SlideShare a Scribd company logo
Rakshika Mathur
 Electronic commerce company · often referred
to as simply Amazon, is an American electronic
commerce and cloud computing company. It is
the largest Internet-based retailer in the United
States.
 CEO:Jeff Bezos
 Founded: July 5, 1994,
 Headquarters: Seattle, Washington, United
States
 Amazon Prime Air is a conceptual drone-
based delivery system currently in
development by Amazon.com
 It will use Multirotor miniature unmanned air
vehicle technology to autonomously fly
individual packages to customers’ doorsteps
within 30 min of ordering.
 It is remote controlled robotic vehicles.
 Amazon Prime Air is a future service that will
deliver packages up to five pounds in 30
minutes
 Flying under 400 feet and weighing less than
55 pounds
 Prime Air vehicles will take advantage of
sophisticated “sense and avoid” technology,
as well as a high degree of automation, to
safely operate beyond the line of sight to
distances of 10 miles or more.
 horizontal flight mode
 cover over 15 miles and fly over 55 mph.
 Vertical landing.
 Sense and avoid technology.
 Need a helipad in your garden
 Deliveries will be tricky if you live in a flat
or tower block
 The US Federal Aviation Authority (FAA) has
strict criteria for commercial drone use and
some American politicians have called for the
setting up of a drone register.
Built with multiple Redundancies
“Sense and Avoid” Technology
 Demonstrate safe operations
Automated object detection
GPS surveillance, gigapixel Cameras,
and Enhanced Image Resolution
 It is not legal to fly drones in India.
 Safety issues and security threat.
 Requires DGCA’s permission.
Thank you

More Related Content

What's hot

Amazon India
Amazon IndiaAmazon India
Amazon India
Abhay_018
 
Amazon
Amazon Amazon
Amazon
Hamro PPT
 
Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013
Fabernovel
 
Alibaba Global Strategy
Alibaba Global StrategyAlibaba Global Strategy
Alibaba Global Strategy
Alexandr Kudasov
 
Amazon.com Strategic Analysis
Amazon.com Strategic AnalysisAmazon.com Strategic Analysis
Amazon.com Strategic Analysis
Max Jallifier
 
Amazon 2016
Amazon 2016Amazon 2016
Amazon 2016
Bala Iyer
 
Amazon
AmazonAmazon
Amazon
Ikram Khan
 
Amazon
AmazonAmazon
Amazon
diegohs
 
Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018
Ovidijus Jurevicius
 
amazon case study
amazon case studyamazon case study
amazon case study
Shalaka Sitre
 
Introduction to Online Shopping (e-commerce)
Introduction to Online Shopping (e-commerce)Introduction to Online Shopping (e-commerce)
Introduction to Online Shopping (e-commerce)
Arjun Parekh
 
E- Commerce and Amazon
E- Commerce and AmazonE- Commerce and Amazon
E- Commerce and Amazon
Sourav Patel
 
The Culture of Innovation at Amazon Driving Customer Successes
The Culture of Innovation at Amazon Driving Customer SuccessesThe Culture of Innovation at Amazon Driving Customer Successes
The Culture of Innovation at Amazon Driving Customer Successes
Amazon Web Services
 
AMAZON ECOMMERCE
AMAZON ECOMMERCEAMAZON ECOMMERCE
AMAZON ECOMMERCE
swapnali kanekar
 
AMAZON-CASE STUDY
AMAZON-CASE STUDYAMAZON-CASE STUDY
AMAZON-CASE STUDY
ayushigupta300
 
ebay Case Study
ebay Case Studyebay Case Study
Amazon
Amazon Amazon
Amazon
TnickTrivimol
 
Case study domino's sizzles on MIS
Case study domino's sizzles on MISCase study domino's sizzles on MIS
Case study domino's sizzles on MIS
Samsuddoha Sams
 
Flipkart company analysis and strategic & tactical recommendations
Flipkart  company analysis and strategic & tactical recommendationsFlipkart  company analysis and strategic & tactical recommendations
Flipkart company analysis and strategic & tactical recommendationsSumit K Jha
 

What's hot (20)

Amazon India
Amazon IndiaAmazon India
Amazon India
 
Amazon
Amazon Amazon
Amazon
 
Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013Amazon.com: the Hidden Empire - Update 2013
Amazon.com: the Hidden Empire - Update 2013
 
Amazon supply chain
Amazon supply chainAmazon supply chain
Amazon supply chain
 
Alibaba Global Strategy
Alibaba Global StrategyAlibaba Global Strategy
Alibaba Global Strategy
 
Amazon.com Strategic Analysis
Amazon.com Strategic AnalysisAmazon.com Strategic Analysis
Amazon.com Strategic Analysis
 
Amazon 2016
Amazon 2016Amazon 2016
Amazon 2016
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018Amazon SWOT Analysis 2018
Amazon SWOT Analysis 2018
 
amazon case study
amazon case studyamazon case study
amazon case study
 
Introduction to Online Shopping (e-commerce)
Introduction to Online Shopping (e-commerce)Introduction to Online Shopping (e-commerce)
Introduction to Online Shopping (e-commerce)
 
E- Commerce and Amazon
E- Commerce and AmazonE- Commerce and Amazon
E- Commerce and Amazon
 
The Culture of Innovation at Amazon Driving Customer Successes
The Culture of Innovation at Amazon Driving Customer SuccessesThe Culture of Innovation at Amazon Driving Customer Successes
The Culture of Innovation at Amazon Driving Customer Successes
 
AMAZON ECOMMERCE
AMAZON ECOMMERCEAMAZON ECOMMERCE
AMAZON ECOMMERCE
 
AMAZON-CASE STUDY
AMAZON-CASE STUDYAMAZON-CASE STUDY
AMAZON-CASE STUDY
 
ebay Case Study
ebay Case Studyebay Case Study
ebay Case Study
 
Amazon
Amazon Amazon
Amazon
 
Case study domino's sizzles on MIS
Case study domino's sizzles on MISCase study domino's sizzles on MIS
Case study domino's sizzles on MIS
 
Flipkart company analysis and strategic & tactical recommendations
Flipkart  company analysis and strategic & tactical recommendationsFlipkart  company analysis and strategic & tactical recommendations
Flipkart company analysis and strategic & tactical recommendations
 

Recently uploaded

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Amazon shows off new prime air drone delivery

  • 2.  Electronic commerce company · often referred to as simply Amazon, is an American electronic commerce and cloud computing company. It is the largest Internet-based retailer in the United States.  CEO:Jeff Bezos  Founded: July 5, 1994,  Headquarters: Seattle, Washington, United States
  • 3.  Amazon Prime Air is a conceptual drone- based delivery system currently in development by Amazon.com  It will use Multirotor miniature unmanned air vehicle technology to autonomously fly individual packages to customers’ doorsteps within 30 min of ordering.  It is remote controlled robotic vehicles.
  • 4.
  • 5.  Amazon Prime Air is a future service that will deliver packages up to five pounds in 30 minutes  Flying under 400 feet and weighing less than 55 pounds  Prime Air vehicles will take advantage of sophisticated “sense and avoid” technology, as well as a high degree of automation, to safely operate beyond the line of sight to distances of 10 miles or more.
  • 6.  horizontal flight mode  cover over 15 miles and fly over 55 mph.  Vertical landing.  Sense and avoid technology.
  • 7.
  • 8.  Need a helipad in your garden  Deliveries will be tricky if you live in a flat or tower block  The US Federal Aviation Authority (FAA) has strict criteria for commercial drone use and some American politicians have called for the setting up of a drone register.
  • 9. Built with multiple Redundancies “Sense and Avoid” Technology  Demonstrate safe operations Automated object detection GPS surveillance, gigapixel Cameras, and Enhanced Image Resolution
  • 10.  It is not legal to fly drones in India.  Safety issues and security threat.  Requires DGCA’s permission.