WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: NEW-Team Map-7-23, Application Portflio Analysis identifies Application Alignment, IT-related Evaulation Criteria Establishes preliminary due diligence methodology for IT Specialization Areas, Technology integration framework for performing preliminary due diligence for mergers and acquisitions Analyzes business-related integration concerns Current IT Strategy, Enterprise Application Strategy Including, Mismatched culture and values And Probability of Attrition, IT Software Engineering Contributes to the overall technology integration framework by performing High Priority Software Engineering-related evaluation factors of the M&A Candidate, Level of Custom Application usage And Likely cost outlays to align with TIS preferred portfolio, Applications Systems Dependency Review Determines Degree of outsourcing, Opportunities Includes Critical Synergies, High Priority Software Engineering-related evaluation factors of the M&A Candidate Including Application Portflio Analysis, Existence and viability of target company EA And Lack of connection between business and IT strategies, High-level view of M&A target company's areas of critical IT-related strengths or liabilities Standardized with Technology integration framework for performing preliminary due diligence for mergers and acquisitions, And, And, Security posture of mission critical systems that support Supply chain management, Presence or lack of common productivity applications And Presence or lack of sufficient storage infrastructure that is supportive to Trinity data requirements, Enterprise Architecture Analysis Determines Existence and viability of target company EA, Lack of connection between business and IT strategies And Lack of prior significant infrastructure investment, Threat Assessment of Mission Critical Systems evaluates Security posture of mission critical systems, Database and Reporting Analysis Determines Data Model Sufficiency (Potential for data anomalies)