Digital Customer RFID VR ER

My Car had a Conversation with my house Last night . . . when My office interrupted

My Car had a Conversation with my house Last night . . . when My office interrupted

Source: futureforall.org

Everything is a computer—your car, phone, television, music player, radio, and so on. With the expansion of WiFi, even more common objects will not only be computerized; they will be networked. You know that security doohickey that stores attach to clothes, expensive items, and controlled substances? Imagine your Blackberry and Outlook calendars simultaneously updated and “aware” of new items you have purchased the moment you cross the threshold of your home with times and days that you should take your new prescription, or your calendar automatically reminding you when to take your medication through a text message sent to your car, cell phone, computer, and music player.







https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/internet-of-things-global-mobile-consumer-survey-infographic.html










Now, imagine that all of the technology that surrounds you—your PC, phone, radio, car keys, PDA, car, television, and the doohickey in the bag—is monitoring your activities and controlling key aspects of your life (depending, of course, on the settings and who set them).



Your phone flashes: “Take X pill.” Ignored, your phone flashes and rings five minutes later, “Did you take your X pill today?” You walk into your kitchen past your microwave that is blinking and flashing: “Urgent Message: Prescription.”

https://www.pilldrill.com/?utm_source=Google&utm_medium=cpc&utm_campaign=Non-Branded&utm_content=Prescription+-+General&utm_term=%2Bprescription%20%2Breminder%20app&gclid=EAIaIQobChMI88Oc79-01QIVwoSzCh0xZQYIEAAYAyAAEgKul_D_BwE


Customer Worthy Read Download full report pdf Havas Consumer Healthcare Report 2017-20




Customer experience is the next big thing. Inanimate objects are getting smarter. Remember when TVs had dials and clocks had hands? Now, your TV obeys your command and plays the shows you want to see when you want to see them in the order you dictate and without commercials. Look at your bathroom scale. Look at your car. Look at the security tag in the box of aspirin. The experience is different because there is intelligence around the customer, built into everything, constantly shaping the way customers see and interact with the world.


Caller ID, transparency, physical household, and addressability

All customer processes—business, consumer, and government—are subject to overhaul. The vast improvement in cars and computer usability through USB ports points to the ease of computer components and user adoption. It’s the emergence of the Trifecta, the next stage of the evolution, where products are speaking to each other on behalf of the customer and are becoming self-configuring based on a customer’s profile. This goes beyond the car that adjusts to three users. It speaks to design function with such questions as: “Do I hit a 1, 2, 3 button?” or “Does the seat measure me?” or “Does the car hear a voice command, or does it simply recognize my voice and dimensions and adjust my seat accordingly?”

From Google Home Support:

When everyone links their personal Google Account and voice to a shared device, each person:

  • Can choose their own default music services
  • Gets a personalized music experience
    • This is based on their past interaction ...
    • This provides a more personalized experience by continuing playback from your last saved spot


This type of awareness is one in which people are defined by their devices, and services are configured as their personal network with a digital “fingerprint” representing their various connections, activities, and user preferences [this is major part of next book, Customer Sensor - rwas Joe Pine Infinite Possibility - I use Joe’s multiverse description for design thinking across multi-scapes . ]

I built a template to evaluate design and monetization dimensions using Joe Pine’s dimensions as ‘markets’. Excellent for commercialization thinking.



This is the next wave of technology, societal, and business development. It will vastly change the nature of the way products are consumed, repaired, purchased, reused, and resold. This also has tremendous implications for customer privacy, security, and governance.

The emerging business ecosystem is quickly becoming a reality. Early adopters, savvy technology geeks, and children expect technology, communications, and trusted companies to flawlessly work on their behalf with minimal disruptions or inconveniences. In this new environment, information and trust are rationed out to companies that contribute to the customer’s network and respect the customer’s boundaries. These trusted companies also proactively protect and represent the customer’s values and best interests, often without the customer’s acknowledgement, but always with the customer’s permission.

In this new environment, the customer is regarded as the arbiter of business decisions. The primary criterion for business success is this: Is the result Customer-Worthy?


“The Matrix is everywhere. It is all around us, even now in this very room. You can see it when you look out your window or when you turn on your television. You can feel it when you go to work, when you go to church, when you pay your taxes. It is the world that has been pulled over your eyes to blind you from the truth.”

—Morpheus, in The Matrix



Fast forward to 2018 and the diary of a day in the life of your customer, Neil

(Excerpted from the short story, Evil Twin, by Michael R. Hoffman)


Standing on the light rail train, heading into the city, my folder vibrates, and I see the light flashing through the unzipped space in my backpack. Tilting back, I try to glance at the message. The light is green, so it might be home. I reach through the unzipped corner and pull the screen half-out, bending it back just enough to see the address line.

The Wall Street Journal I grabbed at the train station must have had an interactive RFID coupon for 30 percent off the new combo meal at the Starbucks across the street from my office.

I double tap the “Y” on the coupon with my index finger, and the confirmation message alerts me to pick up my sandwich at counter 3. The flashing link below the confirmation also displays a message telling me that I have been entered in a contest for a travel mug with an SD chip and wireless connectivity to play videos and news clips. “You must be present to win. Your current odds of winning are 71:1. This could be your lucky day!”

I jog across the street, gnawing at my sandwich, tasting the melted cheese, ham, and a bit of brown paper.

As I approach the lobby, my folder vibrates (I’m sure it flashes), and I hear, “37 days consecutive on-time attendance. 23 more days to a new golf putter, day spa, flowers home, or grab bag gift, care of Human Performance Resources. Would you like to choose your gift now?”

“Oh, crap!” I mutter as I grab for my ear. I forgot to turn off my office ear- piece again. I push the toggle back twice. I think that’s how I “mute all.”

As I walk into my office, I quickly look left and right and softly say, “Holy stubby Santa!” I pause. Nothing. As I grab my ear and fiddle with the toggle, I hear a soft tone in my left ear and an even softer click on my right. “There you go.”

I repeat “Holy stubby Santa,” and my desk’s half-panel wall begins to glow almost completely green. “Looking good,” I say out loud to no one. I hear three quick beeps in my left ear, and a soft, female voice whispers, “3 urgent, 6 exec, 13 office messages, 31 unknown.”

I plop down in my chair and run my finger across the green screen. Tiny text blurbs pop-up and disappear as my finger moves along. My eyes focus on the red brown blotch just left of the center of the screen. I tap the blotch and spread my two fingers apart to zoom in and open the under- performing area.

The screen light shudders. Then, a list of “recommended actions” appears in a window overlaying the area. The list, numbered from 1 to 6, includes actions and probable outcomes for each item, presented as percentages. At the bottom of the semi-transparent window where “7” would be, the screen highlights “New” and “Other.” Hmmm. . . . I quickly drag my finger across actions “1, 2, 3” and hold it. I pause for a second, and the screen flashes “confirm” as the female voice whispers, “Confirm?” in my left ear.

“Confirm.”

“Good sign,” I think to myself as the lower traffic light-looking gauge has a “97.5%” next to the green signal and “2.5%” hovering between the yellow and green.

“Not bad, 97.5% of processes running on plan 7 months before the big day; 2.5 out of alignment.”

I touch the 2.5% and drag my finger to the lower right “Me” button. I can’t help but smile as the “Me” pops up “$48K, $6k, $26K,” in blue, red, and green respectively, representing my slice of the projected earned bonus, potentially forfeited bonus, and potential group bonus.

7:10 pm: I lean my backpack against the car, and along with the sound of the door lock opening, the car’s dashboard screen is already flashing. I slide in and look at the pulsing message. “MUNICIPAL ALERT MUNICIPAL ALERT” is scrolling across my dashboard in red, bold letters against a sky blue background. I tap the screen, and a message flashes in black letters, “Spring Baseball? Justin Y N Hillary Y N Confirm.” I quickly tap both “Ys” and “Confirm.” “Confirm debit $625 Citi Y N” pops up on the screen, and I tap “Y, Confirm.” The screen then flashes some message about verification among 4 registered items blah, blah, blah and a touch box below that says “Accept Not Accept.” I tap “Accept” and “Start Car,” cleverly using both hands. Nothing happens, and the warning light flashes in synch on the dashboard and the dome light. “External screens must be turned off to start ignition.”

“C’mon, you know what I meant!” I holler back. Nothing.

I tap the flashing and enlarged “Screen Off” button then “Start Car.”

As I turn to enter the mall on the way home, the car’s in-dash, yellow message light flashes quickly, followed by a high-pitched man’s voice asking, “Offers? Yes? No?” Just as I say, “Yes,” the voice changes to my wife Eve’s voice and says “Groceries” in a soft calming tone.

I say, “No groceries” and hear a beeping phone ring tone fill my car, then Eve’s real voice, “Hi, Neil. Honey, are you going to be home soon?” Not really paying attention, I respond, “I’m not picking up groceries.”

“What?”

I park close to the hardware store and tap “Car Off.” Simultaneously, the car windshield screen projects a lightly flashing message “Offers? Yes? No?” to which I say “Yes.” Two large buttons then pop up on the screen: “Some” and “All.” I say “Some” out loud, and the names and images from stores in the mall from my preferred list pop up. They are numbered 1 to 5. I say, “1, 3” for the grocery store and the liquor store. Another message then pops up with “1. Bank $25 OK 2. Chinese Restaurant $10 OK?” “No,” I grunt as I step out of the car.

As I enter the store, I hear a faint voice in my left ear saying “Coupons?”




I realize that I forgot to turn my ear phone off. “No, thank you” I say quickly and tap my phone off.

I just hate being tracked as I go through the store.




The future is now

This “day in the life” excerpt provides a window into an evolved customer- to-company relationship and a set of experiences that in the not-too-distant future will be pervasive, intelligent, highly personalized, multi-device, and multi-member.

The full spectrum of technology used in the excerpt is already available:

  • WiFi;
  • Bluetooth;
  • Encryption;
  • Customer profile-driven personalization, self-configuring, rules- driven marketing and sales offer systems;
  • Visual business performance dashboards with touch screen reporting;
  • Multi-media, network-connected cars; and
  • Multi-device coordination and synchronization.


Neil’s day depicts a higher evolution of networked customer, where the buyer’s experience, activities, environment, human-to-device and human-to- human interactions, movements—and even occasionally thoughts and reactions—are digitally recorded (either by mistake or intentionally) and stored in distributed connectable databases.


How does a company participate in this network? Who is in charge of coordinating the contacts, messages, offers, and customer service? How can marketing and technology work together to make sure the customer is well served at the same time the technology is used effectively and efficiently? Companies must begin now to plan how they will participate in this interconnected, always-on, highly personalized network and whether it is an option not to participate in a customer’s network.


Non-participation probably isn’t an option. A company that chooses not to participate in the customer network is today’s equivalent of a company choosing not to have a phone. It’s worse than not having a website and not using email because the purchase transaction and the execution mechanism will become more tightly linked—like the Municipal Recreation Department transaction in the above example that was extremely convenient. Automatic payment, service, and payment reminders that follow customers around and are delivered through every form of device and medium will become standard practice.


Customers are morphing marketing, customer service, and product usage contacts at light speed. WiFi, intelligent devices, and personal communication networks are seamlessly linked. Your laptop synchronizes to your phone/PDA/GPS, which synchronizes with your car computer and GPS.

Of course all of this information circulating among devices, passing through airwaves, then passed from system to system and company to company, poses a series of new challenges and problems.


Customer promises

The Evil Twin excerpt presents a number of service, delivery, and product fulfillment challenges for all of the companies and parties involved. Let’s call them customer promises. For example, one of the challenges of the Starbucks’ Wall Street Journal interactive offer plus sweepstakes entry is coordinating the messages, resources, and products to create a highly successful, attention-getting, impulse offer. The offer’s success requires coordination not just across companies but also across devices, media, channels, systems, departments, and functions.

What if Neil shows up at Starbucks window 3, and they don’t have his sandwich? What if the worker at window 3 has no record of the sandwich order, which, incidentally, was debited from his account automatically when he walked up to the counter?


No sandwich = a bad experience. Account debited = a worse experience. Spending time to retrace the offer, order, sweepstakes entry, debit, and credit creates a still worse experience for the customer and the Starbucks employee caught in the middle.

And what happens to the Wall Street Journal pay-for-performance advertising campaign results? Should Neil’s response be pulled out? Just how do you do that when the WSJ system checked that Neil responded . . . and he did?

Is Neil still entered in the contest for the mug?

You might say, “Who cares?” Well, Neil does! And so do the paid sponsors of the mug and advertising promotion who were going to give Neil a mug regardless of the sweepstakes drawing results simply because Neil has a high projected lifetime value for their financial services. They want a piece of Neil’s attention, and they funded the Starbucks discount, the Wall Street Journal advertisement, the mug design, the delivery, and the service. The mug also ensured that the financial services company could promote its services by sending messages programmed to appear on the mug’s screen. The financial services company valued and specifically targeted Neil, and the entire effort was focused on creating a dedicated channel to communicate directly with Neil.


The cost of privacy

In Neil’s story, privacy has a price—or a value. In exchange for verification information, customers share personal information with trusted advisors. In fact, it’s very likely that a whole new industry will spring up in the personal network identification business with businesses responsible for ensuring and monitoring networks, personal data exchanges, commercial transactions, and risk mediation.

As customers and citizens, we will all have to decide whether we want to give up this level of “privacy” in exchange for convenience, entertainment, stimulation, and attention.


How will you configure systems and processes to manage customer demand for personalized offers, logistics, pricing, packaging, delivery, and service? How should you decide which technologies to pursue and which processes to change, adapt, and invest in? What profit gains and cost savings should you expect?

This is the role of the CxC Matrix—a methodology and framework designed to help you plot, visualize, analyze, monetize, prioritize, and optimize all customer contacts customer-by-customer and contact-by-contact.