how amdocs validates its ideas - agile israel 2014
DESCRIPTION
TRANSCRIPT
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs
How Amdocs validates its ideas
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs2
The Context
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs3
CustomerFacing
Project Execution
Product Development
Who We Are?
Amdocs as B2B
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs4
Why Customer Validation?
● Understand our customers’ long term strategic directions
Ensure we focus our R&D efforts
Engage our customers in our road-maps
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs5
Methodology
Experience
Practice
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs6
The Methodology
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs7
Would you like a Red Ferrari?
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs8
Ask, Answer and Refine the Key Questions
REAL: Is the problem and opportunity big / real?
WIN: Can we win? Our differentiating angle?
WORTH IT: Is the product worth building?
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs9
Pro
duct
life
cyc
le
Validate, Tuning, or Rejecting
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs10
The Practices
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs11
Customer validation (CV) is critical activity in the process of developing and delivering products. It helps verify our viewpoint that the product addresses a compelling need(s) in a well-defined and growing target market, in a differentiated way, and can indeed make money for the company.
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs12
How Customer Validation?
Validations methodology, embedded in our processes
Best Practices & Improved Skills
Platforms and means for learning and synchronizing
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs13
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs14
Cross PBG Synchronization Means
PBG validation Owner to ensure validation synchronization
BU validation focal points were nominated to synchronize with other Bus
The focal points will meet in a Monthly validations forum
All validations focal points are using the validation tracker and validation site
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs15
The Experience
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs16
The CM experience
Shape our products according to our customer needs
Our Target:
Prepare
- Questionnaires- Contact list- Introduction Letter
Pitch
- Account Meetings- Get approval
“This would be a great way to directly influence our product
roadmap”
Validate
- Customer meetings- Call Center observation- 3 Customers
Analyze
- Cross BU communication - Knowledge sharing
Adapt
- Adjust project scope/ design
“Sign off stages”
“Delivery crisis”
“What's in it for me?”
PDM
Delivery Teams
Customer IT
Customer Business
Call Center Managers
Call Center Rep
End User
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs17
Questions?
Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs18
Thank You