Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs
How Amdocs
validates ...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs2
The Context
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs3
Customer
Facing
Proj...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs4
Why Customer Validat...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs5
Methodology
Experien...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs6
The Methodology
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs7
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs8
Ask, Answer and Refi...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs9
ProductlifecycleVali...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs10
The Practices
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs11
Customer validation...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs12
How Customer Valida...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs13
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs14
Cross PBG Synchroni...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs15
The Experience
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs16
The CM experience
S...
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs17
Questions?
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs18
Thank You
Upcoming SlideShare
Loading in...5
×

How amdocs validates its ideas - Agile Israel 2014

720

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
720
On Slideshare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Amdocs: what we do
  • To avoid duplication
  • Learn both the business and our users
    – Had more than 50! Questions

    Validate:
    No Commitments
    No Due Dates
    No Sharing from other customers

  • Transcript of "How amdocs validates its ideas - Agile Israel 2014"

    1. 1. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs How Amdocs validates its ideas
    2. 2. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs2 The Context
    3. 3. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs3 Customer Facing Project Execution Product Development Who We Are? Amdocs as B2B
    4. 4. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs4 Why Customer Validation? ● Understand our customers’ long term strategic directions Ensure we focus our R&D efforts Engage our customers in our road-maps
    5. 5. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs5 Methodology Experience Practice
    6. 6. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs6 The Methodology
    7. 7. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs7
    8. 8. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs8 Ask, Answer and Refine the Key Questions REAL: Is the problem and opportunity big / real? WIN: Can we win? Our differentiating angle? WORTH IT: Is the product worth building?
    9. 9. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs9 ProductlifecycleValidate, Tuning, or Rejecting
    10. 10. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs10 The Practices
    11. 11. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs11 Customer validation (CV) is critical activity in the process of developing and delivering products. It helps verify our viewpoint that the product addresses a compelling need(s) in a well-defined and growing target market, in a differentiated way, and can indeed make money for the company.
    12. 12. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs12 How Customer Validation? Validations methodology, embedded in our processes Best Practices & Improved Skills Platforms and means for learning and synchronizing
    13. 13. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs13
    14. 14. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs14 Cross PBG Synchronization Means PBG validation Owner to ensure validation synchronization BU validation focal points were nominated to synchronize with other Bus The focal points will meet in a Monthly validations forum All validations focal points are using the validation tracker and validation site
    15. 15. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs15 The Experience
    16. 16. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs16 The CM experience Shape our products according to our customer needs Our Target: Prepare - Questionnaires - Contact list - Introduction Letter Pitch - Account Meetings - Get approval “This would be a great way to directly influence our product roadmap” Validate - Customer meetings - Call Center observation - 3 Customers Analyze - Cross BU communication - Knowledge sharing Adapt - Adjust project scope/ design “Sign off stages” “Delivery crisis” “What's in it for me?” PDM Delivery Teams Customer IT Customer Business Call Center Managers Call Center Rep End User
    17. 17. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs17 Questions?
    18. 18. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs18 Thank You
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×