Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

10 questions to ask before using a startup

Using a little-known tech supplier can produce big benefits, but it requires doing your homework

1. What is your source of operating capital, and how long can you operate at current revenue levels?

2. Who are your advisers?

3. Do you have a product in production?

4. Who are your key employees, and how will you retain them?

5. What aspect of your product cannot easily be reproduced by competitors?

6. What percentage of your users are paying customers?

7. What is your product road map, and how often has it changed?

8. How much are you spending on security and compliance?

9. How many recurring contracts do you have (versus month-to-month subscriptions)?

10. What is your exit strategy?

For much more on this topic, see " The Risks and Rewards of Using Startups."

Read more about innovation in CIO's Innovation Drilldown.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Latest Blog Posts
Whitepapers
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
  • How to Successfully Select an ERP System
    An Enterprise Resource Planning (ERP) system is a series of software applications that collect and compiles data from different departments to enhance collaboration and co-ordination within the business. If you’re looking to implement your first ERP system, or to upgrade from an existing system, this whitepaper offers eight simple steps for selection that will lead to long-term strategic success.
    Learn more »
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments