Welcome! I’m Rob I uncover what customers
truly need, want, and expect.
I show businesses the big picture
by visualizing the end-to-end customer journey
and supporting technologies.
I identify pain points and design
better ways for customers to interact.
I use customer research and
design thinking to drive
impactful product decisions.
I collaborate with business leaders
and IT teams to turn ideas
into real tools and systems.
I am an
AI-Driven Experience
& Product Strategy Leader
I Help Organizations Innovate
Through UX, CX, Visual Storytelling,
VR/AR & Emerging Technologies
I am skilled in leveraging
emerging technologies to drive
innovative, market-leading
digital experiences.
I help businesses
improve customer experience and
streamline business processes
I lead teams or directly deliver
customer research, experience design,
and service design solutions.

Patents

us 9,692,758 | issued Jun 27, 2017

Authentication Techniques Utilizing a Computing Device Service Design

A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a client application on a computing device that is to be utilized as an authentication factor for the MFA service. A computing device enrollment procedure is utilized to enroll the computing device on which the client application was installed for the MFA service. A voice enrollment procedure is utilized to create a voice print for the user of the computing device that is to be utilized as an authentication factor for the MFA service. An authentication procedure is utilized to provide multi-factor authenticated access to a service, such as an online service that provides access to sensitive account information.

us 9,692,758 | issued Jun 27, 2017

Dynamic Glyph-based Search

A method and apparatus for a dynamic glyph-based search includes an image server. The image server analyzes images to determine the content of an image. The image and data related to the determined content of the image are stored in an image database. A user can access the image server and search images using search glyphs. In response to selection of a generic-search glyph, the image server finds related images in the image database and the images are displayed to the user. In addition, refine-search glyphs are displayed to a user based on the selected generic-search glyph. One or more refine-search glyphs can be selected by a user to further narrow a search to specific people, locations, objects, and other image content.

us 7,849,161 | issued Dec 7, 2010

System and methods for remotely recovering and purging data from a wireless device in a communications network

A system and methods are provided for remotely recovering and purging data from a wireless device in a communications network. The system includes a wireless device capable of executing a data recovery/purge application program for receiving a message from a communications device in the network. The application program retrieves the data in the wireless device, purges the data from the wireless device, and sends a return message, including the data retrieved from the wireless device, to the communications device.

us 7,627,767 | issued Dec 1, 2009

Methods and systems for remotely securing data in a wireless device in a communications network

Methods and systems are provided for remotely securing data in a wireless device. A user sends a data message containing instructions for securing data to a remotely located wireless device. Securing data includes recovering data, purging data, locking the wireless device, and locating the wireless device within a communications network. After the data message is sent, a determination is then made as to whether the wireless device is active in the communications network. If the wireless device is active, the data message is sent to the wireless device. If the wireless device is inactive, the data message is temporarily stored in a database until the wireless device is determined to be active. An application program resident on the wireless device is executed upon receiving the data message to secure the data. The data message also includes instructions for retrieving data for identifying an owner of the wireless device.

Contact

Mobile: 678.522.5858
Email: [email protected]