Preview

Creativity and Innovation: Product Development

Powerful Essays
Open Document
Open Document
3002 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Creativity and Innovation: Product Development
CREATIVITY AND INNOVATION
BM006-3-2-CRI
INDIVIDUAL ASSIGNMENT

NAME: HUSSEIN SAID SEIF AL-WAHAIBI
LECTURER: DEVIKA A/P NADARAJAH

Executive Summary
This project is a coursework for the module Creativity and Innovation (CRI). The objective of this assignment as the Product Development Manager of Philips is to introduce a new product to sustain the competitive position of our company in the market place.
In the documentation of this report, a reader will find the techniques of fact finding and defining problems for the purpose of establishing the framework for idea generation. This report also includes the use of the creative tools and techniques in idea generation. Nevertheless, the author of this report will also focus on the evaluation of ideas and making comparison against available alternatives.

Contents

Part I: Problem Statement, Competitor Analysis and Objective Statement
Problem Statement
Human beings tend to forget things. It is a widely common phenomenon that people misplace their keys most of the time and waste a lot of time trying to find and locate them. They even wish that they could at least call their keys so that they can make sound and find the place where it may be hidden.
Competitor Analysis
Bringing this product to the market, the company faces competition from Hone and Hipkey. Both of these are smart key-chains which prevent someone from loosing and misplacing their keys by sounding an alarm on a special circumstance.

Hipkey

Hone
General Overview
Hipkey is a device which is connected to keys as a keychain and an iphone via Bluetooth. Both hipkey and the iphone sound an alarm whenever they are separated at a particular distance. The hipkey is synchronised to a special app in the iphone.
Hone is a Bluetooth enabled smart keychain made in the U.S.A that helps find keys attached to it by using iphone 4s. The hone is synchronised to a special app in the iphone.
Uniqueness
-Works both ways, can be used to



References: Dbrobot.com, Analog Sound Sensor [Online], Available from: [Accessed 27 May 2013]. Litemind, What is Mind Mapping? [Online], Available from: [Accessed 29 May 2013]. MindTools, Scamper [Online], Available from: [Accessed 1 June 2013]. Ehow.com, What are the strengths and weaknesses of Scamper? [Online], Available from: [Accessed 3 June 2013].

You May Also Find These Documents Helpful

  • Good Essays

    Memorial Hermann Health System has also successfully applied wireless applications from AeroScout to track and manage inventory of medical equipment using Radio Frequency Identification, and to wirelessly track and manage medication and supplies, such as surgical kits in operating rooms. Memorial Hermann Health System was able to install a secure network from Aerohive for HIPPA requirement, as well as patient privacy and protection. With built-in features in the HiveOS and HiveManager, Memorial Hermann Health System could easily manage administration of Citrix-powered internal Web-based applications, preventing data to be downloaded into wireless devices, and thus protecting patient data in a situation devices were stolen or information was…

    • 1122 Words
    • 5 Pages
    Good Essays
  • Better Essays

    NETW471 Course Project

    • 2998 Words
    • 9 Pages

    Blue-tooth is a great emerging technology being used today, which also has potential for much more uses than the tradition bluetooth headset. Bluetooth connects gadgets together, helping users listen to music, talk on phones without having to deal with frustrating cords and wires. To understand how a Bluetooth connection works, I will use an example such as a phone connected to wireless speaker. First, each device is equipped with Bluetooth connectivity, a feature that requires both software and hardware components. On the hardware side, an antenna-equipped chip in both devices sends and receives signals at a specific frequency. The software interprets incoming Bluetooth signals and sends them out in ways other devices can read and understand. In the case of the wireless speaker, the phone will know how to send audio files and information in a format that the speaker understands, while the speaker can interpret these signals–as well as other indicators such as volume and track controls–from the phone.…

    • 2998 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Chocoberry Ideation

    • 672 Words
    • 3 Pages

    • What techniques will you propose to CB to generate ideas that can be developed into viable concepts?…

    • 672 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Application Requirements

    • 274 Words
    • 2 Pages

    |Two current applications of WPANs |PDAs and Smart Phones, even tablets using Bluetooth connections. |…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Eng, Paul. "Implant Chip, Track People." ABC News. ABC News Network, 25 Feb. 2014. Web. 07 Mar. 2014. This article discusses the advantages of using the implanted chip. Possibilities of using the chip are to hold medical records, personal info, being a personal tracking device and eventually being used as a virtual wallet. The author feels privacy will ultimately be the problem for this technology,…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    the lock that fits the key. Jonathan Safran Foer, the author of this book, clearly demonstrates the…

    • 2041 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Electronic mobile devices have come to the forefront in many areas of our lives. IPhones, iPads, and Android cell phones keep us in contact with family, friends, and even our physicians. Now it is a common fact that these devices while secure in some ways, these mobile instruments are susceptible to loss or pilfering. In the medical profession, there is an increasing trend to use personal devices instead of the ones provided through the workplace. Medical professionals must take active steps for protect a patient’s ePHIs, or be found in violation of HIPAA rules and regulations.…

    • 1089 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    A keylogger is something that could put your privacy and security at risk. Make sure you learn more about it. Otherwise, you could suffer like Joe Lopez. This is a Florida-based entrepreneur who took the Bank of America to court. The bank had misplaced his $90000. The money appeared to be somewhere in Latvia. After conducting an investigation, Coreflood was the cause. Coreflood is a keylogger Trojan.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Automated Locks: ¿Forgot to lock your door? No problem. Just by touching an icon on your smartphone’s screen, you can make sure all your doors are properly locked… and you can do it from anywhere in the world. Moreover, crooks won’t be able to open your door by using a credit card.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The master key, the ultimate locks pick the skeleton key; regardless the names, all are deadly to any government in the hands of the “wrong” person. Marty Bishop shares my ethical identity, he loves the thrill of breaking into a secure building and cracking the impossible codes of life, but at the same time he does it to help people, this tactic is also known as White-hat hacking.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sesame allows users to control their door with a smartphone app. Connected to users' smartphone via Bluetooth, Sesame allows the phone full control of the lock. With the optional Wi-Fi Access Point that connects to the Internet, users don't even have to be physically near Sesame. This feature allows users to send access to their friends…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cell Phone Theft Indication

    • 20840 Words
    • 84 Pages

    To avoid cell phone theft, this indicator is used. While theft, this cell phone automatically sends SMS to our familiar cell phone number.…

    • 20840 Words
    • 84 Pages
    Satisfactory Essays
  • Good Essays

    Bluetooth Door Lock

    • 2263 Words
    • 10 Pages

    It has been known for some time now that mechanical locks are becoming outdated. Mechanical locks are notoriously easy to lock pick, the quantity of keys limits their use, and they are not convenient to use. The goal of Team Open Sesame is to create a door that is safer and more convenient to use than the conventional mechanical door. Team Open Sesame’s design gives people limited access to a door through their android smartphone’s Bluetooth in the form of a digital key code. The use of a digital key provides more safety than the traditional locking mechanism, as it takes more experience to hack into a password encrypted system than to pick a lock. This design also provides the security of always being locked, until given a quick command to unlock. The goal of almost any piece of technology is to improve on what has been done before. Team Open Sesame’s door is easier to use, is more secure, and has infinite keys.…

    • 2263 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Mobile devices have been a part of our everyday life. Consequently, Security is becoming increasingly prominent features on mobile devices. In this project we will develop a jail security system that interface with an Android mobile device. The mobile device and jail security system communicate via WI-FI. The mobile application can be interface with the security system. Commands to lock, unlock, or check the status of the door, to turn on/off the alarm, to increase/decrease the fencing power supply, control of surveillance to which the security system is installed can be sent quickly from the mobile device via a simple, easy to use GUI. The security system that acts on these commands taking the appropriate action and sending a confirmation back to the mobile device. The security system also incorporates a traditional lock and key interface in case lose the mobile device.…

    • 963 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    • provides high level security not based on keeping the algorithm a secret, but rather upon ignorance of the secret key…

    • 2451 Words
    • 10 Pages
    Powerful Essays