How amdocs validates its ideas - Agile Israel 2014

Post on 27-Jan-2015

107 views 0 download

Tags:

description

 

transcript

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs

How Amdocs validates its ideas

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs2

The Context

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs3

CustomerFacing

Project Execution

Product Development

Who We Are?

Amdocs as B2B

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs4

Why Customer Validation?

● Understand our customers’ long term strategic directions

Ensure we focus our R&D efforts

Engage our customers in our road-maps

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs5

Methodology

Experience

Practice

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs6

The Methodology

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs7

Would you like a Red Ferrari?

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs8

Ask, Answer and Refine the Key Questions

REAL: Is the problem and opportunity big / real?

WIN: Can we win? Our differentiating angle?

WORTH IT: Is the product worth building?

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs9

Pro

duct

life

cyc

le

Validate, Tuning, or Rejecting

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs10

The Practices

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs11

Customer validation (CV) is critical activity in the process of developing and delivering products. It helps verify our viewpoint that the product addresses a compelling need(s) in a well-defined and growing target market, in a differentiated way, and can indeed make money for the company.

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs12

How Customer Validation?

Validations methodology, embedded in our processes

Best Practices & Improved Skills

Platforms and means for learning and synchronizing

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs13

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs14

Cross PBG Synchronization Means

PBG validation Owner to ensure validation synchronization

BU validation focal points were nominated to synchronize with other Bus

The focal points will meet in a Monthly validations forum

All validations focal points are using the validation tracker and validation site

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs15

The Experience

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs16

The CM experience

Shape our products according to our customer needs

Our Target:

Prepare

- Questionnaires- Contact list- Introduction Letter

Pitch

- Account Meetings- Get approval

“This would be a great way to directly influence our product

roadmap”

Validate

- Customer meetings- Call Center observation- 3 Customers

Analyze

- Cross BU communication - Knowledge sharing

Adapt

- Adjust project scope/ design

“Sign off stages”

“Delivery crisis”

“What's in it for me?”

PDM

Delivery Teams

Customer IT

Customer Business

Call Center Managers

Call Center Rep

End User

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs17

Questions?

Information Security Level 2 – Sensitive© 2013 – Proprietary and Confidential Information of Amdocs18

Thank You