MWC 2018 Report.

MWC 2018 Report.

As part of our annual visit to Mobile World Congress in Barcelona, we asked customers, colleagues and friends to suggest areas of interest for us to focus on during our discussions. In return we promised to, and did share our thoughts and insights from our interactions throughout the event.

With a short delay, you can now access this report as well. It contains topics as

  • Startups: user experience, web and unified communications, sales tools, human resources, end-user security, SME tools, sustainability
  • Enterprises: V by Vodafone, 5G by Ericsson, Testbirds

The report looks at what both large companies and startups do, to help contrast and compare.

Originally published on Mar 7, 2018. Go to the full article at


3 Ways To Evaluate Disruption Potential.

3 Ways To Evaluate Disruption Potential.

In our work as advisors to startup founders, company executives and investors, we are often asked for our opinion on the disruption potential of new service and product ideas. In this article we share 3 questions we use to quickly evaluate an idea’s disruption potential and highlight where the execution and operational focus for a potential investor should be.

Originally published on Jul 28, 2016. Go to the full article at

Polymorphic Service Propositions.

Polymorphic Service Propositions.

What if you could design a service proposition once and use it for multiple customer segments, meeting needs arising in different situations? Then you would have the initial ingredients of what we at Neos Chronos call a “polymorphic service proposition” (abbreviated as PSP). This article provides a quick introduction into the concept and highlights a number of reasons why a CEO, CMO, CTO of a company should care to learn more and act.

Originally published on Apr 21, 2016. Go to the full article at

A Primer to Communications Security.

A Primer to Communications Security.

There are many good reasons behind securing communications within the enterprise and across enterprise borders as part of a company’s Business Information Security strategy. Undoubtedly, “preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients” is mandatory for any enterprise (asset protection) and any individual (privacy protection).

Originally published on Mar 11, 2016. Go to the full article at

The practical guide to Enterprise Wi-Fi Calling.

The practical guide to Enterprise Wi-Fi Calling.

Wi-Fi Calling is expected to find wide deployment beyond the US over the course of 2015. Beside consumers, enterprises have a lot to benefit from the new communication access channel. In this article we summarise how enterprises should approach Wi-Fi Calling, compare native to application-based approaches, and provide practical advice on how to choose the right implementation for small, medium and large enterprises.

Originally published on Feb 03, 2015. Go to the full article at