Вы находитесь на странице: 1из 33

2016 - 2015 INSIGHTS SERIES

PREFACE
by Dr. Thomas Papanikolaou on January 1, 2017

Dear reader,

This booklet is a collection of highlights from Neos Chronos work in


2016 and 2015, a period in which we successfully delivered a sizable
number of thought-leading assignments on

establishing digital business models that create unfair advantage


and enable rapid growth for software companies
developing an integrated user experience model for enterprise
communications to create a new position of growth for telecom
companies
scaling lean startups for sales success

Our customers have pushed us to become experts in resolving seem-


ingly contradicting requirements: achieving predictability without losing
innovation ability and agility (startups) and becoming agile and innova-
tive while delivering predictable results (big enterprises). We are both
grateful and thankful to them. We feel privileged that we get to collabo-
rate with amazing companies, meet awesome people, and experience
the moments of joy and personal satisfaction that are only possible
when we see our customers thrive.

We love making our customers successful.

Enjoy reading!
CONTENTS
Preface 2

Digital Customer Segmentation: its all about Trust. 4

3 Ways To Evaluate Disruption Potential. 8

Deciphering Digital Business Models. 11


3
Polymorphic Service Propositions. 14

A Primer to Communications Security. 17

The Achilles heel of Amazons Business Model. 20

A simple model for Sales Success. 22

How to scale a Lean Start-Up. 25

The Technology behind the Evolution of Shopping. 28

The practical guide to Enterprise Wi-Fi Calling. 30

FEATURED SERVICE: Lean Canvas Workshop 32


DIGITAL CUSTOMER SEGMENTATION: ITS ALL ABOUT TRUST.
by Dr. Thomas Papanikolaou on Sep 6, 2016

Todays customers (consumers that context customer segmenta- ly along the dimensions of digital
and enterprise users) have in- tion needs to drastically evolve to capability and trust / data sharing
creasingly one thing in common: be able to capture the essence of under the Bring Your Own Per-
they are millennials in their prime millennials and upcoming digital sona (BYOP) model. Knowledge@
of spending, who grew up in a natives. In this article we list key Whartons focus has been on fi-
technology and service context aspects a digital customer seg- nance institutions, however BYOP
where shared access is preferred mentation model needs to consid- is robust enough to be used in a
over ownership business mod- er. variety of, if not all, digital custom-
els, social media is used as a nat- er domains.
ural way for self-expression and DIGITAL ENGAGEMENT
keeping-in-touch, and sharing of
4 private data is often used to pay Knowledge@Wharton described
for free access to services. In digital user segmentation succinct-
Digital capability is defined as the
users proficiency in utilising all the
latest features, functions and servic-
es available in social, mobile, wear-
ables and Internet of Things, e-com-
merce ... to improve their overall
effectiveness and quality of life.

Trust is defined as user willing-


ness to share personal data and in
some cases, relinquish privacy in ex-
change for a perceived benefit.

According to Knowledge@Whar-
ton, the distribution of users across
these digital profiles will obvious-
ly change over time with a general
trend toward the upper right (No-
2016 Neos Chronos Limited . http://neoschronos.com . adapted from a matrix concept by Knowledge@ mads) of the segmentation map.
Wharton
digital customer segmentation: its all about trust.

Detailed definitions of each seg- Critics: post ratings on prod- tions ecosystem are also known
ment and typical distributions can ucts or services, comment on as Developers. Developers cre-
be found at the original article. someone elses blog, contribute ate applications that make app
to online forums, contribute to / stores a worthwhile place to vis-
We consider relinquishing pri- edit articles in a wiki it by millions of users, and turn
vacy a form of payment. When it Collectors: use RSS feeds, vote connected devices to items users
comes to digital services, we tend for websites online, add tags to consider worth buying. In other
to use the terms user and cus- web pages or photos words, developers create service
tomer interchangeably. Joiners: maintain profile on so- engagement. The key insight: you
cial networking site are missing out on service engage-
SERVICE ENGAGEMENT Spectators: read blogs, online ment potential if you are offering
forums, customer ratings / re- a digital service that does not al-
The combination of digital ca- views, tweets. Listen to podcasts, low developers to access its func-
5 pability and trust depicted in the watch video from other users. tionality and combine it with other
BYOP model provides a necessary Inactives: none of the above services to create improved and
foundation for digital user seg- integrated user experiences.
mentation. As the following exam- In the case of social media, digi-
ple demonstrates it is however not tal capability and trust alone can- ITS ALL ABOUT TRUST
sufficient. not uniquely position a user in the
Creator segment. For that addi- With increasing mobile pene-
SOCIAL MEDIA USER SEGMENTA- tional information is necessary e.g. tration, millennials in their prime,
TION (SOURCE: FORRESTER BLOG) amount of time the user invests and Generation Z closely on their
in creating content in general. If heals, it is fair to assume that dig-
Depending on a users willing- you ever wondered why social ital capability will soon become a
ness to create social content, so- networks replicate editor features less important segmentation cri-
cial media users could be catego- from their competitors, or acquire teria. To win over Creators, they
rised in competitors, you now have possi- need to trust that the data they
Creators: publish a blog, own ble answers e.g. to motivate Cre- are willing to share will be used to
web pages, create and upload ators to switch over, or to acquire create a future benefit for them
video / audio, write articles or Creators. The key insight: acquir- or a broader group.
stories and post them ing Creators for digital services
Conversationalists: update might be as important as acquir- This is why we believe that Trust
status on social networking site, ing Intellectual Property. is the single most important cri-
post updates on Twitter Creators in the digital applica- teria to include in digital custom-
digital customer segmentation: its all about trust.

er segmentation. Trust needs to Enterprise, allowing to use the ment. Hereby monetisation can
permeate all human and business camera and presence for securi- be defined in multiple ways i.e.
interactions resulting from digital ty purposes, smart plugs to save winning trust, increasing loyalty,
customer segmentation. electricity, and the thermostat up-selling, etc.
to both save heating costs and
MONETISABLE MOMENTS alarm in case of fire. The same In summary:
package, the same people, dif-
We started this article mention- ferent use case descriptions of The combination of digital capabil-
ing consumers and enterprise the same functionality, and an ity, trust and service engagement
users. For digital services this dif- experience that becomes en- is a necessary and sufficient basis
ferentiation is rapidly becoming terprise by a simple change of for digital customer segmentation.
meaningless. The reason is that it context / location. O2 Home in The key opportunity is in using
whether a digital service is con- its core is a Smart Premises real-time contextual information
6 sumer or enterprise is decided Polymorphic Service Proposition, to place a customer in a segment
by the active context at the mo- where premises is the Home or dynamically at each service inter-
ment of use. Here is an example: the Enterprise or, to mention action and act appropriately. This
another possible future context, polymorphic view of a customer
Telefonica recently launched the Car. (single profile, dynamically chang-
its O2 Home offering in the UK, ing digital segments based on con-
which includes a package of Digital User Segmentation to- textual information) better reflects
smart sensors communicating gether with Polymorphic Service user experience. Focusing on on
with a connected hub that al- Propositions can enable compa- improving effectiveness and life
low home owners to remotely nies to map users on a single user quality across a users daily jour-
control a home camera, check profile, for which the user seg- ney creates multiple monetisable
presence of a person being in a ment is determined in real-time at moments, and renders the static
room, turn on / off appliances each interaction based on contex- differentiation between consumer
connected to smart plugs, ad- tual information. By deriving such and enterprise users meaningless.
just the heating depending on actionable insights using analytics
temperature, etc. This has been on big data, companies can help
launched as a consumer offer- users improve their overall ef-
ing. Forget this for a moment fectiveness and quality of life at
and imagine launching the same home, in the office and anywhere
package to small medium en- in between. Every service interac-
terprises. Name it e.g. Smart tion becomes a monetisable mo-
digital customer segmentation: its all about trust.

CREDITS & REFERENCES

For the avoidance of doubt,


Neos Chronos are not affiliat-
ed with, and have no financial
interest in any of the companies
mentioned in this article. All
names and trademarks men-
tioned herein are the property of
their respective owners. Please
observe the Neos Chronos
Terms of Use.

7 Wikipedia: Market Segmenta-


tion, Generation Z

Goldman Sachs:
Millennials Coming of Age

Knowledge@Wharton:
Bring Your Own Persona

Forrester Blog: Global Social


Technographics Update 2011

Ericsson: mobile subscriptions


outlook (Q3 2016)

Telefonica: Website, O2 Home


3 WAYS TO EVALUATE DISRUPTION POTENTIAL.
by Dr. Thomas Papanikolaou on Jul 28, 2016

In our work as advisors to start- that quartz watches could be pro- ruption as per Clayton M. Chris-
up founders, company executives duced at a small fraction of the tensens, Disruptive Innovation
and investors, we are often asked cost of mechanical watches. The terminology.
for our opinion on the disruption redefined cost base and resulting
potential of new service and prod- low price points made wrist watch- Apples iPhone User Interface is
uct ideas. In this article we share 3 es accessible to a large low-end a deservedly overused example.
questions we use to quickly evalu- market who did not need the full Apple created a user interface so
ate an ideas disruption potential performance valued by customers simple that anyone could use a
and highlight where the execution at the high end of the market. A highly sophisticated smartphone
and operational focus for a poten- Low-End Disruption as per Clayton without reading a manual first.
tial investor should be. M. Christensens, Disruptive Inno- This has opened the path for the
8 vation terminology. mass smartphone adoption we ex-
QUESTION 1: DOES THE IDEA DRA- perience today. The concept of as-
MATICALLY REDUCE COST FOR An important point to make is sociating applications to tasks cre-
THE END-USER? that the definition of cost goes ated a new service consumption
The ability to produce and de- beyond monetary aspects. De- pattern that was proven to drive
liver at a low-cost is a mandatory pending on the idea the cost can increased service consumption.
part of a companys continuous be defined as the cost to the per-
improvement process. In our eval- son, the business, the society and QUESTION 3: DOES THE IDEA RE-
uation we look for a secret ingre- the environment (as well as com- SULT IN A REDEFINITION OF REVE-
dient within the idea that creates a binations thereof) NUE FLOWS?
cost base many times lower than This question aims at identify-
any evolutionary optimisation QUESTION 2: DOES THE IDEA RE- ing if the new idea changes the
could ever achieve. SULT IN A RADICALLY SIMPLIFIED revenue structure and movement
USER EXPERIENCE? within and across industries.
As an example, think of the in- Offering a great user experience
troduction of the quartz wrist is the aim of every company. We Within the same industry,
watches. The secret ingredient are looking for those re-imagined we look if the idea significantly
was using an electronic oscilla- user experiences that will allow to changes the revenue distribu-
tor regulated by a quartz instead reach customers who have needs tion across participants in the
of mechanical parts and springs. that are unserved by existing in- value chain or, more drastically,
This architectural change meant cumbents. A New-Market Dis- allows to bypass participants in
3 ways to evaluate disruption potential.

the value chain and earn what BRINGING IT ALL TOGETHER An idea does not have to be
has been their revenue. A great disruptive in multiple areas to be
example is TransferWise who Understanding how a service considered. It is worth noting that
enable low-cost money transfers and product idea reshapes cost Apples iPhone has been primari-
across countries. The secret in- base, user experience, and rev- ly a user experience disruption at
gredient: a process that avoids enue flows is helpful to quickly the time it was launched. The new
costly currency conversion and evaluate the ideas disruption po- user experience was so profound,
money transfers crossing bor- tential and highlight where the ex- that it resulted in Apple being able
ders. In other words Trans- ecution and operational focus for to negotiate revenue flows redis-
ferWise (a Financial Conduct a potential investor should be. For tribution between Apple and carri-
Authority regulated company) example, providing the best possi- ers, while at the same time creat-
bypasses banks for international ble user experience is not a man- ing a high margin product.
money transfers. datory condition for a low-end dis-
9 Across industries, we look if ruption to succeed. Similarly, an
the idea can employ an asym- idea applying an asymmetric busi-
metric business model approach ness model requires initial invest-
i.e. create value in another in- ment to create value and a hook
dustry, and create a hook that to acquire customers in another
allows to transfer the revenues industry, and transfer them to
from that industry. The Android capture revenue flows within ones
Operating System is a great ex- own business model.
ample: Google develops and of- A service and product idea can
fers Android for free to phone be disruptive in more than one
manufacturers, and uses the way. For example, TransferWise is
bundling of Google Apps to turn a low-cost and revenue flows dis-
any owner of an Android phone rupting service within the bank-
into a customer of Googles ad- ing industry. Googles Android is
vertising business. Thus revenue a low-cost and revenue flows dis-
flows from customers acquired rupting product across the soft-
through software in the tele- ware and advertising industries.
coms industry to be captured Polymorphic Service Propositions
in Googles advertising business. have the potential to be disruptive
in terms of low-cost and user ex-
perience.
3 ways to evaluate disruption potential.

CREDITS & REFERENCES

For the avoidance of doubt,


Neos Chronos are not affiliat-
ed with, and have no financial
interest in any of the companies
mentioned in this article. All
names and trademarks men-
tioned herein are the property of
their respective owners. Please
observe the Neos Chronos
Terms of Use.

10 Wikipedia: Quartz clock, Clay-


ton M. Christensen, Disruptive
Innovation

TransferWise: Website, How


TransferWise works

PhoneArena:
List of phone manufacturers
DECIPHERING DIGITAL BUSINESS MODELS.
by Dr. Thomas Papanikolaou on May 24, 2016

Have you ever wondered why is a complementary product to and transferring the revenues and
Facebook paid $19 billion to buy Facebook (advertising) and Skype even customers from that partic-
WhatsApp ? What value Microsoft (telecoms). As the examples show, ipant to itself. Such an action cre-
saw in the $8.5 billion take-over of such complementary products ates asymmetry in the revenue
Skype ? Why Google continuously are more than simple accessories: distribution and, thus, unfair ad-
launches new service propositions they are essential. vantage.
in markets that seem so far away
from its core business? And why This close relationship between
the European Commission thinks products and their complements
(rightly or wrongly) this practice is goes even further: whenever the
in the case of Android anti-com- price of a complement decreases,
11 petitive ? In this overview article the demand for the product in-
we will explain the mechanics of creases. The opposite is also true:
digital business models and how whenever the price of a comple-
companies use them to cross user ment increases, the demand for
segments and industry borders to the product decreases. For ex-
create unfair business advantage. ample, due to connectivity costs
(still as of 2016), people use their
CREATING UNFAIR DIGITAL AD- devices and data services less
VANTAGE when they travel abroad / they are
roaming.
In the digital space, every prod-
uct / service created has a com- In a traditional ecosystem, there
plementary product. Such com- is a balance between products
plements are consumed within and their complements and every
products, however products and participant is earning a fair share
their complements do not have of the revenue generated. This
to reside in the same industry. balance, however, can is distort-
For example, electricity (utility) is ed when one of the ecosystem
a complementary product to digi- participants starts controlling the
tal devices (device manufacturing). price of complementary products,
Internet connectivity (telecoms) starving out another participant,
deciphering digital business models.

CREATE VALUE IN A NEW IN- ACQUIRE & TRANSFER CUS- CAPTURE PROFITS IN OWN
DUSTRY TOMERS BUSINESS

Amazon pioneered crowed- By avoiding the retail store Amazon would capture rev-
source recommendations running costs, using the enues of large scale product
for books (and later for all internet to drive logistics, and sales within its e-commerce
products sold through its mass-scale purchasing, Ama- platform.
e-commerce platform). These zon was able to offer - most of
recommendations were per- the time - the lowest possible
ceived as trustworthy, offering price. This ensured that even
a new way to choose books / those customers who had vis-
products. Amazon also offered ited a physical store - to touch
online a much larger catalogue and feel a product - would
than any physical store could, return to Amazon to buy it.
increasing the chances for
customer to find the product
they wanted.
12

CASE 1: AMAZON E-COMMERCE azon performed further asym- CASE 2: GOOGLE ANDROID
Amazons Business Model can be metric steps e.g. launching the Google Android is a further, more
regarded as the first example of Fire tablets at product cost (val- advanced, example of an asym-
an asymmetric business model, ue creation and customer ac- metric business model in action.
exhibiting three (3) fundamental quisition) together with its own
ingredients. app store (customer transfer)
It is worthwhile noting that to capture more revenue on its
since its original inception, Am- e-commerce business model.

CREATE VALUE IN A NEW IN- ACQUIRE & TRANSFER CUS- CAPTURE PROFITS IN OWN
DUSTRY TOMERS BUSINESS

By creating Android and offer- Google bundled Google Apps Google monetises user data
ing it for free to OEMs Google with Android, ensuring that knowledge in its advertising
created value in the device every owner of an Android operations.
industry, commoditising along phone became instantly a
the way the value of Symbian, customer in Googles Advertis-
the prices of mobile phones, ing Business Model. It is this
and accelerating the demise bundling that the European
of many companies including Commission regards as an-
Nokia. ti-competitive
deciphering digital business models.

CASE N: WHATSAPP, SKYPE, AND CREDITS & REFERENCES


MANY MORE
Asymmetry has been used in
With the above structure, it conjunction with business mode-
is now easier to answer why ling since the appearance of
Facebook (advertising) bought Amazon. For us though, it is the
WhatsApp (telecoms), Microsoft people at VisionMobile who first
(software) acquired Skype (tele- provided a concise description.
coms), and why many other com- We use their terminology as a
panies are growing asymmetrically basis for our work with clients
into new industries. and we highly recommend read-
ing their excellent blog on the
In summary: subject.
13
Digital Business Models are inher- For the avoidance of doubt,
ently asymmetric i.e. by design Neos Chronos are not affiliat-
they force customers and profits ed with, and have no financial
to migrate from one industry to interest in any of the companies
the other. They create unfair ad- mentioned in this article. All
vantage by commoditising anoth- names and trademarks men-
er industry and are thus prone tioned herein are the property of
to anti-competitive actions. De- their respective owners. Please
ciphering the mechanics of the observe the Neos Chronos
such Asymmetric Business Models Terms of Use.
is the first step to attaining clarity
on the moves of players such as Wikipedia: Complementary
Google, Facebook, Microsoft and Good, Ecosystem
how those could affect the indus- Microsoft: Skype Acquisition
try your business operates in. Facebook: WhatsApp Acquisition
Google: European Commission
Antitrust motion
VisionMobile:
Asymmetric Business Models
POLYMORPHIC SERVICE PROPOSITIONS.
by Dr. Thomas Papanikolaou on April 21, 2016

What if you could design a ser- a quick introduction into the con- following 3 examples. The title
vice proposition once and use it cept and highlights a number of of each example reflects the me-
for multiple customer segments, reasons why a CEO, CMO, CTO of chanics / underlying implementa-
meeting needs arising in different a company should care to learn tion of the proposition, while the
situations? Then you would have more and act. text describes the user experi-
the initial ingredients of what we ence.
at Neos Chronos call a polymor- To clarify the notion of poly-
phic service proposition (abbrevi- morphism in the context of ser-
ated as PSP). This article provides vice propositions we will use the

14 POLYMORPHIC SER- CONSUMER ENTERPRISE


VICE PROPOSITIONS

1. REVERSE-CHARGED A mobile carrier offers a children An company offers clients a no-


CALL HUNTING safety service, as a Call the Parent charge Contact Sales number.
phone number. Charges for this ser- When a client calls the number,
vice are paid by the parents. A call to it rings consecutively all mem-
the number rings consecutively each bers of the sales team. If no one
parent, optionally assigned family is available to answer, the call is
relatives, and finally a dedicated 24/7 forwarded to a 24/7 line so that
emergency number to ensure calls the client can always reach the
from children to their parents are company.
always answered.

A Communications Application shows A Contact Center Operator


2. PERSISTENT the thread of messages, files, voice Console brings up the history
COLLABORATION calls and videos exchanged between record for a calling client. This
users whenever a communication allows the operator to review
session is set up. This provides the previous interactions and han-
communicating parties with a quick dle client issues faster.
context of the previous interactions.

3. GUEST SERVICE A WiFi Router with a guest login A WiFi Router with a guest
LOGIN feature is used at home to offer an login feature is used at a small
easy login for friends visiting the startup / company to provide
family without revealing the routers WiFi access to visiting clients
password. and partners.
polymorphic service propositions.

There are many more such in terms of polymorphic service Polymorphic service proposi-
examples that can be uncov- propositions has several benefits: tions stand for user experience
ered or invented. In fact, every The underlying mechanics of a patterns that re-occur in daily
well-designed software makes polymorphic service proposition life in multiple situations. They
use of polymorphism techniques are designed and implemented enable to offer packages of user
to add flexibility, and reduce du- once and can be used towards experiences rather than pack-
plication. The reason why such multiple customer segments. ages of features. For example
cases are becoming obvious at This provides a significant ad- a WiFi guest login experience,
the service proposition level origi- vantage in Time-To-Market and can be bundled with both a con-
nates from a simple yet intriguing reuse of existing investments sumer home broadband pack-
(lower CAPEX). Refer to all our age as well as Unified Commu-
KEY INSIGHT examples. nications enterprise proposition.
As the underlying mechanics At Neos Chronos we speak of
15 The consumer and enterprise remain the same, polymorphic service providers becoming in-
personas and their associated be- service propositions require lit- tegrators of user experience.
haviours are converging. This is tle to no additional learning for
due to the exposure of Millenni- users when they switch context. COURSE OF ACTION
als from young age to technology, This allows to create much more
and the natural resulting conver- natural upgrade paths in terms An organisation needs to take a
gence of usage patterns in every of user experience, which cre- number of transformational steps
service being created to serve ates a unique competitive ad- to take full advantage of polymor-
their needs. The surfacing of vantage. An succinct example is phic service propositions. Here are
more and more polymorphic ser- Microsoft buying Skype (a con- some indicative examples in the
vice propositions simply reflects sumer proposition) and lever- context of Communication Service
our evolved ability to recognise aging Skypes user interface to Providers:
these common and reusable ser- revamp Microsofts enterprise
vice patterns (which always exist- offering. The familiar underlying In technology terms, the ser-
ed within well-designed software). mechanics of Skype and Skype vice architecture needs to be
for Business enable consumers further consolidated and unified.
BENEFITS to become productive enterprise For example, if you are launch-
users much faster. A further, ing Voice over LTE, make sure
The reason a CEO, CMO, CTO more recent example, is Face- you purchase one (1) telephony
of a company should care about book at Work. Refer to our key application server that can serve
PSPs is that thinking and acting insight! both consumers and enterprise
polymorphic service propositions.

users. Make sure you have one In summary: CREDITS & REFERENCES
(1) charging system, one (1) user
profile, .... Refer to our first ex- The consumer and enterprise For the avoidance of doubt,
ample. personas and their associated Neos Chronos are not affiliat-
In marketing terms, the organ- behaviours are converging. This ed with, and have no financial
isational division between con- is due to the exposure of Millen- interest in any of the companies
sumer and enterprise marketing nials from young age to technol- mentioned in this article. All
needs to be urgently reconsid- ogy, and the natural resulting names and trademarks men-
ered. Our experience shows that convergence of usage patterns tioned herein are the property of
such a division often causes du- in every service being created to their respective owners. Please
plication. For example, having serve their needs. The surfacing observe the Neos Chronos
both Consumer Rich Commu- of more and more polymorphic Terms of Use.
nications clients and Enterprise service propositions simply re-
16 Unified Communications Clients flects our evolved ability to recog- Wikipedia: Polymorphism
with the same functionality, im- nise these common and reusable
plemented twice, offered to dif- service patterns (which always Microsoft: Skype for Business
ferent customer segments, via existed within well-designed soft-
different sales channels, ... is nei- ware). To fully benefit from poly- Facebook: Facebook at Work
ther economical nor does it rec- morphic service propositions it is
ognise the convergence of user necessary to critically review the
behaviours. Adopting a unified, technology strategy and the or-
holistic view on the user expe- ganisational division between con-
rience can remove duplication, sumer and enterprise marketing
and release resources to be uti- and move from offering silo-ser-
lised to drive innovation. vice propositions towards offer-
Finally in strategic terms, CSPs ing integrated user experiences
must review their existing ser-
vice propositions portfolio with
the purpose to identify polymor-
phic service propositions and
opportunities to combine those
into integrated user experiences.
A PRIMER TO COMMUNICATIONS SECURITY.
by Dr. Thomas Papanikolaou on March 11, 2016

There are many good reasons of servers. The learning is that nature, open source firmware
behind securing communications if you can tamper with a device, is far more difficult to manip-
within the enterprise and across then communication may be ulate without the community
enterprise borders as part of a easily compromised. Companies noticing.
companys Business Information like SilentCircle have recognised You can use devices that
Security strategy. Undoubtedly, this and offer hardware that can vertically integrate hardware
preventing unauthorized inter- not be easily tampered with. and firmware, see SilentCircle .
ceptors from accessing telecom- Finally, if you want to offer
munications in an intelligible form, The Firmware a broader choice of mobile
while still delivering content to the After a device is turned on and devices, you can use Trustonic
intended recipients (definition the completion of power-on s technology, which provides
17 from Wikipedia ) is mandatory for self-tests, the firmware ( boot a Trusted Execution Environ-
any enterprise (asset protection) loader ) is the piece of software ment (TEE) on ARM chipsets.
and any individual (privacy protec- that runs to load the operating As of the writing of this article,
tion). system. It is fair to claim that the Trustonics TEE is available on
firmware is the most important more the half a billion devices.
So what is the best way to se- piece of software from a security
cure communications i.e. voice, point of view. Having the ability The Operating System
video, messaging, file exchange, to manipulate the firmware can Many of the communication
file storage, etc? To answer this provide full access to any com- tasks are implemented on top
question let us look at the individ- munication (and any function) of of the Operating System using
ual components that are taking the operating system. Prominent its Application Programming
part in secure communications. public examples of such firm- Interfaces (APIs), and thus se-
ware attacks include Thunder- curing the OS is a prerequisite
The Device strike and Dark Jedi (attention: to secure communications. Just
The first lesson in attacking se- explicit language). Protecting the as the firmware has super-user
cure systems is to attack the firmware is only possible when access over the OS, the OS has
weakest link. For example, it is you have control over it. There super-user access over all com-
easier to place a bug into a de- are several options you may munications applications. Hard-
vice to capture a voice call, than choose: ening the operating system usu-
trying to break a voice encryp- You can deploy open source ally means creating a bespoke
tion algorithm using a network firmware on your devices. By version of it with all unneces-
a primer to communications security.

sary parts removed. This is the Systems , Threema and Proton- The Cloud
path the many communication Mail. Not all communications are re-
companies take, and Android al-time and most enterprise
(by virtue of being open source) The Network collaboration use cases require
has become a natural choice Fundamentally the network persistent sessions e.g. to store
for mobile, in the same way Li- (whether mobile or fixed) does interim work results and allow
nux has become the standard not play any role in security as- teamwork to continue across
for PCs and Workstations. Im- suming the communications multiple devices at a later stage.
portant note: using an open application creates a secure For such use cases (collaborative
source OS like Android is not a tunnel / Virtual Private Network document editing, document ar-
security guarantee, as Amazon between the communicating chiving, document exchange, ...)
Fire OS users had to experience. end-points. It is useful however it is important that files are en-
to note that 2G/3G mobile net- crypted before they are stored
18 The Application works employ encryption algo- in the cloud. Equally important:
While less likely, applications rithms that are relatively easy to the cloud storage service should
are also used to intercept, cap- crack, and that 4G suffers from have no method to decrypt such
ture and store communications. the same IP security issues as documents without the users
This can be in malicious form any other IP network. Applica- involvement. This is known as a
( spyware ) or in the form of too tions should therefore not trust zero-knowledge cloud storage
detailed logs that are shared the network. At the same time, service. Tresorit is hereby our fa-
across the network (for perfor- as the path between end-points vorite when compared to other
mance improvement purposes). is unknown, it is also important similar services.
It is critical for the enterprise to that any encryption employed by
assess the type of information applications, caters for changing The Communicating Parties
captured, and ensure that criti- network conditions in a way that Any of the precautions above
cal information is not leaving the does not jeopardise user expe- is rendered useless when the
enterprise border unauthorised. rience. A great example of how humans involved in communi-
As applications are the ones ini- this can be done is SQR Systems cations do not live and breathe
tiating the security setup of the who have developed particu- a security culture. For example
communication channel, they lar algorithms to enable secure, plugging memory sticks (see
can capture data before it is adaptive voice and video com- minute 8:31) of unknown origin
encrypted. To avoid surprises, munications. to PCs and / or clicking on dubi-
choose a reputable communi- ous links within emails is a sure
cations app vendor like Whisper way to provide a 3rd party direct
a primer to communications security.

access and control over the OS. CREDITS & REFERENCES


Therefore end-user education is
key to a successful communica- For the avoidance of doubt,
tions security strategy. Neos Chronos are not affiliat-
ed with, and have no financial
In summary: interest in any of the companies
mentioned in this article. All
Understanding the role of the indi- names and trademarks men-
vidual components in secure com- tioned herein are the property of
munications - device, firmware, their respective owners. Please
OS, applications, network, cloud, observe the Neos Chronos
communicating parties - is key to Terms of Use.
developing a successful commu-
19 nications security strategy. Fun- Firmware attacks:
damentally, it is all about deciding Thunderstrike, Dark Jedi
the level of trust towards individ-
ual components and the associ- Wikipedia: Communications
ated investment, risk and benefit Security, Boot Loader, Spyware,
for the enterprise. For example, Virtual Private Network
a combination of secure devices,
firmware, OS comes at the cost Companies: SilentCircle,
of less device choice. Trusting ap- Trustonic, ARM, Whisper Sys-
plications for secure communica- tems, Threema, ProtonMail
tions may be reasonable, as long
as the OS provider is trustworthy. The Guardian: Amazon reverses
Last, but surely not least: secure backward decision to remove
communications should not affect encryption from Fire tablets
user experience negatively.
THE ACHILLES HEEL OF AMAZONS BUSINESS MODEL.
by Dr. Thomas Papanikolaou on December 14, 2015

Without a doubt, Amazon epi- included talking with friends to revenue when it was purchased
tomizes the online retail store. get information and listen to online. Amazon won.
Based on a globally uniform logis- their recommendations, going to
tics and delivery platform, Amazon one or more shops to get more Large businesses reacted by
has managed to build a captivat- information (in some cases: ex- going online, trying to regain the
ing online shopping and social pert advice) and touch and feel pole position in the online product
experience, and generate 10s of the product, and finally pur- search, and hoping to recapture
billions of revenue per year. Look- chase the product from one of the consumer with the best possi-
ing at The Technology behind the the shops visited. A physical re- ble price. A heavy investment that
Evolution of Shopping Amazon tail experience, with a mandato- showed some early success. The
seems to possess the full enabling ry face-to-face social aspect. author believes that in the longer-
20 technology stack, highly scalable After Amazon, consumers term Amazon will win here as well,
through its cloud-based execution would check the Internet to get due to substantially lower operat-
model. In terms of user experi- upfront information and Ama- ing costs.
ence, it is still optimising and sim- zon to read recommendations
plifying the instant buying process, from people that were almost But can Amazons online retail
further accelerating a shift in the always strangers to them. They model grow in a world without
way people buy. would still visit one or more physical retail?
shops that had the product in
It is in this relentless optimisa- display to touch and feel the To answer this question, think
tion where the Achilles heel of product, but would return to of a wedding ring, a musical in-
Amazons Business Model can be Amazon and buy online at the strument, a bike, a lamp, a chair,
found. best possible price. An online a camera, ... or anything that has
retail experience, with a support- to do with a a special moment in
Let us contrast and compare the ing social aspect. life, a personal preference, a hob-
shopping experience before and by, .... It would be fair to claim
after Amazons introduction of So- In the world after Amazon, small that touching and feeling any such
cial Commerce, as enabled by the and medium businesses lost out / product before purchase is an in-
Internet. closed down, as they carried the tegral, even mandatory, part of
cost for displaying the product the consumer buying process.
Before Amazon, buying a con- (location and people expenditure)
sumer product in a retail shop but did not earn a share of the
the achilles heel of amazons business model.

Therefore, assuming existing CREDITS & REFERENCES


technology and Amazons current
approach to market, the answer For the avoidance of doubt,
is that Amazon needs physical re- Neos Chronos are not affiliated
tail to flourish in order for Amazon with, and have no financial
to grow. Physical retail covers the interest in any of the com-
missing and necessary ingredient panies mentioned in this
in Amazons online business mod- article. All names and
el. trademarks mentioned
herein are the property of
This dependency on the physi- their respective own-
cal retail experience, is the Achil- ers. Please observe the
les heel of the Amazons Business Neos Chronos Terms
21 Model. Amazon cannot currently of Use.
move full speed with its business
model execution without more Wikipedia:
physical retail businesses closing Achilles heel
down, and creating a discontinuity
in user experience. In other words, Amazon: Website
the more successful Amazon is,
the less physical retail there is, The Guardian: Amazon
and the more consumers will hes- is opening its first phy-
itate to buy something they have sical bookstore
never seen and touched before.
In that context, it is not surprising
news that Amazon is opening its
first physical bookstore . Expect
more such physical shops in more
product categories to come.
A SIMPLE MODEL FOR SALES SUCCESS.
by Dr. Thomas Papanikolaou on March 30, 2015

We live in a connected world. vantage over sales people. This is ing over-proportional business
Easy access to information, hu- due to their own business com- success. In other words: when all
man capital, and production fa- petence as well as the plethora of proposals put forward to a cus-
cilities means that anyone can similar offerings and propositions tomer look similar, the customers
replicate a product, service or put forward to them. After all, rep- decision criteria are augmented
delivery process. In that con- etition is the mother of learning with intangible aspects. Why you
text, sales models that are based and customers are constantly in- do what you do, becomes more
on presenting and arguing for vited to view solutions from sev- important than what you do, and
unique value are either failing eral angles. For sellers, this means how you do it.
or, in the best case, challenged to that Unique Selling Points (USPs)
deliver results. In this article we tend to evaporate in early discus-
22 present an alternative sales mod- sions. Without USPs, sales prop-
el that defines the uniqueness of ositions degenerate to commodi-
what is offered to a customer in ties and risk to be judged solely on
terms of the companys identity: price.
its purpose, its core values, and
the sum of its employees who live Still, there are companies that
and breathe those values towards despite this context do really well.
customers. Focusing on the com- Their products, albeit similar, are
panys identity, rather than what loved and admired and it is seems
a company does and how it does as if they owned a secret that
it, results in a simple and highly makes them immune to commod-
effective framework for sales suc- itisation. Simon Sinek revealed the
cess, that is universally applicable difference between companies
and hard to imitate. that are liked and companies that
are loved, as the latters ability to
PURPOSE connect on an emotional level
with their customers. Sineks key
From our experience in advis- insight is that the purpose, cause,
ing customers during their buying or belief that inspires a company
processes, we know that custom- and its people to do what they do,
ers have a natural knowledge ad- makes the difference in achiev-
a simple model for sales success.

INTEGRITY as the only successful result. Sha- be separated from successful ex-
ron Drew Morgen calls this way ecution and delivery of the jointly
Before anything can be bought, of companies becoming a trusted identified benefits. In particular
customers have to run internal partner to their customers Selling after delivery, the companys sales
processes to get a formulation of with Integrity. success depends on providing
the benefit they require, get or- continuous care to realise aug-
ganisational alignment and seek Selling with Integrity means put- mented benefits for both custom-
allocation of funds. It is only when ting the customers interests first er and the company. It is when
all those prerequisites are in place and accepting that the Buying Fa- the planned benefits are delivered
that a search for a solution provid- cilitation process may result in and continuously enhanced over
er can begin. It has been claimed solution options that either ne- time that the customer and the
that engaging in that late phase of gate the need for a purchase from company can learn and grow to-
the buying process provides com- the customer (for example, the gether.
23 panies with access to only 7% of customer can achieve a required
the actual customer opportunities. benefit with internal resources), NEOS CHRONOS
In other words: however good a or a solution that cannot be deliv-
companys sales methodology, the ered by the company. Selling with If you have worked with us you
late engagement will by definition Integrity also means a company already know: the Neos Chronos
yield poor results. taking the decision to invest in a Advisory Services Model is based
long-term partnership with its cus- on the principles illustrated above.
Consequently, for a company to tomers. Our companys purpose and val-
achieve sales success (reach the ues are entrenched into our cul-
93% of opportunities) it needs to TRUST ture and ways of working and un-
engage in Buying Facilitation first derpin our commitment towards
i.e. helping customers manage It is our experience that the gen- our customers success.
their behind-the-scenes, non-solu- uine interest to deliver the best
tion-related change management possible outcome for the custom-
issues. This requires an existing er is rewarded with trust and in-
customer relationship based on creased access to opportunities a
trust. Our experience shows that company would have never had
such a relationship can only be es- access to otherwise. This increases
tablished by demonstrating a gen- the chances of buying facilitation
uine advisory engagement style resulting in customer purchases.
which does not define a purchase Therefore sales success cannot
a simple model for sales success.

shape the next steps and strate-


gic view. We will always tell you
the truth as we see it and will con-
tinuously demonstrate a can-do,
always curious, always learning
attitude to deliver creative, re-
sults-focused solutions. Our way
of working: Advise, Demonstrate,
Inspire. Our commitment: caring
for our customers success.

24 CREDITS & REFERENCES

The graphics for this article were


created by our designers at Run-
nyMarmalade. For the avoidance
of doubt, Neos Chronos are
not affiliated with, and have no
financial interest in any of the
companies mentioned in this
Neos Chronos Limited article. All names and trade-
marks mentioned herein are the
Figure 1. Neos Chronos Advisory Ser- You, as our customer, can ex- property of their respective own-
vices Model pect our partners and associates ers. Please observe the Neos
to be dedicated to your success Chronos Terms of Use.
We love making our customers and act with respect and the high-
successful. We believe our work est level of professional integrity. Simon Sinek: How great leaders
and our customers business suc- As members of your team, you inspire action, Start With Why
cess will contribute to peoples can expect us to exhibit a hands-
happiness and societys advance- on approach to drive tactical exe- Sharon Drew Morgen: Website,
ment. cution, and a big-picture mindset Buying Facilitation, Selling with
and sharing attitude to help you Integrity
HOW TO SCALE A LEAN START-UP.
by Dr. Thomas Papanikolaou on March 9, 2015

Entrepreneurs are known for practice, and its principles can be is to reliably identify customer
their desire to always search for applied in a broad context. Here needs and pivot / change direc-
new ideas, customers and busi- is a summary (for a more detailed tion before costly investments
ness models. Over the last years description please see the article are made.
a number of methodologies have by Steve Blank on HBR):
been developed to help and sup- Minimum Viable Product
port this search. In this article, we Business Model Search Hand in hand with Customer De-
discuss how to apply Lean Start- Instead of detailing a Business velopment, entrepreneurs use
Up principles for a purpose they Plan, entrepreneurs use a Busi- agile development techniques to
were not initially designed for: ness Model Canvas to document incrementally create light pro-
moving a company out of start-up their hypotheses and assump- totypes and solutions that can
25 mode and scaling into full execu- tions on how the company cre- be used to verify their assump-
tion. ates value in a sustainable man- tions with customers. The result
ner. is an incrementally developed
THE LEAN START-UP IN A NUT- product, that contains only the
SHELL Customer Development critical (validated) features.
Instead of a building a product
The Lean Start-Up methodolo- and then testing it with custom-
gy has captured and documented ers, entrepreneurs get out of
the essence of the entrepreneur- the building and test their hy- During customer development, a
ial search for a sustainable busi- potheses and assumptions with start-up searches for a business
ness model. It is rigorous, works in potential customers. The focus model that works. If customer feed-
back reveals that its business hy-
potheses are wrong, it either revises
them or pivots to new hypotheses.
Once a model is proven, the start-up
starts executing, building a formal
organization. Each stage of custom-
er development is iterative: a start-
up will probably fail several times
before finding the right approach -
Figure 1. Lean Start-Up Lifecycle Steve Blank
how to scale a lean start-up.

SCALING A LEAN START-UP From Customer Development Using appropriate techniques


to Customer-Driven Organisa- (e.g. Analytics) entrepreneurs
According to Steve Blank, while tional Development review and refine each part of
there is plenty of literature to help Entrepreneurs get out of the the delivery of the Customer Ex-
entrepreneurs figure out how to building and test their hypoth- perience & Lifecycle, and incre-
search for a business model (as eses and assumptions on Cus- mentally create a blueprint of
well as Incubators and Accelera- tomer Experience & Lifecycle de- an organisation that can scale
tors to give practice), there are few livery with potential customers. predictably (by replication, or
resources from which an entre- Based on validated feedback, expansion of each functional
preneur can learn how to guide a they create an organisational unit) to deliver against a given
company through the execution structure that is optimised to sales volume. The key challenge
phase. Thankfully, this is no rea- deliver on each part of the Cus- hereby is that with increasing
son to despair. In the following tomer Experience & Lifecycle. organisational size it is diffi-
26 sections we will show how entre- It is important to note that cre- cult to maintain focus: clarity of
preneurs can re-purpose and use ating an appropriate organisa- the common purpose, under-
Lean Start-Up principles to help tional structure requires specific standing of business model and
moving a company out of start-up organisational skills that might dedication to customer needs.
mode and scaling into full execu- be not available among the Experience shows that fewer
tion: founding team. Therefore, this functional units, a flat organisa-
phase is often used as an inflec- tional hierarchy, ... can help ad-
From Business Model Search tion point by start-up boards to dress these issues by promoting
to Operating Model Search re-assess and strengthen the speed, simplicity and trust.
Entrepreneurs use a Customer founding team with any missing
Experience & Lifecycle Definition organisational competence. Fi-
to capture the assumptions and nally, successful companies view
hypotheses on how the com- Customer-Driven Organisational
pany delivers the pre-, in- and Development as a continuous
post-sales customer experience, process to adjust and improve
as enabled by the Minimum Via- the companys organisational
ble Product (an example of such structure.
a Definition can be provided on
request). From Minimum Viable Product
to Minimum Viable Organisa-
tional Blueprint
how to scale a lean start-up.

CREDITS & REFERENCES

The graphics in this article are


based on graphics from the
Figure 2. Scaling a Lean Start-Up HBR.org site. The graphics were
adapted for this article by our
In parallel to customer develop- In summary: designers at RunnyMarmalade
ment, a start-up searches for an op- to reflect the extended method
erating model that can scale predict- In this insights article we de- proposed. All names and trade-
27 ably to deliver against a given sales scribed how Lean Start-Up princi- marks mentioned therein are
volume. Starting from an initial or- ples can be re-purposed and ap- the property of their respective
ganisation setup, the start-up seeks plied for moving a company out of owners. Please observe the
to continuously adjust its structure start-up mode and scaling into full Neos Chronos Terms of Use.
to deliver optimally against the Cus- execution. The application of the
tomer Experience & Lifecycle Defi- method presented may require Lean Start-Up: Website, Wiki
nition. Once an operating model is specific organisational skills that
proven, the start-up is ready to scale might be not available among the Steve Blank: Website, Why
its organisation at a higher speed. founding team. In such case, it is the Lean Start-Up Changes
This is a continuous process: a start- advisable to acquire missing or- Everything, What Do I Do Now?
up will probably adjust its operating ganisational competence. The Startup Lifecycle
model several times over its lifetime
to address changing Customer Expe- Free Download:
rience & Lifecycle Definitions - Neos Business Model Canvas
Chronos
THE TECHNOLOGY BEHIND THE EVOLUTION OF SHOPPING.
by Dr. Thomas Papanikolaou on February 12, 2015

Understanding what makes life


simpler, easier and better for us-
ers (be it persons or businesses)
is the prerequisite to create com-
pelling and engaging user experi-
ences for them. Starting from the
users daily life and journey offers
a natural way to identify user tasks
whose execution can be improved.
The inherent clarity of this ap-
proach makes it easier to choose
28 the most appropriate technology
to create improvements to user
experience. As an example, we
look at how shopping experience
evolved and how technology has
enabled this evolution.
2015 Neos Chronos Limited . http://neoschronos.com . based on a presentation by Saatchi & Saatchi X,
with permission.
Up to 2005, purchasing in-store
was the primary means of acquir-
ing goods. With the introduction by introducing facilities such as enabling technology might be
of fixed broadband, shopping be- community ratings and one-click readily available. Our picture
came more convenient as technol- purchase. Since fairly recently, it is shows one such possible path (in
ogy enabled shoppers to research even possible for connected devic- gray color).
and purchase online while siting es e.g. fridges to perform purchas-
in front of a computer. Mobile es after asking for and receiving Big Data and Analytics could
broadband removed the attach- the users permission. be used to enable connected de-
ment to the computer, leveraging vices (intelligent fridges) perform
the mobility of devices connect- Moving forward, there are many purchases based on rules de-
ed to mobile networks. Subse- possible paths for the shopping fined by the user. In rule-based
quently, social networks improved experience that may or may not replenishment, the technology
shopping confidence and speed materialise despite the fact that matches user preferences to in-
the technology behind the evolution of shopping.

formation computed from his- CREDITS & REFERENCES


torical patterns to implement
rules like always buy vegeta- The Evolution of Shopping
bles from local producers (rule), graphic is based on a graphic
based on our usual seasonal from a public presentation by
consumption (big data, analyt- Rachelle Headland, Managing
ics), even if the price is 10% high- Director at Saatchi & Saatchi X -
er than the market average (rule, London who generously gave us
big data, analytics). permission to use it for our own
Artificial intelligence could be work. Graphics were adapted
employed to enable use cases for this article by our designers
that are more interconnected at RunnyMarmalade. All names
with our life. For example, de- and trademarks mentioned
29 spite existing rules, an intelligent therein are the property of their
fridge could independently or- respective owners. Please ob-
der more drinks, when a party is serve the Neos Chronos Terms
arranged on the users connect- of Use.
ed device / calendar (predictive
replenishment). Wikipedia: Artificial intelligence

Whether the future shopping ex-


perience we describe will material-
ise, will most likely depend on the
ability for users to program such
rules simply and intuitively, rather
than the availability of technology.
This brings us to this articles key
learning:

For an experience to be adopted


by users it needs to make life sim-
pler, easier, better. Technology is
just an enabler.
THE PRACTICAL GUIDE TO ENTERPRISE WI-FI CALLING.
by Dr. Thomas Papanikolaou on February 03, 2015

Wi-Fi Calling is expected to find small enterprises and start-ups to have Wi-Fi calling usable via
wide deployment beyond the US can deploy application-based Wi-Fi the native phone dialer. This is
over the course of 2015. Beside Calling across all common Mobile not new. Native Wi-Fi Calling has
consumers, enterprises have a Operating Systems. been a functionality long availa-
lot to benefit from the new com- ble in the US through various mo-
munication access channel. In COMMUNICATIONS COST bile and fixed network operators
this article we summarise how across various devices and mod-
enterprises should approach Wi- It is a different story at the ified versions of Mobile Operat-
Fi Calling, compare native to ap- point where enterprises need to ing Systems). The novelty is in the
plication-based approaches, and provide a managed / controlled acknowledgement from a major
provide practical advice on how to communications experience. This device manufacturer that Wi-Fi
30 choose the right implementation could be, for example, because Calling belongs into the Mobile
for small, medium and large enter- the enterprise grows that much, Operating System, as an intrinsic
prises. that deploying its own communi- part of the user experience.
cations infrastructure (e.g. a PBX)
ENTERPRISE SIZE and monitoring communications Imagine, for example, a mobile
cost has a positive business case. operator that can offer native Wi-
The size of your enterprise will Hereby two options (managed Fi Calling, with smooth handover
most likely determine the type of on-premise versus outsourced between access networks and all
Wi-Fi Calling approach that makes cloud infrastructure) become enterprise functionality of a cloud-
sense for you. For example, if you available. The tools that worked PBX. Such a proposition provides
are just starting out, existing and well for small enterprises, might productivity gains that are hard to
battle-tested tools like Skype, We- now expose issues as manage- beat with any application-based
Chat, etc. will be more than suffi- ability and financial integration approach. So user experience is a
cient. Once agreed as the default become important. This is usually critical factor to consider because
tool to be used by everyone (this the case in medium-size enterpris- of its positive business case im-
is where size matters) such appli- es. pact.
cations provide great functionality
(voice/video call, messaging, pres- USER EXPERIENCE INTEGRATION REQUIREMENTS
ence, file transfer) and experience
(robust and bandwidth-saving Co- With the introduction of the iP- There is however a further factor
decs). For a very low investment hone 6, enterprises can choose that will ultimately decide wheth-
the practical guide to enterprise wi-fi calling.

er an enterprise should choose Neos Chronos have published


the native Wi-Fi Calling approach an excerpt of relevant research
versus the application-based one, performed last year in the Wi-Fi
namely the depth of integration Calling market overview article.
required with existing enterprise For more information on how our
processes. This is the case with advisory services could help you,
large enterprises. Examples of please contact us to arrange an in-
such integration include the ability troductory meeting.
to place video calls from a mobile
into an enterprise-premises video
conferencing system, and com- CREDITS & REFERENCES
plying to regulatory requirements
such a call recording for financial All names and trademarks
31 institutions. Here a configurable mentioned therein are the
application-based Wi-Fi Calling property of their respective own-
approach makes far more sense ers. Please observe the Neos
than native Wi-Fi Calling. Chronos Terms of Use.

WHAT NEXT Application-based Wi-Fi Calling:


Skype, WeChat
The four factors listed above,
form a solid decision guide for Wikipedia: Codec, PBX,
choosing the right Wi-Fi Calling Mobile Operating Systems
deployment for your enterprise.
Admittedly, there is no solution
that fits all requirements. There is
however an optimal solution for
your enterprise size, your budget,
the productivity gains you aim to
achieve, and the context within
which you operate. We hope the
examples we listed above will help
you find it.
FEATURED SERVICE: LEAN CANVAS WORKSHOP

Starting up?

Get help to accelerate your entrepreneurial journey. Work together with an expert advisor to capture your
idea and business model. Discuss questions specific and relevant to your idea. Benefit from direct access to
the advisors business experience to inform your decisions during and after the workshop. All of this within a
confidential and supportive setting.

STARTUP EDITION BUSINESS EDITION ENTERPRISE EDITION


< 2 YEARS OLD 2+ YEARS OLD 2+ YEARS OLD

32

LEAN CANVAS WORKSHOP LEAN CANVAS WORKSHOP LEAN CANVAS WORKSHOP


ONLINE, SKYPE VIDEO ONLINE, SKYPE VIDEO ON-PREMISE
1 - 2 PARTICIPANTS 1 - 2 PARTICIPANTS 1 - 6 PARTICIPANTS
1 HOUR SUPPORT 2 HOURS SUPPORT 4 HOURS SUPPORT
NO EXPENSES NO EXPENSES EXPENSES (*)
PAY WITH PAYPAL PAYPAL OR INVOICE PAY ON INVOICE

LEARN MORE

(*) The Expenses for on-premise delivery for the Enterprise Edition are charged in addition to the price shown on our website. Details will be provided upfront.
We thank you for your support
and hope for a continuing suc-
cessful cooperation.

The Neos Chronos Team

33

INSIGHTS 2016 - 2015

Design: runnymarmalade.com
Photography: Anja Trampert

Subscribe at
neoschronos.com/insights

2017 - All rights reserved.

Вам также может понравиться