top of page

Search
All Posts


Most PE Firms Are Using AI to Speed Up Engineering. The Real Value Lies Upstream.
Inflexion recently published an analysis on AI's impact in mid-market software engineering. The data is compelling: 82% of companies using AI in development report productivity gains of 20% or more; some see code migration speeds triple. Mike Arshinskiy notes that "mid-market companies are no longer catching up, they're taking the lead." The article focuses on execution gains: faster coding, accelerated legacy modernization, automated testing. Real benefits. But there's a hig
mdoody0
Oct 31, 20252 min read


If the sofa wobbles, assume the firewall does too
In more than twenty-five years of post-acquisition integration and technology due diligence, I have learned that the small details often reveal more than the spreadsheets.
mdoody0
Aug 27, 20253 min read


Why 88% of AI Pilots Fail, and How to Beat the Odds
Why 88% of AI Pilots Fail, and How to Beat the Odds
mdoody0
Aug 19, 20252 min read


Succession Isn’t Just a People Problem, It’s a Platform Risk
One resignation. Twenty years of undocumented knowledge. A system nobody else can run. You don’t need a cyberattack to go down....
mdoody0
Aug 5, 20252 min read


AI or Smoke‑and‑Mirrors? Spotting False AI Claims Before You Sign the LOI
Why “AI-washing” is the newest valuation trap The AI gold rush is well underway. So is the noise. Gartner tracked over 1,000 vendors...
mdoody0
Apr 20, 20252 min read


Culture Clash 2.0: How Misaligned Engineering Cultures Fuel Post‑Deal Failures
Integration failures stem more from human factors than system-related issues. The collision of two engineering teams with different...
mdoody0
Apr 19, 20252 min read


Synergy Obsession vs. Orchestration Reality: Why M&A Automation Engines Often Fail
Synergy estimates find favor with boards because they present financial benefits such as “£2 million in IT cost savings.” The numbers...
mdoody0
Apr 19, 20251 min read


Bombshells After Close: When Critical Security Gaps Emerge Weeks Later
You believed the target environment was secure with firewalls and EDR and MFA in place. Your SOC console displays vulnerabilities and...
mdoody0
Apr 19, 20251 min read


Hidden Minefields: Tech Debt Lurking in Legacy Code
The maintenance of legacy code represents both operational difficulties and financial risks. The combination of unsupported frameworks ...
mdoody0
Apr 19, 20251 min read


The CapEx Time‑Bomb: Uncovering Years of Underinvestment Buried in the Balance Sheet
The financial reports contain an undiscovered time bomb of capital expenditures which will blow up your expenses when you gain control...
mdoody0
Apr 19, 20251 min read


Beyond the Due‑Diligence Checklist: Why Standard Tech Assessments Leave You Exposed
Private equity firms heavily rely on standardized due‑diligence checklists which include security scans and infrastructure inventories...
mdoody0
Apr 19, 20252 min read
bottom of page