Consultant
User Experience Director

Innovation & Design Leader
User Experience Director
Researcher and Designer

(DLT) Design-Led Transformation
(CX) Customer Experience
(UX) User Experience
(SD) Service Design
(CAi) Conversational

A hands-on user experience director and consultant experienced in revolutionizing customer experiences through design-led digital transformations, structured innovation programs, and exceptional experience and service design.

Leverages a strong foundation in user-centered design and design thinking, leads and builds teams integrating cutting-edge technologies to enhance and improve user experiences across various industries and customer touchpoints. Expertise spans customer/user research, experience design, and journey mapping, ensuring that every interaction is seamless and impactful.

Champions a holistic, end-to-end approach, working closely with cross-functional teams to drive projects from concept to execution. Specializes in design team leadership, guiding teams to excel in customer experience research, journey mapping, interaction design, information architecture, wireframing, and rapid prototyping. Leadership style fosters an environment of innovation and collaboration, empowering teams to deliver exceptional solutions that meet the needs of both users and businesses.

Proficient in process visualization and business communications, ensuring complex ideas are clearly conveyed and effectively implemented. Experience with agile methodologies and data-driven design allows teams to adapt quickly to changing business needs while focusing on delivering exceptional results.

A strong advocate for customers and end-users, ensuring their needs are at the forefront of all design and development processes. Committed to customer experience (CX), User Experience (UX), and service design, continually seeking new ways to innovate and improve, fostering business growth and long-term success.

Insights

Understanding

CX, UX, &
Service Design

The benefits of

Experience
Audits

What is?

Design-Led
Transformation

Project Samples

Patents

us 9,692,758 | issued Jun 27, 2017 

Authentication Techniques Utilizing a Computing Device Service Design

A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a client application on a computing device that is to be utilized as an authentication factor for the MFA service. A computing device enrollment procedure is utilized to enroll the computing device on which the client application was installed for the MFA service. A voice enrollment procedure is utilized to create a voice print for the user of the computing device that is to be utilized as an authentication factor for the MFA service. An authentication procedure is utilized to provide multi-factor authenticated access to a service, such as an online service that provides access to sensitive account information.

us 9,692,758 | issued Jun 27, 2017 

Dynamic Glyph-based Search

A method and apparatus for a dynamic glyph-based search includes an image server. The image server analyzes images to determine the content of an image. The image and data related to the determined content of the image are stored in an image database. A user can access the image server and search images using search glyphs. In response to selection of a generic-search glyph, the image server finds related images in the image database and the images are displayed to the user. In addition, refine-search glyphs are displayed to a user based on the selected generic-search glyph. One or more refine-search glyphs can be selected by a user to further narrow a search to specific people, locations, objects, and other image content.

us 7,849,161 | issued Dec 7, 2010

System and methods for remotely recovering and purging data from a wireless device in a communications network

A system and methods are provided for remotely recovering and purging data from a wireless device in a communications network. The system includes a wireless device capable of executing a data recovery/purge application program for receiving a message from a communications device in the network. The application program retrieves the data in the wireless device, purges the data from the wireless device, and sends a return message, including the data retrieved from the wireless device, to the communications device.

us 7,627,767 | issued Dec 1, 2009

Methods and systems for remotely securing data in a wireless device in a communications network

Methods and systems are provided for remotely securing data in a wireless device. A user sends a data message containing instructions for securing data to a remotely located wireless device. Securing data includes recovering data, purging data, locking the wireless device, and locating the wireless device within a communications network. After the data message is sent, a determination is then made as to whether the wireless device is active in the communications network. If the wireless device is active, the data message is sent to the wireless device. If the wireless device is inactive, the data message is temporarily stored in a database until the wireless device is determined to be active. An application program resident on the wireless device is executed upon receiving the data message to secure the data. The data message also includes instructions for retrieving data for identifying an owner of the wireless device.

Contact

Mobile: 678.522.5858
Email: rob.andres@dmm-adv.com