Your SlideShare is downloading. ×
How amdocs validates its ideas - Agile Israel 2014
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

How amdocs validates its ideas - Agile Israel 2014

683
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
683
On Slideshare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Amdocs: what we do
  • To avoid duplication
  • Learn both the business and our users
    – Had more than 50! Questions

    Validate:
    No Commitments
    No Due Dates
    No Sharing from other customers

  • Transcript

    • 1. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs How Amdocs validates its ideas
    • 2. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs2 The Context
    • 3. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs3 Customer Facing Project Execution Product Development Who We Are? Amdocs as B2B
    • 4. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs4 Why Customer Validation? ● Understand our customers’ long term strategic directions Ensure we focus our R&D efforts Engage our customers in our road-maps
    • 5. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs5 Methodology Experience Practice
    • 6. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs6 The Methodology
    • 7. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs7
    • 8. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs8 Ask, Answer and Refine the Key Questions REAL: Is the problem and opportunity big / real? WIN: Can we win? Our differentiating angle? WORTH IT: Is the product worth building?
    • 9. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs9 ProductlifecycleValidate, Tuning, or Rejecting
    • 10. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs10 The Practices
    • 11. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs11 Customer validation (CV) is critical activity in the process of developing and delivering products. It helps verify our viewpoint that the product addresses a compelling need(s) in a well-defined and growing target market, in a differentiated way, and can indeed make money for the company.
    • 12. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs12 How Customer Validation? Validations methodology, embedded in our processes Best Practices & Improved Skills Platforms and means for learning and synchronizing
    • 13. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs13
    • 14. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs14 Cross PBG Synchronization Means PBG validation Owner to ensure validation synchronization BU validation focal points were nominated to synchronize with other Bus The focal points will meet in a Monthly validations forum All validations focal points are using the validation tracker and validation site
    • 15. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs15 The Experience
    • 16. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs16 The CM experience Shape our products according to our customer needs Our Target: Prepare - Questionnaires - Contact list - Introduction Letter Pitch - Account Meetings - Get approval “This would be a great way to directly influence our product roadmap” Validate - Customer meetings - Call Center observation - 3 Customers Analyze - Cross BU communication - Knowledge sharing Adapt - Adjust project scope/ design “Sign off stages” “Delivery crisis” “What's in it for me?” PDM Delivery Teams Customer IT Customer Business Call Center Managers Call Center Rep End User
    • 17. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs17 Questions?
    • 18. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs18 Thank You