Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Hershey, Pa.
Information Science Reference
2009
|
Schriftenreihe: | Premier reference source
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Abstract: | "This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | XIX, 402 S. graph. Darst. |
ISBN: | 9781605660189 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035201093 | ||
003 | DE-604 | ||
005 | 20090616 | ||
007 | t| | ||
008 | 081208s2009 xx d||| b||| 00||| eng d | ||
015 | |a GBA892277 |2 dnb | ||
020 | |a 9781605660189 |c (hbk.) : £85.00 |9 978-1-60566-018-9 | ||
035 | |a (OCoLC)212893624 | ||
035 | |a (DE-599)HBZHT015717628 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-29T | ||
050 | 0 | |a HD30.2 | |
082 | 0 | |a 658.1/62 |2 22 | |
100 | 1 | |a Andriole, Stephen J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Technology due diligence |b best practices for chief information officers, venture capitalists and technology vendors |c Stephen J. Andriole |
264 | 1 | |a Hershey, Pa. |b Information Science Reference |c 2009 | |
300 | |a XIX, 402 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher. | |
650 | 4 | |a Knowledge management | |
650 | 4 | |a Information technology |x Management | |
650 | 4 | |a Chief information officers | |
650 | 4 | |a Decision making | |
650 | 0 | 7 | |a Technologie |0 (DE-588)4059276-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4006432-3 |a Bibliografie |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Technologie |0 (DE-588)4059276-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017007549 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0002 WIR 640f 2009 B 1303 |
---|---|
DE-BY-TUM_katkey | 1657693 |
DE-BY-TUM_location | 00 |
DE-BY-TUM_media_number | 040006901259 |
_version_ | 1821933441666514945 |
adam_text | Table of Contents
Preface................................................................................................................ix
Acknowledgment............................................................................................xviii
Section I:
Due Diligence Strategies and Tactics
Chapter I
The Due Diligence Process.................................................................................1
Due Diligence Criteria.........................................................................................2
Criterion #1: The Right Technology.................................................................4
Criterion #2: Few or No Infrastructure Requirements.........................................9
Criterion #3: Budget Cycle Alignment................................................................ 10
Criterion #4: Quantitative Impact......................................................................13
Criterion #5: Changes to Processes and Culture............................................... 14
Criterion #6: Solutions....................................................................................... 15
Criterion #7: Multiple Exits................................................................................16
Criterion #8: Horizontal and Vertical Strength.................................................. 17
Criterion #9: Industry Awareness....................................................................... 19
Criterion #10: Partners and Allies..................................................................... 19
Criterion #11: Politically Correct Products and Services..............................20
Criterion #12: Recruitment and Retention.........................................................22
Criterion #13: Differentiation.............................................................................22
Criterion #14: Experienced Management..........................................................23
Criterion #15: Packaging and Communications............................................25
Criteria Weighting...............................................................................................27
Organization and Execution...............................................................................31
Organizing the Right Team.................................................................................32
Finding and Leveraging Savvy Consultants.......................................................33
Scheduling...........................................................................................................34
Developing Powerful Business Cases.................................................................35
The Business of Business Technology Cases.......................................................36
The Recommendation..........................................................................................39
Execution.............................................................................................................40
Outcomes.............................................................................................................40
References...........................................................................................................45
Endnotes..............................................................................................................46
Chapter II
Acquisition Targets...........................................................................................47
Applications Targets............................................................................................47
Software Applications Investment Guidelines.....................................................56
Communications Targets.....................................................................................58
Communications Technology Investment Guidelines.........................................64
Data Targets........................................................................................................66
Data Investment Guidelines................................................................................72
Infrastructure Targets..........................................................................................73
Infrastructure Investment Guidelines..................................................................76
Security Targets...................................................................................................79
Security Investment Guidelines...........................................................................85
Advanced Technology Targets.............................................................................86
Advanced Technology Investment Guidelines.....................................................91
Services Targets...................................................................................................92
Services Investment Guidelines...........................................................................97
References...........................................................................................................97
Endnote...............................................................................................................98
Chapter III
Business Technology Trends Analysis..............................................................99
Business Technology Trends Analysis Methodology.........................................100
Current and Future Business Models and Processes by Vertical Industry.......108
Advanced Technology Trends............................................................................109
Five Technology Trends That Matter.................................................................Ill
The Combined Effect.........................................................................................131
Implications.......................................................................................................132
Endnote.............................................................................................................134
Section II:
Due Diligence Case Studies
Chapter IV
Venture Investing in Wireless Communications Technology:
The ThinAirApps Case...................................................................................136
Introduction to the Case.................................................................................... 136
The ThinAirApps Opportunity........................................................................... 137
ThinAirApps Solutions...................................................................................... 140
Product Line...................................................................................................... 141
Pricing............................................................................................................... 141
Sales.................................................................................................................142
Customers......................................................................................................... 142
Marketing.......................................................................................................... 143
History and Accomplishments........................................................................... 143
Management Team............................................................................................ 143
Risks.................................................................................................................145
Financials.........................................................................................................146
Forecast............................................................................................................ 146
Additional Funds...............................................................................................146
Investment Highlights....................................................................................... 147
Due Diligence................................................................................................... 148
Conclusion........................................................................................................156
Endnotes............................................................................................................ 156
Chapter V
Enterprise Investing in Remote Access Technology:
The Prudential Fox Roach/Trident Case......................................................157
Introduction to the Case....................................................................................157
Description of the Investment Opportunity.......................................................159
Due Diligence...................................................................................................165
Conclusion........................................................................................................ 174
Endnotes............................................................................................................ 174
Chapter VI
Venture Investing in Voice-Over-IP (VOIP):
The NexTone Communications Case.............................................................175
Introduction to the Case....................................................................................175
Background....................................................................................................... 177
Prior Financing................................................................................................ 178
Management Team............................................................................................178
Market............................................................................................................... 179
Competition.......................................................................................................179
Technology Drivers...........................................................................................181
Market Evolution.............................................................................................. 182
Intellectual Property (IP).................................................................................. 185
Due Diligence................................................................................................... 185
Conclusion........................................................................................................ 188
Endnote............................................................................................................. 190
Chapter VII
Enterprise Investing in Radio Frequency Identification (RFID):
The Oracle Case..............................................................................................191
Introduction to the Case....................................................................................191
Oracle s RFID Investment Strategy..................................................................193
Oracle s RFID Development Roadmap.............................................................195
RFID Hardware Considerations.......................................................................196
RFID Standards................................................................................................ 196
Integration......................................................................................................... 197
Manageability, Scalability, Security.................................................................197
Oracle RFID Partners...................................................................................... 199
The Horizontal and Vertical Market Strategy...................................................201
Due Diligence...................................................................................................202
Conclusion........................................................................................................208
Endnotes............................................................................................................209
Chapter VIII
Technology Product and Service Development in an Enterprise
Architecture Service Capability: The LiquidHub Case..............................210
Introduction to the Case....................................................................................210
Background.......................................................................................................210
The Challenge....................................................................................................211
The Approach....................................................................................................212
The LiquidHub Enterprise Services Transformation Roadmap........................221
Due Diligence...................................................................................................222
Conclusion........................................................................................................228
Endnote.............................................................................................................228
Chapter IX
Venture Investing in E-Mail Trust Solutions: The Postiva Case................229
Introduction to the Case....................................................................................229
Background.......................................................................................................229
The Market and the Opportunity.......................................................................231
Productivity.......................................................................................................233
Business-to-Business Integration and Messaging Optimization.......................234
The Postiva Solution.........................................................................................236
Revenue and Business Model............................................................................238
Competitive Advantages....................................................................................242
Competition.......................................................................................................243
Technology........................................................................................................245
Summary of Projected Financial Performance................................................246
Management: Officers, Directors, and Key Consultants..................................246
Due Diligence...................................................................................................251
Conclusion........................................................................................................256
Endnote.............................................................................................................267
Chapter X
Investing in Knowledge-Based User-Computer Interaction:
The TechVestCo Case......................................................................................258
Introduction to the Case....................................................................................258
The Need for Easier to Use Software Applications...........................................258
The User Interface Workbench.........................................................................259
Components of the Interactive Knowledge-Based Workbench.........................260
Due Diligence...................................................................................................263
Conclusion........................................................................................................268
Endnote.............................................................................................................269
Chapter XI
Enterprise Investing in Wireless Technology:
The Villanova University Case.......................................................................270
Introduction to the Case....................................................................................270
Background.......................................................................................................270
Challenge..........................................................................................................271
Solution.............................................................................................................271
Results...............................................................................................................273
Due Diligence...................................................................................................273
Conclusion........................................................................................................279
Endnote.............................................................................................................279
Section III:
Due Diligence Tools and Techniques
Chapter XII
Tools of the Trade............................................................................................281
Technology Trends Analysis Methodology........................................................281
Off-the-Shelf Tools for the Due Diligence Analysis..........................................285
Due Diligence Project Management.................................................................285
A Due Diligence Template................................................................................287
Reference...........................................................................................................291
Endnote.............................................................................................................291
Section IV:
Appendices
Appendix A
Technology Trends Analysis: Trends in Pervasive Computing...................293
Pervasive Computing Technology Trends.........................................................298
A Pervasive Computing Action Plan.................................................................324
Appendix B
Technology Trends Analysis: Trends in Intelligent
Systems Technology........................................................................................327
Intelligent Decision-Making and Transaction Support.....................................330
Intelligent Systems Technology and the Range of Computable Problem..........337
AI Tools and Techniques...................................................................................338
Why You Need to Understand It........................................................................342
The Range of Applications................................................................................342
Case Study.........................................................................................................344
Appendix C
Technology Trends Analysis: Trends in Business
Technology Integration...................................................................................349
Do You Think?...................................................................................................352
Acceptable Addiction........................................................................................353
Having Fun Yet?................................................................................................354
Privacy.............................................................................................................356
Who is Technology?..........................................................................................356
Now What?........................................................................................................358
The New Compact, or Alignment in the 21s Century...................................360
How to Think.....................................................................................................367
Business Technology Trends.............................................................................377
lOTake-Aways...................................................................................................379
Where is it All Going?.......................................................................................381
Endnote.............................................................................................................391
About the Author............................................................................................392
Index.................................................................................................................394
|
any_adam_object | 1 |
author | Andriole, Stephen J. |
author_facet | Andriole, Stephen J. |
author_role | aut |
author_sort | Andriole, Stephen J. |
author_variant | s j a sj sja |
building | Verbundindex |
bvnumber | BV035201093 |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.2 |
callnumber-search | HD30.2 |
callnumber-sort | HD 230.2 |
callnumber-subject | HD - Industries, Land Use, Labor |
ctrlnum | (OCoLC)212893624 (DE-599)HBZHT015717628 |
dewey-full | 658.1/62 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.1/62 |
dewey-search | 658.1/62 |
dewey-sort | 3658.1 262 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01952nam a2200457 c 4500</leader><controlfield tag="001">BV035201093</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090616 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">081208s2009 xx d||| b||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA892277</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605660189</subfield><subfield code="c">(hbk.) : £85.00</subfield><subfield code="9">978-1-60566-018-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)212893624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT015717628</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD30.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.1/62</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andriole, Stephen J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Technology due diligence</subfield><subfield code="b">best practices for chief information officers, venture capitalists and technology vendors</subfield><subfield code="c">Stephen J. Andriole</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa.</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 402 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Knowledge management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chief information officers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Decision making</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4006432-3</subfield><subfield code="a">Bibliografie</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017007549</subfield></datafield></record></collection> |
genre | (DE-588)4006432-3 Bibliografie gnd-content |
genre_facet | Bibliografie |
id | DE-604.BV035201093 |
illustrated | Illustrated |
indexdate | 2024-12-20T13:25:45Z |
institution | BVB |
isbn | 9781605660189 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017007549 |
oclc_num | 212893624 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-29T |
owner_facet | DE-91 DE-BY-TUM DE-29T |
physical | XIX, 402 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spellingShingle | Andriole, Stephen J. Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Knowledge management Information technology Management Chief information officers Decision making Technologie (DE-588)4059276-5 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4059276-5 (DE-588)4026926-7 (DE-588)4006432-3 |
title | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors |
title_auth | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors |
title_exact_search | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors |
title_full | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole |
title_fullStr | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole |
title_full_unstemmed | Technology due diligence best practices for chief information officers, venture capitalists and technology vendors Stephen J. Andriole |
title_short | Technology due diligence |
title_sort | technology due diligence best practices for chief information officers venture capitalists and technology vendors |
title_sub | best practices for chief information officers, venture capitalists and technology vendors |
topic | Knowledge management Information technology Management Chief information officers Decision making Technologie (DE-588)4059276-5 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Knowledge management Information technology Management Chief information officers Decision making Technologie Informationstechnik Bibliografie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017007549&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT andriolestephenj technologyduediligencebestpracticesforchiefinformationofficersventurecapitalistsandtechnologyvendors |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Stammgelände
Signatur: | 0002 WIR 640f 2009 B 1303 |
---|---|
Exemplar 1 | Ausleihbar Am Standort |