Technology due diligence: best practices for chief information officers, venture capitalists and technology vendors
"This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa.
Information Science Reference
2009
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIX, 402 S. graph. Darst. |
ISBN: | 9781605660189 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035201093 | ||
003 | DE-604 | ||
005 | 20090616 | ||
007 | t | ||
008 | 081208s2009 d||| b||| 00||| eng d | ||
015 | |a GBA892277 |2 dnb | ||
020 | |a 9781605660189 |c (hbk.) : £85.00 |9 978-1-60566-018-9 | ||
035 | |a (OCoLC)212893624 | ||
035 | |a (DE-599)HBZHT015717628 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-29T | ||
050 | 0 | |a HD30.2 | |
082 | 0 | |a 658.1/62 |2 22 | |
100 | 1 | |a Andriole, Stephen J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Technology due diligence |b best practices for chief information officers, venture capitalists and technology vendors |c Stephen J. Andriole |
264 | 1 | |a Hershey, Pa. |b Information Science Reference |c 2009 | |
300 | |a XIX, 402 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher. | |
650 | 4 | |a Knowledge management | |
650 | 4 | |a Information technology |x Management | |
650 | 4 | |a Chief information officers | |
650 | 4 | |a Decision making | |
650 | 0 | 7 | |a Technologie |0 (DE-588)4059276-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4006432-3 |a Bibliografie |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Technologie |0 (DE-588)4059276-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017007549 |
Datensatz im Suchindex
_version_ | 1804138454218440704 |
---|---|
adam_text | Table of Contents
Preface................................................................................................................ix
Acknowledgment............................................................................................xviii
Section I:
Due Diligence Strategies and Tactics
Chapter I
The Due Diligence Process.................................................................................1
Due Diligence Criteria.........................................................................................2
Criterion #1: The Right Technology.................................................................4
Criterion #2: Few or No Infrastructure Requirements.........................................9
Criterion #3: Budget Cycle Alignment................................................................ 10
Criterion #4: Quantitative Impact......................................................................13
Criterion #5: Changes to Processes and Culture............................................... 14
Criterion #6: Solutions....................................................................................... 15
Criterion #7: Multiple Exits................................................................................16
Criterion #8: Horizontal and Vertical Strength.................................................. 17
Criterion #9: Industry Awareness....................................................................... 19
Criterion #10: Partners and Allies..................................................................... 19
Criterion #11: Politically Correct Products and Services..............................20
Criterion #12: Recruitment and Retention.........................................................22
Criterion #13: Differentiation.............................................................................22
Criterion #14: Experienced Management..........................................................23
Criterion #15: Packaging and Communications............................................25
Criteria Weighting...............................................................................................27
Organization and Execution...............................................................................31
Organizing the Right Team.................................................................................32
Finding and Leveraging Savvy Consultants.......................................................33
Scheduling...........................................................................................................34
Developing Powerful Business Cases.................................................................35
The Business of Business Technology Cases.......................................................36
The Recommendation..........................................................................................39
Execution.............................................................................................................40
Outcomes.............................................................................................................40
References...........................................................................................................45
Endnotes..............................................................................................................46
Chapter II
Acquisition Targets...........................................................................................47
Applications Targets............................................................................................47
Software Applications Investment Guidelines.....................................................56
Communications Targets.....................................................................................58
Communications Technology Investment Guidelines.........................................64
Data Targets........................................................................................................66
Data Investment Guidelines................................................................................72
Infrastructure Targets..........................................................................................73
Infrastructure Investment Guidelines..................................................................76
Security Targets...................................................................................................79
Security Investment Guidelines...........................................................................85
Advanced Technology Targets.............................................................................86
Advanced Technology Investment Guidelines.....................................................91
Services Targets...................................................................................................92
Services Investment Guidelines...........................................................................97
References...........................................................................................................97
Endnote...............................................................................................................98
Chapter III
Business Technology Trends Analysis..............................................................99
Business Technology Trends Analysis Methodology.........................................100
Current and Future Business Models and Processes by Vertical Industry.......108
Advanced Technology Trends............................................................................109
Five Technology Trends That Matter.................................................................Ill
The Combined Effect.........................................................................................131
Implications.......................................................................................................132
Endnote.............................................................................................................134
Section II:
Due Diligence Case Studies
Chapter IV
Venture Investing in Wireless Communications Technology:
The ThinAirApps Case...................................................................................136
Introduction to the Case.................................................................................... 136
The ThinAirApps Opportunity........................................................................... 137
ThinAirApps Solutions...................................................................................... 140
Product Line...................................................................................................... 141
Pricing............................................................................................................... 141
Sales.................................................................................................................142
Customers......................................................................................................... 142
Marketing.......................................................................................................... 143
History and Accomplishments........................................................................... 143
Management Team............................................................................................ 143
Risks.................................................................................................................145
Financials.........................................................................................................146
Forecast............................................................................................................ 146
Additional Funds...............................................................................................146
Investment Highlights....................................................................................... 147
Due Diligence................................................................................................... 148
Conclusion........................................................................................................156
Endnotes............................................................................................................ 156
Chapter V
Enterprise Investing in Remote Access Technology:
The Prudential Fox Roach/Trident Case......................................................157
Introduction to the Case....................................................................................157
Description of the Investment Opportunity.......................................................159
Due Diligence...................................................................................................165
Conclusion........................................................................................................ 174
Endnotes............................................................................................................ 174
Chapter VI
Venture Investing in Voice-Over-IP (VOIP):
The NexTone Communications Case.............................................................175
Introduction to the Case....................................................................................175
Background....................................................................................................... 177
Prior Financing................................................................................................ 178
Management Team............................................................................................178
Market............................................................................................................... 179
Competition.......................................................................................................179
Technology Drivers...........................................................................................181
Market Evolution.............................................................................................. 182
Intellectual Property (IP).................................................................................. 185
Due Diligence................................................................................................... 185
Conclusion........................................................................................................ 188
Endnote............................................................................................................. 190
Chapter VII
Enterprise Investing in Radio Frequency Identification (RFID):
The Oracle Case..............................................................................................191
Introduction to the Case....................................................................................191
Oracle s RFID Investment Strategy..................................................................193
Oracle s RFID Development Roadmap.............................................................195
RFID Hardware Considerations.......................................................................196
RFID Standards................................................................................................ 196
Integration......................................................................................................... 197
Manageability, Scalability, Security.................................................................197
Oracle RFID Partners...................................................................................... 199
The Horizontal and Vertical Market Strategy...................................................201
Due Diligence...................................................................................................202
Conclusion........................................................................................................208
Endnotes............................................................................................................209
Chapter VIII
Technology Product and Service Development in an Enterprise
Architecture Service Capability: The LiquidHub Case..............................210
Introduction to the Case....................................................................................210
Background.......................................................................................................210
The Challenge....................................................................................................211
The Approach....................................................................................................212
The LiquidHub Enterprise Services Transformation Roadmap........................221
Due Diligence...................................................................................................222
Conclusion........................................................................................................228
Endnote.............................................................................................................228
Chapter IX
Venture Investing in E-Mail Trust Solutions: The Postiva Case................229
Introduction to the Case....................................................................................229
Background.......................................................................................................229
The Market and the Opportunity.......................................................................231
Productivity.......................................................................................................233
Business-to-Business Integration and Messaging Optimization.......................234
The Postiva Solution.........................................................................................236
Revenue and Business Model............................................................................238
Competitive Advantages....................................................................................242
Competition.......................................................................................................243
Technology........................................................................................................245
Summary of Projected Financial Performance................................................246
Management: Officers, Directors, and Key Consultants..................................246
Due Diligence...................................................................................................251
Conclusion........................................................................................................256
Endnote.............................................................................................................267
Chapter X
Investing in Knowledge-Based User-Computer Interaction:
The TechVestCo Case......................................................................................258
Introduction to the Case....................................................................................258
The Need for Easier to Use Software Applications...........................................258
The User Interface Workbench.........................................................................259
Components of the Interactive Knowledge-Based Workbench.........................260
Due Diligence...................................................................................................263
Conclusion........................................................................................................268
Endnote.............................................................................................................269
Chapter XI
Enterprise Investing in Wireless Technology:
The Villanova University Case.......................................................................270
Introduction to the Case....................................................................................270
Background.......................................................................................................270
Challenge..........................................................................................................271
Solution.............................................................................................................271
Results...............................................................................................................273
Due Diligence...................................................................................................273
Conclusion........................................................................................................279
Endnote.............................................................................................................279
Section III:
Due Diligence Tools and Techniques
Chapter XII
Tools of the Trade............................................................................................281
Technology Trends Analysis Methodology........................................................281
Off-the-Shelf Tools for the Due Diligence Analysis..........................................285
Due Diligence Project Management.................................................................285
A Due Diligence Template................................................................................287
Reference...........................................................................................................291
Endnote.............................................................................................................291
Section IV:
Appendices
Appendix A
Technology Trends Analysis: Trends in Pervasive Computing...................293
Pervasive Computing Technology Trends.........................................................298
A Pervasive Computing Action Plan.................................................................324
Appendix B
Technology Trends Analysis: Trends in Intelligent
Systems Technology........................................................................................327
Intelligent Decision-Making and Transaction Support.....................................330
Intelligent Systems Technology and the Range of Computable Problem..........337
AI Tools and Techniques...................................................................................338
Why You Need to Understand It........................................................................342
The Range of Applications................................................................................342
Case Study.........................................................................................................344
Appendix C
Technology Trends Analysis: Trends in Business
Technology Integration...................................................................................349
Do You Think?...................................................................................................352
Acceptable Addiction........................................................................................353
Having Fun Yet?................................................................................................354
Privacy.............................................................................................................356
Who is Technology?..........................................................................................356
Now What?........................................................................................................358
The New Compact, or Alignment in the 21s Century...................................360
How to Think.....................................................................................................367
Business Technology Trends.............................................................................377
lOTake-Aways...................................................................................................379
Where is it All Going?.......................................................................................381
Endnote.............................................................................................................391
About the Author............................................................................................392
Index.................................................................................................................394
|
any_adam_object | 1 |
author | Andriole, Stephen J. |
author_facet | Andriole, Stephen J. |
author_role | aut |
author_sort | Andriole, Stephen J. |
author_variant | s j a sj sja |
building | Verbundindex |
bvnumber | BV035201093 |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.2 |
callnumber-search | HD30.2 |
callnumber-sort | HD 230.2 |
callnumber-subject | HD - Industries, Land Use, Labor |
ctrlnum | (OCoLC)212893624 (DE-599)HBZHT015717628 |
dewey-full | 658.1/62 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.1/62 |
dewey-search | 658.1/62 |
dewey-sort | 3658.1 262 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01951nam a2200457 c 4500</leader><controlfield tag="001">BV035201093</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090616 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081208s2009 d||| b||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA892277</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605660189</subfield><subfield code="c">(hbk.) : £85.00</subfield><subfield code="9">978-1-60566-018-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)212893624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT015717628</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD30.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.1/62</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andriole, Stephen J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Technology due diligence</subfield><subfield code="b">best practices for chief information officers, venture capitalists and technology vendors</subfield><subfield code="c">Stephen J. Andriole</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa.</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 402 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Knowledge management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chief information officers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Decision making</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4006432-3</subfield><subfield code="a">Bibliografie</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017007549</subfield></datafield></record></collection> |
genre | (DE-588)4006432-3 Bibliografie gnd-content |
genre_facet | Bibliografie |
id | DE-604.BV035201093 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:28:26Z |
institution | BVB |
isbn | 9781605660189 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017007549 |
oclc_num | 212893624 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-29T |
owner_facet | DE-91 DE-BY-TUM DE-29T |
physical | XIX, 402 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Andriole, Stephen J. Verfasser aut Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole Hershey, Pa. Information Science Reference 2009 XIX, 402 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Premier reference source Includes bibliographical references and index "This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher. Knowledge management Information technology Management Chief information officers Decision making Technologie (DE-588)4059276-5 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf (DE-588)4006432-3 Bibliografie gnd-content Informationstechnik (DE-588)4026926-7 s Technologie (DE-588)4059276-5 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Andriole, Stephen J. Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Knowledge management Information technology Management Chief information officers Decision making Technologie (DE-588)4059276-5 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4059276-5 (DE-588)4026926-7 (DE-588)4006432-3 |
title | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors |
title_auth | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors |
title_exact_search | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors |
title_full | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole |
title_fullStr | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole |
title_full_unstemmed | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole |
title_short | Technology due diligence |
title_sort | technology due diligence best practices for chief information officers venture capitalists and technology vendors |
title_sub | best practices for chief information officers, venture capitalists and technology vendors |
topic | Knowledge management Information technology Management Chief information officers Decision making Technologie (DE-588)4059276-5 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Knowledge management Information technology Management Chief information officers Decision making Technologie Informationstechnik Bibliografie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT andriolestephenj technologyduediligencebestpracticesforchiefinformationofficersventurecapitalistsandtechnologyvendors |