The Achilles heel of Amazon’s Business Model.

The Achilles heel of Amazon's Business Model.

Without a doubt, Amazon epitomizes the online retail store. Based on a globally uniform logistics and delivery platform, Amazon has managed to build a captivating online shopping and social experience, and generate 10’s of billions of revenue per year. Looking at The Technology behind the Evolution of Shopping Amazon seems to possess the full enabling technology stack, highly scalable through its cloud-based execution model. In terms of user experience, it is still optimising and simplifying the instant buying process, further accelerating a shift in the way people buy. It is in this relentless optimisation where the Achilles heel of Amazon’s Business Model can be found.

Originally published on Dec 14, 2015. Go to the full article at


2014 in Review.

2014 in Review.

Over the last year Neos Chronos has expanded its reach, with assignments from existing and new clients. We are grateful for the trust and the recognition received for our work. Continuing the tradition started in the last year, our in-house designers took everything we learned and created the 2014 Insights Series booklet. We are happy to share this complimentary booklet with you.

Originally published on May 07, 2015. Go to the full article at

A simple model for Sales Success.

A simple model for Sales Success.

We live in a connected world. Easy access to information, human capital, and production facilities means that “anyone” can replicate a product, service or delivery process. In that context, sales models that are based on presenting and arguing for “unique” value are either failing or, in the best case, challenged to deliver results. In this article we present an alternative sales model that defines the uniqueness of what is offered to a customer in terms of the company’s identity: its purpose, its core values, and the sum of its employees who live and breathe those values towards customers. Focusing on the company’s identity, rather than what a company does and how it does it, results in a simple and highly effective framework for sales success, that is universally applicable and hard to imitate.

Originally published on Mar 30, 2015. Go to the full article at

How to scale a Lean Start-Up.

How to scale a Lean Start-Up.

Entrepreneurs are known for their desire to always search for new ideas, customers and business models. Over the last years a number of methodologies have been developed to help and support this search. In this article, we discuss how to apply Lean Start-Up principles for a purpose they were not initially designed for: moving a company out of start-up mode and scaling into full execution.

Originally published on Mar 09, 2015. Go to the full article at

The Technology behind the Evolution of Shopping.

The Technology behind the Evolution of Shopping.

Understanding what makes life simpler, easier and better for users (be it persons or businesses) is the prerequisite to create compelling and engaging user experiences for them. Starting from the user’s daily life and journey offers a natural way to identify user tasks whose execution can be improved. The inherent clarity of this approach makes it easier to choose the most appropriate technology to create improvements to user experience. As an example, we look at how shopping experience evolved and how technology has enabled this evolution.

Originally published on Feb 12, 2015. Go to the full article at

The practical guide to Enterprise Wi-Fi Calling.

The practical guide to Enterprise Wi-Fi Calling.

Wi-Fi Calling is expected to find wide deployment beyond the US over the course of 2015. Beside consumers, enterprises have a lot to benefit from the new communication access channel. In this article we summarise how enterprises should approach Wi-Fi Calling, compare native to application-based approaches, and provide practical advice on how to choose the right implementation for small, medium and large enterprises.

Originally published on Feb 03, 2015. Go to the full article at

How iTunes could disrupt Mobile Device Management.

How iTunes could disrupt Mobile Device Management.

Realistic fiction scenarios is a method we use in strategy development to inspire new thinking. The approach is fairly simple and thus highly effective: based on technologically and practically feasible assumptions, we employ fictional scenarios to synthesize future use cases. These use cases are then used to highlight and motivate what a business need to do in a specific version of the future to retain market control and / or become more competitive.

We illustrate this technique in the example of iTunes.

Originally published on Dec 15, 2014. Go to the full article at

Wi-Fi Calling market overview.

Wi-Fi Calling market overview.

Wi-Fi Calling is the commercial name for a telecommunication technology that allows to seamlessly place and receive calls over Wi-Fi in areas where there is no mobile coverage. Seamless means that you still use your actual phone number: the person you call, or you receive a call from, will never know. We created a complimentary market overview report (October 2014) that you can download.

Originally published on Oct 24, 2014. Go to the full article at

How Cloud Services impact IT Executives.

How Cloud Services impact IT Executives.

There is a lively ongoing discussion about the approach, the timing and speed of introduction of cloud services into the enterprise workflows. When asked by their business stakeholders, you often hear IT executives state that “the cloud is expensive”, “the cloud is insecure”, “the cloud doesn’t fit to our business model” … These statements fail to appreciate a fundamental paradigm shift. The cloud is now! It is not about if you will move to the cloud but when.

Originally published on Oct 14, 2014. Go to the full article at

A Primer to Business Information Security.

A Primer to Business Information Security.

In a world where customer information and enterprise networks are under constant attack, owning and processing personal and business information requires particular attention to information security. In the case of personal information this is mandatory due to data protection legislation, in the case of business information this is critical to secure competitive advantage.

Originally published on Aug 18, 2014. Go to the full article at