Merger and acquisition impose great challenges for small and medium size businesses (SMBs). Successfully executing the M&A transaction is difficult but the reward can be great, a singular milestone in the life of a business. Determining the value of a business today includes far more than what’s revealed in a company’s financial documents.

Data as an Asset – Creating Tech Equity

The data assets of an organization are major components of the current and future value of the enterprise. Technology provides vast amounts of data that become valuable assets when standardized and enriched by a business’s development of the products, processes and services that meet the needs of customers.

Emerging data analytic technologies that have been used successfully in other aspects of business, are now being used in M&A. These tools greatly reduce the time and effort to gather and organize data and increase the discovery of value or identify risks. Artificial intelligence, data analytics and machine learning are being incorporated into platforms that let M&A teams ingest and standardize large data sets with processing power to rapidly evaluate numerous potential scenarios.

Speed is an important capability during due diligence. It is not uncommon for the process to take 60 to 90 days to complete. During that time key staff, leaders and subject matter experts are diverted from the day to day important functions of the business to spend hours in meetings. The longer this process takes the more likely the deal will be derailed as patience decreases and frustration mounts. The automated application of AI and data analytics can accelerate the process and free up staff to concentrate on the business.

A greater benefit than speed is the insight these new platforms can provide. For the SMB this insight exposes a layer of value – the digital data asset, equity that is increasingly important to the future of the business. With focus beyond company financial data, AI and data analytics enable a new tier – Data Due Diligence. These tools can combine and analyze data to provide insights that will be the basis for new products, services and revenue streams.

SMB leaders and their C-Suite team will be able to use AI powered data due diligence to fully and accurately demonstrate the value of their business and to identify the value of potential acquisition targets.

Automation Leveraging the Playing Field for SMBs

To take full advantage of these technologies, SMBs can look to external partners.

These firms have developed advanced automation capabilities and employed people with the mindset and expertise to use these tools for maximum benefit in due diligence for M&A. The major consulting firms and partners who focus on particular industry sectors offer services based on these new platforms. They have established practices that look at M&A in a new way and take into account the full potential of businesses. They evaluate a business’s approach to data and level of digital maturity, how companies normalize their data and use it across all aspects of the business to take advantage of its current and future potential.

External partners can help SMBs avoid the cost of developing or employing due diligence expertise. SMBs though can take steps to prepare their organizations to benefit from automated due diligence.

  • Become familiar with advanced automation, AI, data analytics and machine learning.  Attend conferences to see how these technologies are benefiting your industry sector.
  • Conduct pilots and proof of concept initiatives.
  • Identify individuals at different levels in your organization. Prepare them with the skillset and mindset to work with and help develop the latest digital M&A tools. Those people will help select the right partner to assist with a transaction.
  • Step away from reliance solely on the traditional M&A due diligence playbook. Use a shadow process to gain experience with new tools and data sources.
  • Become familiar with new pools of information. Data sources such as third party data and social media. They can provide a more complete picture for decision making.
  • Incorporate analytics as a core capability. Don’t use it merely as a decision aid. Use analytics as an ongoing capability for valuing your organization and potential targets.

Evolving Importance of Data Due Diligence

As an SMB, be aware of a growing trend among Private Equity (PE) firms to use AI and data analytics to continuously scan the environment. Their objective is to discover target acquisitions and to find potential synergies with sister companies in their portfolios. Analysis of the data equity a company has built combined with that of other portfolio companies will create new revenue streams or potential for cost efficiencies through consolidations. This is an opportunity for SMBs to leverage their data assets. To the extent that you can use advanced analytics, AI and ML to increase your digital maturity, you can increase your valuation and present as an attractive target.

The COVID-19 pandemic has added tremendous disruption to the M&A landscape.

Covid-19 slammed the door on M&A in February 2020. Transactions were halted in mid-process. Seller and buyers fled the marketplace. As the economy worsened, the basis for valuations eroded and traditional due diligence lost credibility.

A year into the crisis, activity has begun to return. The paradigm shift has opened up opportunities for some companies and left others in shambles. Bargain hunters are busy snapping up distressed businesses and using advanced analytics to try to discover who the winners and losers will be in this new environment and the environment that will emerge down the road.

Interestingly the pandemic has had an accelerating effect on the M&A process. The remote, work-from-home technologies used by us and our children (Zoom, Skype, et al.), along with abandonment of travel, group meetings, and social contact have streamlined the process.

Firms that once had to focus on one transaction at a time now can process multiple transactions simultaneously, in their pajamas!

Drone videos are now taking the place of plant tours and the long days that used to involve parties on both sides of a transaction and their costly consultants.

The increased volatility, accelerated pace and the discounted value of years of historical business data present challenges for advanced technologies and the M&A participants who deploy them. These challenges will, however, be met and overcome. Data due diligence as an integral part of the M&A process enabled by AI and similar tools will play a central role in defining the future business environment.

SMBs should prepare now to build data equity and to partner with the service providers who can maximize its benefit.

[This article was originally published on www.cdomagazine.tech.]

The year 2020 has presented significant challenges to businesses worldwide. Leaders in those businesses have had their lives turned upside down personally and professionally. Business plans have been blown apart. In some cases, the fundamental assumptions about products, customers supply chains and staff have been thrown into question. Enterprise architects, or EA’s charged with defining the technical strategies that have been supporting and transforming businesses find themselves in new and unfamiliar environments. Major paradigm shifts have taken place and EAs are now responsible for rationalizing the technical architecture for a new environment.  

Disruption is unsettling but the same disruption contains opportunities as the landscape changes and customers, employees, and suppliers have new needs, expectations, and constraints. One constant in the pre and post pandemic environment that technology architects will recognize is Technical Debt. Experienced architects know their biggest challenge is not necessarily in deploying new applications, new platforms, or capabilities but managing investment in technology, balancing that investment with other business priorities. Striking that balance means recognizing and managing technical debt. The pandemic crisis presents EAs with new priorities and opportunities for managing that Technical Debt 

recently published “Tech Debt 2.0® How to Future Proof Your Small Business and Improve Your Tech Bottom Line”. The timely release of that book is crucial to small and medium businesses. However, reaction from readers has shown that the books concepts and recommendations, especially now, are equally valuable to CIOs and technology architects in larger enterprises. 

Let’s step back though and examine the concept of Tech Debt. Initially technical debt was defined as defective code released to rush a product to market. Today with technology permeating nearly every aspect of a business and in light of the realities of the new environment, it’s important to expand the definition of tech debt – Tech Debt 2.0 is any liability incurred in the development, acquisition, use and retirement of technology – i.e. hardware and software systems, or the skills set needed to support them. EAs must reevaluate the role of technology in their enterprise. This means reprioritizing investments in legacy systems, infrastructure and skill sets, be ready to abandon obsolete, dysfunctional systems, processes and methodologies.  

Architects must assess the changed needs of the business, – customers, staff, supply chain and identify efficient technology to support those new requirements. 

There is opportunity to walk away from legacy technology containing Unplanned Tech Debt that has never been corrected, the result of poor practices or poorly communicated requirements 

The move to remote workspace may present the option to discontinue the use of equipment or applications that have become instances of Creeping Tech Debt where features become obsolete, replaced by the better, faster more capable upgrades. Orthe applications and operating systems are no longer supported, causing security vulnerabilities. 

Changes in market dynamics as the customer base struggles to understand their new needs, constraints and opportunities invite architects and product developers to consider incurring Intentional Tech Debt. By releasing prototypes and minimal viable products (MVPs) customers become partners in product development, helping to build the plane even as it reaches cruising altitude. Architects know this will entail false starts as perceived requirements morph or fade away and require rework as the product matures. But the approach may buy competitive advantage as all players scramble to find their way in the new market space.  

Internally the pandemic disruption will raise the threat of Tech Debt in the form of shadow IT, as frustrated, impatient functional area leaders are tempted to deploy their own solutions outside the guidelines required by a coherent architecture.  Hmmm, let’s see will it be Zoom, or Skype, or Aircall, Slack, Microsoft Teams, GoToMeeting, Hopin and on and on. Unapproved, unmanaged tools can have cybersecurity issues or fracture data integrity by creating multiple versions of the truth. 

This far into the Covid-19 crisis we have seen the very real existential threat as businesses in more vulnerable industry sectors are forced to permanently close. 

As this continues there will be increased activity in mergers and acquisitions. Enterprise architects have an important role to play on both sides of an M&A transaction. Both involve the aggressive management of Tech Debt 

To maximize the benefit of selling a business or merging with another organization a company must recognize and eliminate excessive Tech Debt. Unsupported, dysfunctional legacy technology can represent major liability to a potential buyer omerger partner. Such a liability could significantly affect the value of the transaction. An EA needs to foresee and mitigate this by communicating effectively with stakeholders the consequences of Tech Debt. 

The EA with the acquiring company is responsible for effective due diligence that uncovers instances of Tech Debt. These include, not just some of the obvious liabilities mentioned so far but also unsuspected instances such as software license stipulations where, for example, the sheer number of employees in a new organization can vastly increase the software maintenance costs even if the number of actual users doesn’t increase. Tech Debt can not only alter the price of a transaction but create an unsurmountable deal breaker. 

Managing Tech Debt is an important part of an organizations response to the pandemic crisis. Enterprise architects and leaders charged with IT governance have the opportunity and actions they can take on offense and defense to manage Tech Debt to protect their business. 

 Top 10 Plays for EAs managing Tech Debt:

  • Stay healthy, your family and business need you. 
  • Do a health check of your project portfolio and reprioritize any Tech Debt backlog. 
  • Refocus IT governance to accelerate decision making and maintain goal alignment with the organization 
  • Develop an “acute” action plan with intent and purpose for the next 30,60, 90 and 180 days and execute flawlessly. 
  • Prioritize actions that focus on revenue preservation and customer experience. 
  • Diagnose your Tech Debt and plan to address root causes. 
  • Conduct a business impact analysis to prioritize your cyber risks. 
  • Review and revise essential “pandemic” security policies and practices. 
  • Engage your internal team and external partners to best utilize their resources and identify cost saving opportunities. 
  • Protect core operations and monitor critical infrastructure services for internal users. 

 

Michael C. Fillios is the Founder and CEO of IT Ally, LLC., a leading IT and Cyber Advisory firm for small and mid-size businesses. He is a four-time CIO, entrepreneur and senior global business and technology executive with over 25 years of experience in transformation, change leadership and operations management in the Pharmaceutical, Industrials, Automotive, Banking and Consulting Industries. His first book, Tech Debt 2.0®: How to Future Proof Your Small Business and Improve Your Tech Bottom Line, was published by the IT Ally Institute in April, 2020. 

In 2020, he formed the IT Ally Institute, a non-profit organization that provides research, best practices, thought leadership and peer to peer programs specifically developed for small and mid-sized businesses. To learn more about the IT Ally Institute and register for our latest research, thought leadership and peer to peer round tables, please visit www.Itallyinstitute.org

[This article was originally published on architectureandgovernance.com.]

Search for quotes about debt and you will find this from American businessman and author, Robert Kiyosaki, “10% of the borrowers in the world use debt to get richer – 90% use debt to get poorer.” The glaring takeaway here, avoid debt at all cost. But wait a second. Can debt make you richer? Can debt be a good thing?

2020 has turned the world upside down. Small business owners are among the hardest hit. The pandemic and resulting economic disruption have challenged SMBs, undercutting established business plans and negating processes leaders have developed and relied on for the health of their businesses. Managing technology, where SMBs are typically at a disadvantage to large enterprises with greater resources, needs to be reevaluated. When disruption resets the score in competitive markets and everyone is, more-or-less starting over, there can be opportunity in reassessing strategies and assumptions.

intentional tech debt SMB.

Technical debt is a concept in technology management that is similar to financial debt. It is the backlog of work and support needed to correct errors and shortcomings in a product built by cutting corners and with other expedient measures to speed release to market. In effect the developers borrow time that would be spent on complete, error free design and development to get product to market early. The interest on that borrowed time is the added effort to work down the backlog that could be directed at new projects. The difference between technical debt and financial debt is that the interest is not paid to a bank or outside entity but is paid with the internal resources of the business.

Technical debt (Tech Debt 2.0®) can be unintentional (poor practices, inexperience), evolutionary (aged infrastructure, obsolescence) or intentional, a deliberate choice to borrow time for competitive advantage.

The disruption in today’s environment, given new customer needs and desires, the constraints on customers and providers brought on by the pandemic have created new market opportunities that will be lasting and lucrative. Timing is essential and the new market’s requirements are emerging and not clearly defined. An SMB could benefit with the assistance of a design and developer partner with an insider’s perspective.

In my research on Tech Debt, I interviewed a consultant who worked with a firm developing a mobile application for retail sales in the floral sector. The product had good prospects and the enthusiastic backing of investors. The development team however, were reluctant to release anything but a product complete with the full functionality they envisioned and superior performance and reliability. Projected deadlines were established and repeatedly missed as the team added feature upon feature and subjected each version to rigorous regression testing. Weeks turned to months as investors lost patience and interest and similar products began to surface in the market. Perfect had clearly become victor over good and an opportunity had wilted away.

Our interview then led to exploration of intentionally incurring Tech Debt via a design strategy known as Minimal Viable Product (MVP). An MVP strategy invites technical debt by borrowing the attention of the potential customer base to act as a partner in the design and development of the application. Careful and deliberate priority is given to the customer who is presented with an application pilot containing valuable but minimal features. The internal developers formalize a hypothesis about the value the pilot contains for the customer. The customer benefits from that initial valuable functionality and provides feedback as to how the pilot should evolve to provide the next incremental value.

From here on, developers follow the customer’s lead modifying the hypothesis, effectively testing the stream of high-fidelity feedback from the user community as the product evolves. It is important throughout this process that the developers concentrate on the needs of the customer and are not distracted by the underlying technology or changes in the technology environment. That focus on the customer is now the “interest” being paid to service the tech debt. If you pay down this debt and the application becomes a success in the market you will have successfully incurred tech debt and gained a return greater than if you had remained debt free. Likewise, if the potential customer base fragments or the requirements diffuse beyond capabilities to the point where your return on investment diminishes, you will have early warning and can disengage and apply resources to other projects and initiatives.

This example demonstrates how a business can use tech debt to their benefit. This is especially so in an unsettled environment where there is opportunity to strike out on new ground and leverage new factors in the marketplace. Similar to financial debt however, intentionally incurred Tech Debt needs to be carefully monitored and managed.

Here are some pointers to help when using intentional Tech Debt as a strategy for product development.

  • With the customer driving product development, you will build a significant backlog of work that needs to be completed. That means you need to carefully scan and monitor the customer base and market.
  • Formally identify the size of the initial opportunity you envision. Document the size and timing of the revenue opportunity.
  • Track the participation and input of your development partners. Be aware of fragmentation or of one or more segments developing the need for specialization not shared by the general population. (Adobe Inc. encountered this as high-end commercial customers developed sophisticated graphic requirements not shared by desk-top-publishing consumers).
  • Even though the customer is driving development, be wary of scope creep that could lead to requirements outside the bounds of the target opportunity.
  • Monitor your Tech Debt backlog and make sure it is in proper balance with the market growth opportunity. Make sure your potential upside is worth more than your debt obligation.
  • Avoid the temptation to capture the last marginal dollar. Obsolescence and advances in technology will add to the Tech Debt backlog and block new opportunities.

[This article was originally published on databirdjournal.com.]

The virus pandemic of 2020 is severely disrupting the economy and the large and small businesses that drive it. Poor practices such as ignoring safe distancing, insufficient sanitation, and not mandating mask-wearing open the door to infection of customers and staff and threaten the viability of a business.

Similarly, poor practices that allow a business to incur technical debt open the door to cybersecurity exploits that can bankrupt a business financially or through loss of trust and reputation in the eyes of its customers. Leaders of small and medium size businesses (SMBs) often think their size lets them operate under the radar, as less attractive targets to bad guys. But, actually, their lack of robust security strategy and resources make them easier to penetrate. And, sadly, the National Cyber Security Alliance (NCSA) reports that 60 percent of small companies are unable to sustain their business more than six months following a cyberattack.

Years of experience working and advising businesses domestically and internationally has shown that business leaders find it difficult to recognize tech debt and how it exposes cyber vulnerability. As technology has evolved over time from main frame to client server to the Internet and now the cloud, the impact of a new Tech Debt 2.0® has grown stealthier and more sinister. This is especially true for SMBs that lack the resources to apply to cybersecurity. CEOs and CFOs managing technology may not recognize tech debt building up in their SMBs—because it is not revealed in monthly variance reports or other accounting controls. Someone in their organization, without explicit or implicit authority or oversight, may be making decisions adding to the Tech Debt 2.0 load and increasing exposure to cyberattacks. Let’s look at how that might happen and how to prevent it.

Old and Obsolete Infrastructure:

Azeotrope, an aerospace firm in the Southeast, realized they were compromised when a number of clients complained of receiving invoices from Azeotrope that contained confidential information about their client’s orders and projects. Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant. Because the device was connected to the company’s network for printing purposes, it provided network access using out-of-date insecure facsimile protocols. This gave the bad actors access to the company’s customer accounts and valuable data.

“Fax is an ancient technology; the protocols we use today haven’t been changed for the past 30 years,” notes Yaniv Balmas of Check Point Software, a leading provider of cyber threat intelligence. “Fax data is sent with no cryptographic protections; anyone who can tap a phone line can instantly intercept all data transmitted across it. Fax is always sent unauthenticated. There are absolutely no protections over fax.” Balmas advises: “If you can’t stop using fax, segregate the printers, put them on a separate network.”

The Tech-away: Identify and remove obsolete components from your network. Not just equipment with obvious vulnerabilities like fax, but all equipment no longer supported and updated by the manufacturer for cybersecurity risk.

A Stitch in Time . . .

Patches are often created after a software or hardware company has experienced a data breach or recognized a vulnerability that might allow one. The patch is issued to ensure other businesses’ data remains safe. Applying a patch as quickly as possible lessens the risk of your business becoming affected. But it is each business’s responsibility to know a patch has been issued and to apply it promptly. That is patch management—a relatively straightforward process, 10 or 20 years ago. Today, however, the vast proliferation of software and hardware components in our business environment have made patch management a complex, time- and resource- consuming necessity, critical to the cybersecurity of a business’s network. Failure to effectively manage patching is a main cause of accumulating excessive Tech Debt 2.0 and security penetration.

NETGEAR, a highly respected manufacturer of network equipment in data centers, offices, and the homes of hundreds of thousands of people working from home now, and, possibly, far into the future, recently sent an email alert to its customers. An excerpt is below. How would your CFO or CIO handle this?

Hello.

We have become aware of vulnerabilities involving certain NETGEAR products and have issued a security advisory.

We have released hotfixes addressing some of the vulnerabilities for certain impacted models and continue to work on hotfixes for the remaining vulnerabilities and models, which we will release on a rolling basis as they become available. We strongly recommend that you download the latest firmware containing the hotfixes as instructed in the security advisory. We plan to release firmware updates that fix all vulnerabilities for all affected products that are within the security support period.

Until a hotfix or firmware fix is available for your product, we strongly recommend turning off Remote Management in your product. Please follow the steps below to turn off Remote Management immediately. . .

The Tech-away: Take steps to reduce the burden and complexity of patch management. Adopt software and hardware that automatically detect and apply patches. Look for opportunities to shed responsibility for patch management through outsourcing cybersecurity responsibility or utilizing cloud services that provide monitoring and patch management services. Tech Debt accrued through failure to manage patching effectively can fatally compromise your network and business.

People, Policies and Processes

Of greater consequence than obsolescence and patch management to Tech Debt 2.0 and cybersecurity are the people, policies, and processes that make up the culture and collective mindset of a business organization. Properly patched, up-to-date infrastructure is not going to stand in the way of the accounts payable clerk or chief marketing officer who clicks on the attachment to an email from some bad actor posing as a trusted vendor or prospective customer. Equally dangerous is the computer operator who props open the data center door to make it easier to allow the guy who says he’s the A/C maintenance engineer get in and out. Or the CEO who shares her password with her husband and children so they can access her mail and messaging accounts.

Establishing a data security mindset from the bottom to the very top of an organization is a basic essential to safeguarding a business from cyberattacks. Policies and processes must instill in all the company’s people an always-on awareness of their responsibility to protect the physical and digital assets of the enterprise. That mindset needs to be reinforced frequently and backed up by actions that demonstrate commitment and consequence behind company policies and processes.

The Tech-away: Formulate and clearly communicate policies and processes governing any actions that involve cybersecurity. Visibly demonstrate across the organization the commitment to security.

Make cybersecurity awareness a visible priority for every person in the organization.

[This article was originally published on strategydriven.com.]

2020 has brought business leaders challenges, undercutting established business plans and negating processes and practices leaders have developed and relied on for the health and success of their business. The pandemic and resulting economic disruption have taken a toll on all businesses, but especially small and medium-sized businesses (SMBs), which typically do not have the resources available to large enterprises.

In this environment, technology is a double-edged sword, presenting an existential threat and, at the same time, an opportunity to reevaluate and reposition a business for competition in a changed world. Size and agility can work in favor of the SMB that is not burdened with entrenched technology permeating processes spread across many functional areas.

Repositioning a business will mean developing new capabilities. But, just as important is reevaluating, reprioritizing and purging obsolete, dysfunctional infrastructure and systems that no longer move the business in the desired direction at the right cost and proper speed. This means managing technical debt in a business.

Technical debt, or Tech Debt, is similar to financial debt, but paying it down drains internal resources as opposed to paying interest and principle to a bank. Tech Debt costs a business time, project funding, staff turnover and competitive standing. It can accumulate silently and become a threat to the future of a business.

Staying on top of Tech Debt is especially difficult for SMBs that might not have the technology departments, CIOs and CTOs of larger organizations. However, a successful campaign to manage Tech Debt can benefit from the assistance and guidance of outside resources that can extend your enterprise.

Assessment of technology currently used by a business can best be accomplished by an independent party who is not influenced by past history, pride of ownership or a protectionist bias.

A substantial portion of infrastructure and applications adopted by businesses in the last ten years and earlier is obsolete, functionality insufficient or supported at costs far out of proportion to the benefits provided. Servers, storage systems, some proprietary network and communications equipment, proprietary applications systems for back office, customer relations, sales and email have all evolved to alternative solutions that are cloud-based, shared, secure, on-demand, off-premise and third-party supported.

Independent, experienced firms and individuals with no interest in promoting any one solution are poised to provide their expertise to help SMBs differentiate real technology advances from technology-of-the day solutions. They have years of experience working in finance and technology with large and small companies and have helped develop technology management strategies that position these businesses for the future.

These resources represent a continuing trend in today’s workplace. The gig economy provides supertemps and experienced executives who have left corporate positions and become greypeneurs. They provide not only fractional services as traditional consultants but also often as virtual CIOs, CFOs or CTOs, available on-demand to fill these roles for SMBs and help manage technology investment and technology strategies for the future.

49 percent of self-employed workers are baby boomers who want to share their important life experiences and give back to businesses, especially SMBs, that appeal to their natural inclination toward independence and self-reliance.

Another path open to SMBs addressing Tech Debt is collaboration. There can be substantial value in a collective approach to addressing shared issues.

Collaboration opportunities come in a variety of forms and have different advantages. User groups foster collaboration among similar organizations sharing a particular technology or even a particular brand or product. These groups can exert powerful influence on the evolution and future direction of a technology. Industry sectors have broader, collaborative trade associations that address issues shared by businesses in that sector.

Geographically structured organizations such as regional chambers of commerce provide forums to inform and educate business leaders, promoting cross pollination and the sharing of ideas. A unique benefit of such organizations is the insight they provide to businesses confronting new issues or adopting technology early on, helping the community foresee issues and emerging trends. Collaboration allows an SMB to monitor competitive businesses and benchmark key performance indicators, including the variables that contribute to Tech Debt.

Today’s constraints on small and medium-sized businesses provide some advantages over established larger businesses heavily invested in the past and with large internal staffs needed to support processes and practices that have evolved over time. These larger companies are feeling pressure to look more like SMBs.

“The prevalence of lean management teams, the post-recession drive to cap costs, and the accelerating pace of change combine to make temporary solutions compelling,” as authors Jody Greenstone Miller and Matt Miller observe in their Harvard Business Review article, “The Rise of the Supertemp.” Extending the SMB enterprise through judicious use of external resources can be an effective and efficient means to manage Tech Debt and prepare for the future health and resilience of the business.

Here are some pointers to help when enlisting the assistance of external resources:

An independent perspective is a big advantage assessing the state of an organization. Use a combination of internal knowledge and outside perspective to evaluate the infrastructure, systems, processes, staff and technology investment strategy of the business.

Know the people, services and expertise level available to your business. Consider outsourcing non-core competencies and infrastructure components. Prepare for and use the shared and scalable cloud resources to limit capital and operating expense.

Become familiar with fractional expertise resources–virtual C-suite staff. Consider their use on major tech projects, investment planning, M&A due diligence and more.

Develop and use collaboration strategies with an ecosystem of providers, advisors, organizations and partners.

Lastly, value the resources that serve you the way you would have your customers value you. Do not underestimate the ability and willingness of people to understand and address your issues.

[This article was originally published on smallbizclub.com.]

Years of experience working in finance and technology at large, mid-sized, and small businesses have taught me that business leaders face real challenges managing the technology their company needs to operate effectively and stay competitive. This is especially the case for small and mid-sized businesses (SMBs), which typically do not have the resources available to large enterprises. The challenge has grown significantly in recent years as businesses have adopted technologies to meet the expectations of their customers and to compete for advantage in the digital world.

The challenge is not necessarily in deploying new applications or platforms but in managing investment in technology and balancing that investment with other business priorities. Striking that balance means recognizing and managing technical debt.

Technical debt is similar to the financial debt a business can incur through salary and benefit commitments, plant and equipment payments, and loans. But there are critical differences. Unlike financial debt, technical debt is not paid to outsiders: It is debt a business owes internally that needs to be paid with internal resources such as time, diverted funding, market opportunity, and competitive standing. Also, unlike financial debt, technical debt is not clearly identified by the reporting built into a business’ financial and accounting practices. Unless it is routinely monitored and measured, it can accumulate unchecked and become a destructive threat to the future of a business.

Initially, technical debt was defined as defective code released to rush a product to market. Today with the widespread adoption of technology, the expanded definition of tech debt, or Tech Debt 2.0®, includes any liability incurred in the development, acquisition, use, and retirement of technology, from hardware and software systems to the skillsets needed to support them. Just like the evolution of technology over the past several decades has occurred from mainframe to client server to the internet and now the cloud, Tech Debt 2.0 has steadily grown smarter, stealthier, and more sinister.

Tech Debt 2.0 can be broken down into three main types:

Unplanned Tech Debt is unintentional. It typically stems from flawed practices, such as insufficiently trained code developers using overly complicated, undocumented, and unsupervised coding techniques. Poor communication between parties in preparation of requirement specifications and unforeseen changes to product requirements can also be factors. Unplanned tech debt often occurs in the beginning stages of a project and, if recognized, can be corrected without overhauling or scrubbing a project.

Creeping Tech Debt is sneaky. It may initially be non-existent in a new application or piece of hardware infrastructure. Over time though, obsolescence takes its toll. Changes to the needs or size of the user base reveal weakness in the design. Performance issues begin to increase. Increased incidents of downtime and time spent on maintenance drain the productivity and morale of technicians and engineers. At the same time, CTOS and CIOs face an uphill battle convincing the C-Suite to invest in replacing an infrastructure that has worked in the past and continues to work, if not optimally.

The way to combat creeping tech debt is to highlight the creep and its costs. Track time spent on staff performing rework, doing maintenance, and fixing the same issues over and over again. Track the time this work takes away from progress on new projects and product development. Measure the number and duration of failures. Communicate the effect of these incidents on customers to departments throughout the business. Correlate rework time and downtime to staff turnover and productivity measures. Benchmark technology performance and investment against industry best practices. Periodically review application and equipment portfolios. Know and communicate the life cycle status of the business’ technology. Include phone systems, physical plant and electrical components.

Intentional Tech Debt has the potential to be good for a business — if approached with balance. There is a constant tug of war and tension between marketing and technical development. Marketing product managers want to move product to customers as quickly as possible. That is key to capturing market share and gaining competitive advantage. Technology developers want all the time and information necessary to design, build, and test products of the highest quality with all the performance characteristics and capabilities a customer could envision. Give developers their way and the “perfect” product might well be late to market and just one of a number of similar products among leading competitors. Oh, and in the time it took to build and exhaustively QA that product, customer requirements might well have shifted.

A middle ground addresses time-to-market considerations while delivering customers a minimally viable product, with full disclosure that it lacks certain desirable features or may contain “bugs.” Accepting intentional tech debt has let the product get to market first or, at least, early. It has let customers benefit from the initial product capability and has given them a powerful voice in the product’s evolution, letting their user experience refine further requirements and priorities. Intentional tech debt has recruited the customer as a key part of future development and freed the technology developers to concentrate on evolving features instead of trying to discern from afar what the customer might want next. Tech debt deployed in this manner places the technology developer in the perfect position to exercise the agile methodology.

Different kinds of Tech Debt 2.0 lurk in all kinds of businesses, and even the most brilliant among us can miss what’s right in front of us. Like other business disciplines, technology departments require monitoring, measurement, and management. Implementing a comprehensive diagnostic provides unique insights into the causes of Tech Debt 2.0 and highlights areas that need improvement.

The results reflect your company’s level of technomic health:
Excellent: Tech Debt 2.0 is being proactively managed jointly by the business and the tech team with a strong focus on innovation and customer experience while maintaining operational excellence.
Good: Tech Debt 2.0 is proactively managed jointly by the business and the tech team and shows little or no negative impact on business performance.
Fair: Tech Debt 2.0 management is a mix of reactive and proactive, is led by the tech team, and shows some signs of negative impact on business performance.
Poor: Tech Debt 2.0 is reactively managed by the tech team and has significant impact on business performance.

Beyond any specific technology or group of technologies, Tech Debt 2.0 is about awareness of the role technology investment plays in determining the viability, success, and existence of an enterprise. Effective Tech Debt 2.0 management enables reaching a balance of investment and prioritization over time and in response to the dynamically changing environment — a priority for not only the CIO but all C-Suite occupants and stakeholders.

[This article was originally published on builtin.com.]

Whether it’s the cool craft brew pub on the corner or the hottest new app, it’s clear that Americans love the excitement, risk, and reward of creating the next big thing in a small package. What also is clear: the US economy loves small and medium-sized businesses because their innovations propel economic resilience, allow us to compete more successfully overseas, and create opportunities for diverse and inclusive business ownership. While many assume huge multinational corporations motor the marketplace, the truth is local SMBs do.

Until very recently, SMBs comprised 99.9 percent of businesses and 47.5 percent of private sector employment in the US. Sadly, SMBs have taken a tremendous hit in 2020, with the COVID-19 outbreak presenting unexpected obstacles to their success and survival. How SMB owners and C-suite leaders have deployed technology is turning out to be a major factor in how, or if, their company will survive those challenges.

Like large companies, SMBs have become dependent on technologies to support critical functions such as marketing, sales, manufacturing, and customer experience, in addition to traditional back office. Those SMBs that have managed their technology with oversight and efficiency are realizing opportunities for competitive advantage. Of those that haven’t, many are struggling to overcome the effects of technical debt—specifically, what I call “Tech Debt 2.0®.”

The concept of technical debt has been around for nearly three decades. Howard G. “Ward” Cunningham, a programmer known for developing the first wiki, is credited with coining the term. “Shipping first-time code is like going into debt,” according to Cunningham. “Every minute spent on not-quite-right code counts as interest on that debt.” In other words, a little debt speeds development, as long as it is paid back promptly with a rewrite. This description makes the trade-off clear: Speedier development time and the ability to rush to market is leveraged against future work to improve and support the first version’s imperfections. The “interest” is a stand-in for future development costs, increased support headaches, and potential hits on credibility.

In my book Tech Debt 2.0®, I compare the concept of technical debt to financial debt. One way in which the analogy doesn’t work quite as neatly is that financial debt is typically owed to someone else, usually a bank, credit union, or rich uncle. Tech Debt 2.0, however, is something your small business owes to itself.

Similar to the original definition, Tech Debt 2.0 refers to an imperfection in the state of technology that a business should rectify in the near future, causing interest to accrue that is either financial or non-financial in nature. But, the definition is not simply limited to software development—because the problem isn’t simple at all.

For example, Tech Debt 2.0 can be attributed to the version of software and operating systems, the level of security capabilities employed on systems, the age of networking equipment in the data center, or the compatibility of existing solutions with new, cutting edge technologies. If you know where to look, the effects of Tech Debt 2.0 can also be found in data quality, business processes, and even among IT talent. The effects can be compared to accrued interest and directly impact, or irrevocably threaten, the bottom line.

Tech Debt 2.0 can translate into excessive costs for businesses, whether from rectifying security breaches, recouping lost revenue, or increasing expenditures. It also comes with a significant non-financial price tag. Tech Debt 2.0 can drive down employee morale, inhibit the recruitment and retention of good talent, and negatively affect the merger and acquisition process. And, it can have disastrous effects on a company’s reputation.

SMBs may not recognize IT as the key strategic asset it is, and, therefore, may wind up underutilizing IT for competitive advantage. Another distinct challenge for SMBs is their ability to minimize the impact of Tech Debt 2.0. The challenges of proactively managing their company’s technology investments are aggravated as SMB leaders confront the challenges of COVID-19.

The first step for leaders is getting a firm grasp of tech debt, the intersection of technology and economics, and how to recognize the different types: unplanned, creeping, and intentional. With an understanding of tech debt, SMB leaders can then take steps to avoid it, eliminate, or use it to their advantage. In Tech Debt 2.0®, I offer SMB leaders a tool to measure their company’s tech debt to help guide the future direction of their business.

Every SMB leader has an opportunity to positively impact their organization during this time of crisis and throughout the uncertainty ahead. Following are offensive and defensive actions you can take today:

On Offense:

  • Do a health check of your project portfolio and reprioritize backlog.
  • Refocus IT governance to accelerate decision-making and maintain alignment.
  • Develop an “acute” action plan with intent and purpose for the next 30, 60, 90, and 180 days.
  • Prioritize actions that focus on revenue preservation and customer experience.

On Defense:

  • Diagnose your tech debt and plan to address root causes.
  • Conduct a business impact analysis to prioritize your cyber risks.
  • Review and revise essential “pandemic” security policies and practices.
  • Engage your team and external partners to identify cost-saving opportunities.
  • Protect core operations and monitor critical infrastructure services of internal users.

Above all, stay healthy and stay positive—for the sake of your family as well as your business.

[This article was originally published on ceoworld.biz.]

By Michael C. Fillios

Author, Tech Debt 2.0®: How to Future Proof Your Small Business and Improve Your Tech Bottom Line.

The impact of Covid-19 has had unprecedented implications on a global scale in both our personal and professional lives. Much of which today is blurred as we all adapt to changing behaviors such as working from home and being surrogate teachers for our children. Needless to say, we have all had to change in one way or another.

Covid-19 wasn’t on the radar when I was researching and writing my book, Tech Debt 2.0®, How to Future Proof Your Small Business and Improve Your Tech Bottom Line. However, now that it is so much a part of our daily lives, I wanted to share my thoughts on the parallels between Tech Debt 2.0® and in what ways the pandemic creates a unique paradox that every IT leader is facing during this crisis and for the years ahead.

This image has an empty alt attribute; its file name is business-meeting-1030x633.jpg

I believe that every IT leader has a unique opportunity to positively impact their organization during this crisis and in many ways, they have already. The rapid movement to supporting the huge shift of employees to work remotely is just one small example that perhaps has elevated your IT reputation to your business counterparts to bask in a moment of unexpected glory.  In other cases, perhaps you were caught flat footed and had to scramble to purchase laptops at your local Best Buy or stock up on peripherals to support your end users. Perhaps your company already had a stockpile of Microsoft Teams licenses, but it was not being leveraged and users needed to be trained.

These are just a few examples of paradoxes that either shine the light on you as an IT leader positively or perhaps expose some of your functional warts.  As I speak with dozens of IT and business leaders at small and mid sized businesses, I would say that the results are somewhat mixed.  However, as we learn more about the economic implications of the virus on businesses and individuals, we are just scratching the surface of challenges that lie ahead.

I believe that this is a watershed moment for IT leaders to lean in, be proactive, and utilize this opportunity to redefine your individual and your functional brand reputation and to extend the short term accolades you might have received into a sustainable and earned seat at the board room table!

As far as dealing with the reputational paradox, I offer some suggestions in the form of a “top 10” list of offensive and defensive plays to consider as you navigate the challenges and opportunities ahead.

Offensive Plays:

  1. Stay healthy, your family and business needs you
  2. Conduct a health check of your project portfolio and reprioritize backlog
  3. Establish or refocus IT governance processes to accelerate decision making and keep alignment with business priorities
  4. Develop and “acute” action plan with intention and purpose for the next 30, 60, 90, 120 days and execute flawlessly
  5. Prioritize areas that focus on revenue preservation and the external customer experience

Defensive Plays:

  1. Diagnose your Tech Debt 2.0® and set a plan to improve underlying root causes
  2. Prioritize your cyber risks by conducting a business impact analysis with targeted penetration tests
  3. Review and revise essential “pandemic” security policies and practices
  4. Investigate and engage your internal team and external partners to identify potential cost savings opportunities
  5. Protect core operations and monitor critical infrastructure services for internal end users

About the author

Michael C. Fillios is the founder and CEO of IT Ally, LLC., a C-Suite IT Advisory and Cyber Advisory firm for small and mid-size businesses. He is a four-time CIO and senior global business and technology executive with 25 years of experience in transformation, change leadership and operations management in the Pharmaceutical, Industrials, Automotive, Banking and Consulting Industries. His first book, Tech Debt 2.0®: How to Future Proof Your Small Business and Improve Your Tech Bottom Line, was published in April 2020.

In 2020, he formed the IT Ally Institute to provide research, best practices, thought leadership and peer to peer programs for business and IT leaders at small and mid-sized businesses.

To learn more about IT Ally, please visit ITAlly.

To learn more about the IT Ally Institute and to take our Covid-19 SMB Survey, please visit www.itallyinstitute.org.

To start reading Tech Debt 2.0® for free, please visit https://a.co/9Y8f3Cx.

This article was originally published on itallyinstitute.org.

SMBs face many, if not more challenges than enterprise size businesses and have less resources to take on these challenges. As SMBs take greater advantage of technology to transform and grow their businesses they often incur another challenge that provides opportunity but is often fraught with peril. That challenge is the complex world of software licensing.

Over the years as technology has evolved from big mainframe computers to client server and network-based applications and today to cloud based applications software companies have evolved their pricing and licensing policies.

Making assumptions about how software licensing works or far worse ignoring software licensing can destroy an SMB, sucking up financial resources in fines, penalties, and unplanned licensing costs. Just as bad it can damage a company’s reputation exposing illegal license use or piracy.

The upside opportunities in software licensing are in taking advantage of software companies’ options for volume licensing, enterprise licensing and the world of open source. SMBs should make sure their CIO understands software licensing as it applies to your business and take all necessary steps to stay in compliance. Many 3rd party firms can provide guidance here including the software companies themselves. IT Ally™ is ready to assist you getting and staying on top of software licensing compliance.

Here are five key points about software licensing:

1. Look into volume licenses or site licenses whenever possible. These arrangements offer lower prices and often make administration tasks easier.

2. Know what “free” means. In the context of software licensing, free doesn’t refer to price. It means free in the sense of “free speech” and refers to the rights and restrictions imposed on using software.

3. Free or open-source software has fewer restrictions. If a program is released under a free software license or an open-source license, you generally don’t have to ask anyone’s permission to use it.

4. Read the End User License Agreement (EULA). It’s always a good idea to review these agreements, but it’s especially important to do so for one-off or small software purchases from less well-known companies. The EULA spells out what you can and can’t do with software. It covers everything from how many copies you can install to what the software company can do with your data and what additional software the company can install on your computer.

5. You may get secondary or home use rights. You may be able to install copies of the software on more than one computer, with certain restrictions. For example, you may be able to install a copy of the software on a home or portable computer, as long as it is not used at the same time as the software is used on your primary computer.

Technology Value Creation Ally for PE Firms

Get business insights right in your inbox.

@ 2025 IT ALLY LLC | Privacy Policy | Terms of Service | Website designed and Maintained by Robben Media