Due diligence serves several important functions, such as filling gaps in expertise (technical or industry-specific), verifying data provided by the target company, or enlisting a trusted intermediary to examine confidential information. Dr. Jonyer brings his years of experience in venture capital performing deep technical dives, market research, and team evaluations, to his clients. Compared to providers with only technical backgrounds, Dr. Jonyer brings a holistic perspective that encompasses technology, business, and investment considerations.
We provide due diligence services for the following business needs:
- Venture capital investment
- Private equity investment
- Litigation finance
Our due diligence services include:
- Investment thesis validation
- Business case review
- Software architecture review
- Machine learning strategy review
- Software development life cycle management review
- Open-source licensing auditing
- Open-source Cybersecurity Vulnerability Audit
- Market research
Machine Learning Diligence for Startup Acquisition
The maker of a large open-source CMS was considering acquiring an analytics platform and enlisted our help to conduct a thorough evaluation of the target’s technology stack. We analyzed the target’s machine learning stack to see what existing libraries and methodologies they make use of and what innovations were developed in-house. We looked for synergies between the two companies’ offerings and made recommendations on future machine learning applications and features. In addition, we analyzed the target’s open-source software exposure to copyleft licenses and cybersecurity vulnerability. We reviewed the software stack for scalability, extensibility, proper design principles, maintainability, evaluated their documentation and software development life cycle practices. The target was acquired shortly after we submitted our report.
Software Architecture Diligence for Acquisition
A large logistics marketplace was considering acquiring a startup in the less-than-full-truckload shared container orchestration space. The parties entrusted our team to be the trusted third party to examine the acquisition target’s technology, software architecture, and open-source exposure to licensing issues and cybersecurity threats. Based on our work, the acquisition closed soon after we submitted our report.
We’ve opined on cases involving: