SlideShare una empresa de Scribd logo
1 de 60
Descargar para leer sin conexión
1
2
BLOG.
wedo
tech-
nolo-
gies.comAF_Miolo_LivroBlog2015.indd 2 03/02/16 16:23
3
“BLOG.wedotechnologies.com is the official blog of the WeDo Technologies team, sharing
expert opinions on the important role that Enterprise Business Assurance plays in the
digital transformation of business on several industries.
The blog posts represent the writers’ opinion. The articles are mainly created by our own
experts but it also includes the voice of some special guests on the matters which they
can had value to the community or in those topics they would like to be further discussed.
Thus, we try to answer common questions that our community has by consistently
creating content that’s helpful for you.
The BLOG.wedotechnologies.com is also a space that offers the chance to share our values,
communicate our corporate culture and of strengthening ties with the farthest reader.
This is the 2nd Edition of the BLOG.wedotechnologies.com book and it is once again
fascinating to look back and see what readers have enjoyed most. From the 33 blog
articles published from 22 unique authors, the most-shared and most-viewed articles
represent this selection of the best blog articles of 2015.
A total of 13 blog posts make up this book, addressing topics such as Fraud
Management, Revenue Assurance, Credit Scoring, Customer Value Management and
more within the different industries: Telecom, Utilities, Retail, Insurance and Healthcare.
Thank you to all our writers that have contributed to the BLOG.wedotechnologies.com last
year and also, of course to you, our valued readers.
We hope you will continue to appreciate BLOG.wedotechnologies.com in 2016.
Enjoy it!
Visit and subscribe BLOG.wedotechnologies.com
Marketing, Alliances and Community Development Team
BLOG.wedotechnologies.com
mAF_Miolo_LivroBlog2015.indd 3 03/02/16 16:23
4
“Many CEOs opt for the tried
an tested way of reducing costs
and satisfying stakeholders
quickly by reducing head count,
but in retail that usually
results in lower levels
of customer service.”
AF_Miolo_LivroBlog2015.indd 4 03/02/16 16:23
5
CEOs have been getting a lot of press recently. It’s not surprising really as they are
the ones ultimately responsible for a company’s performance and are accountable
to both stakeholders and staff alike. Forbes launched the opening salvo against
wanton CEOs by saying, “across the board, the more CEOs get paid, the worse their
companies do over the next three years, according to extensive new research. This is
true whether they’re CEOs at the highest end of the pay spectrum or the lowest.”
The article and the report itself lambasted high-earning, poor-performing CEOs by
linking that the more they were paid, the worse their companies did. In fact, this
negative effect was most pronounced in the 150 firms with the highest-paid CEOs.
For the 5 percent of CEOs who were the highest paid, it was found that their
companies did 15 percent worse, on average, than their peers. The paper also found
that the longer CEOs were at the helm, the more pronounced was their firms’ poor
performance.
CEOs
SEEING RED
Written by
Rui
Paiva
Chief Executive Officer
at WeDo Technologies
27/01/2015
AF_Miolo_LivroBlog2015.indd 5 03/02/16 16:23
6
The conclusion the report came to was that overconfidence was the main
contributing factor and that CEOs who are paid huge amounts tend to think less
critically about their decisions.
At this time of the year when most news reports are on the highlights of the last year,
the BBC went out of its own conservative comfort zone to name the year’s five worst
CEOs.
Writer, Sydney Finklestein, held back no punches in stating that, “in virtually
each instance, the seeds of failure were sown in earlier success. These five
chief executives were celebrated for their genius at one time, but all have fallen,
sometimes in spectacular ways.”
The five, in ascending order of failure were Twitter’s Dick Costolo; Sears Holding’s
Eddie Lampert; Tesco’s Philip Clarke; American Apparel’s Dov Charney and Banco
Espirito Santo’s Ricardo Espirito Santo Silva Salgado.
Salgado is the family head and kingpin of an interlocking and complex set of entities
that controlled the second-biggest bank in Portugal — and brought it to bankruptcy.
Of greater interest is that three of the five are involved primarily in retailing, a sector
that is being rattled by the digital revolution and changes in the way people are
buying goods.
Whilst it is evident that more people are buying online, CEOs of some ‘bricks
and mortar’ retailing chains have been able to adapt more readily than others to
heightened competition from cheaper stores that are operating more efficiently at
lower cost levels.
Many CEOs opt for the tried an tested way of reducing costs and satisfying
stakeholders quickly by reducing head count, but in retail that usually results in
lower levels of customer service. Retailing is still heavily dependent on staff to stock
shelves and serve customers.
AF_Miolo_LivroBlog2015.indd 6 03/02/16 16:23
7
Automation has helped bringing more efficiencies at managing stock levels and
speeding checkouts but cannot yet replace the human element and ‘retail therapy’
that shoppers go to stores to seek out.
Price competition, high stock levels, rents, seasonal cash flows, theft and low ‘stock
turns’ all contribute to the woes of retailers, but there is a trend towards monitoring
and managing all aspects of the business using sophisticated software not unlike
that used by telecoms operators.
Automation is providing continuous monitoring and detecting exceptions before
they cause significant impact on retail business right from supply chain controls to
continuously auditing pricing plans to assure yielding enough revenues.
7-Eleven México, with more than 1,700 stores across the country, recently
announced that it was implementing enterprise business software to deliver end-to-
end visibility and control of its retail processes, analyzing and identifying risks and
monitoring and controlling deviations.
The trend now is to have a full picture of the retail operation and be able to act
quickly in addressing any anomalies that may occur in real-time.
When enterprise business assurance becomes the norm we should see no retailers
in that top five lousy CEO list, just as we don’t see any telco bosses there now. That
should also remove the need for boards to make the single biggest cost reduction of
all – firing the CEO!
This article was first published in TelcoProfessionals.com. You can find the original
version here.
AF_Miolo_LivroBlog2015.indd 7 03/02/16 16:23
8
AF_Miolo_LivroBlog2015.indd 8 03/02/16 16:23
9
Any product is only as good as the ideas behind it. Unfortunately, generating
good ideas is never easy! As Seth Godin puts it “You can’t have good ideas unless
you’re willing to generate a lot of bad ones.” This may present terrifying vision
that demotivates us from even trying, but in reality it is just a natural part of the
innovation process. The more ideas that are generated, the more chances of
generating really good ones.
The flip side of this is the difficulty of managing a huge number of inputs. To get the
most out of a variety of knowledge, experiences and backgrounds, one must collect
and consider a large number of inputs from a variety of sources. These inputs must
then be clarified, enriched, classified, and eventually, in some cases, rejected or
grouped with other similar ones.
“At WeDo
Technologies
we employ an
open process
for collection
of ideas”
THE VIRTUOUS
CYCLE FROM
IDEA TO MARKET
Written by
MÓNICA
VALE
PRODUCT MANAGER
at WeDo Technologies
06/04/2015
AF_Miolo_LivroBlog2015.indd 9 03/02/16 16:23
10
Deciding which ideas to pick for promotion to market from an extended backlog is
an even tougher task. A successful prioritization process will account for a lot of
different factors, including customer requests, market trends, strategic directions,
long-term roadmaps and, of course, available resources. While there are many
approaches, no single best solution emerges. Therefore, it is essential to constantly
implement, assess, and improve a prioritization process that best fits needs and
reality.
After that, all the selected ideas will be further detailed from a more technical
perspective for transformation by development teams into the features that the
market will see. This phase frequently requires compromises, but often the final
features will be far more complex and comprehensive than the original ideas since
the development process factors in multiple aspects and visions.
When products finally hit the market, it marks the transformation of great ideas into
real features that customers will love, which will eventually generate new ideas. The
cycle is complete, but the work is not over because it is time to go through all of the
ideas, both new and old, and start the process all over again.
If you have seen the expanse of WeDo Technologies products, then you will know
that we are not running short on great ideas. At WeDo Technologies we employ an
open process for collection of ideas: we invite everyone to contribute. We receive
inputs from a lot of different sources and markets, including telecom, retail, energy,
healthcare and finance, and from a variety of user profiles and backgrounds from
both internal, such as product architects and developers, integrators, marketing,
support and sales team members, and external contributors from C-level to analysts.
Our customer contributions are key in the process because of their willingness to
cooperate and provide constructive criticism or complex needs that challenges us
to go one step further. And their willingness to embark on a WeDo Labs project and
work from concept through to the testing of an idea helps us shape and produce
viable products for the market.
Not all of the ideas that we receive will pass the initial scrutiny, and others will fail
to provide enough business value. But a great number of them will eventually make
AF_Miolo_LivroBlog2015.indd 10 03/02/16 16:23
11
it to the development stage or maybe generate other great ideas. Our Product
Management and Marketing teams’ joint efforts offer a democratic approach
for high-level prioritization that involves the Development, Delivery, Sales, and
Professional Services teams, and ultimately the Executive Committee, in the
decision-making process that brings all stakeholder views to the table.
Next the Product Architects and Development Teams take the high-level ideas and
transform them into great product features. And it is up to the Product Management
and Marketing teams to leverage all the contributions and feed the product
roadmaps with the long-term vision for product evolution.
The final result is certainly not perfect, but it gives everyone a chance to contribute.
In the end we can be confident that all these contributions will provide us with the
best forward path that, both in the short and the long term, will bring to the market
the features that are most relevant to our customers.
AF_Miolo_LivroBlog2015.indd 11 03/02/16 16:23
12
“The best way to
safeguard against
fraud is to have a
security and fraud
management teams
working together”
AF_Miolo_LivroBlog2015.indd 12 03/02/16 16:23
13
DOUBLE BIND
IN FRAUD WON'T
BE AN ISSUE FOR
MUCH LONGER
Did anyone ever tell you to be creative about something? When this situation
happens, I use to close my eyes and start repeating this mantra to myself: “Let’s go
creative! And by the way, if you can do it right now… it will be perfect!”
This situation is what is referred to as a “double bind” - a tricky way to communicate two
discordant instructions given simultaneously. Another example of a double bind is telling
to people to be spontaneous. If they begin to act spontaneously, they are not truly acting
spontaneously; they are simply following instructions. In the end, it is a no-win situation.
From psychology to global level, the double bind constantly occurs. For example,
a double bind is encountered in economy when countries face the challenge of
growing economically without disrupting the environment.
Written by
CLAUDIa
CaLADo
Advanced Analytics
Project Manager
at WeDo Technologies
12/08/2015
AF_Miolo_LivroBlog2015.indd 13 03/02/16 16:23
14
In Telco, a variety of double bind situations can also be presented. One type that is
particularly worrisome to operators is the double bind faced in fraud management.
In fraud situations, operators set the necessary fraud rules to prevent future fraud
cases of the same type. Instead of controlling fraud activity, this actually results in
the growth of a constantly adaptive capacity of fraudsters to escape from the fraud
management system based on traditional fraud rule mechanisms. But, on the other
hand, doing nothing is not an option. This is another no-win situation. As traditional
fraud rules increase in number; the more complex and tricky schemes to perpetrate
fraud become, thus making it more difficult for operators to reach the level of
sophistication that fraudsters are achieving.
Fortunately, advanced analytics are now able to confront the fraud challenge.
The capacity to analyse data on a multiple dimension reality, combined with the
performance of Big Data processing, makes use of detection and prediction models
on large volumes of data more realistic now than it was a decade ago.
Detection models, also called unsupervised models, are mainly used to identify
groups or clusters from a customer base so that the behaviour of entities within
each group are more alike than the ones belonging to other groups.
When applied in the context of fraud, detection models can be used to do the
following:
• Detect suspicious behaviours
• Identify new fraud types
• Enrich case management with cluster information
• Reduce false positives
On the other hand, prediction models analyse past behaviour to obtain the propensity
value of a particular event to occur.
AF_Miolo_LivroBlog2015.indd 14 03/02/16 16:23
15
Prediction models can be used to prevent the occurrence of fraud. These models
take into account the behaviour generated by entities upon their traffic data and
evaluate their propensity to commit fraud. The prediction models can be used to do
the following:
• Prevent the occurrence of fraud, scoring all customer base and identifying the
entities having a behaviour more likely to commit a fraud
• Enrich case management with additional information to better evaluate false
positive
• Prioritize the cases in Case Management with additional propensity values
information
Advanced analytics are leading to new weapons in the fight against fraud
ecosystems that are continuously growing in complexity.
The added value of such techniques is their capacity to rapidly adapt to new realities
that are increasingly more difficult to achieve with the setting of traditional fraud
rules.
Another trend that we assist is the constant concern of providers in delivering user-
friendly advanced analytics tools, solutions, and products that are capable of guiding
a fraud analyst through their investigation, from selecting the customer base for
analysis to reaching actionable results.
Despite the double bind suffered from traditional fraud rule mechanisms, the use of
advanced analytics tools can produce the optimum combination, leading an operator
to the next step of a Fraud Management System, introducing more advanced and
complex rules within a large volume of data.
With advanced analytics tools, double bind in fraud management won’t be an issue
for much longer.
AF_Miolo_LivroBlog2015.indd 15 03/02/16 16:23
16
With RAID TELECOM (...)
we decided to design
four ‘experiences’,
helping to ensure
all roles are
optimized.
AF_Miolo_LivroBlog2015.indd 16 03/02/16 16:23
17
RAID TELECOM:
CREATING
A STATE OF
THE ART USER
EXPERIENCE
In this interview, Carlos Martins, Chief User Experience Architect at WeDo
Technologies, shares why he is so passionate about creating the best User
Experience possible for RAID Telecom, and why WeDo has invested so heavily in
this area.
by QUEXOR GROUP
AN INTERVIEW WITH
Carlos
MartinsCHIEF UX Architect
at WeDo Technologies
17/07/2015
AF_Miolo_LivroBlog2015.indd 17 03/02/16 16:23
18
As the User Experience Architect for WeDo Technologies, what vision did you have
for RAID TELECOM and were you able to achieve it?
As a UX architect, I wanted to deliver a state of the art look and feel for RAID
TELECOM that followed the best practices for UI design to ensure optimum usability
for our customers. It needed to be a progression from our latest version – with a
modern look, but one that still relates to our core product.
Many of today’s best design and usability practices can be traced back to industry
innovator Don Norman, who, in 1988 was one of the first to publish his principles
on the art of human machine interaction. This involves the study, planning, design
and uses of the interfaces between people and computers. For RAID TELECOM we
worked to provide a modern look and feel without sacrificing usability.
In 2013 we invested heavily in significant usability improvements with the launch of
Raid 7.0 and did extensive testing with real end-users. This resulted in some early
failures, and we learned a lot from this experience. Going forward, we only deploy
new functionality when we have at least 90% testing success. Intuitiveness is one of
our biggest design challenges today- we wanted our users to ‘recognize’ rather than
‘recall’. This is an area we worked on extensively for the launch of RAID TELECOM.
Another major improvement with RAID TELECOM is the ability to anticipate a user’s
actions through something we call ‘Smart Highlights’. This is a tool we designed for
presenting the end user with what is relevant based on their profile. This improves
the user experience and speeds up the results, providing options via the user
interface that will lead to the most critical actions. It’s a more personalized approach
that is based on user-centered design rules. When the user first logs on to our
software, they will find it very intuitive and easy to understand.
What key areas do you take into account when designing a user interface?
Our software is based on a user’s ‘web experience’. There are two different philosophies
when designing a Web user interface - Fast Web and Slow Web. Most UI applications
have one strategy, fast or slow. Our software uses both because our customers use our
solution in ways that require different speeds. There are scenarios that are time sensitive
AF_Miolo_LivroBlog2015.indd 18 03/02/16 16:23
19
or where users only require a high level view (fast web), and then there are those times
where lengthy analysis of detailed data might be required (slow web).
We needed a design approach that could respond to both fast and slow web styles.
We use big graphics and bright colors for fast web, but for slow web styles we use
a special font that is more easily readable and we add features that are specifically
designed with a strong focus on analyzing data. For example, we reduced the use
of colors but optimized contrast so we could guarantee users can focus on detailed
data. Slow web use can cause users to tire quickly, but we implemented features to
lessen the impact of eyestrain and mental fatigue.
With RAID TELECOM we decided we couldn’t create a single one-size-fits-all user
experience that would fit with every role, so we decided to design four ‘experiences’,
helping to ensure all roles are optimized. This led to our Smart Highlights feature.
Why is the User Interface so critical for a solution like RAID? And how is RAID’s
user interface different from other solutions on the market?
Businesses around the world are evolving fast and people need fast answers.
Software needs to adapt to users’ needs and UI is a critical piece of this puzzle.
RAID is one of the major tools for providing critical answers for our customers. If
the UI is intuitive our customers will achieve better, faster results. They will have the
answers they need and to allow the corporation to understand their business and to
understand where problems exist and to resolve them more quickly. The UI must be
very intuitive, fast and directed to handle day to day changes in the business.
With RAID 7 we took a different approach, focusing more on user empowerment.
This allows users to create their own dashboards and change them as the business
evolves. As a UI designer, this creates a lot of challenges, but users should be able
to redefine a screen or create a new screen from scratch if the business demands
it. We improved on this with Enterprise Business Assurance, giving users the even
more agility to create their own screens and dashboards as their business evolves.
We know business changes rapidly, and if customers have to wait for their vendors
to make upgrades or update functionality – they won’t be able to keep up and remain
competitive. Customers can now manage these changes themselves.
AF_Miolo_LivroBlog2015.indd 19 03/02/16 16:23
20
RAID TELECOM allows users to create their own analysis through our ‘Investigation
Workbench’ tool. This allows users to create ‘self-service’ analysis that can preserve
data snapshots and allow data comparisons over time. In addition, this analysis can
be attached to specific Case Management cases, which provides an added level of
information for other users. RAID TELECOM also provides the freedom to create ad-
hoc tasks with SLAs that can change or be redefined as needed. No other tool in the
market is providing all of this today; the best user experience and a powerful set of
tools that don’t otherwise exist in the market.
What new features of RAID TELECOM are your customers most excited about?
One of the things our customers have been asking for is to have Help features
bundled in with the product, making it easier to access. In the past, we provided
user guides as PDF files, but now it has been built into the product, making it more
contextual and easier to access.
‘Smart Highlights’ is another popular feature. As I mentioned earlier, this feature
gives RAID a dynamic ability to create a world that highlights what is critical and
relevant for that specific user.
‘Investigation Workbench’ for ad-hoc analysis has been extremely well received,
along with the ability to support Pivot Tables.
‘Adaptive Case Management’ gives users the power to create ad-hoc tasks and
human readable flows based on the new BPMN2.0 standard, allowing end users to
design workflows in Visio and import these into our solution.
‘Smart Data Stream’ is also a new feature. This is a new ETL engine that is lightning fast.
And last but not least is our new ‘EBA Cockpit’, which provides executive-level
answers quickly, with just a glance.
When it comes to giving our customers the best product possible, I think that we
nailed it. RAID TELECOM is state of the art in terms of user experience.
AF_Miolo_LivroBlog2015.indd 20 03/02/16 16:23
21
CreatedbyJamesFenton•NounProject
“RAID TELECOM is
state of the art
in terms of user
experience.”
AF_Miolo_LivroBlog2015.indd 21 03/02/16 16:23
22
“All this new data
and new tools are
invading Insurance
Companies business
areas down
to its processes, systems
and human resources”
AF_Miolo_LivroBlog2015.indd 22 03/02/16 16:23
23
Three Insurance salesman were sitting in a restaurant boasting about each
company’s service.
The first one said, “When one of our insureds died suddenly on Monday, we got the
news that evening and were able to process the claim for the wife and had mailed a
check on Wednesday evening.”
The second one said, “When one of our insured died without warning on Monday, we
learned of it in 2 hours and were able to hand-deliver a check the same evening.”
3 STORIES
THAT'LL MAKE
YOU RE-THINK
THE FUTURE
OF INSURANCE
Written by
GUILHERME
FARIABusiness Development
Manager - Insurance
and Banking
03/07/2015
24
The last salesman said, “That’s nothing. Our office is on the 20th floor of a tall
building. One of our insured who was washing a window on the 85th floor, slipped
and fell. We handed him his check as passed our floor.”
This very plausible story shows how insurers nowadays are concerned about providing a
great service and excelling in customer relationship, but it unveils the urge to keep up with
the latest technological trends. Social Networks, Mobility, Analytics and Cloud (the so-
called SMAC) as well as Big Data and the Internet of Things or, more appropriately, Internet
of insurable Things, are pushing Insurance Companies to a very uncomfortable ground.
The reality is that the Insurance Industry is considered to be “digitally conservative”.
The EY Global Insurance Digital Survey 2013 finds insurers limited in their digital
capabilities: fewer than half were able to digitally provide information about products
and services or provide a quote, a mere 23% could digitally process insurance claims,
and just 35% could process a transaction/ sale digitally (see chart below).
Now, imagine the following stories:
1) “My new car: a BM… black mouth, not Bavarian Motors”
I have just bought a car that, besides being loaded of sensors, is able to whisper
my driving habits directly to the ears of my insurer - distance travelled, time spent
Digital Functionality in the Insurance Sector
(% of insurers with digital funcionality)
Provide Information about products/company
Provider Quote
Customer Self-Service Facilities
Transact/Purchase
Process Claims
23
35
40
43
47
AF_Miolo_LivroBlog2015.indd 24 03/02/16 16:23
25
driving, accelerations, brakes and turns. But, at the end of the day I like it, because as
an impeccable driver, my personalized insurance premium is much cheaper than my
crazy driving neighbor.
2) “My skinflint spirit is telling me: don’t eat that chocolate and go to the gym!”
I am all fit with fancy wearable devices that know all the time my heart rate, calorie
calculations, exercise habits, sleep patterns, GPS location data,… and the truth is,
before I look at my health statistics my buddy insurer is already computing all this
data to duly adjusting my life and health insurance premiums… I am going to the
Gym!
3) “My house is calling the insurance plumber to stop a water leakage”
I was working when I received an SMS from the insurance company telling me that
there was a leaking water tap at my house. They wanted to schedule a visit from a
plumber to fix the problem and prevent any type of property damage.
These 3 stories are not far away from today, in spite of all regulatory and privacy
concerns, similar situations will occur in the near future. And again, how tough
will be for these “digitally conservative” companies to cope with large inflows
of new data, with new customer relationships and the need of higher than ever
reaction speed?
And how about the integration of the new and essential data analytics tools with
existing legacy systems, ensuring the smooth and safe transfer of data between
previously siloed departments and business systems?
All this new data and new tools are invading Insurance Companies business areas
down to its processes, systems and human resources: from Risk Assessment and
Underwriting, Policy and Premium Calculation to Claim processing and Fraud detection.
Now, the $1M question is: How are we going to continuously control these newly
shaped processes, systems and human resources, avoiding financial losses
coming either from revenue leakages or undue costs?
AF_Miolo_LivroBlog2015.indd 25 03/02/16 16:23
26
“No longer will
the revenue
discussion
be confined
to a purely
finance function”
AF_Miolo_LivroBlog2015.indd 26 03/02/16 16:23
27
WHO'S AFRAID
OF THE IoT?
NOT I - AND
YOU SHOULDN'T
BE, EITHER!
Next month I have the opportunity to speak at WeDo’s inaugural North American
Enterprise Business Assurance Conference, WDC@WDC. While pondering the key
issues facing the Revenue Assurance and Fraud Management community and
planning my subject matter during a long drive to Las Vegas for CTIA, I happened upon
a radio feature on connected devices – already quoted as standing at 10 billion. This
got me thinking. The fact is that this number is going to multiply tenfold in the next two
to three years, begging the question for any company whose revenue could be in some
way related to the new connected world we’re entering into: “Are we really ready?”
Written by
ROBERT
STRICKLANDCo-Founder of Digital Nexus
17/09/2015
AF_Miolo_LivroBlog2015.indd 27 03/02/16 16:23
28
Now that connectivity is introducing new elements of commerce to everyday objects,
from cars to energy meters, the concept of the Internet of Things (IoT) is slowly but
surely becoming the norm rather than a nascent technology that we’ve long dreamed
about. Indeed, the connected world is going to be here a lot sooner than we realise –
and, although it’s something that the tech / mobile industry and consumers have been
eagerly anticipating for some time, the reality of whether we’re ready to embrace and
make the most of it from a revenue perspective is probably quite different. It’s something
that offers immense opportunity, but is simultaneously quite a frightening prospect.
Driving different behaviours and dynamics across business, the IoT will bring with it a
whole new set of challenges and disruption, especially when considering the backdrop
of protecting customers, assets and revenues. No longer will the revenue discussion
be confined to a purely finance function; there will be implications for IT spend as we
know it and company culture as a whole. This will be a board level conversation.
When it comes to the associated software and services for the new connected
world, companies are going to need to be at least on the curve – if not ahead of it.
Trailing behind will certainly not be a good place to be. This is where WeDo’s event
will be invaluable. Having attended and spoken at their events in the past, I know
from experience that they have the knack of getting people together to really define
a category, in turn listening and driving solutions to meet the demand of what their
customers want and need - ahead of the curve. That is their secret sauce.
What is needed to face the new challenges of the IoT is thought leadership, innovation
and technology, and that is what WeDo deliver in spades. Their Enterprise Business
Assurance approach allows businesses to face innovation such as the introduction of a
new range of connected devices head on, capitalising on the opportunity for growth while
maintaining tight control over business processes, the customer experience and revenue.
While it’s unusual to see this kind of innovative approach coming from Portugal rather
than the usual suspects of Silicon Valley, Israel or Germany, the fact that WeDo are
providing a glimmer of hope on how to come to terms with this new reality is something
that should be embraced. Their worldwide footprint and impressive list of clients mean
that their insights are better and different from others offering similar services. I’m looking
forward to seeing how the first event specifically for the North American market unfolds!
AF_Miolo_LivroBlog2015.indd 28 03/02/16 16:23
29
CreatedbyFelixWestphal•NounProject
“...the IoT
will bring with it
a whole new set
of challenges
and disruption...”
AF_Miolo_LivroBlog2015.indd 29 03/02/16 16:23
30
“One thing is for sure,
war is an inevitable
part of every fraudster’s
game, even if you
try to avoid it.”
AF_Miolo_LivroBlog2015.indd 30 03/02/16 16:23
31
Explaining the fraud market maturity by analogy with Computer Game ‘Civilization’.
Ah, the 90s. They were wonderful, weren’t they? Nirvana released ‘Nevermind’, people
started to go online and everyone was sure the Y2K bug was going to bring about
the end of the world. You want to know what else was great? Computer games. The
90s produced some of the most inspiring, innovative computer games the world has
ever seen. You may have played ‘Age of Empires’, which was a very influential game
for its time, related to real-time strategy, but we cannot ignore the fact Sid Meier’s
‘Civilization’ came first, in 1991, with just one objective: build an empire that can last.
Written by
CARLOS
MARQUES
PRODUCT MARKETING
Manager at
WeDo Technologies
05/08/2015
IS THE FRAUD
MANAGEMENT
MARKET
'MATURE'?
AF_Miolo_LivroBlog2015.indd 31 03/02/16 16:23
32
In this game, the player takes on the role of the leader of a civilization, starting
with one settler unit, and attempts to build an empire in competition with other
civilizations. Along with the larger tasks of exploration, warfare and diplomacy, the
player has to make decisions about where to build new cities, which improvements
or units to build in each city, which advances in knowledge should be pursued, and
how to transform the land surrounding the cities for maximum profit.
From time to time the player’s towns are attacked by barbarians with no specific
nationality and no named leader. These threats only come from unclaimed terrain (land or
sea), and over time there are fewer and fewer places from which barbarians would arise.
As time advances, new technologies can be developed and these technologies are
the primary way in which the game changes and grows. These stages of ‘scientific
advancement’, just as in real life, are directly linked with military strength. In ‘Civilization’
the war starts with a strong infantry unit, catapults and knights can be finished with
riflemen, cannons and cavalry. He who has more cutting-edge units usually wins the war.
AF_Miolo_LivroBlog2015.indd 32 03/02/16 16:23
33
Like with modern fraud prevention and detection techniques, success in defeating
the “barbarians” in Sid Meier’s ‘Civilization’ is determined by the capability to reduce
uncertainty from emerging fraud threats. However, ‘unclaimed terrains’ can blind
you from spotting these emerging threats, and that is why we rely on technological
advances to manage fraud threats when fraudsters emerge.
Similar to the game, most of today’s CSPs already have a weapon, or in this case a
fraud management tool, that is being used to stop the barbarians, or fraudsters. At
first glance, we may mistakenly believe that this is a mature market.
The question now becomes, “If you have a tool but it faces technological
disadvantages against the fraudster’s tools, are you really equipped to battle fraud?”
Certainly not.
At this point, the service provider has 2 options:
• Weapons are upgraded to a more updated version, (i.e. – The CSP begins with
arches and evolves to a crossbow)
• A completely disruptive technology is introduced, (i.e.- where you go for gunpowder
or even nuclear weapons to exterminate your enemies)
Either way, until you have the right weapon to defeat your potential enemy, the
problem isn’t solved.
One thing is for sure, war is an inevitable part of every fraudster’s game, even if you
try to avoid it.
CSPs can gain a large advantage if their fraud departments are the first to
achieve a particular technological advantage (the secrets of Artificial Intelligence,
for example) and put it to use in a “military” context. The whole system of
advancements, from beginning to end, is a full speed technology ride. So is the
market mature? Not if it is always open and rejuvenating. In other words, I would
say that it ‘Smells Like Teen Spirit!’
AF_Miolo_LivroBlog2015.indd 33 03/02/16 16:23
34
“With this latest
version of RAID
Telecom, we have also
completely redesigned
the user interface.
AF_Miolo_LivroBlog2015.indd 34 03/02/16 16:23
35
Raul Azevedo is Head of Product Development at WeDo Technologies. In this interview,
Raul shares his insights into the market drivers behind RAID Telecom, and how his
team has worked to redesign the way Telcos think about and manage their business.
by QUEXOR GROUP
AN INTERVIEW WITH
RAUL
AZEVEDOHead of PRODUCT
DEVELOPMENT
at WeDo Technologies
18/06/2015
ENTERPRISE
BUSINESS
ASSURANCE AND
RAID TELECOM:
DEVELOPING
THE TOOLS TO
BUILD A BETTER
BUSINESS
AF_Miolo_LivroBlog2015.indd 35 03/02/16 16:23
36
What was your role in creating RAID Telecom?
I joined WeDo Technologies eleven years ago, beginning in Product Delivery. Now
my role is Head of Product Development, which is responsible for Engineering,
Technical Architecture and Quality Assurance. I oversee the entire product
development lifecycle, which includes requirements identification, analysis, design
and engineering, as well as test and delivery. I also oversee our activities with the TM
Forum as head of their Fraud Management Group.
What are latest product features of RAID Telecom? What will customers find most
useful?
As always, our focus when developing products is to remain true to our Enterprise
Business Assurance (EBA) vision. One way we’ve accomplished this was through
the creation of Fast Processes - which address the broader business assurance
needs within a CSP; going well beyond traditional Revenue Assurance and Fraud
Management. For example, with Fast Processes we have taken industry best
practices for controls, alarms, case management flows, and supplier and partner
incentives management and then packaged them and made them available right out
of the box.
Although Fast Processes are prepackaged, RAID still maintains its flexibility with Flex
Processes. With Flex Processes you can expand your audits and configure them to
fit any need that you have, including certain modeling requirements that are out of
scope within Fast Processes.
We also have a lot of new and exciting product features within this release.
Firstly- our new Adaptive Case Management tool allows users to change or react
to events like emails, tweets or external alarms. It is fully event-driven and very
easy to configure, allowing the end-user to maintain the case management flow
and monitor performance. Another feature is the new Data Discovery toolset.
Investigation Workbench is one of these tools and was designed specifically for
ad-hoc investigation. We have done significant market testing with this feature
to maximize usability and productivity. Secondly, we have introduced Smart Data
AF_Miolo_LivroBlog2015.indd 36 03/02/16 16:23
37
Blueprints, which allows end-users who are not familiar with SQL or other query
languages to produce complex queries simply by creating them in a data flow. This
provides a simple, interactive way of building complex queries that can easily be
reused.
We also have fully redesigned our information layer with our Smart Data Stream
tool. Our biggest focus for this release was the ability to react, analyze and detect in
real-time, and with Smart Data Stream, the system is able to react to events and also
receive and process streams of data in real-time.
Lastly, a trend we are seeing from our customers is the need to maximize the
value of big data sources; namely those supported by Adaptive Solutions. We
now support data stored in Hadoop and are even able to perform validations
with mixed data sources. For example, if some data resides in Hadoop and the
rest is in a transactional database like Oracle, users can still validate all the
data regardless of where it is stored, and still identify problems without the
need to extract all the data out to a separate database. This saves both time
and money.
With this latest version of RAID Telecom, we have also completely redesigned the
user interface. It is now sleeker, with a new color scheme, and it is more user-friendly,
following industry best practices for usability.
When moving to a real-time architecture, we needed to optimize the processing
time, but still keep the legacy features intact to ensure we could access backup
data. Technically this was quite a challenge, but we’ve had great results. All
configurations are in the same web-based user interface, so that any user can
see how the flow is organized. The benefit of having a fully integrated web-
based architecture is that it allows both design and analysis within the same
interface.
AF_Miolo_LivroBlog2015.indd 37 03/02/16 16:23
38
Were there any hurdles that were difficult to overcome?
One of the most challenging issues when addressing real-time processing is that
sometimes there are instances real-time processing isn’t required or isn’t supported.
What we’ve been able to do is achieve a compromise, where we maximize speed
and reach without losing the consistency of our processes, namely in the areas of
transforming and processing data. The other issue is that when we tried to maximize
the value of various big data sources, we quickly learned that we were dealing with
different realities than those we encounter in a relational database. It was a bit of a
challenge to prepare data properly so that we could maximize performance within
Hadoop, and of course our goal is to make all of this technical stuff really easy for
our end users.
We performed exhaustive user testing until we achieved a solution that met our
requirements. The end result is a product that utilizes the same base language
throughout and doesn’t require customization. We worked extensively on these
issues to ensure we could deliver the best user experience possible; not just in how it
looks, but in how it functions.
What are the benefits to our Customers? To the business managers/business
users and to the organization as a whole?
Revenue Assurance used to be focused solely on the revenue stream, but with our
new EBA Fast Processes, we’ve been able to increase coverage across the entire
organization, with real-time monitoring and continuous auditing of key processes
across the company. Auditing tools that were previously only available to revenue
assurance teams are now packaged and available to other groups- including
partners and incentives management, sales, HR, etc.
Additionally, our solution is constantly adapting to changing business needs.
Imagine that you have a case management tool to address a specific situation; in
2 months, the details of that situation will be outdated. We give users the ability
to manage changes on their own, without complex coding. There will still be the
‘power users’ who want more granular access, but now a new level of control is
AF_Miolo_LivroBlog2015.indd 38 03/02/16 16:23
39
given to every end-user to ensure that the tool keeps up with changing needs and
remains relevant to the current business processes. We also ensure that the right
alarms and controls are being monitored. We don’t believe in systems that rely on
monthly control points, but in a system that is continuously looking at the business
in a focused way, only creating alarms if there are critical issues that need to be
addressed. We provide our customers with the comfort that their business is
constantly being monitored, and that they will receive ample warning if anything
goes wrong. We tackle the problem from end-to-end in an integrated environment
that can be accessed over any device, including smartphone or tablet. It adapts to
whatever device you are using, prioritizing the interface and making it easy to see
at a glance. You can constantly keep in touch and see how things are going, no
matter where you are.
What are the advantages and best practices taken from these new technologies?
Big Data and Hadoop: At WeDo Technologies, we are leveraging the power of big
data within our product roadmap because that is the future. The CSP market has
been a bit slow to embrace the concept of open source, but supporting Hadoop can
expand a CSP’s ability to process huge amounts of data. It’s not just a data source;
it’s a tool that, if leveraged correctly, provides incredible processing power, which is
what we have leveraged with our Smart Data Stream.
Analytics: The issue of embedding analytics into the product is an area that we
are currently investing in. Machine learning and data mining algorithms for fraud
detection are what we are working on now; in other words, preparing the architecture
for a real-time world. The needs of our customers are evolving and our solution is
changing to fit those needs. When CSPs monitor critical processes, it’s important to
quickly identify problems that are leading to losses.
Virtualization: With our architecture redesign we have been working to scale our
system in a cloud environment and continue to do extensive testing in this area.
LTE/M2M: With regards to LTE and M2M, there is the need to address huge
amounts of data in real-time. We have the ability to standardize data by putting
AF_Miolo_LivroBlog2015.indd 39 03/02/16 16:23
40
it into a common data format that can easily feed our solutions and processes,
identifying if the data is VoLTE or Wi-fi or 3G. Our product is able to read and
process all kinds of data, and we are constantly improving, so when there is a new
format we can quickly adapt.
Do you expect to reach new audiences/stakeholders within the organization?
Yes definitely. With our new ‘Fast Processes’ we are extending the benefits of
our product to other stakeholders within the organization. More than serving
different users, our product allows different teams to work more closely together,
collaborating and sharing the same case management tools and features, allowing
teams to work with a common platform in a more integrated way. Also, in terms
of the user interface, we segment data visualization components for different
audiences. C-level data visualization components are very different from those that
are used by a data scientist or analyst. We have ways to address different needs by
different users/roles within the company. For example, within ‘Fast Processes’ we
provide a CXO Cockpit that has been designed to provide a summarized view of all
the processes and it delivers the results in a very intuitive way. From there, he or she
can drill down to gain further details.
AF_Miolo_LivroBlog2015.indd 40 03/02/16 16:23
41
“...our focus when
developing products
is to remain true to
our Enterprise Business
Assurance (EBA) vision.”
Created
by
Artem
D
•N
oun
Project
AF_Miolo_LivroBlog2015.indd 41 03/02/16 16:23
42
“engage with our
customers so they can
help us to help
them!”
AF_Miolo_LivroBlog2015.indd 42 03/02/16 16:23
43
While preparing for the 10th WeDo Technologies’ Worldwide User Group, I
remembered Maria João Gomes (Head of People  Culture)’ blog entry on the
intensity and uniqueness of the WeDo Technologies corporate culture and values.
In fact, this uniqueness comes also with such a rich and diverse group of costumers
around the world.
Together with our customers, we have built an amazing User Group, a community of
Telecom experts that get together to share experiences, and discuss challenges and
solutions, all while having pleasure and fun!
Written by
João
ResendeVice-President
for Product
Development at
WeDo Technologies
15/06/2015
VALUES-BASED
PRODUCT
STRATEGY?
AF_Miolo_LivroBlog2015.indd 43 03/02/16 16:23
44
To achieve this, the first two values come into play: Diversity and Companionship
provide the ideas, creativity and collaborative empowerment that leverage the
individual capabilities of both WeDo and our customers to do more and better,
together.
But they also require an open and frank engagement with our customers to understand
their issues and their challenges, identify the areas and features to improve, as well as,
the key streams for research and development. Here, the message must be clear and
transparent: engage with our customers so they can help us to help them!
This cannot be accomplished without a commitment that enables trust. Our
customers entrusted us, relying on our products and our ability to support their work
and help their organizations. So naturally, they challenge us, always demanding
more, better – and cheaper!
We need to honor that trust, working for the long run, thinking of the long term and
committing to sustained product investment, with an ambitious yet solid roadmap –
always, striving to do more with less, being frugal with our own and our customers’
resources.
So, three other critical values are Commitment, Transparency and Frugality. They
give us the drive, the openness and the hands-on pragmatic approach that allow us
to continually improve our products and their effectiveness for our customers.
A Product Strategy must certainly be described by the context of the market being
addressed, the value the product is supposed to bring, the product key features to
achieve a compelling value proposition and a corresponding strategic plan.
But in a world where all seems to revolve around “what and how much value”, it is
refreshing to also examine the role that Values may have on our Product Strategy.
AF_Miolo_LivroBlog2015.indd 44 03/02/16 16:23
45
And this User Group showed so clearly the unique role of our customers in that!
Thank you.
PRODUCT
STRATEGY
CUSTOMERS
PRODUCTS
Commitment
Transparency
Frugality
Companionship
Diversity
AF_Miolo_LivroBlog2015.indd 45 03/02/16 16:23
46
“Fraud and revenue risks
associated with IoT
may mean different things
to different people, depending on
where they reside within the product
and service delivery chain.”
AF_Miolo_LivroBlog2015.indd 46 03/02/16 16:23
47
Today’s increasingly connected world is introducing many new elements of
commerce into everyday objects, from cars to energy meters. However, the reality of
whether we’re ready to embrace the concept of the Internet of Things (IoT) and make
the most of it from a revenue perspective is quite different.
The IoT is progressively driving different behaviours and dynamics across business,
bringing with it a whole new set of challenges and disruption – especially when
considering the backdrop of protecting customers, assets and revenues. As a result,
revenue discussion will no longer be confined to a purely finance function; there will
be implications for IT spend as we know it and company culture as a whole.
Written by
Luís
BrásProfessional Services
Manager - Fraud
at WeDo Technologies
13/11/2015
IDENTIFYING IOT
FRAUD RISKS:
THE CHALLENGES
FOR OPERATORS
AF_Miolo_LivroBlog2015.indd 47 03/02/16 16:23
48
The progression to the IoT will introduce new device manufacturers and application
providers that the telecoms industry has previously not worked with, and who don’t
understand the risks. This will result in additional security and fraud risk, as these
‘trusted’ parties will need to be audited to ensure the expectations of the CSPs are
being met, says Luís Brás, head of professional services, Fraud Management Area,
WeDo Technologies.
Considerations for a Successful Risk Management Strategy
Fraud and revenue risks associated with IoT may mean different things to different
people, depending on where they reside within the product and service delivery chain.
In order to stay ahead of the curve, organisations will therefore need to consider and
evaluate from as risk perspective what elements of their existing fraud type exposure
will increase (or decrease) as a result of launching the new devices or services, and
understand the full risks that can be posed by the IoT; both what can result from
failures with the technology and what fraudsters stand to gain from attacking the
service. As part of the product and service lifecycle, the fraud and security functions
will need to be directly involved in performing ‘product and services risk assessments’
that are ultimately linked to defining the required strategies. By making a thorough
risk assessment, businesses can ensure they are adopting a balanced approach, with
technology, people and processes working together to create an effective strategy.
What defences can be defined?
As CSPs are already aware, they have a responsibility for storing and managing
highly sensitive and confidential data associated with their customers and
business partners. Consideration will need to be given as to how these new
connected devices with the IoT will be secured to maintain the integrity of the
information held or exchanged with their partners. Data and privacy protection
risks will include the potential for eavesdropping on other users, a device’s
data being transmitted over the network by the criminal masquerading as the
customer’s device, or network ID and information being subsequently provided
illegally to third parties.
AF_Miolo_LivroBlog2015.indd 48 03/02/16 16:23
49
As evidenced by recent high profile fraud and security incidents and breaches, the
criminal fraternity are becoming more innovative, deploying new and more focused
techniques for obtaining exactly what they want from the services and products
they target. The IoT will be no exception. CSPs must never become complacent or
forget that these highly organised fraudsters operate their own businesses and need
to “service” their own customers. Their business model for committing fraud spans
all types of technology and crosses international boundaries, and has traditionally
relied heavily on the CSP’s inability to respond and recover in a timely manner. It
is this aspect that they will again look to prey upon. One of the essential business
requirements for CSPs will be to continually consider the risk, and implement clearly
defined fraud, security and risk protection models for the IoT.
The demand and requirements for this progression will lead to more exciting
results in the formation of strategic partnerships. CSPs must however, consider the
implications and requirements to enable them to minimise exposure to fraud risks
associated with mobile devices, applications, processes and different business
models. At WeDo, we believe that an Enterprise Business Assurance (EBA) approach
allows businesses to face innovation such as the introduction of a new range of
connected devices as part of the IoT, head on, capitalising on the opportunity for
growth while maintaining tight control over business processes, the customer
experience and revenue.
AF_Miolo_LivroBlog2015.indd 49 03/02/16 16:23
50
“For current
customers,
the evaluation
to perform
is a Behavior
Scoring.”
AF_Miolo_LivroBlog2015.indd 50 03/02/16 16:23
51
CREDIT SCORING
AS A CONTINUOUS
PROCESS
In some businesses involving credit concession, it’s common to find Credit Scoring
processes and tools. Most of the time these are incomplete, treating Credit Risk
processes in a disaggregated way.
Credit Scoring may involve multiple types of evaluations: Acquisition or Application
Scoring, Behavior Scoring, a mix of both, or even manual handling. These can have
different timings and cycles of execution and use multiple internal or external
sources of information. It becomes a challenge to achieve a complete view through a
single and integrated solution.
Regardless of Credit Scoring tools and processes sophistication, an accurate and
up-to-date Credit Score Value is crucial in avoiding erroneous credit concession or
Written by
RUI NELSON
FERNANDESSOLUTION ARCHITECT at
WeDo Technologies
04/11/2015
AF_Miolo_LivroBlog2015.indd 51 03/02/16 16:23
52
recovery decisions with negative impacts on revenues. When the decision is too
permissive, turning risk exposure higher than the defined policy, the probability
of default and bad credit increases. If the decision is too restrictive, turning risk
exposure lower than the accepted one, it will block the maximization of the evaluated
entities’ business potential.
Credit Risk is not static, and to know at each moment the real risk in conceiving
credit, it’s critical to closely follow each entity and act upon new and relevant
information or credit related events. This continuous monitoring with credit risk
re-evaluations keeps Credit Score Values updated with the most recent known
information and behaviors. This assures the quality of data used to decide credit
concession conditions (e.g., credit limits or deposits) or best scenarios and actions
for credit recovery.
Within the life cycle of a customer, there are different events that will demand
different Credit Scoring evaluations. When an entity becomes a customer with initial
credit, an Acquisition Scoring (also known as Application) type of evaluation is used
to decide the conditions for a possible credit concession. For current customers, the
evaluation to perform is a Behavior Scoring. Acquisition scoring provides a snapshot
of the entity Credit Risk at a given moment, whereas Behavior Scoring gives a
continuous up-to-date Credit Risk Value.
Keep in mind that, during the entity life cycle, available information differs in type and
weight. For Credit Scoring it is critical to use existent knowledge in an intelligent way,
according to its actuality and reliability. When facing a new customer request, little or
no direct information is available, and scoring must rely on demographic and indirect
data supplied by third parties. However, when an entity is already a customer, direct
and highly reliable behavior information is available, and Credit Scoring should use
this knowledge to adjust an entity’s Credit Risk Value.
AF_Miolo_LivroBlog2015.indd 52 03/02/16 16:23
53
A complete and effective Credit Scoring solution, is the one capable of handling
smoothly and consistently the different events and available data during customers’
life cycle. All Credit Scoring evaluations and manual risk handling operations, must
be combined to give an accurate and up-to-date risk value and, at the same time, to
tell one common and consistent story. This approach allows, not only, to know at
each moment the present Credit Risk associated to each customer, but also to have
access to the full story and evolution of each entity regarding Credit Scoring.
New
Customer
1st
Credit
Decision
INDIRECT
KNOWLEDGE
GROWING DIRECT KNOWLEDGE
Already
Customer
Credit Risk
Revision
Already
Customer
Additional
Credit
Decision
AF_Miolo_LivroBlog2015.indd 53 03/02/16 16:23
54
“It IS hard
to get billing
millions of customers
to be flawless.“
AF_Miolo_LivroBlog2015.indd 54 03/02/16 16:23
55
Customers are now able to switch more easily to a new supplier then a couple of
years ago. Due to the regulated split-up of the value chain, more players entered the
market and there is more choice for the consumer. So, retaining a customer and
the “hunt” for the new customer became a priority. The cost of maintaining a (good)
customer is less than the cost of the acquisition of a new one thus Utilities need to
concentrate efforts on keeping the customer happy.
HOW TO
ASSURE HAPPY
CUSTOMERS
AND GET AHEAD
OF COMPETITION
Written by
PIETER
IJZERMANBUSINESS DEVELOPMENT
MANAGER at
WeDo Technologies
27/10/2015
AF_Miolo_LivroBlog2015.indd 55 03/02/16 16:23
56
Besides that the customer expects a service level of a 100%, Utilities need to
manage other expectations, which result, eventually, in customer experience. Using
my personal experience, I will mention some expectations a customer has of an
electricity distribution company and then line them up with the Business Assurance
practice. The Business Assurance practice that helps customers to be happy.
I expect my bill to be addressed to me and not to me with a slightly different name. I expect
the tariff applied to be the one the supplier promised me. I also expect the bill to reflect
the estimated power consumption minus the real one (measured once every 6 months)
and that the balance to pay / to be credited for, to be correct. I like to see my flat rate to be
adjusted to my profile of consumption so I don’t have unpleasant surprises at the end of
the contract period. I would say that these are expectations that are more susceptible to
stronger emotional reactions, when reality is different from the expected values.
So, not that hard to get these right, right? Wrong. It IS hard to get billing millions of
customers to be flawless. Generally speaking, dozens of systems and processes
create and support the data and the flow that eventually leads to that bill I receive.
An example of systems and processes involved in a meter to bill process:
• A meter from which data is read (either automatically or manually)
• An interface that transforms and transfers that data to a meter reading
management system
• An interface that transfers relevant data to a billing software
• A Customer Relation Management system that holds my contract information and
delivers it to the billing system
• The billing system holding the correct tariff information and applicable taxes and
produces the bill
• The finishing system that, with all collected relevant information, prints my invoice
With all this complexity there is a chance I may receive an erroneous bill. And when I
find out about it, I will be disappointed and call up the company. In the UK, two third
of complaints to suppliers registered by customer support professionals continue to
be about billing errors (Source: Citizens Advice).
AF_Miolo_LivroBlog2015.indd 56 03/02/16 16:23
57
Now, as a reasonable person and with some experience in the ICT sector and large
scale implementations of systems that support complex business processes, I can
understand that these things happen. And I have hope because there are solutions
that can prevent this all. In the (complexity comparable) telecommunication industry
similar issues occurred. The Business Assurance practice was adopted and the sector
has a yearly healthy return on investment and happier customers and shareholders.
One of the practices that will detect erroneous billing, before the customer does, is
Enterprise Business Assurance. As controls on the accuracy of individual systems
does not avoid errors on a process or integration level, one needs a systems’
agnostic solution that loads data from all systems involved, applies the correct
business rules and validations and verifies if all is good. These permanent audits
will allow detection of possible errors that can lead to my dissatisfaction. Better, it
will allow to detect anomalies in values billed to me (i.e. Bill Shock, I typically spend
300 USD per month and suddenly a 300.000 USD bill occurs…) and the subsequent
potential press that will reduce confidence even further.
The Business Assurance practice only works a 100% if it is continuous and involves
all customers, relevant processes and systems. Utilities thus need a solution that
can handle the big data involved and has the intelligence to detect issues and to
present them in a way we humans can analyse. Also, they will have to involve others
in the organization to solve the cases found and consequently it needs an integrated
collaborative workflow solution.
Earlier this year, it became public that a UK electricity supplier had received a
7 million pounds fine due to incorrect billing. More recently, we read another
release about that same company billing a customer millions whilst he normally
spends just 300 pounds per month. These are expensive examples of the 80% of
complaints registered at customer support centres of utilities. Underlying systems
and processes cause these issues that can be prevented by adopting a Business
Assurance practice and control systems and processes on a permanent basis. The
company that does will surely have an easier job in maintaining clients happy and
will become more competitive.
AF_Miolo_LivroBlog2015.indd 57 03/02/16 16:23
58
Visit and Subscribe
BLOG.wedotechnologies.com
AF_Miolo_LivroBlog2015.indd 58 03/02/16 16:23
Notes
AF_Miolo_LivroBlog2015.indd 59 03/02/16 16:23
1

Más contenido relacionado

La actualidad más candente

Your cognitive future in retail industry
Your cognitive future in retail industryYour cognitive future in retail industry
Your cognitive future in retail industryTero Angeria
 
Herding Cats in the Digital World
Herding Cats in the Digital WorldHerding Cats in the Digital World
Herding Cats in the Digital WorldCapgemini
 
WealthTech Views: Looking into 2021 from William Rouse, Contemi Solutions
WealthTech Views: Looking into 2021 from William Rouse, Contemi SolutionsWealthTech Views: Looking into 2021 from William Rouse, Contemi Solutions
WealthTech Views: Looking into 2021 from William Rouse, Contemi SolutionsContemi Solutions
 
Leveraging Geo-Spatial (Big) Data for Financial Services Solutions
Leveraging Geo-Spatial (Big) Data for Financial Services SolutionsLeveraging Geo-Spatial (Big) Data for Financial Services Solutions
Leveraging Geo-Spatial (Big) Data for Financial Services SolutionsCapgemini
 
A Holistic Approach to Insurance Automation
A Holistic Approach to Insurance AutomationA Holistic Approach to Insurance Automation
A Holistic Approach to Insurance AutomationAccenture Insurance
 
The Future of Fintech and Banking
The Future of Fintech and BankingThe Future of Fintech and Banking
The Future of Fintech and BankingKen Sielecki
 
Why Businesses Must Embrace Digital Transformation
Why Businesses Must Embrace Digital TransformationWhy Businesses Must Embrace Digital Transformation
Why Businesses Must Embrace Digital TransformationDiscerning Digital
 
Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...
Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...
Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...Cognizant
 
Be Digital: South Africa's Short-Term Insurance Industry
Be Digital: South Africa's Short-Term Insurance IndustryBe Digital: South Africa's Short-Term Insurance Industry
Be Digital: South Africa's Short-Term Insurance IndustryAccenture Insurance
 
Swiss Digital Index 2015
Swiss Digital Index 2015Swiss Digital Index 2015
Swiss Digital Index 2015accenture
 
Self-Service in Wealth Management: Remaining Competitive
Self-Service in Wealth Management: Remaining CompetitiveSelf-Service in Wealth Management: Remaining Competitive
Self-Service in Wealth Management: Remaining CompetitiveCapgemini
 
Retail Revolution: Thrive in Disruption
Retail Revolution: Thrive in DisruptionRetail Revolution: Thrive in Disruption
Retail Revolution: Thrive in DisruptionBooz Allen Hamilton
 
Le rapport publie_par_pwc_luxembourg_0
Le rapport publie_par_pwc_luxembourg_0Le rapport publie_par_pwc_luxembourg_0
Le rapport publie_par_pwc_luxembourg_0Marie-Astrid Heyde
 
Fast Thinking: Reinventing Strategy for a Digitally-Disrupted World
Fast Thinking: Reinventing Strategy for a Digitally-Disrupted WorldFast Thinking: Reinventing Strategy for a Digitally-Disrupted World
Fast Thinking: Reinventing Strategy for a Digitally-Disrupted WorldCapgemini
 
Branching out: FinTech, rising CRE costs driving design strategy for U.S. banks
Branching out: FinTech, rising CRE costs driving design strategy for U.S. banksBranching out: FinTech, rising CRE costs driving design strategy for U.S. banks
Branching out: FinTech, rising CRE costs driving design strategy for U.S. banksJLL
 
Connected Shipping: Riding the Wave of E-Commerce
Connected Shipping: Riding the Wave of E-CommerceConnected Shipping: Riding the Wave of E-Commerce
Connected Shipping: Riding the Wave of E-CommerceCognizant
 
Banking on Digital: Innovation in Financial Services
Banking on Digital: Innovation in Financial ServicesBanking on Digital: Innovation in Financial Services
Banking on Digital: Innovation in Financial ServicesBackbase
 

La actualidad más candente (20)

Your cognitive future in retail industry
Your cognitive future in retail industryYour cognitive future in retail industry
Your cognitive future in retail industry
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Herding Cats in the Digital World
Herding Cats in the Digital WorldHerding Cats in the Digital World
Herding Cats in the Digital World
 
WealthTech Views: Looking into 2021 from William Rouse, Contemi Solutions
WealthTech Views: Looking into 2021 from William Rouse, Contemi SolutionsWealthTech Views: Looking into 2021 from William Rouse, Contemi Solutions
WealthTech Views: Looking into 2021 from William Rouse, Contemi Solutions
 
Leveraging Geo-Spatial (Big) Data for Financial Services Solutions
Leveraging Geo-Spatial (Big) Data for Financial Services SolutionsLeveraging Geo-Spatial (Big) Data for Financial Services Solutions
Leveraging Geo-Spatial (Big) Data for Financial Services Solutions
 
A Holistic Approach to Insurance Automation
A Holistic Approach to Insurance AutomationA Holistic Approach to Insurance Automation
A Holistic Approach to Insurance Automation
 
The Future of Fintech and Banking
The Future of Fintech and BankingThe Future of Fintech and Banking
The Future of Fintech and Banking
 
Why Businesses Must Embrace Digital Transformation
Why Businesses Must Embrace Digital TransformationWhy Businesses Must Embrace Digital Transformation
Why Businesses Must Embrace Digital Transformation
 
The disruption of banking
The disruption of bankingThe disruption of banking
The disruption of banking
 
Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...
Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...
Future-Proofing Insurance: Deepening Insights, Reinventing Processes and Resh...
 
Be Digital: South Africa's Short-Term Insurance Industry
Be Digital: South Africa's Short-Term Insurance IndustryBe Digital: South Africa's Short-Term Insurance Industry
Be Digital: South Africa's Short-Term Insurance Industry
 
A. Blockchain
A. BlockchainA. Blockchain
A. Blockchain
 
Swiss Digital Index 2015
Swiss Digital Index 2015Swiss Digital Index 2015
Swiss Digital Index 2015
 
Self-Service in Wealth Management: Remaining Competitive
Self-Service in Wealth Management: Remaining CompetitiveSelf-Service in Wealth Management: Remaining Competitive
Self-Service in Wealth Management: Remaining Competitive
 
Retail Revolution: Thrive in Disruption
Retail Revolution: Thrive in DisruptionRetail Revolution: Thrive in Disruption
Retail Revolution: Thrive in Disruption
 
Le rapport publie_par_pwc_luxembourg_0
Le rapport publie_par_pwc_luxembourg_0Le rapport publie_par_pwc_luxembourg_0
Le rapport publie_par_pwc_luxembourg_0
 
Fast Thinking: Reinventing Strategy for a Digitally-Disrupted World
Fast Thinking: Reinventing Strategy for a Digitally-Disrupted WorldFast Thinking: Reinventing Strategy for a Digitally-Disrupted World
Fast Thinking: Reinventing Strategy for a Digitally-Disrupted World
 
Branching out: FinTech, rising CRE costs driving design strategy for U.S. banks
Branching out: FinTech, rising CRE costs driving design strategy for U.S. banksBranching out: FinTech, rising CRE costs driving design strategy for U.S. banks
Branching out: FinTech, rising CRE costs driving design strategy for U.S. banks
 
Connected Shipping: Riding the Wave of E-Commerce
Connected Shipping: Riding the Wave of E-CommerceConnected Shipping: Riding the Wave of E-Commerce
Connected Shipping: Riding the Wave of E-Commerce
 
Banking on Digital: Innovation in Financial Services
Banking on Digital: Innovation in Financial ServicesBanking on Digital: Innovation in Financial Services
Banking on Digital: Innovation in Financial Services
 

Destacado

Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101ntel
 
10th WeDo Technologies Worldwide User Group Agenda
10th WeDo Technologies Worldwide User Group Agenda10th WeDo Technologies Worldwide User Group Agenda
10th WeDo Technologies Worldwide User Group AgendaWeDo Technologies
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gNoor Mohammad's Faltoos
 
Porters five force analysis for telecom industry
Porters five force analysis for telecom industryPorters five force analysis for telecom industry
Porters five force analysis for telecom industryAkash Agamya
 
Porters 5 forces for mobile industry
Porters 5 forces for mobile industryPorters 5 forces for mobile industry
Porters 5 forces for mobile industryGautham Reddy
 
How IKANOW uses MongoDB to help organizations solve really big problems
How IKANOW uses MongoDB to help organizations solve really big problemsHow IKANOW uses MongoDB to help organizations solve really big problems
How IKANOW uses MongoDB to help organizations solve really big problemsikanow
 
2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)jcsobreira
 
Worldwide User Group & Summit 2016 Highlights | Final day
Worldwide User Group & Summit 2016 Highlights | Final dayWorldwide User Group & Summit 2016 Highlights | Final day
Worldwide User Group & Summit 2016 Highlights | Final dayWeDo Technologies
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Detecon Workshop - Telco and OTT Partnerships
Detecon Workshop - Telco and OTT PartnershipsDetecon Workshop - Telco and OTT Partnerships
Detecon Workshop - Telco and OTT PartnershipsAdrian Hall
 
Risques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenusRisques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenusEric Pradel-Lepage
 
Whats new in joomla 3.5 & whats coming in future
Whats new in joomla 3.5 & whats coming in futureWhats new in joomla 3.5 & whats coming in future
Whats new in joomla 3.5 & whats coming in futureTim Plummer
 
Joomla SEO basics 2016
Joomla SEO basics 2016Joomla SEO basics 2016
Joomla SEO basics 2016Tim Plummer
 
Conhecendo o confluence
Conhecendo o confluenceConhecendo o confluence
Conhecendo o confluencejrompkovski
 
How to customise Joomla
How to customise JoomlaHow to customise Joomla
How to customise JoomlaTim Plummer
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssurancecVidya Networks
 

Destacado (20)

Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
 
10th WeDo Technologies Worldwide User Group Agenda
10th WeDo Technologies Worldwide User Group Agenda10th WeDo Technologies Worldwide User Group Agenda
10th WeDo Technologies Worldwide User Group Agenda
 
10 Ways to Stop Service Revenue Leakage
10 Ways to Stop Service Revenue Leakage10 Ways to Stop Service Revenue Leakage
10 Ways to Stop Service Revenue Leakage
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5g
 
Porters five force analysis for telecom industry
Porters five force analysis for telecom industryPorters five force analysis for telecom industry
Porters five force analysis for telecom industry
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Porters 5 forces for mobile industry
Porters 5 forces for mobile industryPorters 5 forces for mobile industry
Porters 5 forces for mobile industry
 
Fraud Risk Services Brochure
Fraud Risk  Services BrochureFraud Risk  Services Brochure
Fraud Risk Services Brochure
 
How IKANOW uses MongoDB to help organizations solve really big problems
How IKANOW uses MongoDB to help organizations solve really big problemsHow IKANOW uses MongoDB to help organizations solve really big problems
How IKANOW uses MongoDB to help organizations solve really big problems
 
2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)
 
Types of telecom fraud
Types of telecom fraudTypes of telecom fraud
Types of telecom fraud
 
Worldwide User Group & Summit 2016 Highlights | Final day
Worldwide User Group & Summit 2016 Highlights | Final dayWorldwide User Group & Summit 2016 Highlights | Final day
Worldwide User Group & Summit 2016 Highlights | Final day
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Detecon Workshop - Telco and OTT Partnerships
Detecon Workshop - Telco and OTT PartnershipsDetecon Workshop - Telco and OTT Partnerships
Detecon Workshop - Telco and OTT Partnerships
 
Risques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenusRisques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenus
 
Whats new in joomla 3.5 & whats coming in future
Whats new in joomla 3.5 & whats coming in futureWhats new in joomla 3.5 & whats coming in future
Whats new in joomla 3.5 & whats coming in future
 
Joomla SEO basics 2016
Joomla SEO basics 2016Joomla SEO basics 2016
Joomla SEO basics 2016
 
Conhecendo o confluence
Conhecendo o confluenceConhecendo o confluence
Conhecendo o confluence
 
How to customise Joomla
How to customise JoomlaHow to customise Joomla
How to customise Joomla
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 

Similar a WeDo Technologies Blog Book 2015

SHQ - Disruption is Your Opportunity
SHQ - Disruption is Your OpportunitySHQ - Disruption is Your Opportunity
SHQ - Disruption is Your OpportunityKristi Castano
 
hitachi-forbes-cios-guide-to-digital-transformation
hitachi-forbes-cios-guide-to-digital-transformationhitachi-forbes-cios-guide-to-digital-transformation
hitachi-forbes-cios-guide-to-digital-transformationIngrid Fernandez, PhD
 
Digital transformation challenges and the marketing audit imperative
Digital transformation challenges and the marketing audit imperativeDigital transformation challenges and the marketing audit imperative
Digital transformation challenges and the marketing audit imperativeSilvia Rak
 
Accelerating-performance
Accelerating-performanceAccelerating-performance
Accelerating-performanceTanja Ivkovic
 
The innovation game: Why and how business are investing in innovation centers
The innovation game: Why and how business are investing in innovation centersThe innovation game: Why and how business are investing in innovation centers
The innovation game: Why and how business are investing in innovation centersRick Bouter
 
The Innovation Game: Why and How Businesses are Investing in Innovation Centers
The Innovation Game: Why and How Businesses are Investing in Innovation CentersThe Innovation Game: Why and How Businesses are Investing in Innovation Centers
The Innovation Game: Why and How Businesses are Investing in Innovation Centerseraser Juan José Calderón
 
The Innovation Game: Why & How Businesses are Investing in Innovation Centers
The Innovation Game: Why & How Businesses are Investing in Innovation Centers The Innovation Game: Why & How Businesses are Investing in Innovation Centers
The Innovation Game: Why & How Businesses are Investing in Innovation Centers Capgemini
 
Innovation center v14_1
Innovation center v14_1Innovation center v14_1
Innovation center v14_1Santosh Kumar
 
Digital Retail Innovations Report 2019
Digital Retail Innovations Report 2019Digital Retail Innovations Report 2019
Digital Retail Innovations Report 2019Webloyalty UK
 
Product Management in London - A Recruiters view...
Product Management in London - A Recruiters view...Product Management in London - A Recruiters view...
Product Management in London - A Recruiters view...Will Boulton
 
Digital transformation review_7 - dtr 7 - capgemini consulting
Digital transformation review_7 - dtr 7 - capgemini consultingDigital transformation review_7 - dtr 7 - capgemini consulting
Digital transformation review_7 - dtr 7 - capgemini consultingRick Bouter
 
Digital transformation review_7
Digital transformation review_7Digital transformation review_7
Digital transformation review_7Erik Lodenstein
 
Strategies for the age of digital disruption #dtr7
Strategies for the age of digital disruption #dtr7Strategies for the age of digital disruption #dtr7
Strategies for the age of digital disruption #dtr7Tania Bozhova
 
Raising Funds in Silicon Valley -- Startup Chile Feb 2015 Presentation
Raising Funds in Silicon Valley -- Startup Chile Feb 2015 PresentationRaising Funds in Silicon Valley -- Startup Chile Feb 2015 Presentation
Raising Funds in Silicon Valley -- Startup Chile Feb 2015 PresentationPeter Szymanski
 
Case Study: Mastering digital disruption in retail
Case Study: Mastering digital disruption in retailCase Study: Mastering digital disruption in retail
Case Study: Mastering digital disruption in retailScopernia
 
The Mandate for Agile Measurement by BECKON
The Mandate for Agile Measurement by BECKONThe Mandate for Agile Measurement by BECKON
The Mandate for Agile Measurement by BECKONAmanda Roberts
 
The Rise of Enterprise Social Networks
The Rise of Enterprise Social NetworksThe Rise of Enterprise Social Networks
The Rise of Enterprise Social NetworksAref Jdey
 
2021 Global Marketing Trends
2021 Global Marketing Trends2021 Global Marketing Trends
2021 Global Marketing TrendsShareDocView.com
 

Similar a WeDo Technologies Blog Book 2015 (20)

SHQ - Disruption is Your Opportunity
SHQ - Disruption is Your OpportunitySHQ - Disruption is Your Opportunity
SHQ - Disruption is Your Opportunity
 
5 Hidden Factors Driving Complexity
5 Hidden Factors Driving Complexity5 Hidden Factors Driving Complexity
5 Hidden Factors Driving Complexity
 
hitachi-forbes-cios-guide-to-digital-transformation
hitachi-forbes-cios-guide-to-digital-transformationhitachi-forbes-cios-guide-to-digital-transformation
hitachi-forbes-cios-guide-to-digital-transformation
 
DUP_NewDigitalDivide
DUP_NewDigitalDivideDUP_NewDigitalDivide
DUP_NewDigitalDivide
 
Digital transformation challenges and the marketing audit imperative
Digital transformation challenges and the marketing audit imperativeDigital transformation challenges and the marketing audit imperative
Digital transformation challenges and the marketing audit imperative
 
Accelerating-performance
Accelerating-performanceAccelerating-performance
Accelerating-performance
 
The innovation game: Why and how business are investing in innovation centers
The innovation game: Why and how business are investing in innovation centersThe innovation game: Why and how business are investing in innovation centers
The innovation game: Why and how business are investing in innovation centers
 
The Innovation Game: Why and How Businesses are Investing in Innovation Centers
The Innovation Game: Why and How Businesses are Investing in Innovation CentersThe Innovation Game: Why and How Businesses are Investing in Innovation Centers
The Innovation Game: Why and How Businesses are Investing in Innovation Centers
 
The Innovation Game: Why & How Businesses are Investing in Innovation Centers
The Innovation Game: Why & How Businesses are Investing in Innovation Centers The Innovation Game: Why & How Businesses are Investing in Innovation Centers
The Innovation Game: Why & How Businesses are Investing in Innovation Centers
 
Innovation center v14_1
Innovation center v14_1Innovation center v14_1
Innovation center v14_1
 
Digital Retail Innovations Report 2019
Digital Retail Innovations Report 2019Digital Retail Innovations Report 2019
Digital Retail Innovations Report 2019
 
Product Management in London - A Recruiters view...
Product Management in London - A Recruiters view...Product Management in London - A Recruiters view...
Product Management in London - A Recruiters view...
 
Digital transformation review_7 - dtr 7 - capgemini consulting
Digital transformation review_7 - dtr 7 - capgemini consultingDigital transformation review_7 - dtr 7 - capgemini consulting
Digital transformation review_7 - dtr 7 - capgemini consulting
 
Digital transformation review_7
Digital transformation review_7Digital transformation review_7
Digital transformation review_7
 
Strategies for the age of digital disruption #dtr7
Strategies for the age of digital disruption #dtr7Strategies for the age of digital disruption #dtr7
Strategies for the age of digital disruption #dtr7
 
Raising Funds in Silicon Valley -- Startup Chile Feb 2015 Presentation
Raising Funds in Silicon Valley -- Startup Chile Feb 2015 PresentationRaising Funds in Silicon Valley -- Startup Chile Feb 2015 Presentation
Raising Funds in Silicon Valley -- Startup Chile Feb 2015 Presentation
 
Case Study: Mastering digital disruption in retail
Case Study: Mastering digital disruption in retailCase Study: Mastering digital disruption in retail
Case Study: Mastering digital disruption in retail
 
The Mandate for Agile Measurement by BECKON
The Mandate for Agile Measurement by BECKONThe Mandate for Agile Measurement by BECKON
The Mandate for Agile Measurement by BECKON
 
The Rise of Enterprise Social Networks
The Rise of Enterprise Social NetworksThe Rise of Enterprise Social Networks
The Rise of Enterprise Social Networks
 
2021 Global Marketing Trends
2021 Global Marketing Trends2021 Global Marketing Trends
2021 Global Marketing Trends
 

Más de WeDo Technologies

Worldwide User Group & Summit 2016 Highlights | Day 2
Worldwide User Group & Summit 2016 Highlights | Day 2Worldwide User Group & Summit 2016 Highlights | Day 2
Worldwide User Group & Summit 2016 Highlights | Day 2WeDo Technologies
 
Worldwide User Group & Summit 2016 Highlights | Day 1
Worldwide User Group & Summit 2016 Highlights | Day 1Worldwide User Group & Summit 2016 Highlights | Day 1
Worldwide User Group & Summit 2016 Highlights | Day 1WeDo Technologies
 
WeDo Technologies - MWC16 - Day 3
WeDo Technologies - MWC16 - Day 3WeDo Technologies - MWC16 - Day 3
WeDo Technologies - MWC16 - Day 3WeDo Technologies
 
WeDo Technologies - MWC16 - Day 2
WeDo Technologies - MWC16 - Day 2WeDo Technologies - MWC16 - Day 2
WeDo Technologies - MWC16 - Day 2WeDo Technologies
 
WeDo Technologies - MWC16 - Day 1
WeDo Technologies - MWC16 - Day 1WeDo Technologies - MWC16 - Day 1
WeDo Technologies - MWC16 - Day 1WeDo Technologies
 
WeDo Technologies' Conference in Washington D.C. 2015
WeDo Technologies' Conference in Washington D.C. 2015WeDo Technologies' Conference in Washington D.C. 2015
WeDo Technologies' Conference in Washington D.C. 2015WeDo Technologies
 

Más de WeDo Technologies (6)

Worldwide User Group & Summit 2016 Highlights | Day 2
Worldwide User Group & Summit 2016 Highlights | Day 2Worldwide User Group & Summit 2016 Highlights | Day 2
Worldwide User Group & Summit 2016 Highlights | Day 2
 
Worldwide User Group & Summit 2016 Highlights | Day 1
Worldwide User Group & Summit 2016 Highlights | Day 1Worldwide User Group & Summit 2016 Highlights | Day 1
Worldwide User Group & Summit 2016 Highlights | Day 1
 
WeDo Technologies - MWC16 - Day 3
WeDo Technologies - MWC16 - Day 3WeDo Technologies - MWC16 - Day 3
WeDo Technologies - MWC16 - Day 3
 
WeDo Technologies - MWC16 - Day 2
WeDo Technologies - MWC16 - Day 2WeDo Technologies - MWC16 - Day 2
WeDo Technologies - MWC16 - Day 2
 
WeDo Technologies - MWC16 - Day 1
WeDo Technologies - MWC16 - Day 1WeDo Technologies - MWC16 - Day 1
WeDo Technologies - MWC16 - Day 1
 
WeDo Technologies' Conference in Washington D.C. 2015
WeDo Technologies' Conference in Washington D.C. 2015WeDo Technologies' Conference in Washington D.C. 2015
WeDo Technologies' Conference in Washington D.C. 2015
 

Último

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 

Último (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 

WeDo Technologies Blog Book 2015

  • 1. 1
  • 3. 3 “BLOG.wedotechnologies.com is the official blog of the WeDo Technologies team, sharing expert opinions on the important role that Enterprise Business Assurance plays in the digital transformation of business on several industries. The blog posts represent the writers’ opinion. The articles are mainly created by our own experts but it also includes the voice of some special guests on the matters which they can had value to the community or in those topics they would like to be further discussed. Thus, we try to answer common questions that our community has by consistently creating content that’s helpful for you. The BLOG.wedotechnologies.com is also a space that offers the chance to share our values, communicate our corporate culture and of strengthening ties with the farthest reader. This is the 2nd Edition of the BLOG.wedotechnologies.com book and it is once again fascinating to look back and see what readers have enjoyed most. From the 33 blog articles published from 22 unique authors, the most-shared and most-viewed articles represent this selection of the best blog articles of 2015. A total of 13 blog posts make up this book, addressing topics such as Fraud Management, Revenue Assurance, Credit Scoring, Customer Value Management and more within the different industries: Telecom, Utilities, Retail, Insurance and Healthcare. Thank you to all our writers that have contributed to the BLOG.wedotechnologies.com last year and also, of course to you, our valued readers. We hope you will continue to appreciate BLOG.wedotechnologies.com in 2016. Enjoy it! Visit and subscribe BLOG.wedotechnologies.com Marketing, Alliances and Community Development Team BLOG.wedotechnologies.com mAF_Miolo_LivroBlog2015.indd 3 03/02/16 16:23
  • 4. 4 “Many CEOs opt for the tried an tested way of reducing costs and satisfying stakeholders quickly by reducing head count, but in retail that usually results in lower levels of customer service.” AF_Miolo_LivroBlog2015.indd 4 03/02/16 16:23
  • 5. 5 CEOs have been getting a lot of press recently. It’s not surprising really as they are the ones ultimately responsible for a company’s performance and are accountable to both stakeholders and staff alike. Forbes launched the opening salvo against wanton CEOs by saying, “across the board, the more CEOs get paid, the worse their companies do over the next three years, according to extensive new research. This is true whether they’re CEOs at the highest end of the pay spectrum or the lowest.” The article and the report itself lambasted high-earning, poor-performing CEOs by linking that the more they were paid, the worse their companies did. In fact, this negative effect was most pronounced in the 150 firms with the highest-paid CEOs. For the 5 percent of CEOs who were the highest paid, it was found that their companies did 15 percent worse, on average, than their peers. The paper also found that the longer CEOs were at the helm, the more pronounced was their firms’ poor performance. CEOs SEEING RED Written by Rui Paiva Chief Executive Officer at WeDo Technologies 27/01/2015 AF_Miolo_LivroBlog2015.indd 5 03/02/16 16:23
  • 6. 6 The conclusion the report came to was that overconfidence was the main contributing factor and that CEOs who are paid huge amounts tend to think less critically about their decisions. At this time of the year when most news reports are on the highlights of the last year, the BBC went out of its own conservative comfort zone to name the year’s five worst CEOs. Writer, Sydney Finklestein, held back no punches in stating that, “in virtually each instance, the seeds of failure were sown in earlier success. These five chief executives were celebrated for their genius at one time, but all have fallen, sometimes in spectacular ways.” The five, in ascending order of failure were Twitter’s Dick Costolo; Sears Holding’s Eddie Lampert; Tesco’s Philip Clarke; American Apparel’s Dov Charney and Banco Espirito Santo’s Ricardo Espirito Santo Silva Salgado. Salgado is the family head and kingpin of an interlocking and complex set of entities that controlled the second-biggest bank in Portugal — and brought it to bankruptcy. Of greater interest is that three of the five are involved primarily in retailing, a sector that is being rattled by the digital revolution and changes in the way people are buying goods. Whilst it is evident that more people are buying online, CEOs of some ‘bricks and mortar’ retailing chains have been able to adapt more readily than others to heightened competition from cheaper stores that are operating more efficiently at lower cost levels. Many CEOs opt for the tried an tested way of reducing costs and satisfying stakeholders quickly by reducing head count, but in retail that usually results in lower levels of customer service. Retailing is still heavily dependent on staff to stock shelves and serve customers. AF_Miolo_LivroBlog2015.indd 6 03/02/16 16:23
  • 7. 7 Automation has helped bringing more efficiencies at managing stock levels and speeding checkouts but cannot yet replace the human element and ‘retail therapy’ that shoppers go to stores to seek out. Price competition, high stock levels, rents, seasonal cash flows, theft and low ‘stock turns’ all contribute to the woes of retailers, but there is a trend towards monitoring and managing all aspects of the business using sophisticated software not unlike that used by telecoms operators. Automation is providing continuous monitoring and detecting exceptions before they cause significant impact on retail business right from supply chain controls to continuously auditing pricing plans to assure yielding enough revenues. 7-Eleven México, with more than 1,700 stores across the country, recently announced that it was implementing enterprise business software to deliver end-to- end visibility and control of its retail processes, analyzing and identifying risks and monitoring and controlling deviations. The trend now is to have a full picture of the retail operation and be able to act quickly in addressing any anomalies that may occur in real-time. When enterprise business assurance becomes the norm we should see no retailers in that top five lousy CEO list, just as we don’t see any telco bosses there now. That should also remove the need for boards to make the single biggest cost reduction of all – firing the CEO! This article was first published in TelcoProfessionals.com. You can find the original version here. AF_Miolo_LivroBlog2015.indd 7 03/02/16 16:23
  • 9. 9 Any product is only as good as the ideas behind it. Unfortunately, generating good ideas is never easy! As Seth Godin puts it “You can’t have good ideas unless you’re willing to generate a lot of bad ones.” This may present terrifying vision that demotivates us from even trying, but in reality it is just a natural part of the innovation process. The more ideas that are generated, the more chances of generating really good ones. The flip side of this is the difficulty of managing a huge number of inputs. To get the most out of a variety of knowledge, experiences and backgrounds, one must collect and consider a large number of inputs from a variety of sources. These inputs must then be clarified, enriched, classified, and eventually, in some cases, rejected or grouped with other similar ones. “At WeDo Technologies we employ an open process for collection of ideas” THE VIRTUOUS CYCLE FROM IDEA TO MARKET Written by MÓNICA VALE PRODUCT MANAGER at WeDo Technologies 06/04/2015 AF_Miolo_LivroBlog2015.indd 9 03/02/16 16:23
  • 10. 10 Deciding which ideas to pick for promotion to market from an extended backlog is an even tougher task. A successful prioritization process will account for a lot of different factors, including customer requests, market trends, strategic directions, long-term roadmaps and, of course, available resources. While there are many approaches, no single best solution emerges. Therefore, it is essential to constantly implement, assess, and improve a prioritization process that best fits needs and reality. After that, all the selected ideas will be further detailed from a more technical perspective for transformation by development teams into the features that the market will see. This phase frequently requires compromises, but often the final features will be far more complex and comprehensive than the original ideas since the development process factors in multiple aspects and visions. When products finally hit the market, it marks the transformation of great ideas into real features that customers will love, which will eventually generate new ideas. The cycle is complete, but the work is not over because it is time to go through all of the ideas, both new and old, and start the process all over again. If you have seen the expanse of WeDo Technologies products, then you will know that we are not running short on great ideas. At WeDo Technologies we employ an open process for collection of ideas: we invite everyone to contribute. We receive inputs from a lot of different sources and markets, including telecom, retail, energy, healthcare and finance, and from a variety of user profiles and backgrounds from both internal, such as product architects and developers, integrators, marketing, support and sales team members, and external contributors from C-level to analysts. Our customer contributions are key in the process because of their willingness to cooperate and provide constructive criticism or complex needs that challenges us to go one step further. And their willingness to embark on a WeDo Labs project and work from concept through to the testing of an idea helps us shape and produce viable products for the market. Not all of the ideas that we receive will pass the initial scrutiny, and others will fail to provide enough business value. But a great number of them will eventually make AF_Miolo_LivroBlog2015.indd 10 03/02/16 16:23
  • 11. 11 it to the development stage or maybe generate other great ideas. Our Product Management and Marketing teams’ joint efforts offer a democratic approach for high-level prioritization that involves the Development, Delivery, Sales, and Professional Services teams, and ultimately the Executive Committee, in the decision-making process that brings all stakeholder views to the table. Next the Product Architects and Development Teams take the high-level ideas and transform them into great product features. And it is up to the Product Management and Marketing teams to leverage all the contributions and feed the product roadmaps with the long-term vision for product evolution. The final result is certainly not perfect, but it gives everyone a chance to contribute. In the end we can be confident that all these contributions will provide us with the best forward path that, both in the short and the long term, will bring to the market the features that are most relevant to our customers. AF_Miolo_LivroBlog2015.indd 11 03/02/16 16:23
  • 12. 12 “The best way to safeguard against fraud is to have a security and fraud management teams working together” AF_Miolo_LivroBlog2015.indd 12 03/02/16 16:23
  • 13. 13 DOUBLE BIND IN FRAUD WON'T BE AN ISSUE FOR MUCH LONGER Did anyone ever tell you to be creative about something? When this situation happens, I use to close my eyes and start repeating this mantra to myself: “Let’s go creative! And by the way, if you can do it right now… it will be perfect!” This situation is what is referred to as a “double bind” - a tricky way to communicate two discordant instructions given simultaneously. Another example of a double bind is telling to people to be spontaneous. If they begin to act spontaneously, they are not truly acting spontaneously; they are simply following instructions. In the end, it is a no-win situation. From psychology to global level, the double bind constantly occurs. For example, a double bind is encountered in economy when countries face the challenge of growing economically without disrupting the environment. Written by CLAUDIa CaLADo Advanced Analytics Project Manager at WeDo Technologies 12/08/2015 AF_Miolo_LivroBlog2015.indd 13 03/02/16 16:23
  • 14. 14 In Telco, a variety of double bind situations can also be presented. One type that is particularly worrisome to operators is the double bind faced in fraud management. In fraud situations, operators set the necessary fraud rules to prevent future fraud cases of the same type. Instead of controlling fraud activity, this actually results in the growth of a constantly adaptive capacity of fraudsters to escape from the fraud management system based on traditional fraud rule mechanisms. But, on the other hand, doing nothing is not an option. This is another no-win situation. As traditional fraud rules increase in number; the more complex and tricky schemes to perpetrate fraud become, thus making it more difficult for operators to reach the level of sophistication that fraudsters are achieving. Fortunately, advanced analytics are now able to confront the fraud challenge. The capacity to analyse data on a multiple dimension reality, combined with the performance of Big Data processing, makes use of detection and prediction models on large volumes of data more realistic now than it was a decade ago. Detection models, also called unsupervised models, are mainly used to identify groups or clusters from a customer base so that the behaviour of entities within each group are more alike than the ones belonging to other groups. When applied in the context of fraud, detection models can be used to do the following: • Detect suspicious behaviours • Identify new fraud types • Enrich case management with cluster information • Reduce false positives On the other hand, prediction models analyse past behaviour to obtain the propensity value of a particular event to occur. AF_Miolo_LivroBlog2015.indd 14 03/02/16 16:23
  • 15. 15 Prediction models can be used to prevent the occurrence of fraud. These models take into account the behaviour generated by entities upon their traffic data and evaluate their propensity to commit fraud. The prediction models can be used to do the following: • Prevent the occurrence of fraud, scoring all customer base and identifying the entities having a behaviour more likely to commit a fraud • Enrich case management with additional information to better evaluate false positive • Prioritize the cases in Case Management with additional propensity values information Advanced analytics are leading to new weapons in the fight against fraud ecosystems that are continuously growing in complexity. The added value of such techniques is their capacity to rapidly adapt to new realities that are increasingly more difficult to achieve with the setting of traditional fraud rules. Another trend that we assist is the constant concern of providers in delivering user- friendly advanced analytics tools, solutions, and products that are capable of guiding a fraud analyst through their investigation, from selecting the customer base for analysis to reaching actionable results. Despite the double bind suffered from traditional fraud rule mechanisms, the use of advanced analytics tools can produce the optimum combination, leading an operator to the next step of a Fraud Management System, introducing more advanced and complex rules within a large volume of data. With advanced analytics tools, double bind in fraud management won’t be an issue for much longer. AF_Miolo_LivroBlog2015.indd 15 03/02/16 16:23
  • 16. 16 With RAID TELECOM (...) we decided to design four ‘experiences’, helping to ensure all roles are optimized. AF_Miolo_LivroBlog2015.indd 16 03/02/16 16:23
  • 17. 17 RAID TELECOM: CREATING A STATE OF THE ART USER EXPERIENCE In this interview, Carlos Martins, Chief User Experience Architect at WeDo Technologies, shares why he is so passionate about creating the best User Experience possible for RAID Telecom, and why WeDo has invested so heavily in this area. by QUEXOR GROUP AN INTERVIEW WITH Carlos MartinsCHIEF UX Architect at WeDo Technologies 17/07/2015 AF_Miolo_LivroBlog2015.indd 17 03/02/16 16:23
  • 18. 18 As the User Experience Architect for WeDo Technologies, what vision did you have for RAID TELECOM and were you able to achieve it? As a UX architect, I wanted to deliver a state of the art look and feel for RAID TELECOM that followed the best practices for UI design to ensure optimum usability for our customers. It needed to be a progression from our latest version – with a modern look, but one that still relates to our core product. Many of today’s best design and usability practices can be traced back to industry innovator Don Norman, who, in 1988 was one of the first to publish his principles on the art of human machine interaction. This involves the study, planning, design and uses of the interfaces between people and computers. For RAID TELECOM we worked to provide a modern look and feel without sacrificing usability. In 2013 we invested heavily in significant usability improvements with the launch of Raid 7.0 and did extensive testing with real end-users. This resulted in some early failures, and we learned a lot from this experience. Going forward, we only deploy new functionality when we have at least 90% testing success. Intuitiveness is one of our biggest design challenges today- we wanted our users to ‘recognize’ rather than ‘recall’. This is an area we worked on extensively for the launch of RAID TELECOM. Another major improvement with RAID TELECOM is the ability to anticipate a user’s actions through something we call ‘Smart Highlights’. This is a tool we designed for presenting the end user with what is relevant based on their profile. This improves the user experience and speeds up the results, providing options via the user interface that will lead to the most critical actions. It’s a more personalized approach that is based on user-centered design rules. When the user first logs on to our software, they will find it very intuitive and easy to understand. What key areas do you take into account when designing a user interface? Our software is based on a user’s ‘web experience’. There are two different philosophies when designing a Web user interface - Fast Web and Slow Web. Most UI applications have one strategy, fast or slow. Our software uses both because our customers use our solution in ways that require different speeds. There are scenarios that are time sensitive AF_Miolo_LivroBlog2015.indd 18 03/02/16 16:23
  • 19. 19 or where users only require a high level view (fast web), and then there are those times where lengthy analysis of detailed data might be required (slow web). We needed a design approach that could respond to both fast and slow web styles. We use big graphics and bright colors for fast web, but for slow web styles we use a special font that is more easily readable and we add features that are specifically designed with a strong focus on analyzing data. For example, we reduced the use of colors but optimized contrast so we could guarantee users can focus on detailed data. Slow web use can cause users to tire quickly, but we implemented features to lessen the impact of eyestrain and mental fatigue. With RAID TELECOM we decided we couldn’t create a single one-size-fits-all user experience that would fit with every role, so we decided to design four ‘experiences’, helping to ensure all roles are optimized. This led to our Smart Highlights feature. Why is the User Interface so critical for a solution like RAID? And how is RAID’s user interface different from other solutions on the market? Businesses around the world are evolving fast and people need fast answers. Software needs to adapt to users’ needs and UI is a critical piece of this puzzle. RAID is one of the major tools for providing critical answers for our customers. If the UI is intuitive our customers will achieve better, faster results. They will have the answers they need and to allow the corporation to understand their business and to understand where problems exist and to resolve them more quickly. The UI must be very intuitive, fast and directed to handle day to day changes in the business. With RAID 7 we took a different approach, focusing more on user empowerment. This allows users to create their own dashboards and change them as the business evolves. As a UI designer, this creates a lot of challenges, but users should be able to redefine a screen or create a new screen from scratch if the business demands it. We improved on this with Enterprise Business Assurance, giving users the even more agility to create their own screens and dashboards as their business evolves. We know business changes rapidly, and if customers have to wait for their vendors to make upgrades or update functionality – they won’t be able to keep up and remain competitive. Customers can now manage these changes themselves. AF_Miolo_LivroBlog2015.indd 19 03/02/16 16:23
  • 20. 20 RAID TELECOM allows users to create their own analysis through our ‘Investigation Workbench’ tool. This allows users to create ‘self-service’ analysis that can preserve data snapshots and allow data comparisons over time. In addition, this analysis can be attached to specific Case Management cases, which provides an added level of information for other users. RAID TELECOM also provides the freedom to create ad- hoc tasks with SLAs that can change or be redefined as needed. No other tool in the market is providing all of this today; the best user experience and a powerful set of tools that don’t otherwise exist in the market. What new features of RAID TELECOM are your customers most excited about? One of the things our customers have been asking for is to have Help features bundled in with the product, making it easier to access. In the past, we provided user guides as PDF files, but now it has been built into the product, making it more contextual and easier to access. ‘Smart Highlights’ is another popular feature. As I mentioned earlier, this feature gives RAID a dynamic ability to create a world that highlights what is critical and relevant for that specific user. ‘Investigation Workbench’ for ad-hoc analysis has been extremely well received, along with the ability to support Pivot Tables. ‘Adaptive Case Management’ gives users the power to create ad-hoc tasks and human readable flows based on the new BPMN2.0 standard, allowing end users to design workflows in Visio and import these into our solution. ‘Smart Data Stream’ is also a new feature. This is a new ETL engine that is lightning fast. And last but not least is our new ‘EBA Cockpit’, which provides executive-level answers quickly, with just a glance. When it comes to giving our customers the best product possible, I think that we nailed it. RAID TELECOM is state of the art in terms of user experience. AF_Miolo_LivroBlog2015.indd 20 03/02/16 16:23
  • 21. 21 CreatedbyJamesFenton•NounProject “RAID TELECOM is state of the art in terms of user experience.” AF_Miolo_LivroBlog2015.indd 21 03/02/16 16:23
  • 22. 22 “All this new data and new tools are invading Insurance Companies business areas down to its processes, systems and human resources” AF_Miolo_LivroBlog2015.indd 22 03/02/16 16:23
  • 23. 23 Three Insurance salesman were sitting in a restaurant boasting about each company’s service. The first one said, “When one of our insureds died suddenly on Monday, we got the news that evening and were able to process the claim for the wife and had mailed a check on Wednesday evening.” The second one said, “When one of our insured died without warning on Monday, we learned of it in 2 hours and were able to hand-deliver a check the same evening.” 3 STORIES THAT'LL MAKE YOU RE-THINK THE FUTURE OF INSURANCE Written by GUILHERME FARIABusiness Development Manager - Insurance and Banking 03/07/2015
  • 24. 24 The last salesman said, “That’s nothing. Our office is on the 20th floor of a tall building. One of our insured who was washing a window on the 85th floor, slipped and fell. We handed him his check as passed our floor.” This very plausible story shows how insurers nowadays are concerned about providing a great service and excelling in customer relationship, but it unveils the urge to keep up with the latest technological trends. Social Networks, Mobility, Analytics and Cloud (the so- called SMAC) as well as Big Data and the Internet of Things or, more appropriately, Internet of insurable Things, are pushing Insurance Companies to a very uncomfortable ground. The reality is that the Insurance Industry is considered to be “digitally conservative”. The EY Global Insurance Digital Survey 2013 finds insurers limited in their digital capabilities: fewer than half were able to digitally provide information about products and services or provide a quote, a mere 23% could digitally process insurance claims, and just 35% could process a transaction/ sale digitally (see chart below). Now, imagine the following stories: 1) “My new car: a BM… black mouth, not Bavarian Motors” I have just bought a car that, besides being loaded of sensors, is able to whisper my driving habits directly to the ears of my insurer - distance travelled, time spent Digital Functionality in the Insurance Sector (% of insurers with digital funcionality) Provide Information about products/company Provider Quote Customer Self-Service Facilities Transact/Purchase Process Claims 23 35 40 43 47 AF_Miolo_LivroBlog2015.indd 24 03/02/16 16:23
  • 25. 25 driving, accelerations, brakes and turns. But, at the end of the day I like it, because as an impeccable driver, my personalized insurance premium is much cheaper than my crazy driving neighbor. 2) “My skinflint spirit is telling me: don’t eat that chocolate and go to the gym!” I am all fit with fancy wearable devices that know all the time my heart rate, calorie calculations, exercise habits, sleep patterns, GPS location data,… and the truth is, before I look at my health statistics my buddy insurer is already computing all this data to duly adjusting my life and health insurance premiums… I am going to the Gym! 3) “My house is calling the insurance plumber to stop a water leakage” I was working when I received an SMS from the insurance company telling me that there was a leaking water tap at my house. They wanted to schedule a visit from a plumber to fix the problem and prevent any type of property damage. These 3 stories are not far away from today, in spite of all regulatory and privacy concerns, similar situations will occur in the near future. And again, how tough will be for these “digitally conservative” companies to cope with large inflows of new data, with new customer relationships and the need of higher than ever reaction speed? And how about the integration of the new and essential data analytics tools with existing legacy systems, ensuring the smooth and safe transfer of data between previously siloed departments and business systems? All this new data and new tools are invading Insurance Companies business areas down to its processes, systems and human resources: from Risk Assessment and Underwriting, Policy and Premium Calculation to Claim processing and Fraud detection. Now, the $1M question is: How are we going to continuously control these newly shaped processes, systems and human resources, avoiding financial losses coming either from revenue leakages or undue costs? AF_Miolo_LivroBlog2015.indd 25 03/02/16 16:23
  • 26. 26 “No longer will the revenue discussion be confined to a purely finance function” AF_Miolo_LivroBlog2015.indd 26 03/02/16 16:23
  • 27. 27 WHO'S AFRAID OF THE IoT? NOT I - AND YOU SHOULDN'T BE, EITHER! Next month I have the opportunity to speak at WeDo’s inaugural North American Enterprise Business Assurance Conference, WDC@WDC. While pondering the key issues facing the Revenue Assurance and Fraud Management community and planning my subject matter during a long drive to Las Vegas for CTIA, I happened upon a radio feature on connected devices – already quoted as standing at 10 billion. This got me thinking. The fact is that this number is going to multiply tenfold in the next two to three years, begging the question for any company whose revenue could be in some way related to the new connected world we’re entering into: “Are we really ready?” Written by ROBERT STRICKLANDCo-Founder of Digital Nexus 17/09/2015 AF_Miolo_LivroBlog2015.indd 27 03/02/16 16:23
  • 28. 28 Now that connectivity is introducing new elements of commerce to everyday objects, from cars to energy meters, the concept of the Internet of Things (IoT) is slowly but surely becoming the norm rather than a nascent technology that we’ve long dreamed about. Indeed, the connected world is going to be here a lot sooner than we realise – and, although it’s something that the tech / mobile industry and consumers have been eagerly anticipating for some time, the reality of whether we’re ready to embrace and make the most of it from a revenue perspective is probably quite different. It’s something that offers immense opportunity, but is simultaneously quite a frightening prospect. Driving different behaviours and dynamics across business, the IoT will bring with it a whole new set of challenges and disruption, especially when considering the backdrop of protecting customers, assets and revenues. No longer will the revenue discussion be confined to a purely finance function; there will be implications for IT spend as we know it and company culture as a whole. This will be a board level conversation. When it comes to the associated software and services for the new connected world, companies are going to need to be at least on the curve – if not ahead of it. Trailing behind will certainly not be a good place to be. This is where WeDo’s event will be invaluable. Having attended and spoken at their events in the past, I know from experience that they have the knack of getting people together to really define a category, in turn listening and driving solutions to meet the demand of what their customers want and need - ahead of the curve. That is their secret sauce. What is needed to face the new challenges of the IoT is thought leadership, innovation and technology, and that is what WeDo deliver in spades. Their Enterprise Business Assurance approach allows businesses to face innovation such as the introduction of a new range of connected devices head on, capitalising on the opportunity for growth while maintaining tight control over business processes, the customer experience and revenue. While it’s unusual to see this kind of innovative approach coming from Portugal rather than the usual suspects of Silicon Valley, Israel or Germany, the fact that WeDo are providing a glimmer of hope on how to come to terms with this new reality is something that should be embraced. Their worldwide footprint and impressive list of clients mean that their insights are better and different from others offering similar services. I’m looking forward to seeing how the first event specifically for the North American market unfolds! AF_Miolo_LivroBlog2015.indd 28 03/02/16 16:23
  • 29. 29 CreatedbyFelixWestphal•NounProject “...the IoT will bring with it a whole new set of challenges and disruption...” AF_Miolo_LivroBlog2015.indd 29 03/02/16 16:23
  • 30. 30 “One thing is for sure, war is an inevitable part of every fraudster’s game, even if you try to avoid it.” AF_Miolo_LivroBlog2015.indd 30 03/02/16 16:23
  • 31. 31 Explaining the fraud market maturity by analogy with Computer Game ‘Civilization’. Ah, the 90s. They were wonderful, weren’t they? Nirvana released ‘Nevermind’, people started to go online and everyone was sure the Y2K bug was going to bring about the end of the world. You want to know what else was great? Computer games. The 90s produced some of the most inspiring, innovative computer games the world has ever seen. You may have played ‘Age of Empires’, which was a very influential game for its time, related to real-time strategy, but we cannot ignore the fact Sid Meier’s ‘Civilization’ came first, in 1991, with just one objective: build an empire that can last. Written by CARLOS MARQUES PRODUCT MARKETING Manager at WeDo Technologies 05/08/2015 IS THE FRAUD MANAGEMENT MARKET 'MATURE'? AF_Miolo_LivroBlog2015.indd 31 03/02/16 16:23
  • 32. 32 In this game, the player takes on the role of the leader of a civilization, starting with one settler unit, and attempts to build an empire in competition with other civilizations. Along with the larger tasks of exploration, warfare and diplomacy, the player has to make decisions about where to build new cities, which improvements or units to build in each city, which advances in knowledge should be pursued, and how to transform the land surrounding the cities for maximum profit. From time to time the player’s towns are attacked by barbarians with no specific nationality and no named leader. These threats only come from unclaimed terrain (land or sea), and over time there are fewer and fewer places from which barbarians would arise. As time advances, new technologies can be developed and these technologies are the primary way in which the game changes and grows. These stages of ‘scientific advancement’, just as in real life, are directly linked with military strength. In ‘Civilization’ the war starts with a strong infantry unit, catapults and knights can be finished with riflemen, cannons and cavalry. He who has more cutting-edge units usually wins the war. AF_Miolo_LivroBlog2015.indd 32 03/02/16 16:23
  • 33. 33 Like with modern fraud prevention and detection techniques, success in defeating the “barbarians” in Sid Meier’s ‘Civilization’ is determined by the capability to reduce uncertainty from emerging fraud threats. However, ‘unclaimed terrains’ can blind you from spotting these emerging threats, and that is why we rely on technological advances to manage fraud threats when fraudsters emerge. Similar to the game, most of today’s CSPs already have a weapon, or in this case a fraud management tool, that is being used to stop the barbarians, or fraudsters. At first glance, we may mistakenly believe that this is a mature market. The question now becomes, “If you have a tool but it faces technological disadvantages against the fraudster’s tools, are you really equipped to battle fraud?” Certainly not. At this point, the service provider has 2 options: • Weapons are upgraded to a more updated version, (i.e. – The CSP begins with arches and evolves to a crossbow) • A completely disruptive technology is introduced, (i.e.- where you go for gunpowder or even nuclear weapons to exterminate your enemies) Either way, until you have the right weapon to defeat your potential enemy, the problem isn’t solved. One thing is for sure, war is an inevitable part of every fraudster’s game, even if you try to avoid it. CSPs can gain a large advantage if their fraud departments are the first to achieve a particular technological advantage (the secrets of Artificial Intelligence, for example) and put it to use in a “military” context. The whole system of advancements, from beginning to end, is a full speed technology ride. So is the market mature? Not if it is always open and rejuvenating. In other words, I would say that it ‘Smells Like Teen Spirit!’ AF_Miolo_LivroBlog2015.indd 33 03/02/16 16:23
  • 34. 34 “With this latest version of RAID Telecom, we have also completely redesigned the user interface. AF_Miolo_LivroBlog2015.indd 34 03/02/16 16:23
  • 35. 35 Raul Azevedo is Head of Product Development at WeDo Technologies. In this interview, Raul shares his insights into the market drivers behind RAID Telecom, and how his team has worked to redesign the way Telcos think about and manage their business. by QUEXOR GROUP AN INTERVIEW WITH RAUL AZEVEDOHead of PRODUCT DEVELOPMENT at WeDo Technologies 18/06/2015 ENTERPRISE BUSINESS ASSURANCE AND RAID TELECOM: DEVELOPING THE TOOLS TO BUILD A BETTER BUSINESS AF_Miolo_LivroBlog2015.indd 35 03/02/16 16:23
  • 36. 36 What was your role in creating RAID Telecom? I joined WeDo Technologies eleven years ago, beginning in Product Delivery. Now my role is Head of Product Development, which is responsible for Engineering, Technical Architecture and Quality Assurance. I oversee the entire product development lifecycle, which includes requirements identification, analysis, design and engineering, as well as test and delivery. I also oversee our activities with the TM Forum as head of their Fraud Management Group. What are latest product features of RAID Telecom? What will customers find most useful? As always, our focus when developing products is to remain true to our Enterprise Business Assurance (EBA) vision. One way we’ve accomplished this was through the creation of Fast Processes - which address the broader business assurance needs within a CSP; going well beyond traditional Revenue Assurance and Fraud Management. For example, with Fast Processes we have taken industry best practices for controls, alarms, case management flows, and supplier and partner incentives management and then packaged them and made them available right out of the box. Although Fast Processes are prepackaged, RAID still maintains its flexibility with Flex Processes. With Flex Processes you can expand your audits and configure them to fit any need that you have, including certain modeling requirements that are out of scope within Fast Processes. We also have a lot of new and exciting product features within this release. Firstly- our new Adaptive Case Management tool allows users to change or react to events like emails, tweets or external alarms. It is fully event-driven and very easy to configure, allowing the end-user to maintain the case management flow and monitor performance. Another feature is the new Data Discovery toolset. Investigation Workbench is one of these tools and was designed specifically for ad-hoc investigation. We have done significant market testing with this feature to maximize usability and productivity. Secondly, we have introduced Smart Data AF_Miolo_LivroBlog2015.indd 36 03/02/16 16:23
  • 37. 37 Blueprints, which allows end-users who are not familiar with SQL or other query languages to produce complex queries simply by creating them in a data flow. This provides a simple, interactive way of building complex queries that can easily be reused. We also have fully redesigned our information layer with our Smart Data Stream tool. Our biggest focus for this release was the ability to react, analyze and detect in real-time, and with Smart Data Stream, the system is able to react to events and also receive and process streams of data in real-time. Lastly, a trend we are seeing from our customers is the need to maximize the value of big data sources; namely those supported by Adaptive Solutions. We now support data stored in Hadoop and are even able to perform validations with mixed data sources. For example, if some data resides in Hadoop and the rest is in a transactional database like Oracle, users can still validate all the data regardless of where it is stored, and still identify problems without the need to extract all the data out to a separate database. This saves both time and money. With this latest version of RAID Telecom, we have also completely redesigned the user interface. It is now sleeker, with a new color scheme, and it is more user-friendly, following industry best practices for usability. When moving to a real-time architecture, we needed to optimize the processing time, but still keep the legacy features intact to ensure we could access backup data. Technically this was quite a challenge, but we’ve had great results. All configurations are in the same web-based user interface, so that any user can see how the flow is organized. The benefit of having a fully integrated web- based architecture is that it allows both design and analysis within the same interface. AF_Miolo_LivroBlog2015.indd 37 03/02/16 16:23
  • 38. 38 Were there any hurdles that were difficult to overcome? One of the most challenging issues when addressing real-time processing is that sometimes there are instances real-time processing isn’t required or isn’t supported. What we’ve been able to do is achieve a compromise, where we maximize speed and reach without losing the consistency of our processes, namely in the areas of transforming and processing data. The other issue is that when we tried to maximize the value of various big data sources, we quickly learned that we were dealing with different realities than those we encounter in a relational database. It was a bit of a challenge to prepare data properly so that we could maximize performance within Hadoop, and of course our goal is to make all of this technical stuff really easy for our end users. We performed exhaustive user testing until we achieved a solution that met our requirements. The end result is a product that utilizes the same base language throughout and doesn’t require customization. We worked extensively on these issues to ensure we could deliver the best user experience possible; not just in how it looks, but in how it functions. What are the benefits to our Customers? To the business managers/business users and to the organization as a whole? Revenue Assurance used to be focused solely on the revenue stream, but with our new EBA Fast Processes, we’ve been able to increase coverage across the entire organization, with real-time monitoring and continuous auditing of key processes across the company. Auditing tools that were previously only available to revenue assurance teams are now packaged and available to other groups- including partners and incentives management, sales, HR, etc. Additionally, our solution is constantly adapting to changing business needs. Imagine that you have a case management tool to address a specific situation; in 2 months, the details of that situation will be outdated. We give users the ability to manage changes on their own, without complex coding. There will still be the ‘power users’ who want more granular access, but now a new level of control is AF_Miolo_LivroBlog2015.indd 38 03/02/16 16:23
  • 39. 39 given to every end-user to ensure that the tool keeps up with changing needs and remains relevant to the current business processes. We also ensure that the right alarms and controls are being monitored. We don’t believe in systems that rely on monthly control points, but in a system that is continuously looking at the business in a focused way, only creating alarms if there are critical issues that need to be addressed. We provide our customers with the comfort that their business is constantly being monitored, and that they will receive ample warning if anything goes wrong. We tackle the problem from end-to-end in an integrated environment that can be accessed over any device, including smartphone or tablet. It adapts to whatever device you are using, prioritizing the interface and making it easy to see at a glance. You can constantly keep in touch and see how things are going, no matter where you are. What are the advantages and best practices taken from these new technologies? Big Data and Hadoop: At WeDo Technologies, we are leveraging the power of big data within our product roadmap because that is the future. The CSP market has been a bit slow to embrace the concept of open source, but supporting Hadoop can expand a CSP’s ability to process huge amounts of data. It’s not just a data source; it’s a tool that, if leveraged correctly, provides incredible processing power, which is what we have leveraged with our Smart Data Stream. Analytics: The issue of embedding analytics into the product is an area that we are currently investing in. Machine learning and data mining algorithms for fraud detection are what we are working on now; in other words, preparing the architecture for a real-time world. The needs of our customers are evolving and our solution is changing to fit those needs. When CSPs monitor critical processes, it’s important to quickly identify problems that are leading to losses. Virtualization: With our architecture redesign we have been working to scale our system in a cloud environment and continue to do extensive testing in this area. LTE/M2M: With regards to LTE and M2M, there is the need to address huge amounts of data in real-time. We have the ability to standardize data by putting AF_Miolo_LivroBlog2015.indd 39 03/02/16 16:23
  • 40. 40 it into a common data format that can easily feed our solutions and processes, identifying if the data is VoLTE or Wi-fi or 3G. Our product is able to read and process all kinds of data, and we are constantly improving, so when there is a new format we can quickly adapt. Do you expect to reach new audiences/stakeholders within the organization? Yes definitely. With our new ‘Fast Processes’ we are extending the benefits of our product to other stakeholders within the organization. More than serving different users, our product allows different teams to work more closely together, collaborating and sharing the same case management tools and features, allowing teams to work with a common platform in a more integrated way. Also, in terms of the user interface, we segment data visualization components for different audiences. C-level data visualization components are very different from those that are used by a data scientist or analyst. We have ways to address different needs by different users/roles within the company. For example, within ‘Fast Processes’ we provide a CXO Cockpit that has been designed to provide a summarized view of all the processes and it delivers the results in a very intuitive way. From there, he or she can drill down to gain further details. AF_Miolo_LivroBlog2015.indd 40 03/02/16 16:23
  • 41. 41 “...our focus when developing products is to remain true to our Enterprise Business Assurance (EBA) vision.” Created by Artem D •N oun Project AF_Miolo_LivroBlog2015.indd 41 03/02/16 16:23
  • 42. 42 “engage with our customers so they can help us to help them!” AF_Miolo_LivroBlog2015.indd 42 03/02/16 16:23
  • 43. 43 While preparing for the 10th WeDo Technologies’ Worldwide User Group, I remembered Maria João Gomes (Head of People Culture)’ blog entry on the intensity and uniqueness of the WeDo Technologies corporate culture and values. In fact, this uniqueness comes also with such a rich and diverse group of costumers around the world. Together with our customers, we have built an amazing User Group, a community of Telecom experts that get together to share experiences, and discuss challenges and solutions, all while having pleasure and fun! Written by João ResendeVice-President for Product Development at WeDo Technologies 15/06/2015 VALUES-BASED PRODUCT STRATEGY? AF_Miolo_LivroBlog2015.indd 43 03/02/16 16:23
  • 44. 44 To achieve this, the first two values come into play: Diversity and Companionship provide the ideas, creativity and collaborative empowerment that leverage the individual capabilities of both WeDo and our customers to do more and better, together. But they also require an open and frank engagement with our customers to understand their issues and their challenges, identify the areas and features to improve, as well as, the key streams for research and development. Here, the message must be clear and transparent: engage with our customers so they can help us to help them! This cannot be accomplished without a commitment that enables trust. Our customers entrusted us, relying on our products and our ability to support their work and help their organizations. So naturally, they challenge us, always demanding more, better – and cheaper! We need to honor that trust, working for the long run, thinking of the long term and committing to sustained product investment, with an ambitious yet solid roadmap – always, striving to do more with less, being frugal with our own and our customers’ resources. So, three other critical values are Commitment, Transparency and Frugality. They give us the drive, the openness and the hands-on pragmatic approach that allow us to continually improve our products and their effectiveness for our customers. A Product Strategy must certainly be described by the context of the market being addressed, the value the product is supposed to bring, the product key features to achieve a compelling value proposition and a corresponding strategic plan. But in a world where all seems to revolve around “what and how much value”, it is refreshing to also examine the role that Values may have on our Product Strategy. AF_Miolo_LivroBlog2015.indd 44 03/02/16 16:23
  • 45. 45 And this User Group showed so clearly the unique role of our customers in that! Thank you. PRODUCT STRATEGY CUSTOMERS PRODUCTS Commitment Transparency Frugality Companionship Diversity AF_Miolo_LivroBlog2015.indd 45 03/02/16 16:23
  • 46. 46 “Fraud and revenue risks associated with IoT may mean different things to different people, depending on where they reside within the product and service delivery chain.” AF_Miolo_LivroBlog2015.indd 46 03/02/16 16:23
  • 47. 47 Today’s increasingly connected world is introducing many new elements of commerce into everyday objects, from cars to energy meters. However, the reality of whether we’re ready to embrace the concept of the Internet of Things (IoT) and make the most of it from a revenue perspective is quite different. The IoT is progressively driving different behaviours and dynamics across business, bringing with it a whole new set of challenges and disruption – especially when considering the backdrop of protecting customers, assets and revenues. As a result, revenue discussion will no longer be confined to a purely finance function; there will be implications for IT spend as we know it and company culture as a whole. Written by Luís BrásProfessional Services Manager - Fraud at WeDo Technologies 13/11/2015 IDENTIFYING IOT FRAUD RISKS: THE CHALLENGES FOR OPERATORS AF_Miolo_LivroBlog2015.indd 47 03/02/16 16:23
  • 48. 48 The progression to the IoT will introduce new device manufacturers and application providers that the telecoms industry has previously not worked with, and who don’t understand the risks. This will result in additional security and fraud risk, as these ‘trusted’ parties will need to be audited to ensure the expectations of the CSPs are being met, says Luís Brás, head of professional services, Fraud Management Area, WeDo Technologies. Considerations for a Successful Risk Management Strategy Fraud and revenue risks associated with IoT may mean different things to different people, depending on where they reside within the product and service delivery chain. In order to stay ahead of the curve, organisations will therefore need to consider and evaluate from as risk perspective what elements of their existing fraud type exposure will increase (or decrease) as a result of launching the new devices or services, and understand the full risks that can be posed by the IoT; both what can result from failures with the technology and what fraudsters stand to gain from attacking the service. As part of the product and service lifecycle, the fraud and security functions will need to be directly involved in performing ‘product and services risk assessments’ that are ultimately linked to defining the required strategies. By making a thorough risk assessment, businesses can ensure they are adopting a balanced approach, with technology, people and processes working together to create an effective strategy. What defences can be defined? As CSPs are already aware, they have a responsibility for storing and managing highly sensitive and confidential data associated with their customers and business partners. Consideration will need to be given as to how these new connected devices with the IoT will be secured to maintain the integrity of the information held or exchanged with their partners. Data and privacy protection risks will include the potential for eavesdropping on other users, a device’s data being transmitted over the network by the criminal masquerading as the customer’s device, or network ID and information being subsequently provided illegally to third parties. AF_Miolo_LivroBlog2015.indd 48 03/02/16 16:23
  • 49. 49 As evidenced by recent high profile fraud and security incidents and breaches, the criminal fraternity are becoming more innovative, deploying new and more focused techniques for obtaining exactly what they want from the services and products they target. The IoT will be no exception. CSPs must never become complacent or forget that these highly organised fraudsters operate their own businesses and need to “service” their own customers. Their business model for committing fraud spans all types of technology and crosses international boundaries, and has traditionally relied heavily on the CSP’s inability to respond and recover in a timely manner. It is this aspect that they will again look to prey upon. One of the essential business requirements for CSPs will be to continually consider the risk, and implement clearly defined fraud, security and risk protection models for the IoT. The demand and requirements for this progression will lead to more exciting results in the formation of strategic partnerships. CSPs must however, consider the implications and requirements to enable them to minimise exposure to fraud risks associated with mobile devices, applications, processes and different business models. At WeDo, we believe that an Enterprise Business Assurance (EBA) approach allows businesses to face innovation such as the introduction of a new range of connected devices as part of the IoT, head on, capitalising on the opportunity for growth while maintaining tight control over business processes, the customer experience and revenue. AF_Miolo_LivroBlog2015.indd 49 03/02/16 16:23
  • 50. 50 “For current customers, the evaluation to perform is a Behavior Scoring.” AF_Miolo_LivroBlog2015.indd 50 03/02/16 16:23
  • 51. 51 CREDIT SCORING AS A CONTINUOUS PROCESS In some businesses involving credit concession, it’s common to find Credit Scoring processes and tools. Most of the time these are incomplete, treating Credit Risk processes in a disaggregated way. Credit Scoring may involve multiple types of evaluations: Acquisition or Application Scoring, Behavior Scoring, a mix of both, or even manual handling. These can have different timings and cycles of execution and use multiple internal or external sources of information. It becomes a challenge to achieve a complete view through a single and integrated solution. Regardless of Credit Scoring tools and processes sophistication, an accurate and up-to-date Credit Score Value is crucial in avoiding erroneous credit concession or Written by RUI NELSON FERNANDESSOLUTION ARCHITECT at WeDo Technologies 04/11/2015 AF_Miolo_LivroBlog2015.indd 51 03/02/16 16:23
  • 52. 52 recovery decisions with negative impacts on revenues. When the decision is too permissive, turning risk exposure higher than the defined policy, the probability of default and bad credit increases. If the decision is too restrictive, turning risk exposure lower than the accepted one, it will block the maximization of the evaluated entities’ business potential. Credit Risk is not static, and to know at each moment the real risk in conceiving credit, it’s critical to closely follow each entity and act upon new and relevant information or credit related events. This continuous monitoring with credit risk re-evaluations keeps Credit Score Values updated with the most recent known information and behaviors. This assures the quality of data used to decide credit concession conditions (e.g., credit limits or deposits) or best scenarios and actions for credit recovery. Within the life cycle of a customer, there are different events that will demand different Credit Scoring evaluations. When an entity becomes a customer with initial credit, an Acquisition Scoring (also known as Application) type of evaluation is used to decide the conditions for a possible credit concession. For current customers, the evaluation to perform is a Behavior Scoring. Acquisition scoring provides a snapshot of the entity Credit Risk at a given moment, whereas Behavior Scoring gives a continuous up-to-date Credit Risk Value. Keep in mind that, during the entity life cycle, available information differs in type and weight. For Credit Scoring it is critical to use existent knowledge in an intelligent way, according to its actuality and reliability. When facing a new customer request, little or no direct information is available, and scoring must rely on demographic and indirect data supplied by third parties. However, when an entity is already a customer, direct and highly reliable behavior information is available, and Credit Scoring should use this knowledge to adjust an entity’s Credit Risk Value. AF_Miolo_LivroBlog2015.indd 52 03/02/16 16:23
  • 53. 53 A complete and effective Credit Scoring solution, is the one capable of handling smoothly and consistently the different events and available data during customers’ life cycle. All Credit Scoring evaluations and manual risk handling operations, must be combined to give an accurate and up-to-date risk value and, at the same time, to tell one common and consistent story. This approach allows, not only, to know at each moment the present Credit Risk associated to each customer, but also to have access to the full story and evolution of each entity regarding Credit Scoring. New Customer 1st Credit Decision INDIRECT KNOWLEDGE GROWING DIRECT KNOWLEDGE Already Customer Credit Risk Revision Already Customer Additional Credit Decision AF_Miolo_LivroBlog2015.indd 53 03/02/16 16:23
  • 54. 54 “It IS hard to get billing millions of customers to be flawless.“ AF_Miolo_LivroBlog2015.indd 54 03/02/16 16:23
  • 55. 55 Customers are now able to switch more easily to a new supplier then a couple of years ago. Due to the regulated split-up of the value chain, more players entered the market and there is more choice for the consumer. So, retaining a customer and the “hunt” for the new customer became a priority. The cost of maintaining a (good) customer is less than the cost of the acquisition of a new one thus Utilities need to concentrate efforts on keeping the customer happy. HOW TO ASSURE HAPPY CUSTOMERS AND GET AHEAD OF COMPETITION Written by PIETER IJZERMANBUSINESS DEVELOPMENT MANAGER at WeDo Technologies 27/10/2015 AF_Miolo_LivroBlog2015.indd 55 03/02/16 16:23
  • 56. 56 Besides that the customer expects a service level of a 100%, Utilities need to manage other expectations, which result, eventually, in customer experience. Using my personal experience, I will mention some expectations a customer has of an electricity distribution company and then line them up with the Business Assurance practice. The Business Assurance practice that helps customers to be happy. I expect my bill to be addressed to me and not to me with a slightly different name. I expect the tariff applied to be the one the supplier promised me. I also expect the bill to reflect the estimated power consumption minus the real one (measured once every 6 months) and that the balance to pay / to be credited for, to be correct. I like to see my flat rate to be adjusted to my profile of consumption so I don’t have unpleasant surprises at the end of the contract period. I would say that these are expectations that are more susceptible to stronger emotional reactions, when reality is different from the expected values. So, not that hard to get these right, right? Wrong. It IS hard to get billing millions of customers to be flawless. Generally speaking, dozens of systems and processes create and support the data and the flow that eventually leads to that bill I receive. An example of systems and processes involved in a meter to bill process: • A meter from which data is read (either automatically or manually) • An interface that transforms and transfers that data to a meter reading management system • An interface that transfers relevant data to a billing software • A Customer Relation Management system that holds my contract information and delivers it to the billing system • The billing system holding the correct tariff information and applicable taxes and produces the bill • The finishing system that, with all collected relevant information, prints my invoice With all this complexity there is a chance I may receive an erroneous bill. And when I find out about it, I will be disappointed and call up the company. In the UK, two third of complaints to suppliers registered by customer support professionals continue to be about billing errors (Source: Citizens Advice). AF_Miolo_LivroBlog2015.indd 56 03/02/16 16:23
  • 57. 57 Now, as a reasonable person and with some experience in the ICT sector and large scale implementations of systems that support complex business processes, I can understand that these things happen. And I have hope because there are solutions that can prevent this all. In the (complexity comparable) telecommunication industry similar issues occurred. The Business Assurance practice was adopted and the sector has a yearly healthy return on investment and happier customers and shareholders. One of the practices that will detect erroneous billing, before the customer does, is Enterprise Business Assurance. As controls on the accuracy of individual systems does not avoid errors on a process or integration level, one needs a systems’ agnostic solution that loads data from all systems involved, applies the correct business rules and validations and verifies if all is good. These permanent audits will allow detection of possible errors that can lead to my dissatisfaction. Better, it will allow to detect anomalies in values billed to me (i.e. Bill Shock, I typically spend 300 USD per month and suddenly a 300.000 USD bill occurs…) and the subsequent potential press that will reduce confidence even further. The Business Assurance practice only works a 100% if it is continuous and involves all customers, relevant processes and systems. Utilities thus need a solution that can handle the big data involved and has the intelligence to detect issues and to present them in a way we humans can analyse. Also, they will have to involve others in the organization to solve the cases found and consequently it needs an integrated collaborative workflow solution. Earlier this year, it became public that a UK electricity supplier had received a 7 million pounds fine due to incorrect billing. More recently, we read another release about that same company billing a customer millions whilst he normally spends just 300 pounds per month. These are expensive examples of the 80% of complaints registered at customer support centres of utilities. Underlying systems and processes cause these issues that can be prevented by adopting a Business Assurance practice and control systems and processes on a permanent basis. The company that does will surely have an easier job in maintaining clients happy and will become more competitive. AF_Miolo_LivroBlog2015.indd 57 03/02/16 16:23
  • 60. 1