SlideShare a Scribd company logo
1 of 30
Download to read offline
ü 	
  	
  ID Protection
ü  Lost & Recovery
ü  Peace of Mind
About Us!
"
WiMO tagz™ reunites owners with their lost property. "
Tag your luggage, electronics, keys and more, without
revealing your identity. If lost, WiMO helps get them back."
	
  
	
  	
  
Problem!
	
  
Every day, tens of thousands of valuable items are left behind
in airports, taxicabs, coffee shops and other public venues. "
"
Lost & Found departments are bursting with lost items."
"
Studies show that most finders would return the item to its
rightful owner. However, without proper identification a lost
item is rarely returned."
	
  
	
  	
  
Problem - Statistics!
Imagine the grief in losing a Smartphone, Laptop,
Tablet or any other personal belonging.!
"
ü  70 million cell phones lost annually ($3 Billion)"
ü  Approximately one in three phones are lost"
ü 86k laptops & tablet lost annually"
ü 70k pieces of luggage are lost in the US weekly"
ü Nearly 29 million bags were lost in airports worldwide "
	
  
Growing Trend!!
Devices are thinner, lighter and lost more frequently"
	
  
Problem - Replacement Costs!
Smartphone: $400-$700"
Tablet: $400-$900"
Laptop: $700+"
Problem – Replacement Costs!
Smart Keys are expensive.
Replacement costs range from
$220 to $1,000 Edmunds	
  Inc.	
  
	
  
WSJ Article 2012!
Oops! I Forgot My New iPad On the
Plane
“A growing trend…attributed in part to the
iPads' thinness…they are often put-and thus
forgotten-in seat-back pockets. Matching iPads
to owners can be particularly tricky, since the
tablets mostly look alike and password
protection makes it difficult for airlines to
access the owners' details.”
“An ID Tag would greatly help.”
Wall Street Journal
April 2012
WiMO is the Solution!
WiMO increases your chance of
recovery by over 75%!"
"
ü  Fast & Hassle-Free Recovery "
ü  Secure Identity Protection"
ü  24/7 Alerts (via SMS and/or e-mail)"
When you lose a piece of
personal property, you want to get
it back. "
That is what WiMO is all about"
Why WiMO?!
WiMO is about ID protection and retrieval of personal
assets. "
Each tag is encrypted with an individual serial number,
which are stored in a Global Database."
We identify the property and the property owner. "
WiMOʼs Mission !
How it Works!
Recovery	
  of	
  lost	
  items	
  is	
  simple	
  
Value Proposition!
•  Appeals to all customers
•  Complements many store products
•  Easy to merchandise
•  Low price point
•  Potential to go viral
•  Drive sales and profits!
Retailerʼs Benefit! Consumerʼs Benefit!
•  Protect any personal
belogning
•  No Registration fee
•  Free Lifetime Membership
•  Low cost per unit
•  Identity Protection & Product
Identifier
•  Recover lost items
Merchandising!
VERSATILE MERCHANDISING & BIG PROFITS
• impulse buy"
• attractive price"
• great margins"
• clip strips"
• j-peg"
• shelving displays"
• end cap"
• floor displays"
• wing panels"
Packaging	
  
Merchandising!
IN-STORE!
"
Will custom design displays to
showcase the new product
launch."
"
"
Smart	
  Phone	
  Accessories	
  
Retail/Gondola	
  
	
  Packaging	
  System	
  
Merchandising!
Signage!
Competition – Point of Distinction!
Competition – Point of Distinction!
Endless Licensing Opportunities!
OEM	
  &	
  Licensing	
  Op.ons	
  
Appendix!
Mobile Package!
Travel Package!
Tools Package!
Keys Package!
Combo Travelerʼs Package!
WiMO - Retailer Package

More Related Content

Viewers also liked

WiMO - The Storyline
WiMO - The StorylineWiMO - The Storyline
WiMO - The StorylineGoWiMO
 
LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...
LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...
LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...Italo Delavechia
 
University ppt turkey 03_march2015
University ppt turkey 03_march2015University ppt turkey 03_march2015
University ppt turkey 03_march2015Niloy Chowdhury
 
Community Concept voor TMO European Fashion Business School
Community Concept voor TMO European Fashion Business SchoolCommunity Concept voor TMO European Fashion Business School
Community Concept voor TMO European Fashion Business SchoolBert Hovens
 
Sonoma County Wildlife Rescue PR Campaign
Sonoma County Wildlife Rescue PR CampaignSonoma County Wildlife Rescue PR Campaign
Sonoma County Wildlife Rescue PR CampaignEJurbina
 
Empreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedorasEmpreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedorasItalo Delavechia
 
Services brochure 6 april2016-web
Services brochure 6 april2016-webServices brochure 6 april2016-web
Services brochure 6 april2016-webNiloy Chowdhury
 
UMaine clinical faculty orientation guide
UMaine clinical faculty orientation guideUMaine clinical faculty orientation guide
UMaine clinical faculty orientation guideheatherspaulding
 

Viewers also liked (13)

WiMO - The Storyline
WiMO - The StorylineWiMO - The Storyline
WiMO - The Storyline
 
Bio zain test
Bio zain test Bio zain test
Bio zain test
 
LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...
LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...
LOGÍSTICA: A SUA ASCENSÃO EM PLATAFORMAS VIRTUAIS EM PROL DO SEU RECONHECIMEN...
 
Bio Test 35-42
Bio Test 35-42Bio Test 35-42
Bio Test 35-42
 
University ppt turkey 03_march2015
University ppt turkey 03_march2015University ppt turkey 03_march2015
University ppt turkey 03_march2015
 
Community Concept voor TMO European Fashion Business School
Community Concept voor TMO European Fashion Business SchoolCommunity Concept voor TMO European Fashion Business School
Community Concept voor TMO European Fashion Business School
 
Sonoma County Wildlife Rescue PR Campaign
Sonoma County Wildlife Rescue PR CampaignSonoma County Wildlife Rescue PR Campaign
Sonoma County Wildlife Rescue PR Campaign
 
Vinger
VingerVinger
Vinger
 
Unit 2
Unit 2Unit 2
Unit 2
 
Empreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedorasEmpreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedoras
 
Services brochure 6 april2016-web
Services brochure 6 april2016-webServices brochure 6 april2016-web
Services brochure 6 april2016-web
 
UMaine clinical faculty orientation guide
UMaine clinical faculty orientation guideUMaine clinical faculty orientation guide
UMaine clinical faculty orientation guide
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 

Similar to WiMO - Retailer Package

Lost Phones
Lost PhonesLost Phones
Lost PhonesLookout
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Garland Technology
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
Homeless Center Presentation LinkedIn
Homeless Center Presentation LinkedInHomeless Center Presentation LinkedIn
Homeless Center Presentation LinkedInLaura Laidlaw
 
Homeless Center Presentation LinkedIn
Homeless Center Presentation LinkedInHomeless Center Presentation LinkedIn
Homeless Center Presentation LinkedInLaura Laidlaw
 
Mobile Edge Corp Pres 1 11lr
Mobile Edge Corp Pres 1 11lrMobile Edge Corp Pres 1 11lr
Mobile Edge Corp Pres 1 11lrmolivolo
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVijayan Ganapathy
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theftmkinzie
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Teddy Njoroge
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conferenceStoyan Kenderov
 
Do you love to Travel? If so check this out
Do you love to Travel? If so check this outDo you love to Travel? If so check this out
Do you love to Travel? If so check this outVictor Ogunmodede
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Jeff Kershner / Ryan Leslie DSES 2013 Slides
Jeff Kershner / Ryan Leslie DSES 2013 SlidesJeff Kershner / Ryan Leslie DSES 2013 Slides
Jeff Kershner / Ryan Leslie DSES 2013 SlidesDealerRater
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
Ecommerce and the Future
Ecommerce and the FutureEcommerce and the Future
Ecommerce and the FutureMenno Beker
 
At mcard under your skin
At mcard under your skinAt mcard under your skin
At mcard under your skinccdotin
 

Similar to WiMO - Retailer Package (20)

2005 thinking
2005 thinking2005 thinking
2005 thinking
 
Lost Phones
Lost PhonesLost Phones
Lost Phones
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
Homeless Center Presentation LinkedIn
Homeless Center Presentation LinkedInHomeless Center Presentation LinkedIn
Homeless Center Presentation LinkedIn
 
Homeless Center Presentation LinkedIn
Homeless Center Presentation LinkedInHomeless Center Presentation LinkedIn
Homeless Center Presentation LinkedIn
 
Mobile Edge Corp Pres 1 11lr
Mobile Edge Corp Pres 1 11lrMobile Edge Corp Pres 1 11lr
Mobile Edge Corp Pres 1 11lr
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerce
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age.
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conference
 
Do you love to Travel? If so check this out
Do you love to Travel? If so check this outDo you love to Travel? If so check this out
Do you love to Travel? If so check this out
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Jeff Kershner / Ryan Leslie DSES 2013 Slides
Jeff Kershner / Ryan Leslie DSES 2013 SlidesJeff Kershner / Ryan Leslie DSES 2013 Slides
Jeff Kershner / Ryan Leslie DSES 2013 Slides
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Ecommerce and the Future
Ecommerce and the FutureEcommerce and the Future
Ecommerce and the Future
 
At mcard under your skin
At mcard under your skinAt mcard under your skin
At mcard under your skin
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

WiMO - Retailer Package

  • 1. ü     ID Protection ü  Lost & Recovery ü  Peace of Mind
  • 2.
  • 3. About Us! " WiMO tagz™ reunites owners with their lost property. " Tag your luggage, electronics, keys and more, without revealing your identity. If lost, WiMO helps get them back."      
  • 4.
  • 5. Problem!   Every day, tens of thousands of valuable items are left behind in airports, taxicabs, coffee shops and other public venues. " " Lost & Found departments are bursting with lost items." " Studies show that most finders would return the item to its rightful owner. However, without proper identification a lost item is rarely returned."      
  • 6. Problem - Statistics! Imagine the grief in losing a Smartphone, Laptop, Tablet or any other personal belonging.! " ü  70 million cell phones lost annually ($3 Billion)" ü  Approximately one in three phones are lost" ü 86k laptops & tablet lost annually" ü 70k pieces of luggage are lost in the US weekly" ü Nearly 29 million bags were lost in airports worldwide "  
  • 7. Growing Trend!! Devices are thinner, lighter and lost more frequently"  
  • 8. Problem - Replacement Costs! Smartphone: $400-$700" Tablet: $400-$900" Laptop: $700+"
  • 9. Problem – Replacement Costs! Smart Keys are expensive. Replacement costs range from $220 to $1,000 Edmunds  Inc.    
  • 10. WSJ Article 2012! Oops! I Forgot My New iPad On the Plane “A growing trend…attributed in part to the iPads' thinness…they are often put-and thus forgotten-in seat-back pockets. Matching iPads to owners can be particularly tricky, since the tablets mostly look alike and password protection makes it difficult for airlines to access the owners' details.” “An ID Tag would greatly help.” Wall Street Journal April 2012
  • 11. WiMO is the Solution! WiMO increases your chance of recovery by over 75%!" " ü  Fast & Hassle-Free Recovery " ü  Secure Identity Protection" ü  24/7 Alerts (via SMS and/or e-mail)"
  • 12. When you lose a piece of personal property, you want to get it back. " That is what WiMO is all about" Why WiMO?!
  • 13. WiMO is about ID protection and retrieval of personal assets. " Each tag is encrypted with an individual serial number, which are stored in a Global Database." We identify the property and the property owner. " WiMOʼs Mission !
  • 14. How it Works! Recovery  of  lost  items  is  simple  
  • 15. Value Proposition! •  Appeals to all customers •  Complements many store products •  Easy to merchandise •  Low price point •  Potential to go viral •  Drive sales and profits! Retailerʼs Benefit! Consumerʼs Benefit! •  Protect any personal belogning •  No Registration fee •  Free Lifetime Membership •  Low cost per unit •  Identity Protection & Product Identifier •  Recover lost items
  • 16. Merchandising! VERSATILE MERCHANDISING & BIG PROFITS • impulse buy" • attractive price" • great margins" • clip strips" • j-peg" • shelving displays" • end cap" • floor displays" • wing panels"
  • 19. IN-STORE! " Will custom design displays to showcase the new product launch." " " Smart  Phone  Accessories   Retail/Gondola    Packaging  System   Merchandising!
  • 21. Competition – Point of Distinction!
  • 22. Competition – Point of Distinction!
  • 23. Endless Licensing Opportunities! OEM  &  Licensing  Op.ons  

Editor's Notes

  1. Appeals to all customers - Everyone has items they want to protect Complements many of your items – cellphones, laptops, cameras, technology, travel, padfolios, luggage Easy to merchandise with a limited footprint Low price point Significant marketing potential – as it solves a common and relateable problemOther notes: Addresses the growing concern of ID theft. Plus, it addresses the growing problem of lost smart devices.
  2. WIP
  3. Retail & Web combination: Retail will drive awareness, build a brand, and accelerate progress beyond competition (and provide the revenue). Limited competition. We are licensing the concept, thereby encouraging vendors not to compete but rather to participate with us (our core competency).
  4. Retail & Web combination: Retail will drive awareness, build a brand, and accelerate progress beyond competition (and provide the revenue). Limited competition. We are licensing the concept, thereby encouraging vendors not to compete but rather to participate with us (our core competency).