Apple is considering introducing a new spill-proof laptop. A conjoint analysis was conducted with 32 students to determine consumer preferences for laptop attributes and the potential demand for a spill-proof laptop. The attributes tested were screen size, RAM size, hard drive space, price, operating system, and whether the laptop was spill-proof. Based on the part-worth utilities, consumers preferred larger screen sizes, more RAM, and the Mac operating system. While a spill-proof feature was preferred, the utility was not significantly higher than other attributes to recommend its introduction alone. The most important attribute was screen size.
This document discusses various applications of computer graphics including computer-aided design (CAD), visualization, animation, and computer games. It then describes the frame buffer, which stores pixel information for the screen in memory. Finally, it explains two basic line drawing algorithms - the digital differential analyzer (DDA) line drawing algorithm and Bresenham's line drawing algorithm. The DDA algorithm calculates pixel coordinates by incrementing x or y values based on the slope of the line, while Bresenham's algorithm optimizes for integer coordinates.
Structured Vs, Object Oriented Analysis and DesignMotaz Saad
This document discusses structured vs object-oriented analysis and design (SAD vs OOAD) for software development. It outlines the phases and modeling techniques used in SAD like data flow diagrams, decision tables, and entity relationship diagrams. It also outlines the phases and modeling techniques used in OOAD like use cases, class diagrams, sequence diagrams, and state machine diagrams. The document compares key differences between SAD and OOAD, discusses textbooks on software engineering and UML, and references papers on using UML in practice and evaluating the impact and costs/benefits of UML in software maintenance.
The document discusses requirements analysis and specifications. It provides examples of different types of requirements like functional, non-functional, user, and system requirements. It also describes various requirement elicitation techniques like interviews, brainstorming sessions, FAST, quality function deployment, and use case approach. Context and data flow diagrams are discussed as models for representing requirements. Data dictionaries are described as repositories for defining data items. Finally, entity-relationship modeling is introduced as a way to visually represent entities, attributes, and relationships in a database.
This document is a seminar report submitted by Ganesh Waghmare on the topic of Android OS. It contains chapters covering features of the Android OS, its architecture, application framework, libraries, runtime, kernel and more. The report was submitted to fulfill degree requirements at MAEER's MIT College of Engineering, Pune, under the guidance of Prof. Sukhada Bhingarkar. It includes an acknowledgment, table of contents, and glossary related to Android OS.
1. The document discusses the properties of elements in Groups V and VI of the periodic table, including nitrogen, phosphorus, arsenic, antimony, and bismuth.
2. It describes the electronic configurations of these elements based on their positions in the periodic table, and explains their periodic trends in properties like atomic radius, ionization energy, and electronegativity.
3. The document also discusses the importance of these elements in agriculture and industry, as well as their roles in environmental chemistry.
This document provides an overview of use case diagrams and use cases. It defines what a use case is, including that it captures a user's interaction with a system to achieve a goal. It describes the key components of a use case diagram, including actors, use cases, and relationships between use cases like generalization, inclusion, and extension. An example use case diagram for a money withdrawal from an ATM is presented to illustrate these concepts. Guidelines for documenting use cases with descriptions of flows, exceptions, and other details are also provided.
This document discusses various techniques for estimating software costs:
1. Expert judgment relies on experienced people's assessments but can be unreliable due to biases. The Delphi technique improves expert judgment by anonymously aggregating estimates over multiple rounds.
2. Work breakdown structures break projects down into components to estimate costs bottom-up. The COCOMO model also estimates bottom-up using algorithmic formulas adjusted by multipliers for attributes.
3. COCOMO is demonstrated through an example estimating effort of 191 person-months and a 13 month schedule for a 30,000 line embedded software project with high reliability requirements.
Control flow testing is a white box testing technique that uses the program's control flow graph to design test cases that execute different paths through the code. It involves creating a control flow graph from the source code, defining a coverage target like branches or paths, generating test cases to cover the target, and executing the test cases to analyze results. It is useful for finding bugs in program logic but does not test for missing or extra requirements.
This document discusses various applications of computer graphics including computer-aided design (CAD), visualization, animation, and computer games. It then describes the frame buffer, which stores pixel information for the screen in memory. Finally, it explains two basic line drawing algorithms - the digital differential analyzer (DDA) line drawing algorithm and Bresenham's line drawing algorithm. The DDA algorithm calculates pixel coordinates by incrementing x or y values based on the slope of the line, while Bresenham's algorithm optimizes for integer coordinates.
Structured Vs, Object Oriented Analysis and DesignMotaz Saad
This document discusses structured vs object-oriented analysis and design (SAD vs OOAD) for software development. It outlines the phases and modeling techniques used in SAD like data flow diagrams, decision tables, and entity relationship diagrams. It also outlines the phases and modeling techniques used in OOAD like use cases, class diagrams, sequence diagrams, and state machine diagrams. The document compares key differences between SAD and OOAD, discusses textbooks on software engineering and UML, and references papers on using UML in practice and evaluating the impact and costs/benefits of UML in software maintenance.
The document discusses requirements analysis and specifications. It provides examples of different types of requirements like functional, non-functional, user, and system requirements. It also describes various requirement elicitation techniques like interviews, brainstorming sessions, FAST, quality function deployment, and use case approach. Context and data flow diagrams are discussed as models for representing requirements. Data dictionaries are described as repositories for defining data items. Finally, entity-relationship modeling is introduced as a way to visually represent entities, attributes, and relationships in a database.
This document is a seminar report submitted by Ganesh Waghmare on the topic of Android OS. It contains chapters covering features of the Android OS, its architecture, application framework, libraries, runtime, kernel and more. The report was submitted to fulfill degree requirements at MAEER's MIT College of Engineering, Pune, under the guidance of Prof. Sukhada Bhingarkar. It includes an acknowledgment, table of contents, and glossary related to Android OS.
1. The document discusses the properties of elements in Groups V and VI of the periodic table, including nitrogen, phosphorus, arsenic, antimony, and bismuth.
2. It describes the electronic configurations of these elements based on their positions in the periodic table, and explains their periodic trends in properties like atomic radius, ionization energy, and electronegativity.
3. The document also discusses the importance of these elements in agriculture and industry, as well as their roles in environmental chemistry.
This document provides an overview of use case diagrams and use cases. It defines what a use case is, including that it captures a user's interaction with a system to achieve a goal. It describes the key components of a use case diagram, including actors, use cases, and relationships between use cases like generalization, inclusion, and extension. An example use case diagram for a money withdrawal from an ATM is presented to illustrate these concepts. Guidelines for documenting use cases with descriptions of flows, exceptions, and other details are also provided.
This document discusses various techniques for estimating software costs:
1. Expert judgment relies on experienced people's assessments but can be unreliable due to biases. The Delphi technique improves expert judgment by anonymously aggregating estimates over multiple rounds.
2. Work breakdown structures break projects down into components to estimate costs bottom-up. The COCOMO model also estimates bottom-up using algorithmic formulas adjusted by multipliers for attributes.
3. COCOMO is demonstrated through an example estimating effort of 191 person-months and a 13 month schedule for a 30,000 line embedded software project with high reliability requirements.
Control flow testing is a white box testing technique that uses the program's control flow graph to design test cases that execute different paths through the code. It involves creating a control flow graph from the source code, defining a coverage target like branches or paths, generating test cases to cover the target, and executing the test cases to analyze results. It is useful for finding bugs in program logic but does not test for missing or extra requirements.
The document discusses different modeling techniques used in software engineering. It describes data modeling, functional modeling, and behavioral modeling. Data modeling involves creating entity relationship diagrams and data dictionaries. Functional modeling uses data flow diagrams to show how data moves through processes. Behavioral modeling uses state transition diagrams to represent a system's states and transitions between states. The modeling techniques help describe requirements, design software, and validate systems.
The document contains slides from a lecture on software engineering. It discusses definitions of software and software engineering, different types of software applications, characteristics of web applications, and general principles of software engineering practice. The slides are copyrighted and intended for educational use as supplementary material for a textbook on software engineering.
Estimacion basada en puntos de casos de usodianitadance
Este documento describe el método de estimación de proyectos de software conocido como Puntos de Casos de Uso (UCP). Explica que el método involucra clasificar la complejidad de las interacciones entre actores y casos de uso, calcular la complejidad de cada caso de uso, y sumar los valores para obtener los Puntos de Casos de Uso sin ajustar (UUCP). Luego, se calculan factores de ajuste para la complejidad técnica y el ambiente, los cuales se usan para ajustar los UUCP y obtener los Puntos de
Rumbaugh's Object Modeling Technique (OMT) is an object-oriented analysis and design methodology. It uses three main modeling approaches: object models, dynamic models, and functional models. The object model defines the structure of objects in the system through class diagrams. The dynamic model describes object behavior over time using state diagrams and event flow diagrams. The functional model represents system processes and data flow using data flow diagrams.
1. Las pruebas de software incluyen pruebas de unidad, integración, validación y del sistema, siendo cada una más amplia en alcance.
2. Las pruebas de unidad comprueban cada módulo de forma aislada, las de integración verifican la interfaz entre módulos, y las de validación evalúan el software completo frente a los requisitos.
3. Finalmente, las pruebas del sistema integran el software con el hardware y otros componentes para probar el rendimiento general del producto terminado.
Mobile applications have become essential as 80% of time on mobile devices is spent using apps. Mobile apps are distributed through app stores and available on smartphones, tablets and other devices. Websites are outdated so customers demand updated mobile apps that are easily accessible with a click. Some key types of mobile apps include paid apps, freemium apps, and free apps. Mobile apps are important for businesses to increase exposure, build loyalty, enhance branding and drive sales. When selecting a mobile app developer, factors like portfolio, culture, marketing expertise, and capabilities should be considered. Social Squared is an app development company that has created addictive apps like GET 75, Binary Puzzle and Modi Wins using technologies like Java and XML.
The document discusses various software testing techniques, including white-box testing and black-box testing. It provides characteristics of testable software such as being operable, observable, controllable, decomposable, simple, stable, and understandable. It also discusses test characteristics such as having a high probability of finding errors, not being redundant, and being "best of breed". Specific white-box and black-box testing techniques are then outlined.
Boundary value analysis is a technique used to test software at the boundaries or edges of different input conditions or equivalence partitions. It aims to find errors that occur at boundary values by testing a range of inputs including values that are minimum, maximum, just above or below the boundaries. The document provides examples of applying boundary value analysis to test different conditions for a password field length, age criteria for military service, postal rate calculations based on letter weight, and an application to determine if a job candidate can be hired based on their age. Boundary value analysis involves determining equivalence partitions, identifying the corresponding boundary values, and designing test cases that evaluate inputs at these boundary points.
Introduces Mobile Operating Systems and goes deeply on Android OS presenting the different layers, developing basics and boot process. Also presents some hardware related topics.
Android technology- Advantages & LimitationsVaibhav Dixit
Android is an open-source software platform and operating system based on a modified version of the Linux kernel. It was developed by Android Inc. which was purchased by Google in 2005. Android is used in mobile devices like smartphones and tablets and allows developers to write applications for the operating system using Java. It supports connectivity through cellular data networks as well as Wi-Fi and Bluetooth. Some key features of Android include a customizable interface, access to millions of third-party apps, and support for various media formats.
This document provides an overview of object oriented analysis and design (OOAD) and the software development process. It discusses common problems faced by software industries, quality attributes, measures of software quality, and the major steps of software development including analysis, design, implementation, testing and refinement. It also describes different software development life cycle models like waterfall, prototyping, spiral, and rapid application development. Business modeling, data modeling, process modeling, and application generation are discussed as part of the rapid application development model. Testing and system turnover are highlighted as important steps to reduce risks.
List of Software Development Model and MethodsRiant Soft
RiantSoft a Software Development Company derived the most useful and different types of Software Development Model for the users who want to know the development process. RiantSoft is specialized in custom software development with latest cutting edge technologies.
The document discusses software products and product engineering. It defines software products as generic systems that provide functionality to a range of customers, from business systems to personal apps. Product engineering methods have evolved from custom software engineering techniques. The key aspects of product development are that there is no external customer generating requirements, and rapid delivery is important to capture the market. Product managers are responsible for planning, development, and marketing software products throughout their lifecycle.
This document is a lecture introduction to object oriented analysis and design (OOA/D) at the University of Education Okara. It discusses key topics that will be covered in the course, including applying the Unified Modeling Language (UML), assigning responsibilities to objects, requirements analysis, use cases, the Unified Process (UP) methodology, and the differences between object oriented analysis, design and implementation. The goal is for students to learn skills in analyzing requirements and designing object-oriented systems using standard best practices.
This document provides an overview and introduction to the book "Software Engineering: A Hands-On Approach" by Roger Y. Lee. The book aims to teach key principles of software engineering through hands-on learning and a project-based approach. It uses common tools like the Unified Modeling Language and object-oriented design patterns. The book is divided into two parts - the first introduces software engineering concepts, and the second guides readers through a software project from requirements to implementation and testing. The goal is to help students bridge the gap between academic learning and real-world practice of software engineering.
The Spiral Development Model is a systems development method used in information technology that combines prototyping and the waterfall model. It involves defining the problem, creating preliminary designs and prototypes, evaluating strengths/weaknesses of prototypes, and iteratively improving prototypes until the customer is satisfied, at which point the final system is constructed, tested, and maintained. It allows estimates to become more realistic as work progresses and is easier to cope with typical software changes than traditional lifecycle models.
This document outlines a software requirement specification (SRS) for a software system. It defines what an SRS is, including that it provides a complete description of the system's behavior and documents interactions between users and the software. The document also describes the key components of an SRS, including functionality, objectives, requirements, and constraints. It explains that an SRS is important as the official contract between developers and users, and serves as the basis for further system development. Finally, it provides an outline for the structure and contents of a full SRS document.
UML (Unified Modeling Language) is a standard modeling language used to specify, visualize, and document software systems. It uses graphical notations to model structural and behavioral aspects of a system. Common UML diagram types include use case diagrams, class diagrams, sequence diagrams, and state diagrams. Use case diagrams model user interactions, class diagrams show system entities and relationships, sequence diagrams visualize object interactions over time, and state diagrams depict object states and transitions. UML aims to simplify the complex process of software design through standardized modeling.
The document discusses various techniques for functional testing, including boundary value testing, equivalence class testing, decision table-based testing, and robustness testing. It provides details on decision tables, including their structure, usage, examples, and methodology for development. Decision tables present conditions and corresponding actions in a matrix format and can be used to both specify complex program logic and generate test cases.
The objective of this presentation is to demonstrate how well we understand the marketing research practices taught by Prof. David Rice at Schulich School of Business, York University in Toronto, Canada.
Our MBA Pricing Strategy final project analyzed the Internet TV set top box market We surveyed 50 consumers and segmenting the respondents based on their utility values for a series of features for Apple and Google TV devices. From these results we projected each vendors market share and recommending product and pricing strategies.
The document discusses different modeling techniques used in software engineering. It describes data modeling, functional modeling, and behavioral modeling. Data modeling involves creating entity relationship diagrams and data dictionaries. Functional modeling uses data flow diagrams to show how data moves through processes. Behavioral modeling uses state transition diagrams to represent a system's states and transitions between states. The modeling techniques help describe requirements, design software, and validate systems.
The document contains slides from a lecture on software engineering. It discusses definitions of software and software engineering, different types of software applications, characteristics of web applications, and general principles of software engineering practice. The slides are copyrighted and intended for educational use as supplementary material for a textbook on software engineering.
Estimacion basada en puntos de casos de usodianitadance
Este documento describe el método de estimación de proyectos de software conocido como Puntos de Casos de Uso (UCP). Explica que el método involucra clasificar la complejidad de las interacciones entre actores y casos de uso, calcular la complejidad de cada caso de uso, y sumar los valores para obtener los Puntos de Casos de Uso sin ajustar (UUCP). Luego, se calculan factores de ajuste para la complejidad técnica y el ambiente, los cuales se usan para ajustar los UUCP y obtener los Puntos de
Rumbaugh's Object Modeling Technique (OMT) is an object-oriented analysis and design methodology. It uses three main modeling approaches: object models, dynamic models, and functional models. The object model defines the structure of objects in the system through class diagrams. The dynamic model describes object behavior over time using state diagrams and event flow diagrams. The functional model represents system processes and data flow using data flow diagrams.
1. Las pruebas de software incluyen pruebas de unidad, integración, validación y del sistema, siendo cada una más amplia en alcance.
2. Las pruebas de unidad comprueban cada módulo de forma aislada, las de integración verifican la interfaz entre módulos, y las de validación evalúan el software completo frente a los requisitos.
3. Finalmente, las pruebas del sistema integran el software con el hardware y otros componentes para probar el rendimiento general del producto terminado.
Mobile applications have become essential as 80% of time on mobile devices is spent using apps. Mobile apps are distributed through app stores and available on smartphones, tablets and other devices. Websites are outdated so customers demand updated mobile apps that are easily accessible with a click. Some key types of mobile apps include paid apps, freemium apps, and free apps. Mobile apps are important for businesses to increase exposure, build loyalty, enhance branding and drive sales. When selecting a mobile app developer, factors like portfolio, culture, marketing expertise, and capabilities should be considered. Social Squared is an app development company that has created addictive apps like GET 75, Binary Puzzle and Modi Wins using technologies like Java and XML.
The document discusses various software testing techniques, including white-box testing and black-box testing. It provides characteristics of testable software such as being operable, observable, controllable, decomposable, simple, stable, and understandable. It also discusses test characteristics such as having a high probability of finding errors, not being redundant, and being "best of breed". Specific white-box and black-box testing techniques are then outlined.
Boundary value analysis is a technique used to test software at the boundaries or edges of different input conditions or equivalence partitions. It aims to find errors that occur at boundary values by testing a range of inputs including values that are minimum, maximum, just above or below the boundaries. The document provides examples of applying boundary value analysis to test different conditions for a password field length, age criteria for military service, postal rate calculations based on letter weight, and an application to determine if a job candidate can be hired based on their age. Boundary value analysis involves determining equivalence partitions, identifying the corresponding boundary values, and designing test cases that evaluate inputs at these boundary points.
Introduces Mobile Operating Systems and goes deeply on Android OS presenting the different layers, developing basics and boot process. Also presents some hardware related topics.
Android technology- Advantages & LimitationsVaibhav Dixit
Android is an open-source software platform and operating system based on a modified version of the Linux kernel. It was developed by Android Inc. which was purchased by Google in 2005. Android is used in mobile devices like smartphones and tablets and allows developers to write applications for the operating system using Java. It supports connectivity through cellular data networks as well as Wi-Fi and Bluetooth. Some key features of Android include a customizable interface, access to millions of third-party apps, and support for various media formats.
This document provides an overview of object oriented analysis and design (OOAD) and the software development process. It discusses common problems faced by software industries, quality attributes, measures of software quality, and the major steps of software development including analysis, design, implementation, testing and refinement. It also describes different software development life cycle models like waterfall, prototyping, spiral, and rapid application development. Business modeling, data modeling, process modeling, and application generation are discussed as part of the rapid application development model. Testing and system turnover are highlighted as important steps to reduce risks.
List of Software Development Model and MethodsRiant Soft
RiantSoft a Software Development Company derived the most useful and different types of Software Development Model for the users who want to know the development process. RiantSoft is specialized in custom software development with latest cutting edge technologies.
The document discusses software products and product engineering. It defines software products as generic systems that provide functionality to a range of customers, from business systems to personal apps. Product engineering methods have evolved from custom software engineering techniques. The key aspects of product development are that there is no external customer generating requirements, and rapid delivery is important to capture the market. Product managers are responsible for planning, development, and marketing software products throughout their lifecycle.
This document is a lecture introduction to object oriented analysis and design (OOA/D) at the University of Education Okara. It discusses key topics that will be covered in the course, including applying the Unified Modeling Language (UML), assigning responsibilities to objects, requirements analysis, use cases, the Unified Process (UP) methodology, and the differences between object oriented analysis, design and implementation. The goal is for students to learn skills in analyzing requirements and designing object-oriented systems using standard best practices.
This document provides an overview and introduction to the book "Software Engineering: A Hands-On Approach" by Roger Y. Lee. The book aims to teach key principles of software engineering through hands-on learning and a project-based approach. It uses common tools like the Unified Modeling Language and object-oriented design patterns. The book is divided into two parts - the first introduces software engineering concepts, and the second guides readers through a software project from requirements to implementation and testing. The goal is to help students bridge the gap between academic learning and real-world practice of software engineering.
The Spiral Development Model is a systems development method used in information technology that combines prototyping and the waterfall model. It involves defining the problem, creating preliminary designs and prototypes, evaluating strengths/weaknesses of prototypes, and iteratively improving prototypes until the customer is satisfied, at which point the final system is constructed, tested, and maintained. It allows estimates to become more realistic as work progresses and is easier to cope with typical software changes than traditional lifecycle models.
This document outlines a software requirement specification (SRS) for a software system. It defines what an SRS is, including that it provides a complete description of the system's behavior and documents interactions between users and the software. The document also describes the key components of an SRS, including functionality, objectives, requirements, and constraints. It explains that an SRS is important as the official contract between developers and users, and serves as the basis for further system development. Finally, it provides an outline for the structure and contents of a full SRS document.
UML (Unified Modeling Language) is a standard modeling language used to specify, visualize, and document software systems. It uses graphical notations to model structural and behavioral aspects of a system. Common UML diagram types include use case diagrams, class diagrams, sequence diagrams, and state diagrams. Use case diagrams model user interactions, class diagrams show system entities and relationships, sequence diagrams visualize object interactions over time, and state diagrams depict object states and transitions. UML aims to simplify the complex process of software design through standardized modeling.
The document discusses various techniques for functional testing, including boundary value testing, equivalence class testing, decision table-based testing, and robustness testing. It provides details on decision tables, including their structure, usage, examples, and methodology for development. Decision tables present conditions and corresponding actions in a matrix format and can be used to both specify complex program logic and generate test cases.
The objective of this presentation is to demonstrate how well we understand the marketing research practices taught by Prof. David Rice at Schulich School of Business, York University in Toronto, Canada.
Our MBA Pricing Strategy final project analyzed the Internet TV set top box market We surveyed 50 consumers and segmenting the respondents based on their utility values for a series of features for Apple and Google TV devices. From these results we projected each vendors market share and recommending product and pricing strategies.
This document presents a new product development project for leather shoes in the Indian market. It discusses the Indian footwear industry and leather shoe market. The project aims to study consumer preferences for leather shoes based on attributes like price, brand, shape, heel, and lace. Conjoint analysis and multi-dimensional scaling will be used to analyze preferences for different attribute levels and map consumer perceptions. A survey was conducted with 20 choice cards to determine the relative importance of attributes and identify the most preferred product concepts.
Why Customers Buy | Conjoint Analysis: Unlocking the Secret to What Your Cu...Qualtrics
Conjoint analysis is the key to unlocking the value customers place on different feature of a given product, service, or experience. Join us as we explore five different types of conjoint analysis and discuss how you can use them to let your customers do the talking.
Modeling Online Hotel Choice: Conjoint analysis as a multivariate alternative...SKIM
How can researchers best investigate what drives online purchase decisions? Currently, A/B-tests of isolated features on two otherwise identical versions of a website are the gold standard for testing online purchase environments. Despite its simplicity, A/B-testing is tedious since only a single feature can be changed at a time and possible interactions between features are not accounted for.
In their presentation, Christine and Paulo examined whether conjoint analysis can be used as a multivariate alternative to A/B-testing. Choice-based conjoint is a powerful method to analyze purchase decisions as it allows for optimization across various attributes and levels. While in most conjoint applications attributes and levels pertain to the product itself, the method can also be applied to optimizing the user interface (where elements are placed, how they are designed and executed, the use of rankings, reviews, and promotions). With the application of choice-based conjoint, we can test which booking site features impact purchase decisions for hotel accommodation.
Find out more at www.skimgroup.com/gor-2015
Learn how to do a conjoint analysis project in 1 hrQuestionPro
Survey Analytics provides conjoint analysis software to help companies evaluate new products and variations of existing products. The software allows users to define product attributes and levels, conduct surveys to assess consumer preferences, and analyze results. Key features include an intuitive interface for setting up studies, previewing concepts, and reviewing utility values and relative importance of attributes. The software also includes a market segmentation simulator that allows predicting how changes to products may impact market share. Conjoint analysis provides a cost-effective way to test concepts without full product development and can help optimize offerings to meet consumer demands.
The document provides a brief history of Apple Inc., describing how Steve Jobs and Steve Wozniak started the company in 1976 after Wozniak designed the Apple I computer. It then discusses the success of the Apple II in 1977 and the increased sales from the introduction of the Apple Disk II floppy drive in early 1978. Finally, it notes that as the company grew larger in the 1980s with the Apple III, it began hiring more experienced managers and investors who helped transform Apple into a "real company".
Full strategic case analysis for Apple incorporation including industry , competitor's and firm's self analysis. It covers all the strategic issues facing the industry and Apple inc. as well as the recommended solutions for these issues on business and corporate levels.
The study shows the development on the Apple Inc. mission& vision and the strategic objectives over time.
Business statistics research on consumer behaviourKhem Singh
The survey collected data from 77 respondents on their preferences and opinions regarding laptop purchases. Key findings include:
- Dell was the most preferred brand at 27 respondents, followed by Apple at 18.
- The most popular budget range was Rs. 30,000-40,000, chosen by 40 respondents.
- Over 50% preferred a screen size of 13-14 inches.
- Work and study were the most common purchase reasons, cited by 46 respondents each.
- After sales service was considered very important by 69% of respondents.
1) The memo analyzes competitive tablets on the market, focusing on the iPad Mini, Kindle Fire HD, and Nexus 7.
2) It finds that while the iPad Mini has the best design and camera quality, it has the highest price point starting at $329, compared to the Kindle Fire HD starting at $199 and Nexus 7 starting at $199-$299.
3) The memo concludes that the deciding factor for most consumers is their intended use of the tablet (entertainment, productivity, etc.), as well as which company's services they prefer - Apple, Amazon, or Google.
The marketing plan summarizes Microsoft's strategy for the Surface Pro 3 tablet. Key points include:
- The goal is to drive customers to purchase Microsoft software by filling a niche in the tablet/laptop market.
- The Surface Pro 3 is positioned as a device that can replace both a tablet and laptop at a lower combined cost. It is targeted at middle to upper class note-takers and content creators.
- Microsoft faces competition primarily from Apple's iPad/Macbook lineup. However, the Surface Pro 3 differentiates itself by being a true laptop replacement with a full-sized OS, ports and screen in a tablet form factor.
- The document discusses a marketing research project conducted by a team for Apple to understand customer satisfaction with the latest iOS 10 update and how it compares to competitor operating systems like Android.
- A survey of 38 students found that while overall satisfaction with iOS 10 was high, Android scored higher on certain features like GPS maps. Battery life, interface design, and maps were most important to customers.
- The recommendations include prioritizing improvements to interface, battery life, and maps for iOS 11 and focusing marketing efforts on brand prestige and appealing to potential switchers from Android.
The document discusses the rise and fall of Blackberry compared to Apple. It explains that Blackberry was initially popular for its secure email and physical keyboard but failed to adapt to changing consumer tastes. In contrast, Apple succeeded through innovative products like the iPhone that integrated hardware, software and apps to provide a seamless user experience. The document then analyzes Apple's success using Porter's five forces model, noting its high barriers to entry, strong network effects, and ability to differentiate its products in the "blue ocean" of opportunities.
This document discusses Lenovo's strategies for achieving dominance in the corporate notebook computer market. It analyzes Lenovo's current 19% market share inherited from its acquisition of IBM's notebook division. While Lenovo faces competition from HP and Dell who control larger market shares, the document suggests strategies for Lenovo to maintain and improve its position, such as focusing on high-end products and marketing mid-range laptops to become a "one-stop shop" for corporate customers. It also considers spinning off the Thinkpad brand under a new name to avoid associations with lower quality Chinese brands as Lenovo loses rights to the IBM name.
This document discusses Lenovo's strategies for dominance in the corporate notebook computer market. It analyzes Lenovo's current 19% market share inherited from its acquisition of IBM's notebook division. While Lenovo competes with HP and Dell who control larger market shares, losing the IBM brand name poses challenges. The document recommends Lenovo focus on high-end Thinkpad products, market mid-range laptops to corporations, and potentially spin off the Thinkpad brand under a new name to maintain perceptions of quality without IBM branding. A SWOT analysis and discussion of competitors' strategies is also provided.
Tablets: is aviation ready for the post-pc era - Singapore 2011Paul Saunders
Here's the keynote presentation that I gave at the Aircraft Commerce Airline & Aerospace MRO & Operators IT Conference in Singapore on the 19th October 2011
This document summarizes research on tablet usage and the iPad market in early 2011. It finds that tablets were being adopted faster than any other mobile device, with over 28 million iPads sold in 2010. While tablet usage was still small compared to other devices, many companies were preparing to launch their own tablets to compete with the iPad. The document also examines the demographics of iPad users and how the iPad was being used, finding that most users spent 1-5 hours per day on activities like web browsing, email and apps.
Running head: APPLE ENVIRONMENTSL SCAN 1
Running head: APPLE’S ENVIRONMENTSL SCAN 4
Title
By
Apple’s Environmental Scan
Economic factors and trends
Apple is one of the fastest growing companies that had blossomed into a well recognizable consumer name for electronic devices globally. Apple operations depend and performance significantly on global and regional economic conditions (Apple Inc., 2016). Their components are manufactured in other countries. Some of these countries include, Korea, Japan and Taiwan, but their products are assembled in China (Wright, A., 2012). Even those Apple is seen as a status symbol of financial stability for the elite and others, there are many others that built their self-esteem off of owning Apple products. Unemployment is a big key factor in the financial dealing with Apple’s products. In 2015, economists are projecting that unemployment rate will fall to a low of about 4.7% by the end of 2016 (Zumbrun, J., 2015). Their predictions were close, as of the end of October of 2016; unemployment rate in the United States was at 4.9% (U.S. Bureau of Labor Statistics, 2016).
Political, Regulatory and legal factors and trends
Earlier this year, Apple wrestled with the U.S. Government over unlocking a suspected terrorist Iphone. The FBI and the U.S. Department of Justice, solicited Apple as the suspect has a code on their phone. Apple’s Iphones enables users to set up a passcode to lock out intruders. If the code is entered incorrectly in excess of ten times, then the phone will automatically delete the data on it. Apple’s fear was that by the government requesting them to unlock this one phone, that this was a privacy violation (Rash, W., 2016). These fears of Apples became the same-shared views among iphone users. Giving the government access would allow them to future access for any reason.
Societal factors and trends
A person’s family, friends and even colleagues can serve as a strong contributor to a person’s choice of mobile phone. Today’s youth are more into electronics. Teenagers have more economic clout than that of their predecessors (Grant, I.J., and Graeme R.S., 2006).
Technological factors and trends
The survival and the competitiveness of Apple Inc. is a result of its ability to innovate new technologies. Since the time of its formation, they have relentlessly developed new technologies. It started at the lowest point, but is now one of the top technology companies. The success of the company is attributable to strong and favorable internal environment, which entails such elements as the organizational structure, culture, mission and vision and also the coordination among different departments within the company (O'Grady, 2009). Apple Inc. has a culture of innovation and invention (O'Grady, 2009).
It is a company that is capable of producing a steady stream of innovative products an ...
We will make a project for Laptop price prediction. The problem statement is that if any user wants to buy a laptop then our application should be compatible to provide a tentative price of laptop according to the user configurations.
Although it looks like a simple project or just developing a model, the dataset we have is noisy and needs lots of feature engineering, and preprocessing that will drive your interest in developing this project.
Get more for your money with Lenovo ThinkPad, ThinkBook, and ThinkCentre devicesPrincipled Technologies
We compared eight Lenovo Think laptops, 2-in-1, and desktops with 12th Gen and 13th Gen Intel Core processors to their Apple Mac counterparts
Conclusion
When it comes to selecting a laptop, 2-in-1, or desktop for you or your workforce, there are many factors at play. In our hands-on evaluation of Lenovo Think business devices with 12th and 13th Gen Intel Core processors and similarly configured Apple Mac devices, we found the Lenovo Think systems offered a range of advantages in performance and user experience.
The document analyzes market research data to understand user preferences for Microsoft Mobile's next phone features. Questionnaires and focus groups were conducted with 100 respondents. Cluster, factor, and ANOVA analyses found high priority is placed on hardware like battery and RAM across all incomes. Software preferences vary by income and operating system, but music store, office suite, and RAM were significant for different OS users. The data suggests Microsoft should improve its app selection to attract non-users while continuing to provide favored home screen and office suite features.
Steve Jobs has done an excellent job performing the five tasks of strategic management as Apple's CEO. He has established a strong strategic vision, set objectives to achieve that vision, crafted strategies to implement the objectives, executed the strategies effectively, and monitored performance and made adjustments when needed. Under Jobs' leadership, Apple has expanded into new industries like digital music and mobile phones very successfully, establishing strong competitive advantages in these areas through superior products, marketing, and brand management. However, competition remains quite intense in the PC industry, holding Apple back from achieving similar dominance.
This document provides a literature review and background on factors that influence student purchase decisions regarding laptops. It discusses 5 previous studies that identified various important factors such as price, brand, features, mobility, functionality, and the influence of friends. The document also provides an overview of the laptop industry in India, major brands, and current market share trends. It aims to understand which factors most significantly impact student purchasing behavior to help marketers better target this demographic.
This document provides an overview of Apple Inc.'s microeconomics presentation. It introduces the team members and describes Apple's key products, markets, history, competitors, revenue streams, and pricing structures. It also discusses how COVID-19 impacted Apple's production, sales, and stores. In closing, it references Samsung as a new competitor entering the smartphone market and lists sources.
The document discusses a study on the electronic devices used by industrial design students at the University of Santo Tomas. It aims to identify the most common gadgets, how long students use them, and if they have brand preferences. The methodology involves surveying 30 students about the types and brands of gadgets they use, how these help their studies, and how long they use gadgets each day. Preliminary results found that many students have 3 gadgets, are comfortable with 3 brands, use gadgets for research and schoolwork, and typically use them for 6-12 hours daily. The Apple brand was identified as most popular among respondents.
The document discusses a study on the types of electronic gadgets used by industrial design students at the University of Santo Tomas. It aims to determine the most common gadgets, how long students use them, and if they have brand preferences. The methodology involves surveying 30 students about the gadgets they use, brands, and how the gadgets help with their studies. Preliminary results found that 12 students use 3 gadgets, 14 are comfortable with 3 brands, and gadgets are mostly used for 6-12 hours per day for research and schoolwork, with Apple being the most popular brand.
Similar to Apple Conjoint Analysis -Spillproof Laptops (20)
1. Spill-proof Laptop Study:
A Conjoint Analysis for Apple
Prepared in MKT 402 (Consumer Behavior)
Arizona State University / W.P. Carey School of Business
Professor John Lastovicka
Nicole Baron Dietrich
Wesley Berg
Anna Bayles Depp
Matthew Lawler
Geyang Li
Noah Oropeza
Nicholas Sfreddo
2. Introduction
Problem
Apple is one of the largest technology designers and the creators of devices such as the
iPhone, iPad, Mac notebooks and desktop computers. In the third calendar quarter of 2014,
Apple reached its highest Laptop market share ever reported. The company gained ground with
13.4 percent of the US Laptop market, edging out Lenovo to grab the number three spot behind
HP (27.7 percent) and Dell (24 percent). Although Apple has been gaining ground on its
competitors in the US, they are looking to remain competitive by introducing a new product with
a spill-proof feature.
In order for Apple to move forward with this new product, management requires research
data to support the product’s potential sales. Although Apple has an extensive internal marketing
department, they chose to outsource this project in order to administer a full conjoint analysis on
the market. This study considers laptops’ attributes and attribute levels that allow definition of
new product possibilities from Apple as well as existing competitors’ products. Apple has
decided to stick to its premium price point because of their highly established brand equity. They
have recently innovated spill-proof casing for their product line. The product look or weight is
not different either. The following study will simulate its effect on the market and will allow us
to determine if introducing spill-proof computers will be beneficial to Apple.
Attributes/Levels
The new laptop that Apple is particularly interested in introducing is currently priced at
$1000, and comes in a 13-inch screen, with a RAM size of 4GB, total hard drive space of
250GB, and is run by a Mac operating system. Not to mention the new attribute, which is the
ability to withstand spills. Other attributes and prices being tested in the analysis are shown in
Table 1.1. After consulting Apple’s main competitors, pricing is set at either $600 or $1000. The
laptops possible screen sizes vary from 11” to 13” to 15” with the largest being 17”. Among the
competitors, three levels of storage are offered for both RAM size and total hard space. We
chose these sizes because these are the most standard sizes in the industry and the core sizes
demanded by consumers. Among the competitors, three levels of storage are offered for both
RAM size and total hard space. The levels of RAM and total hard space were also relatively
standard for modern laptops, offering options that would satisfy most, if not all laptop users. We
chose MAC and Windows operating systems because they are the two most commonly used
around the world. We chose to introduce a spill-proof feature because we believed there was a
large market of people who have spilled on their laptop before, and thus would find the feature
valuable.
3. Table 1.1 Attributes & Attribute Levels
Attributes Laptop Screen
Size
Spill-proof RAM
Size
Total Hard
Space
Price OS
Levels 11” Spill-proof 2 GB 125 GB $600 Mac
13” Not Spill-proof 4 GB 250 GB $1,000 Windows
15” 8 GB 500 GB
17”
After identifying those attributes, the attributes were then used to define the current
competitors in the market as well as the types of laptops they currently offer to consumers.
Apple’s existing product, their potential new product and their competition is shown in Table 1.2
below. Images of select existing products are shown in Figures 1.1 through 1.4.
Table 1.2 Competitors
Products Price
Attribute
Level
Laptop Screen
Size Attribute
Level
Total Hard
Space
Attribute
Level
RAM Size
Attribute
Level
OS
Attribute
Level
Spill-proof
Attribute Level
Windows 7 Acer
Competitor
$600 15” 125 GB 4 GB Windows Not Spill-proof
Windows Dell
Inspiron
Competitor
$1,000 15” 250 GB 8 GB Windows Not Spill-proof
Windows Lenovo
Competitor
$600 13” 125 GB 2 GB Windows Not Spill-proof
MacBook Pro
Existing Client
Product
$1,000 13” 500 GB 8 GB Mac Not Spill-proof
MacBook Spill
New Client Product
$1,000 13” 250 GB 4 GB Mac Spill-proof
4. Visual images of current Apple and competitor products in the marketplace are shown on this
page.
Figure 1.1 Windows 7 Acer Figure 1.4 MacBook Pro
Figure 1.2 Windows Dell Inspiron
Figure 1.3 Windows Lenovo
Figure 1.2 Windows Dell Inspiron
5. Data Collection
Data
Data was collected from 32 different consumers who were Arizona State students that
had purchased a laptop in the last five years. These students were deemed appropriate for this
study because they answered our screener questions and fit the qualifications we were looking
for. In addition, the consumers were not biased towards this study because they do not work in
the laptop industry or in any advertising or marketing related field. The screening questions used
to qualify the study’s participants can be seen in Appendix A: Screening Questions.
Questions 1 and 2 are demographic questions that don’t qualify the respondents. The
consumers must answer, “Yes” to questions 3, 4, and 5 to be qualified. These specific questions
state that the respondents currently have a laptop, have purchased a laptop in the last five
months, and they have used both windows and mac operating systems.
Each of the 16 product concepts was put into cards and was created using the DESIGN
software. Every respondent was asked to rank the cards on a scale of 1 to 16 with their most
preferred card being 16 and their least preferred being 1. In order to save paper and time, the
cards were formatted into a spreadsheet and printed into line strips. This also allowed the
respondents to easily sort the cards into the order they wanted. The official instructions on how
to rank the cards can be found under Appendix B and the actual cards that were created using the
DESIGN software can be found under Appendix C.
We asked specific screener questions in hopes of determining if there were any relevant
correlations to our study. Our qualifications included being an ASU student between 17 and 28,
who has operated both Windows and Mac operating systems. They must currently own a laptop
and they must have purchased a laptop in the last five years. We asked each respondent whether
or not he or she had spilled on a laptop before. This was our market segment. We then tested the
significance of whether they had spilled on their laptop and if they would consider purchasing
the spill-proof laptop.
6. Preliminary Analysis
In order to evaluate the accuracy of our sample’s responses, multiple-R statistics were
computed in analyzing each consumer’s conjoint ranking data. The multiple-R reflects (on a
consumer-by-consumer basis) the conjoint model’s ability to describe each consumer’s rankings.
Low multiple-R’s reflect respondents that either did not understand the ranking instructions, did
not follow the ranking instructions, or were not knowledgeable enough to give informed
preferences about laptops in general.
The preliminary study included respondents with multiple-R levels of 0.5 and above. Out
of the 32 participants, we kept all of them. 30 of the respondents have R levels above 0.7,
although there were two R levels below this mark we felt their responses, as being above 0.5
were appropriate for the total sample as they met the qualifications in both screener questions
and as reliable data. If they had been below 0.5 for R, we would not have included them. The
average multiple-R of the 32 respondents was 0.956977586.
Table 1. 3 Multiple-R Values from Regressions
Respondent Code# Multiple R Values
11 0.864037
12 0.694011
13 0.922433
14 0.962856
15 0.504561
16 0.972225
17 0.979335
21 0.983504
22 0.961769
23 0.972414
24 0.92752
25 0.930488
31 0.98593
32 0.972414
41 0.908093
42 0.892576
43 0.934628
44 0.976187
51 1
52 0.884299
53 0.99484
54 0.99336
55 0.987235
56 0.952744
61 0.979008
62 0.955633
63 0.94849
71 0.995927
72 0.937941
73 0.738639
74 0.99908
75 1
Average multiple-R of the 32 respondents retained:
0.956977586
7. Overall Market Analysis
Utilities
From the regression analysis conducted on each of the respondents in the study, part-
worth utilities were estimated for 32 consumers. These individual part-worth utilities were then
averaged. The results are shown in Graph 1.1 and demonstrate the part-worth utilities for all 32
consumers.
When the price of the Apple laptop increased from $600.00 to $1,000.00, the utility
decreased slightly. With respect to operating system (essentially brand) preference, Apple’s
MAC was high on perceived utilities, so respondents preferred Apple over Windows operating
system. In the overall market, the most significant utilities were the laptop screen size and the
RAM size. An 11-inch screen size was preferred over a 13-inch, but ranked significantly lower
than a 15-inch or 17-inch screen size. The utility for RAM size proved the second most
significant. Respondents’ average part-worth utility increased by 1 util from 2GB to 4GB, and
increased by 1 util from 4GB to 8GB. Utility increased when the laptop included the spill-proof
feature, so consumers in this study preferred spill-proof laptops. The difference in this part-worth
utility for a spill-proof attribute was not significant enough - in relation to the part-worth utilities
of the other attributes - for us to recommend that Apple introduce this feature.
Graph 1.1 Average Part-Worth Utilities
The average importance of the attributes for the entire market was also computed by
calculating the importance of each attribute for each consumer, and then by computing the
average importance of each attribute across all consumers. These averages are reported in Table
1.4. Graph 1.2 shows each attribute’s relative importance in a pie chart.
The attribute that was most important on average was the laptop screen size. The attribute
levels of a 11-inch, 13-inch, 15-inch, or 17-inch, were the most important factors in choosing a
8. laptop. On average, price was the least important attribute; there was little difference between a
$600 laptop and a $1,000 laptop. In addition, the spill-proof feature proved to be the second least
significant attribute. Attributes that fell in the middle in importance included the total hard space,
the operating system, and the RAM size.
Table 1.4 Average Attribute Importance
Attribute Importance
Laptop Screen Size 26%
Spill-proof 10%
RAM Size 22%
Total Hard Space 17%
Price 6%
OS 20%
SUM 100%
Graph 1.2 Average Attribute Importance
9. Willingness to Pay
To determine the trade-offs consumers were willing to make between price and desired
attribute levels, exchange rates and willingness to pay were considered. The exchange rate is the
dollar amount per utility, computed as:
Exchange Rate = $(the change in price)______________________
(the corresponding difference in utilities for the price attribute)
For instance, the first respondent in the study had a utility of 2.5 utils for a drop in price from
$1,000 down to $600. This utility increase corresponds to a drop in price of $400. Therefore, the
exchange rate for this consumer is:
Exchange Rate = $400/2.5 util = $160/util
When all of the exchange rates were computed, an average exchange rate for all
consumers of $466.04 per util was estimated. The average exchange rate, calculated in terms of
dollars/util, indicates that on average, 1 util of any given attribute is worth $466.04.
This exchange rate allows for the calculation of a consumers “willingness to pay”. A
measure of willingness to pay shows how much value an individual consumer places on a good
or service. It is measured in terms of money. This ratio represents a characteristic of each
consumer for each non-price attribute level. In the calculation of willingness to pay, each
consumer’s exchange rate is used to value each consumer’s utilities in dollars (as opposed to
utils). After determining the willingness to pay for each individual, the average willingness to
pay among all respondents is shown in Table 1.7 below.
Table 1.7 Average Willingness To Pay Calculations
Willingness to pay: Spill-proof over Not Spill-Proof -$103.19
Willingness to pay: MAC over Windows $427
Willingness to pay: 17-inch over 11-inch $1,237.83
Willingness to pay: 8GB over 2GB $1696.45
10. MarketSimulations
Analysis of the current products provided by competitors was necessary in assessing if a
spill-proof laptop would advance Apple’s position in the laptop marketplace. In order to provide
a standard upon which the market’s response to a new product can be gauged, an existing Apple
product was included in the simulations. The competitors and existing product that were
analyzed in the first simulation are shown in Table 1.5.
Table 1.5 Existing Products in the Marketplace
Price Screen
Size
Hard Drive
Space
RAM
Size
OS Spill-proof
P1-Existig Product $1,000 13” 500 GB 8 GB Mac Not Spill-proof
P2 –Acer $600 15” 125 GB 4 GB Windows Not Spill-proof
P3 –Dell Insipron $1,000 15” 250 GB 8 GB Windows Not Spill-proof
P4 - Lenovo $600 13” 125 GB 2 GB Windows Not Spill-proof
In order to simulate a total market, the utilities of competitors’ products were calculated
with respect to the consumer’s part-worth utilities. For example, choices for each consumer were
simulated by allocating the choice to the product P1-P4 in table 1.5 with the highest utility for
each. Through this simulation a total market was made in which market shares for each product
were computed.
The calculated market shares for each product within the simulated total market are
shown in Graph 1.3. Over half of the consumers prefer P1 from Apple, running Mac operating
software, costing $1,000, with a screen size of 13-inches, 500 GB of total hard space, and 8 GB
of RAM that does not withstand spills. The product that was liked least by the consumers in the
simulation market was Windows Lenovo, costing $600, with a screen size of 13-inches, 125 GB
of total hard space, and 2 GB of RAM, that also does not have a spill-proof attribute.
Graph 1.3 Existing Market Shares:
11. Once a total market was simulated and customer preferences of this market were
established, the new product design was applied to a second simulation to determine how
consumers in the market would react to the new product idea.
The second market simulation consisted of the product design at the higher price as well
as the competitors in the market. The product idea that was simulated in the market had the
following attribute levels: $1,000 + 15-inch + 500 GB of Total Hard Space + 4GB of RAM +
Mac + Spill-proof. This product design is displayed in Table 1.6 as P1.
Table 1.6 Introduction of First New Product Concept
Price Screen Size Hard Drive Space RAM Size OS Spill-proof
P1- New (A) $1,000 13” 250 GB 4 GB Mac Spill-proof
P2- Existing $1,000 13” 500 GB 8 GB Mac Not Spill-proof
P3- Acer $600 15” 125 GB 4 GB Windows Not Spill-proof
P4- Dell $1,000 15” 250 GB 8 GB Windows Not Spill-proof
P5- Lenovo $600 13” 125 GB 2 GB Windows Not Spill-proof
In the second simulation the market share for the first new product at a higher price,
$1,000, with the spill-proof attribute, was preferred by only 22% of the consumers. The
introduction of Apple’s spill-proof laptop had no effect on the market shares for the Dell
Inspiron and Lenovo competitors whose shares stayed constant at 22% and 6% respectively. The
majority of the first new product’s market shares came from the existing client product in the
simulation, which decreased from 53% to 38%. One thing of importance to note was that Acer’s
market shares dropped 7%, from 19% in the market simulation down to 12% in the simulation of
the first new product concept introduction. The simulation with the first new product design is
illustrated in Graph 2.1 as P1.
Graph 1.4 Simulation #2: Market Shares
12. In the third market simulation a product design at the lower price, as well as the existing
competing products in the market were included. The second new product design, identified as
P1 had the following attribute levels: $600 + 15-inch + 500 GB of Total Hard Space + 4GB of
RAM + Mac + Spill-proof. Table 1.7 illustrates the competing product as well as the second new
product included in the third simulation.
Table 1.7 Introduction of Second New Product Concept
Price Screen Size Hard Drive Space RAM Size OS Spill-proof
P1-New (B) $600 13” 250 GB 4 GB Mac Spill-proof
P2- Existing $1,000 13” 500 GB 8 GB Mac Not Spill-proof
P3- Acer $600 15” 125 GB 4 GB Windows Not Spill-proof
P4- Dell $1,000 15” 250 GB 8 GB Windows Not Spill-proof
P5- Lenovo $600 13” 125 GB 2 GB Windows Not Spill-proof
This third simulation in which the second new product concept was introduced identified
that consumers were more attracted to the new product at a lower price, $600. With the decrease
in the new product’s price from $1,000 down to $600, the apple market shares increased from
22% to 34%. The existing client product’s market share further dwindled from 38% in the first
new product simulation, to 16% in the second new product simulation. The market shares for P3,
the Windows 7 Acer that had fallen between the market simulation and first introduction saw a
4% increase from 12% to 16% at the introduction of the second new product. The Windows
Lenovo competitor who had stayed constant in market shares saw a 10% increase from 6% in the
first two simulations to 16% in the third simulation. The simulation of the introduction of the
second new product concept into the market is shown below in Graph 1.5.
Graph 1.5 Simulation #3: Market Shares
13. Market Segment Analysis
In order to better understand the part-worth utilities of the consumers in the market, the
total market was divided into two market segments. The market was segmented into those who
had spilled and those who had not spilled on their laptop prior.
SegmentAnalysis
The market segment that included those who have spilled on their laptops was chosen for
further analysis. The idea was to market a spill-proof laptop to consumers that have spilled
alcoholic beverages on their laptops in the past, who would have a greater appreciation for a
laptop that is spill-proof due to their past accidents spilling on their laptops.
Table 2.5 Attribute Importance Average: Those who have spilled beverages on their laptops
Attribute Importance
Laptop Screen Size 24%
Spill-proof 5%
RAM Size 18%
Total Hard Space 24%
Price 11%
OS 18%
The average importance of the attributes for the entire market was computed by
calculating the importance of each attribute for each consumer, and then by computing the
average importance of each attribute across all consumers. These averages are reported in Table
2.5.
The attribute that was most important on average remained the laptop screen size, holding
24% importance. The attribute levels of a 11-inch, 13-inch, 15-inch, or 17-inch, were the most
important factors in choosing a laptop. In addition, the Total Hard Space proved equally
significant, at a comparable 24%. On-average, the Spill Proof feature was the least important
attribute, at 5%. Price was the second least important attribute; there was little difference
between a $600 laptop and a $1,000 laptop. Attributes that fell in the middle in importance
included the price, the operating system, and the RAM size. It is important for Apple to consider
the importance of various attributes in deciding what they want to introduce to the marketplace.
This helps them determine what consumers are looking for. Graph 2.9 is graphical representation
of our findings.
14. Graph 2.9 Attribute importance: Those who have spilled beverages on their laptops
Additionally, the average willingness to pay of this segment of those who have spilled on their
laptops can be found below in table 2.6:
Table 2.6 Those who have spilled on their laptops Average Willingness To Pay
Willingness to pay: Spill-proof over Not Spill Proof -$166.16
Willingness to pay: MAC over Windows $208.65
Willingness to pay: 17-inch over 11-inch -$101.51
Willingness to pay: RAM Size 8 GB over 2 GB $803.99
Table 2.7 Those who have spilled on their laptops Attribute Importance
Attribute Importance
Laptop Screen Size 24%
Spill-proof 5%
RAM Size 18%
Total Hard Space 24%
Price 11%
OS 18%
We found it very important to consider market segments to help push towards realistic
customers. Initially we believe the spill-proof feature would appeal to many people who have
spilled on their laptops or knew someone who had spilled on their laptop. Upon further analysis
we have found the spill-proof feature did not add any value or incentive for consumers. Total
hard space and laptop screen size were the most influential features and spill-proof was least
influential. Conducting an additional study that offered larger screen size and/or larger total hard
space is a lucrative opportunity in the market to capture more market-share. The implementation
of the new spill-proof attribute for laptops only proved viable oddly with a high market price.
15. MarketSimulations in the Segment
Using the existing product alternative, we conducted a simulation using the segment
market. Table 1.5 is shown again are we conducting the same simulation only with the segment
this time.
Table 1.5 Existing Products in the Marketplace (Repeat)
Price Screen
Size
Hard Drive
Space
RAM Size OS Spill-proof
P1 -Existing $1,000 13” 500 GB 8 GB Mac Not Spill-proof
P2- Acer $600 15” 125 GB 4 GB Windows Not Spill-proof
P3- Dell $1,000 15” 250 GB 8 GB Windows Not Spill-proof
P4- Lenovo $600 13” 125 GB 2 GB Windows Not Spill-proof
Graph 3.0 SegmentSimulation for Existing Products
As for the first simulation regarding the segmented market, the results show that the
consumers favor the Apple laptop or P1. Graph 3.0 clearly illustrates the 50% market-share.
We conducted the same simulation for the new product introduction as we did for the
overall market earlier. Refer to Table 1.6, to see the specification of the new product and the
other products. Graph 3.1 shows that with the introduction of the new product alternate Apple
gained 7% market-share.
14%
22%
14%
50%
Simulation-Existing
Windows 7 Acer
Windows Dell Inspiron
Windows Lenovo
MacBook Pro
16. Table 1.6 Introduction of First New Product Concept (Repeat)
Price Screen
Size
Hard Drive
Space
RAM
Size
OS Spill-proof
P1- New (A) $1,000 13” 250 GB 4 GB Mac Spill-proof
P2- Existing $1,000 13” 500 GB 8 GB Mac Not Spill-proof
P3- Acer $600 15” 125 GB 4 GB Windows Not Spill-proof
P4- Dell $1,000 15” 250 GB 8 GB Windows Not Spill-proof
P5- Lenovo $600 13” 125 GB 2 GB Windows Not Spill-proof
Graph 3.1 Segment Spill-proof Simulation
The final simulation for the segment mirrors the third overall market simulation. We factor a
lower price for this specific segment. Table 1.7 is shown again to illustrate the product alternatives. The
findings tell us that Apple will get 8% more market-share with a lower price point for new product.
Table 1.7 Introduction of Second New Product Concept (Repeat)
Price Screen
Size
Hard Drive
Space
RAM Size OS Spill-proof
P1-New (B) $600 13” 250 GB 4 GB Mac Spill-proof
P2- Existing $1,000 13” 500 GB 8 GB Mac Not Spill-proof
P3- Acer $600 15” 125 GB 4 GB Windows Not Spill-proof
P4-Dell $1,000 15” 250 GB 8 GB Windows Not Spill-proof
P5- Lenovo $600 13” 125 GB 2 GB Windows Not Spill-proof
7%
22%
14%43%
14%
Simulation-Spill-proof
Windows 7 Acer
Windows Dell Inspiron
Windows Lenovo
MacBook Pro
MacBook Spill
17. Graph 3.3 Segment Simulation With Lower Price
7%
21%
14%
29%
29%
Simulation-price
Windows 7 Acer
Windows Dell Inspiron
Windows Lenovo
MacBook Pro
MacBook Pro2
18. Conclusion
Final Discussion
In summary, this research study has helped Apple enhance its current line of laptops and
remain competitive in the marketplace. Through understanding of what consumers want, as well
as the attributes that they desire in products, we have developed the outline of a desirable new
product design for Apple. Based on the results of customer importance levels and the market
share levels we found that the new spill-proof feature is not regarded as important by consumers
but may help capture market-share nonetheless. The feature did not matter to our segmented
respondents either.
Screen size (26%)* was the most important attribute to our overall market. It was closely
followed by RAM size (22%) and the operating system (20%). The preferred levels for screen
size, RAM size, and OS was 17”, 8GB, and Mac OS. We suggest further studies and simulations
to look into larger screen sizes and upgraded specifications in RAM and Hard Drive space
(17%). These are valued more highly than the spill-proof attribute.
However the introduction of the product alternative for Apple gained market-share in all
simulations, except for the lower price spill-proof in overall market, which actually saw the
cannibalization as a negative overall effect. In all other cases, the market share cannibalization
was a net benefit. Apple gained 10% in market-share in the first overall market simulation with
the high price. For the segment, Apple’s existing share was lower than the overall, but they
managed to gain 7% and 8% in both simulations. Based on the results in both overall and
segment markets, Apple should not introduce a lower price spill-proof product rather the higher
price.
We did notice the results that the overall market favored the spill-proof feature in both
Willingness to Pay (-109.19 vs -166.16), and Attribute Importance (10% vs 5%). This tells us
that the segment market, those who have spilled on their laptop may actually be currently
satisfied with the durability of their laptop. Having already spilt on their laptop they may have
experienced that their laptop is adequately protected from spills, compared to those who have not
spilled ever. Those who have not spilled maybe more inclined to see the value in spill-proof as
they can only imagine the consequences of such action. In addition, the segment market also
favored smaller screen size, which may attribute to their collective results, as it is harder to spill
on smaller laptops. It is recommended that any possible marketing programs utilize the fear of
spills to help highlight the attributes importance in the consumers’ eyes.
We recommend more research into possible product attributes combinations. Based off
our results alone the introduction of the spill-proof product alternative would prove to be
beneficial as they capture a significant market share away from competitors.
Note 1*: Percentages in parentheses correspond to overall attribute importance.
19. Reflection
We encountered numerous problems with our research.
Notably we found that the sample size conducted for this analysis was much too small
and contained limited reach. The sample was too homogenous in nature as we only interviewed
people who primarily went to Arizona State. The sample was not random and was not
heterogeneous. Alternatively, a sample size of 50 or more from various places, not exclusively
college, would much more ideal.
In addition, all interviewers saw a near total brand preference for Mac OS except for our
foreign student team member whose interviewees had a complete preference for Windows OS.
The bias is apparent in the simulations as although there were many offering with important
attributes that had preferred attribute levels were viewed more favorably, Apple’s existing
product still held a majority market-share. More respondents would have smoothed over the bias
we encountered.
Building off the fact Apple’s new and existing product alternatives had inferior attribute
levels compared to the windows offerings; we should have conducted market simulations with
the Apple laptops having similar attribute levels. As the simulation took account for the attribute
importance, clearly Apple would have had much greater market-share with comparable
attributes.
The attribute level for price on Apple laptops should have been taken to with more
thought, as all Apple computer are priced high. The limitation to two prices for the products,
although necessary, skewed the data in some respects. Additional studies with differing prices
should be arranged in the future to have better comparative data.
We should have designated outliers to generate a more accurate simulation results. We
thought about removing the two respondents with weaker Multiple-R scores, but ultimately
decided not to when we realized we had gone far into the project, as removing those results
would have changed the entire amount of data. We agreed as a group that although the two
respondents were below 0.7, they still qualified being above 0.5. In future analysis, we would
recommend stricter requirements for Multiple-R.
All in all, the analysis was great learning experience.
20. Appendix A
Screener Questions
1. Are you an Arizona State student? Yes No
2. Select the age category that you fall into?
a. 17-20 b. 21-24 c. 25-28 d. None of the above
3. Do you own a laptop? Yes No
4. Have you purchased a laptop in the last five years? Yes No
5. Have you operated on both Windows and Mac operating systems?
Yes No
6. Have you ever spilled on your laptop? Yes No
7. If so, was it alcohol that you spilled? Yes No
21. Appendix B
Instructions
Sort the 16 laptop profiles shown on the 16 cards (labeled 1 through 16) into three piles:
the cards you like most, the cards you like the least, and the cards in between. Then use
this preference scale to rank each card.
Preferred Least Preferred Most
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Rate the profile you preferred most with a 16 and the profile you preferred least with a 1.
Then assign each of the other numbers from 2 to 15 to indicate your rank-ordered level of
preference for the remaining cards. Each card should have a different number from 1 to
16.
22. Appendix C
Cards
Card 1
Laptop Screen Size
11'
Spill-proof
Spill-proof
RAM Size
2 GB
Total Hard Space
250 GB
Price
$600
OS
Mac
Card 2
Laptop Screen Size
17'
Spill-proof
Spill-proof
RAM Size
4 GB
Total Hard Space
500 GB
Price
$6000
OS
Mac
Card 3
Laptop Screen Size
15'
Spill-proof
Not Spill-proof
RAM Size
2 GB
Total Hard Space
125 GB
23. Price
$600
OS
Mac
Card 4
Laptop Screen Size
11'
Spill-proof
Not Spill-proof
RAM Size
4 GB
Total Hard Space
125 GB
Price
$1,000
OS
Windows
Card 5
Laptop Screen Size
11'
Spill-proof
Spill-proof
RAM Size
8 GB
Total Hard Space
125 GB
Price
$600
OS
Windows
Card 6
Laptop Screen Size
17'
Spill-proof
Not Spill-proof
RAM Size
8 GB
24. Total Hard Space
250 GB
Price
$1,000
OS
Mac
Card 7
Laptop Screen Size
11'
Spill-proof
Not Spill-proof
RAM Size
4 GB
Total Hard Space
500 GB
Price
$1,000
OS
Mac
Card 8
Laptop Screen Size
17'
Spill-proof
Spill-proof
RAM Size
4 GB
Total Hard Space
125 GB
Price
$6000
OS
Windows
Card 9
Laptop Screen Size
17'
Spill-proof
Not Spill-proof
RAM Size
25. 2 GB
Total Hard Space
125 GB
Price
$1,000
OS
Windows
Card 10
Laptop Screen Size
15'
Spill-proof
Not Spill-proof
RAM Size
8 GB
Total Hard Space
500 GB
Price
$600
OS
Windows
Card 11
Laptop Screen Size
13'
Spill-proof
Not Spill-proof
RAM Size
4 GB
Total Hard Space
250 GB
Price
$6000
OS
Windows
Card 12
Laptop Screen Size
13'
Spill-proof
Spill-proof
26. RAM Size
8 GB
Total Hard Space
125 GB
Price
$1,000
OS
Mac
Card 13
Laptop Screen Size
15'
Spill-proof
Spill-proof
RAM Size
4 GB
Total Hard Space
125 GB
Price
$1,000
OS
Mac
Card 14
Laptop Screen Size
13'
Spill-proof
Not Spill-proof
RAM Size
4 GB
Total Hard Space
125 GB
Price
$600
OS
Mac
Card 15
Laptop Screen Size
13'
27. Spill-proof
Spill-proof
RAM Size
2 GB
Total Hard Space
500 GB
Price
$1,000
OS
Windows
Card 16
Laptop Screen Size
15'
Spill-proof
Spill-proof
RAM Size
4 GB
Total Hard Space
250 GB
Price
$1,000
OS
Windows