“Can I book you for a two-hour meeting so we can start sketching out your customer's journey?” This is not a question that a telco operator normally hears. But it was exactly this question that we asked the Head of Product at Nortel - a mobile operator targeting small and medium-sized businesses in Norway.
Vxt is on a mission to eradicate boring tasks. Now they’re joining Working Group Two’s product marketplace.
Vxt, a technology communications company in New Zealand, will be adding their voicemail product to Working Group Two’s marketplace. Their aim is to increase visibility and distribution with mobile operators on Working Group Two’s platform.
Voxist to join the Working Group Two marketplace
Voxist - a smart and personalized voicemail product for mobile - will be joining Working Group Two’s marketplace. This means that mobile operators on the Working Group Two platform will soon be able to make Voxist available to their subscribers.
We are releasing our first production-ready gRPC APIs!
At wgtwo we have been offering public APIs for a long time using major version zero.
They have been great for playing around with and we have learned a lot about what we actually need. So now its time to step up our game.
We are releasing our first production ready gRPC APIs!
How I leveraged the 80/20 principle to rebuild wgtwo.com
For a company that provides an innovative solution across the telecommunication sector, I believe it is essential to have a web presence that effectively communicates our vision. This blog post illustrates my approach to taking the content of our existing website and transforming it into a completely new online presence, what it is today. This is the story of leveraging the Pareto 80/20 Principle to effectively portray wgtwo as the innovative telco brand it is.
Manual on Me: Matt Long
As I was waking up this morning, I started surfing Reddit. One post, in particular, jumped out at me. In this post, the writer (OP in Reddit parlance) had been asked to take a personality test at work by a new supervisor. The OP was asking if this was something they should agree to do.
The responses varied. Some were mildly positive, but most were very cynical since this sort of testing can be misused by bad management. However, this got me thinking and, eventually, writing this post.
Don't leave a message after the beep
Think quickly: When was the last time you dialed into your voicemail to listen to a message someone had left for you? Chances are, it’s been a while. The common view is that voicemail isn’t popular any longer. That’s both true and not true, depending on how you look at it. Find out where voicemail - loved by some and hated by others - is heading.
The specs behind the specs part 1
"Abstract Syntax Notation One (ASN.1) is a standard interface description language for defining data structures that can be serialized and deserialized in a cross-platform way." - Wikipedia
Zero-day vulnerabilities - Log4j
On Friday, December 10th, wgtwo and many others became aware of a critical severity zero-day exploit, CVE-2021-44228, known as “Log4Shell” in the Log4j library, which is widely used in numerous systems around the internet. We immediately opened a security incident and have been actively taking steps to mitigate and monitor the situation.
CKH IOD selects Working Group Two for public cloud core network

- As an industry-first, CKH IOD migrates its core network to the cloud – delivered as a fully managed software-as-a-service by Working Group Two and deployed on AWS
- A cloud-based core network brings radical simplification, cost efficiency and a platform to leverage a developer community – to drive innovation and capitalize on disruptive technologies