“The Justice Department unsealed two separate indictments of Chinese telecom device maker Huawei on Monday. But only one of them reads like the script of a slapstick caper movie,” writes Laurel Wamsley in their recent NPR article entitled “A Robot Named 'Tappy': Huawei Conspired To Steal T-Mobile's Trade Secrets, Says DOJ.”
“That would be the one that describes the U.S. government's case alleging that Huawei stole trade secrets from T-Mobile, the wireless service company,” explains Wamsley.
“In the indictment, the government says that between June 2012 and September 2014, Huawei repeatedly made efforts to steal information about the design of a T-Mobile robot. The robot's name, adorably, is ‘Tappy,” the article continues.
Wamsley shares, “We would like to include a photo here of Tappy, but photographing the robot is expressly prohibited by T-Mobile, and Tappy is kept under very tight security in a lab at T-Mobile headquarters in Bellevue, Wash.”
According to the NPR article, “Tappy's job is to test devices before they go to market. With a rubber-tipped robotic arm, it touches the device screen, imitating a human using the phone — while at the same time tracking problems, measuring how long tasks take to complete, and monitoring how much battery is drained by each task.”
“At least at the time of the events in the indictment, Tappy was apparently the envy of other mobile companies, and only T-Mobile employees were allowed to operate Tappy. But eventually the company allowed employees from its phone suppliers to access and operate the robot – so long as they signed nondisclosure and confidentiality agreements. Those agreements specifically barred suppliers' employees from attempting to reverse engineer Tappy, or to take photos or videos of it,” continues Wamsley in the piece.
Wamsley continues that “Meanwhile, Huawei China was reportedly trying to build its own device-testing robot — named, less cutely, ‘xDeviceRobot’ — and it was not finding much success. And Huawei's devices weren't faring well on T-Mobile's Tappy tests, failing more often than devices made by competitors.”
Now, chances are you’re not developing a top-secret robot to change the wireless provider game.
But you’ve most certainly got critical data about your customers, operational processes, and any other competitive advantage you’re leveraging.
That’s why it’s important to know how you can protect it.
We believe Proactive Operations that stick to the methodology get it right more times than not – way more than not.
It’s a disciplined way to keep your performance up and your property protected.
Keep reading; we’re going to share how to protect your figurative “Tappy” from others.
First, we should know what your “Tappy” is, right?
We’re talking about that critical information, competitive advantage, or series of processes you use to become increasingly efficient over time.
It could be one thing or many.
That’s up to you, and we’re confident that the Proactive Operations methodology will help.
Why?
It requires that you go through each pillar to understand, establish, and execute.
You start with your Strategy, which is the first pillar and the part you dive into your “Tappy” a bit more.
It’s where you scrutinize your operation.
You’ll do the exercise of asking the tough questions to know what your strengths and weaknesses are.
How does that sound?
So, do you know what makes up your operation’s “Tappy”?
If not, don’t fret.
We think you’ll know and be able to protect whatever that might be after you get the hang of Proactive Operations.
You’ll be a proactive operation in no time!
We won’t get into the nitty-gritty of the methodology in this article.
But we’re going to give you a few things to think about while you’re employing Proactive Operations and moving your operation to a level of performance you need.
Here’s what you need to know:
We added that last one just for you.
Chinese telecom device maker Huawei’s alleged attempt to steal information about the design of T-Mobile robot, “Tappy,” offers a lesson for operations. Do you know what it is? Protect your “Tappy.”
It might not be a robot you’re protecting, but the concept is all the same. Protect your critical customer information, competitive advantage, and specialized process that keep your operation humming. You can accomplish this by employing a disciplined methodology today – Proactive Operations.
So, are you waiting for someone to steal information about your “Tappy” or are you proactive?