Skip to content

Proactive Operations Know How to Protect Their "Tappy"

| January 31, 2019 | By

“The Justice Department unsealed two separate indictments of Chinese telecom device maker Huawei on Monday. But only one of them reads like the script of a slapstick caper movie,” writes Laurel Wamsley in their recent NPR article entitled “A Robot Named 'Tappy': Huawei Conspired To Steal T-Mobile's Trade Secrets, Says DOJ.”

“That would be the one that describes the U.S. government's case alleging that Huawei stole trade secrets from T-Mobile, the wireless service company,” explains Wamsley.

“In the indictment, the government says that between June 2012 and September 2014, Huawei repeatedly made efforts to steal information about the design of a T-Mobile robot. The robot's name, adorably, is ‘Tappy,” the article continues.

Wamsley shares, “We would like to include a photo here of Tappy, but photographing the robot is expressly prohibited by T-Mobile, and Tappy is kept under very tight security in a lab at T-Mobile headquarters in Bellevue, Wash.”

According to the NPR article, “Tappy's job is to test devices before they go to market. With a rubber-tipped robotic arm, it touches the device screen, imitating a human using the phone — while at the same time tracking problems, measuring how long tasks take to complete, and monitoring how much battery is drained by each task.”

“At least at the time of the events in the indictment, Tappy was apparently the envy of other mobile companies, and only T-Mobile employees were allowed to operate Tappy. But eventually the company allowed employees from its phone suppliers to access and operate the robot – so long as they signed nondisclosure and confidentiality agreements. Those agreements specifically barred suppliers' employees from attempting to reverse engineer Tappy, or to take photos or videos of it,” continues Wamsley in the piece.

Wamsley continues that “Meanwhile, Huawei China was reportedly trying to build its own device-testing robot — named, less cutely, ‘xDeviceRobot’ — and it was not finding much success. And Huawei's devices weren't faring well on T-Mobile's Tappy tests, failing more often than devices made by competitors.”

Now, chances are you’re not developing a top-secret robot to change the wireless provider game.

But you’ve most certainly got critical data about your customers, operational processes, and any other competitive advantage you’re leveraging.

That’s why it’s important to know how you can protect it.

We believe Proactive Operations that stick to the methodology get it right more times than not – way more than not.

It’s a disciplined way to keep your performance up and your property protected.

Keep reading; we’re going to share how to protect your figurative “Tappy” from others.

What is Your “Tappy”?

First, we should know what your “Tappy” is, right?

We’re talking about that critical information, competitive advantage, or series of processes you use to become increasingly efficient over time.

It could be one thing or many.

That’s up to you, and we’re confident that the Proactive Operations methodology will help.

Why?

It requires that you go through each pillar to understand, establish, and execute.

You start with your Strategy, which is the first pillar and the part you dive into your “Tappy” a bit more.

It’s where you scrutinize your operation.

You’ll do the exercise of asking the tough questions to know what your strengths and weaknesses are.

How does that sound?

So, do you know what makes up your operation’s “Tappy”?

If not, don’t fret.

We think you’ll know and be able to protect whatever that might be after you get the hang of Proactive Operations.

You’ll be a proactive operation in no time!

Protect Your “Tappy” with Proactive Operations

We won’t get into the nitty-gritty of the methodology in this article.

That’s for you to do here.

But we’re going to give you a few things to think about while you’re employing Proactive Operations and moving your operation to a level of performance you need.

Here’s what you need to know:

  • Proactive Operations is a methodology by which property operations utilize strategy, infrastructure, and technology to achieve maximum performance.
  • With Proactive Operations, your organization can manage everything that occurs to ensure a safe and memorable experience for your customers.
  • Unlike reactive operations, Proactive Operations provides you a disciplined framework for streamlining processes, resources, personnel, information, and communication.
  • By continuously examining, improving, and optimizing your operation, you program your ability to manage everything 24/7 365 – proactively.
  • Proactive Operations know how to protect their “Tappy”!

We added that last one just for you.

Over to You

Chinese telecom device maker Huawei’s alleged attempt to steal information about the design of T-Mobile robot, “Tappy,” offers a lesson for operations. Do you know what it is? Protect your “Tappy.”

It might not be a robot you’re protecting, but the concept is all the same. Protect your critical customer information, competitive advantage, and specialized process that keep your operation humming. You can accomplish this by employing a disciplined methodology today – Proactive Operations.

So, are you waiting for someone to steal information about your “Tappy” or are you proactive?

Learn how to employ Proactive Operations using strategy, infrastructure & technology.

Related Blog Posts

Properties Under Attack Have a Likely Ally: Proactive Operations
Proactive Operations

Properties Under Attack Have a Likely Ally: Proactive Operations

January 31, 2019 2 min read
Block Foreign Influence from Affecting Your Property
Proactive Operations

Block Foreign Influence from Affecting Your Property

January 31, 2019 2 min read
What Makes Your Property Unique?
The ACDA Principle

What Makes Your Property Unique?

January 31, 2019 2 min read
View All Posts