I suppose I should feel honored that Jason Busch would take the time to speculate in his blog about my work and my priorities. I’ve certainly gotten some mail over his blog entry from earlier this week, which is rather comical because it came right after I ended a dry spell of a few weeks.
And Jason is right, I have been extraordinarily busy. But regarding what am I am busy with was completely off the mark. It hasn’t been client consulting days, although I have had several of those and have enjoyed the chance to work in-depth, in person, with Gartner clients. (FYI, Jason, I recommend that you complete a fact check before you publish something – Gartner does not pay commissions to analysts for consulting days.)
What has kept the midnight oil burning in my office is the boatload of inquiries from end user clients that are interested in procurement technologies such as spend analysis, strategic sourcing, e-procurement and contract management. To me this is a major milestone – because the marked volume of interest from such a diverse set of companies (both geographically and industry –wise) is surely a sign that procurement technologies has reached the mainstream. And yes, I did get behind in posting to my blog. However I advocate that quality of postings, not the quantity, be the measure of worth. Moreover, I can’t think of a more wonderful, gratifying reason to be behind on posting to my blog than being busy helping end-user clients achieve their goals.
And by the way, Jason, the call for vendors for the strategic sourcing magic quadrant was absolutely sincere. When end-user clients are your focus audience, there is every incentive to cover vendors that may be of interest to them. And as one last point, while I clearly welcome open discussion of the market and of needs in the blogsphere, what I value most for input into my research is the private conversations I have day in and day out with end users.
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Protect Mobile Apps
Securely enabling applications on corporate- or employee-owned devices is key to protecting enterprise data from misuse. From containers...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.