27 Jan 2017
Incorrectly plan how it will integrate with their existing architecture Leave security holes in their in-house network Purchase applications that aren’t compatible with their existing architecture/environment Underestimate or overestimate sizing