SlideShare a Scribd company logo
1 of 12
Download to read offline
Summer Internship Project
April –May 2014
Presentation by:
Amar Girdhar
131304
Study of Market Potential of Home
Automation, Security Systems and
Digital Standalone in Delhi region
Corporate Mentors:
Mr. Sai Prasad
Ms. Bhavana Patel
Faculty Mentor :
Dr. Anamika Sinha
10th July, 2014
Flow of Presentation :
1.Background
2.About the company
3.Objectives of Project
4.Literature Review
5.Research methods used
6.Field work
7.Data Analysis
8.Recommendations
9.Personal Learnings
Background
• use of computer and information technology
to control home appliances and features such
as windows or lighting
• range from simple remote control of lighting
through to complex devices with varying
degrees of intelligence and automation
• "Internet of Things"
• slow to take off
• smartphones and tablets
About the company1. Established in 1989
2. Privately owned organisation
3. Field of building Automation as focus core area.
4. Motto : “Design and Develop Indigenous
Technology to improve Life Style, Communication
and Security to the utmost level”.
5. Products (ISO 9001-2000 certified) : Automation
systems – Lighting / AV / Security
• Building Intercom and security systems upto 4096
apartments
• Video Apartment systems with 4 zone security
• Stand-Alone video Door phone
• Visitor Tracking system
• Guard Patrol system
• Lighting Control Touch Panels
Objective of Project
To run an awareness campaign among the Constructors, Builders and
Architects in Delhi region about the home automation products and
security systems manufactured by NCC Telecom Pvt. Ltd.
aka
To generate leads
LITERATURE REVIEW
Brush et al. (2011) in their paper entitled “Home Automation in the wild: Challenges and
Opportunities” studied about the four barriers that need to be addressed before home
automation becomes amenable to broader adoption. They found the four barriers to be
high cost of ownership, inflexibility, poor manageability and difficulty achieving security.
Ahemed et al. (2011) in their paper entitled “Implementing Computerized and
Digitally Mobile Home Automation System towards Electric Appliance Control and
Security System” addressed on the importance of home automation system as compared
to the old and traditional living systems.
Elshafee et al. (2012) in their paper entitled “Design and Implementation of a WiFi Based
Home Automation System”. Scalability is easier .
Type of Research:
Qualitative research is done as asked by the organisation.
Data Collection:
Primary Data: Collected by field work. 125 meetings were done in a period of 8 weeks
during Summer Internship with the various Architects, Builders and Constructors in
Delhi Region.
Secondary Data: Data needed apart from the responses from various clients is
collected by books and Internet.
Data Collection Method:
Daily report is being sent to the organisation to verify and feedback is taken to
improve the survey.
Qualitative research is done in a structured manner by the survey done on a verbal
basis with the clients.
Research Methods used
Field Work:
Various Architects, Builders and Constructors in Delhi/Gurgaon region are called first to take
appointment for the meetings.
All appointments are done on daily basis.
I told them about the company NCC Telecom and what business it is in. Then a demo of
Digital standalone is shown to them and they are being told about the Home Automation
Systems products that company manufactures.
They are asked for the feedback of products, competitors, current scenario, future scope, if
they need any product, their requirements and which product they are currently using and
their feedback about that product.
I covered various regions in Delhi/Gurgaon for the survey – Karol Bagh, Nehru Place, Malviya
Nagar, Saket. Katwariya Sarai, Sector 14 Gurgaon, Sushant Lok Gurgaon, DLF Phase 1 Gurgaon
etc which helped in doing competition and product analysis.
In all 125 meetings are done and 61 leads are generated for the organisation
Data Analysis
Recommnedations :
Reasons for sale’s growth
Increasing crime rates
Low faith in the law enforcement forces
Rise in general education & awareness
Growth Obstructions
Absence of Security Systems Standards
Low level of local manufacturing
Poor installation & after-sales-service support
Undervalued Imports and the active ‘Grey Market’.
Self-motivation
Presentation skills
Presence of mind
Art of negotiation & closure
Understanding the requirements of
clients & offering solutions as per
requirements
Personal
learnings
Thank you!
Special thanks to Dr. Anamika for
continuous motivation.

More Related Content

What's hot

Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Paul Fechtelkotter
 
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.techbyte2014
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless MobilityControlEng
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsThe IOT Academy
 
Arpan pal uworld2013
Arpan pal uworld2013Arpan pal uworld2013
Arpan pal uworld2013Arpan Pal
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives Eurotech
 
Day1 Trina Ward
Day1 Trina WardDay1 Trina Ward
Day1 Trina WardUS-Ignite
 
Tomella Young Chronological Resume
Tomella Young Chronological ResumeTomella Young Chronological Resume
Tomella Young Chronological ResumeTomella Young
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industryRohana K Amarakoon
 
Remote auditing: the pros and cons
Remote auditing: the pros and consRemote auditing: the pros and cons
Remote auditing: the pros and consIllumeo
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTEurotech
 

What's hot (20)

Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
What is IoT | The Structure of IoT | Future of IoT
What is IoT | The Structure of IoT | Future of IoTWhat is IoT | The Structure of IoT | Future of IoT
What is IoT | The Structure of IoT | Future of IoT
 
Architectural reference model
Architectural reference modelArchitectural reference model
Architectural reference model
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
 
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
 
IT for the Construction Industry
IT for the Construction IndustryIT for the Construction Industry
IT for the Construction Industry
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and Applications
 
Arpan pal uworld2013
Arpan pal uworld2013Arpan pal uworld2013
Arpan pal uworld2013
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives
 
Day1 Trina Ward
Day1 Trina WardDay1 Trina Ward
Day1 Trina Ward
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Tomella Young Chronological Resume
Tomella Young Chronological ResumeTomella Young Chronological Resume
Tomella Young Chronological Resume
 
M.tech ieee projects
M.tech ieee projectsM.tech ieee projects
M.tech ieee projects
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industry
 
Remote auditing: the pros and cons
Remote auditing: the pros and consRemote auditing: the pros and cons
Remote auditing: the pros and cons
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoT
 

Similar to Study of Market Potential of Home Automation, Security Systems and Digital Standalone in Delhi region

Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applicationsedwinlorenzana
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductSalesforce Developers
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
LinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech ResearchLinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech ResearchLinkedIn
 
Information Security System Essay
Information Security System EssayInformation Security System Essay
Information Security System EssayChristi Miller
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Internet Society
 
Scaling Training Data for AI Applications
Scaling Training Data for AI ApplicationsScaling Training Data for AI Applications
Scaling Training Data for AI ApplicationsApplause
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeMark Underwood
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Agile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App DevelopmentAgile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App DevelopmentAnyPresence
 
Taking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying ProcessTaking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying ProcessLinkedIn
 
Market Potential of Home Automation
Market Potential of Home AutomationMarket Potential of Home Automation
Market Potential of Home AutomationDinna Dsouza
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...
Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...
Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...Saïd Assar
 

Similar to Study of Market Potential of Home Automation, Security Systems and Digital Standalone in Delhi region (20)

Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
LinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech ResearchLinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech Research
 
Information Security System Essay
Information Security System EssayInformation Security System Essay
Information Security System Essay
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6
 
Scaling Training Data for AI Applications
Scaling Training Data for AI ApplicationsScaling Training Data for AI Applications
Scaling Training Data for AI Applications
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Agile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App DevelopmentAgile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App Development
 
Taking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying ProcessTaking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying Process
 
Market Potential of Home Automation
Market Potential of Home AutomationMarket Potential of Home Automation
Market Potential of Home Automation
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...
Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...
Towards a Visual Modeling Approach to Manage the Impact of Digital Transforma...
 

Recently uploaded

Run more experiments with fewer resources
Run more experiments with fewer resourcesRun more experiments with fewer resources
Run more experiments with fewer resourcesVWO
 
A_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdfA_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdfVWO
 
The best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdfThe best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdfShifali roy
 
Top 15 Emerging Technologies for the Modern World
Top 15 Emerging Technologies for the Modern WorldTop 15 Emerging Technologies for the Modern World
Top 15 Emerging Technologies for the Modern WorldD Cloud Solutions
 
Product Demo: HubSpot's Coolest AI Tools for B2B Tech Companies
Product Demo: HubSpot's Coolest AI Tools for B2B Tech CompaniesProduct Demo: HubSpot's Coolest AI Tools for B2B Tech Companies
Product Demo: HubSpot's Coolest AI Tools for B2B Tech CompaniesKiwi Creative
 
Amazon Seller New Product Launch Guide - 2024.pptx
Amazon Seller New Product Launch Guide - 2024.pptxAmazon Seller New Product Launch Guide - 2024.pptx
Amazon Seller New Product Launch Guide - 2024.pptxWill Haire
 
The Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoadThe Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoadFabio Bin
 
Ice Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling ResearchIce Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling ResearchTINT Marketing
 
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch DeckPodvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch DeckNedko Nedkov
 
Digital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEMDigital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEMNazal Digital
 
TAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdf
TAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdfTAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdf
TAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdfSocial Samosa
 
Harnessing Social Media for Marketing Growth
Harnessing Social Media for Marketing GrowthHarnessing Social Media for Marketing Growth
Harnessing Social Media for Marketing Growthabinashdm2014
 
Voltas turnaround strategy management case
Voltas turnaround strategy management caseVoltas turnaround strategy management case
Voltas turnaround strategy management caseAnkit Sarkar
 
ToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptx
ToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptxToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptx
ToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptxivanrazine1
 
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Elevate Your Design Skills: Enroll in Pune's Premier UI/UX Design Course
Elevate Your Design Skills: Enroll in Pune's Premier UI/UX Design CourseElevate Your Design Skills: Enroll in Pune's Premier UI/UX Design Course
Elevate Your Design Skills: Enroll in Pune's Premier UI/UX Design Courseamirshaikhv21realtyp
 
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...Sophie Logan
 
A navigation of two creative processes Study
A navigation of two creative processes StudyA navigation of two creative processes Study
A navigation of two creative processes Studystuwilson.co.uk
 
Fashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdfFashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdfUttara University
 
Podvertise.fm - Founder.University - Pitch Deck 2024
Podvertise.fm - Founder.University - Pitch Deck 2024Podvertise.fm - Founder.University - Pitch Deck 2024
Podvertise.fm - Founder.University - Pitch Deck 2024Nedko Nedkov
 

Recently uploaded (20)

Run more experiments with fewer resources
Run more experiments with fewer resourcesRun more experiments with fewer resources
Run more experiments with fewer resources
 
A_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdfA_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdf
 
The best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdfThe best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdf
 
Top 15 Emerging Technologies for the Modern World
Top 15 Emerging Technologies for the Modern WorldTop 15 Emerging Technologies for the Modern World
Top 15 Emerging Technologies for the Modern World
 
Product Demo: HubSpot's Coolest AI Tools for B2B Tech Companies
Product Demo: HubSpot's Coolest AI Tools for B2B Tech CompaniesProduct Demo: HubSpot's Coolest AI Tools for B2B Tech Companies
Product Demo: HubSpot's Coolest AI Tools for B2B Tech Companies
 
Amazon Seller New Product Launch Guide - 2024.pptx
Amazon Seller New Product Launch Guide - 2024.pptxAmazon Seller New Product Launch Guide - 2024.pptx
Amazon Seller New Product Launch Guide - 2024.pptx
 
The Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoadThe Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoad
 
Ice Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling ResearchIce Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling Research
 
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch DeckPodvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
 
Digital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEMDigital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEM
 
TAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdf
TAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdfTAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdf
TAM AdEx-A Pixelated view into Digital Advertising Trends for Y 2023.pdf
 
Harnessing Social Media for Marketing Growth
Harnessing Social Media for Marketing GrowthHarnessing Social Media for Marketing Growth
Harnessing Social Media for Marketing Growth
 
Voltas turnaround strategy management case
Voltas turnaround strategy management caseVoltas turnaround strategy management case
Voltas turnaround strategy management case
 
ToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptx
ToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptxToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptx
ToShare_UG 13_03_24_Full_BelgianTrailblazerCommunity.pptx
 
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
 
Elevate Your Design Skills: Enroll in Pune's Premier UI/UX Design Course
Elevate Your Design Skills: Enroll in Pune's Premier UI/UX Design CourseElevate Your Design Skills: Enroll in Pune's Premier UI/UX Design Course
Elevate Your Design Skills: Enroll in Pune's Premier UI/UX Design Course
 
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
 
A navigation of two creative processes Study
A navigation of two creative processes StudyA navigation of two creative processes Study
A navigation of two creative processes Study
 
Fashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdfFashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdf
 
Podvertise.fm - Founder.University - Pitch Deck 2024
Podvertise.fm - Founder.University - Pitch Deck 2024Podvertise.fm - Founder.University - Pitch Deck 2024
Podvertise.fm - Founder.University - Pitch Deck 2024
 

Study of Market Potential of Home Automation, Security Systems and Digital Standalone in Delhi region

  • 1. Summer Internship Project April –May 2014 Presentation by: Amar Girdhar 131304 Study of Market Potential of Home Automation, Security Systems and Digital Standalone in Delhi region Corporate Mentors: Mr. Sai Prasad Ms. Bhavana Patel Faculty Mentor : Dr. Anamika Sinha 10th July, 2014
  • 2. Flow of Presentation : 1.Background 2.About the company 3.Objectives of Project 4.Literature Review 5.Research methods used 6.Field work 7.Data Analysis 8.Recommendations 9.Personal Learnings
  • 3. Background • use of computer and information technology to control home appliances and features such as windows or lighting • range from simple remote control of lighting through to complex devices with varying degrees of intelligence and automation • "Internet of Things" • slow to take off • smartphones and tablets
  • 4. About the company1. Established in 1989 2. Privately owned organisation 3. Field of building Automation as focus core area. 4. Motto : “Design and Develop Indigenous Technology to improve Life Style, Communication and Security to the utmost level”. 5. Products (ISO 9001-2000 certified) : Automation systems – Lighting / AV / Security • Building Intercom and security systems upto 4096 apartments • Video Apartment systems with 4 zone security • Stand-Alone video Door phone • Visitor Tracking system • Guard Patrol system • Lighting Control Touch Panels
  • 5. Objective of Project To run an awareness campaign among the Constructors, Builders and Architects in Delhi region about the home automation products and security systems manufactured by NCC Telecom Pvt. Ltd. aka To generate leads
  • 6. LITERATURE REVIEW Brush et al. (2011) in their paper entitled “Home Automation in the wild: Challenges and Opportunities” studied about the four barriers that need to be addressed before home automation becomes amenable to broader adoption. They found the four barriers to be high cost of ownership, inflexibility, poor manageability and difficulty achieving security. Ahemed et al. (2011) in their paper entitled “Implementing Computerized and Digitally Mobile Home Automation System towards Electric Appliance Control and Security System” addressed on the importance of home automation system as compared to the old and traditional living systems. Elshafee et al. (2012) in their paper entitled “Design and Implementation of a WiFi Based Home Automation System”. Scalability is easier .
  • 7. Type of Research: Qualitative research is done as asked by the organisation. Data Collection: Primary Data: Collected by field work. 125 meetings were done in a period of 8 weeks during Summer Internship with the various Architects, Builders and Constructors in Delhi Region. Secondary Data: Data needed apart from the responses from various clients is collected by books and Internet. Data Collection Method: Daily report is being sent to the organisation to verify and feedback is taken to improve the survey. Qualitative research is done in a structured manner by the survey done on a verbal basis with the clients. Research Methods used
  • 8. Field Work: Various Architects, Builders and Constructors in Delhi/Gurgaon region are called first to take appointment for the meetings. All appointments are done on daily basis. I told them about the company NCC Telecom and what business it is in. Then a demo of Digital standalone is shown to them and they are being told about the Home Automation Systems products that company manufactures. They are asked for the feedback of products, competitors, current scenario, future scope, if they need any product, their requirements and which product they are currently using and their feedback about that product. I covered various regions in Delhi/Gurgaon for the survey – Karol Bagh, Nehru Place, Malviya Nagar, Saket. Katwariya Sarai, Sector 14 Gurgaon, Sushant Lok Gurgaon, DLF Phase 1 Gurgaon etc which helped in doing competition and product analysis. In all 125 meetings are done and 61 leads are generated for the organisation
  • 10. Recommnedations : Reasons for sale’s growth Increasing crime rates Low faith in the law enforcement forces Rise in general education & awareness Growth Obstructions Absence of Security Systems Standards Low level of local manufacturing Poor installation & after-sales-service support Undervalued Imports and the active ‘Grey Market’.
  • 11. Self-motivation Presentation skills Presence of mind Art of negotiation & closure Understanding the requirements of clients & offering solutions as per requirements Personal learnings
  • 12. Thank you! Special thanks to Dr. Anamika for continuous motivation.