AIM

Architectural Insight for Modernization

Freedom AIM Logo

How AIM Works

AIM (Architectural Insight for Modernization) turns your messy reality — legacy systems, half-documented integrations, political constraints, and budget limits — into a structured modernization plan.

No magic. No vendor kickbacks. Just structured inputs, transparent scoring, and AI that stays inside the lines you define.


1. Start with a Guided Assessment

AIM begins with a structured intake that captures:

Organization & environment

  • City, county, agency, or business
  • On-prem, cloud, or hybrid environment
  • Size and scope of the effort

Systems & components

  • Core systems (ERP, billing, public portals, EHR, mainframes, databases, firewalls, etc.)
  • Critical infrastructure (network, storage, backup, identity)

Applications & vendors

  • COTS products, SaaS platforms, custom apps
  • Known vendor lock-in or proprietary dependencies

Integrations & data flows

  • How data moves between systems
  • Protocols and interfaces (APIs, file transfer, HL7, message buses, etc.)

Constraints & requirements

  • Timelines, budgets, staffing limits
  • Regulatory requirements (HIPAA, CJIS, PCI, etc.)
  • Uptime, security, data residency, and other technical requirements

You answer in plain language. AIM normalizes and structures the rest.


2. Constraint Normalizer (C-1, C-2, C-3…)

Free-text constraints are converted into normalized constraint records with IDs like:

  • C-1 – Timeline
  • C-2 – Budget
  • C-3 – Regulatory
  • C-4 – Technical / SLA
  • C-5 – Data / Residency
  • C-6 – Security / Compliance
  • C-7 – Architecture / Dependency
  • C-8+ – Other

Each constraint is:

  1. Split into clear, atomic statements
  2. Classified by type (timeline, budget, regulatory, etc.)
  3. Given a stable code (C-1, C-2, C-3, …)

These codes show up in recommendations and reports so decision-makers can see exactly which constraints each recommendation honors.


3. Structured Context Builder

Behind the scenes, AIM builds a single structured context object for each assessment — think of it as a single source of truth that the AI models are allowed to use:

assessmentSnapshot

  • Organization, environment, size, archetype (new build, integrate, replace, etc.)
  • Normalized constraints with C-codes

currentState

  • Systems, applications, and vendors
  • Integrations and data flows
  • Risks and known pain points

raoData

  • RAO scores for candidate solutions
  • Risk, cost, maturity, lock-in, and complexity dimensions

architecturePatterns

  • Detected patterns (e.g., mainframe core, cloud-native, hub-and-spoke, API-driven)
  • Migration patterns (lift-and-shift, carve-out, strangler pattern, full replace)

guardrails

  • Flags for IBM mainframes, Oracle, cloud providers, PHI/PII, etc.
  • Anti-hallucination safety rails that prevent invention of unsupported technologies

This context is what AIM's AI models see — not your raw survey answers.


4. RAO Engine (Retrieval-Augmented Optimization)

AIM doesn't just "ask a model for ideas."

RAO is a scoring system that ranks modernization paths using your constraints as hard boundaries — not suggestions. It evaluates options across multiple dimensions:

  • Cost – upfront + operating
  • Maturity – stability and real-world adoption
  • Security & compliance – fit against your regulatory profile
  • Vendor lock-in risk – difficulty of future exit
  • Operational complexity – skills, runbooks, and support needs
  • Strategic fit – alignment with constraints C-1, C-2, C-3, etc.

Each recommendation carries a RAO score and a breakdown across these dimensions. This lets you explain why a given path is preferred, not just what the AI suggested.

Important: AIM outputs are designed to be reviewed, edited, and owned by your architects — not blindly accepted. The goal is a faster, clearer starting point, not a replacement for human judgment.


5. Risk & Integration Insight Engines

AIM analyzes your inputs to surface:

Risk patterns

  • Single-vendor dependence on critical platforms
  • Deprecated or end-of-life technologies
  • Unencrypted or fragile data flows
  • Gaps between requirements and current reality

Integration hot spots

  • Choke points where many systems depend on a single integration
  • Legacy protocols that will block modernization
  • Candidate areas for API gateways, data hubs, or integration platforms

These insights feed directly into the modernization strategy and roadmap.


6. Anti-Hallucination Guardrails

AIM is deliberately strict about what it's allowed to say.

The report engine and recommendation engine are explicitly instructed to:

  • Use only facts present in the structured context
  • Never invent vendors, technologies, integrations, or regulations
  • Recommend named technologies only when supported by your inputs (existing environment or explicitly justified requirements) — and flag anything net-new
  • Only mention HIPAA, CJIS, PCI, etc. if detected in your constraints or requirements
  • Tie recommendations back to RAO scores and constraint codes (C-1, C-2, etc.)

If the data isn't there, AIM prefers to say:

"This area requires more input before a confident recommendation can be made."

That's by design.


7. Outputs: What AIM Actually Delivers

From a single assessment, AIM can generate:

1. RAO-Backed Recommendations

  • Ranked list of modernization options
  • Clear tradeoffs and dimension scores
  • Constraint references (e.g., "Addresses C-1, C-3, C-5")

2. Modernization Brief (Markdown → PDF/Word)

  • Executive summary
  • Current state overview
  • Target architecture & modernization strategy
  • Priority recommendations table
  • Risk, compliance, and tradeoff analysis
  • Phased roadmap with quick wins vs long-term moves
  • Operational considerations and next steps

3. Architecture Views (Future-State)

  • Logical component views
  • Integration/data flow views
  • Platform / cloud vs on-prem splits

4. Modernization Strategy

When AIM generates recommendations, it determines a modernization strategy based on your assessment inputs. This strategy appears as a colored badge in your recommendations and guides the overall approach.

StrategyWhen It's UsedDescription
INTEGRATEArchetype is "Hybrid / Integrate"Connect existing systems with new components while preserving current investments. Best for stable systems that work well but need to interact with modern services.
REPLACEHigh vendor lock-in sensitivity or legacy systemsCompletely retire existing systems and deploy new solutions. Best for outdated or unsupportable technology where modernization isn't cost-effective.
REPLATFORMAssessment type is "New Infrastructure"Move to a new platform with minimal code changes. Also called "lift and reshape" — optimizes for the new environment while preserving core functionality.
LIFT & SHIFTQuick migration with minimal changes neededMove existing systems to new infrastructure with minimal changes. Fastest migration path, but may not leverage new platform capabilities.
MODERNIZEIn-place updates preferredUpdate existing systems in place with new technologies and patterns. Preserves institutional knowledge while improving maintainability.
RETAINSystem meets current needsKeep systems as-is with no changes. Appropriate for systems that meet current needs and have no pressing modernization drivers.
RETIRESystem scheduled for decommissionSunset and decommission the system. Data migration and archival may be required. Best for legacy systems no longer needed.
MIXEDMultiple approaches neededMultiple strategies apply across different components. Some systems may be replaced while others are integrated or modernized.

How is strategy determined? AIM evaluates your assessment's archetype, environment type, vendor lock-in sensitivity, and system constraints to automatically select the most appropriate strategy. You can click on the strategy badge in your recommendations to see a quick explanation of what it means.

All content is implementation-vendor neutral, constraint-aware, and exportable for councils, boards, and leadership review — even after your subscription ends.


8. Why AIM Is Different

  • Objective by design – AIM is not paid by vendors, marketplaces, or cloud providers.
  • Constraint-driven – C-codes make your priorities explicit and traceable.
  • Transparent – Recommendations and reports show why, not just what.
  • Built for government & regulated environments – Healthcare, public safety, financial contexts are first-class citizens, not afterthoughts.

Platform Independence

AIM is vendor-neutral in incentives and implementation. The Freedom Project does not accept vendor partnerships, referral fees, or kickbacks. Any qualified vendor can bid on work derived from AIM assessments.

When AIM names specific products (e.g., Okta, PostgreSQL), these represent a solution baseline derived from your assessment — not vendor preference. Naming products makes vendor bids comparable and prevents substitution of non-equivalent components.

Vendors may propose alternatives only if they meet all requirements and include an equivalency matrix (security controls, interoperability, SLA/SLO targets, lifecycle support) plus an impact summary (migration effort, operational burden, lock-in risk).

AIM doesn't replace architects or system engineers. It gives them a faster, clearer starting point — with less vendor noise and fewer hallucinated "best practices."


9. Technology Catalog

AIM recommendations draw from a curated catalog of over 100 enterprise-grade technology products across 16 categories including ERP, Identity & Access, Observability, Data Warehouse, ETL/Integration, and more.

Product Selection Criteria

Products are vetted for inclusion based on objective, security-conscious criteria:

  • FedRAMP Authorization – Preferred for government and regulated environments
  • SOC 2 Type II Certification – Verified security controls and audit compliance
  • Active Maintenance – Products with regular updates and vendor stability
  • Proven Security Track Record – Responsive to vulnerabilities, transparent incident handling
  • Wide Enterprise Adoption – Battle-tested in production at scale

Scoring Dimensions

Each product in the catalog is evaluated across six dimensions:

Security

Vulnerability posture, certifications, data protection

Compliance

FedRAMP, HIPAA, PCI-DSS, SOC 2 readiness

Cost Efficiency

Total cost of ownership, pricing model transparency

Vendor Lock-in Risk

Portability, migration friction, standards support

Operational Complexity

Skill requirements, maintenance burden, support quality

Market Maturity

Ecosystem stability, community support, longevity

Transparency Guarantee

Product rankings are determined solely by assessment-specific constraints and objective scoring dimensions. AIM does not accept vendor partnerships, referral fees, or placement fees. The catalog is maintained by The Freedom Project team and updated regularly based on market changes and security posture.

Ready to Get Started?

Create your first assessment and see how AIM works for your organization.