Beruflich Dokumente
Kultur Dokumente
Contents
Team summary
4
5
6
7
8
Team Summary
The original concept of improving network connectivity by having devices contribute
towards the strength of a network has expanded to an even bolder one such that consumers
will be able to access this type of technology through their very own mobile devices through
a Wi-Fi emitting chip or sticker. The physical form of the network strengthener is still being
decided upon, whether it be manufactured into the device or sold separately as an individual
attachment. Going into these interviews, we sought to nd answers to this question and
many more, such as the feasibility of the actual product, concerns of partnering with big
name tech manufacturers, and how to protect our technology and its users from a cyber
security standpoint.
A common theme throughout the interviews was their reaction to our seemingly
boisterous claim of the capabilities we are envisioning for the nal product. Overall, the
interviewees were pleased to see our group have an idea that could well be possible in the
next decade, claiming it showed our forward thinking and initiative to focus our project on
the capabilities of external network connectivity, but there was much criticism that followed
the praise. It became apparent that the optimistic solution to our problem was characterized
in a way that was too complex to realistically be functional. As we later learned, the practical
solutions given by these IT professionals were easier for us to understand and, in the end,
deemed less problematic in terms of the obstacles we would have to face when coming up
with a prototype for our product. As noted by Li Hui Palevich, we should focus our eorts onto
a single device and work with it until success in terms of keeping our device functional and
secure in order to make it the best that it can be. However, in another discussion, Kajal Rohilla
suggested approaching a dierent problem entirely due to our time restraint and the
complexity of solving the task at hand. Kathleen Jungck also added the point that as long as
what we do with our technology adheres to standard encryption protocols and is produced
either here or in an ally country that would hold our own privacy above their spying interests,
we should be in good production shape. Jan Eveleth cautioned that the technology should
not disrupt the network connectivity of other users. Additionally, through our interviews we
furthered our understanding of who we are trying to sell to and how our means of doings so
would aect not only our market, but also our own business. It was interesting how Stacy
Peterson suggested that we not only seek prot by retailing the device itself, but also make
money from secondary users who are connected to the primary users strong signal. It is an
enticing idea, no doubt, however that may lead to more complications in terms of how we
monetize that aspect of our product and how our primary users may feel about charging
those around them for their better signal.
Going forward, we are going to have to come to a decision on the aspect of the device
becoming an external or internal feature. Throughout the interviews, there were many
dierent perspectives brought up on this aspect by the range of professionals. Because of
this, our deliverable could be presented towards either tech manufacturers capable of putting
our chip into devices, or towards big box retailers or cell phone companies to whom we can
sell it as an external add on to a device. As with any innovation, there will be drawbacks and
skepticism in the actual creation of the product; however, with the information that was
presented to us we have furthered our knowledge and will focus our product accordingly to
position this endeavor strategically.
3