SlideShare a Scribd company logo
Digital & Virtual Fences Danielle & Ibrahim
How it all started…
Digital Fence Regularfencewithadd-on sensorsaddedthatdetect intrusions SafeFence(Joeun):  TautWireFence Vibration-baseddetection PIDSFence(Securenics):  Electric Charge Fence Monitors changes in electric charge
Virtual Fence Intelligent Video Surveillance System Monitors intrusions through CCTV cameras
Initial Research TreatedFences as BurglarAlarm Systems Investigatedmarket for US Alarm Systems Identified major players in the AlarmIndustry
“If you feel that the problems are intractable and you'd rather discontinue the project” Strike 1…
Market for Fences US FenceMarketexpected to reach$3 Billion USD in sales by 2010 Revenue fromfencessold: $1.9 Billion Revenue fromMetalfences: $1.2 Billion
Market for ElectronicPhysical Security (EPS) US EPS Market 2007: $9.7 Billion Intrusion Detection: $1.2 Billion CCTV/Video Surveillance: $3.2 Billion
Breakdown of EPS Number of projects where EPS occurs in specifications (2006-2007)
Segmentation
Marketing Messages SafeFence: perimeter intrusion detection and prevention PIDSFence: mostadvancedperimeter intrusion detectiontechnologyavailable Virtual Fence: software thatconverts a regularfenceinto a smart fence Developed content based on competitors’ websiteswithoutmuchemphasis on keywords
Strike 2…
SEO Strategy
Initial Results
“Amyand Ibrahim's Taut Wire Fence has garnered a quality lead from Bombardier Transport who is a large contractor at JFK (and numerous other airports).” Grand Slam…
Improvements Focused on only 1 keyword MatchedTitle, Header and Page Name Increased keyword density
Final Results
Key Takeaways Sometimesyou are stuckwith a weakproduct Onusis on you as a marketer to find a way to sell the product   Don’tbeafraid to try new things but bepreparedto go back to the basics Perseverance = success (somewhat)
‘‘It takes more hard work, money and brains to reachyour goal thanyouoriginallypredicted.  Perseverance, however, isalways the key to succeeding if youonly have two out of the three.’’ Questions…

More Related Content

What's hot

Technology for national security
Technology for national securityTechnology for national security
Technology for national security
MUTHU LAKSHMI
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
Edge AI and Vision Alliance
 
Wi Life=Scaleable
Wi Life=ScaleableWi Life=Scaleable
Wi Life=Scaleable
Add_Tech
 
Glimmerglass CyberSweep
Glimmerglass CyberSweepGlimmerglass CyberSweep
Glimmerglass CyberSweepScott Rickard
 
Thinxtra, Sigfox and Xamarin
Thinxtra, Sigfox and XamarinThinxtra, Sigfox and Xamarin
Thinxtra, Sigfox and Xamarin
Rod Hemphill
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017
IDATE DigiWorld
 
Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...
Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...
Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...IDATE DigiWorld
 

What's hot (7)

Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
 
Wi Life=Scaleable
Wi Life=ScaleableWi Life=Scaleable
Wi Life=Scaleable
 
Glimmerglass CyberSweep
Glimmerglass CyberSweepGlimmerglass CyberSweep
Glimmerglass CyberSweep
 
Thinxtra, Sigfox and Xamarin
Thinxtra, Sigfox and XamarinThinxtra, Sigfox and Xamarin
Thinxtra, Sigfox and Xamarin
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017
 
Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...
Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...
Future Networks: Ambroise Popper, VP/GM M2M BU, Sequans Communications - Digi...
 

Similar to LPR

[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
운상 조
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Jason Shen
 
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMPReducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP3VR Inc.
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
Achu Anna
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
write31
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
 
Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...
Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...
Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...
Littelfuse
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
Hi Tech Criminal Justice
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
Fiber Optic Network for Security and Surveillance Industry Applications
Fiber Optic Network for Security and Surveillance Industry ApplicationsFiber Optic Network for Security and Surveillance Industry Applications
Fiber Optic Network for Security and Surveillance Industry Applications
Sun Telecom
 
Port security
Port securityPort security
Port security
borepatch
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
Real Time Video Prosecution Unit
Real Time Video Prosecution UnitReal Time Video Prosecution Unit
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 

Similar to LPR (20)

[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMPReducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
 
Trends final
Trends   finalTrends   final
Trends final
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...
Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...
Littelfuse Building Automation Capabilities: Smart Locks and Window / Door Se...
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Fiber Optic Network for Security and Surveillance Industry Applications
Fiber Optic Network for Security and Surveillance Industry ApplicationsFiber Optic Network for Security and Surveillance Industry Applications
Fiber Optic Network for Security and Surveillance Industry Applications
 
Port security
Port securityPort security
Port security
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
Real Time Video Prosecution Unit
Real Time Video Prosecution UnitReal Time Video Prosecution Unit
Real Time Video Prosecution Unit
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 

More from ibzmir

L'Oreal - Marketing Strategy
L'Oreal - Marketing StrategyL'Oreal - Marketing Strategy
L'Oreal - Marketing Strategyibzmir
 
BEA - Corporate Strategy
BEA - Corporate StrategyBEA - Corporate Strategy
BEA - Corporate Strategyibzmir
 
RCM - Leveraging Diversity
RCM - Leveraging DiversityRCM - Leveraging Diversity
RCM - Leveraging Diversityibzmir
 
Rogers
RogersRogers
Rogersibzmir
 
System diagram 2
System diagram 2System diagram 2
System diagram 2ibzmir
 
System diagram 1
System diagram 1System diagram 1
System diagram 1ibzmir
 
Poster
PosterPoster
Posteribzmir
 
Business Design
Business DesignBusiness Design
Business Designibzmir
 
Cheerios
CheeriosCheerios
Cheeriosibzmir
 

More from ibzmir (11)

L'Oreal - Marketing Strategy
L'Oreal - Marketing StrategyL'Oreal - Marketing Strategy
L'Oreal - Marketing Strategy
 
BEA - Corporate Strategy
BEA - Corporate StrategyBEA - Corporate Strategy
BEA - Corporate Strategy
 
RCM - Leveraging Diversity
RCM - Leveraging DiversityRCM - Leveraging Diversity
RCM - Leveraging Diversity
 
Rogers
RogersRogers
Rogers
 
System diagram 2
System diagram 2System diagram 2
System diagram 2
 
System diagram 1
System diagram 1System diagram 1
System diagram 1
 
Poster
PosterPoster
Poster
 
RIM 1
RIM 1RIM 1
RIM 1
 
RIM 2
RIM 2RIM 2
RIM 2
 
Business Design
Business DesignBusiness Design
Business Design
 
Cheerios
CheeriosCheerios
Cheerios
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

LPR

  • 1. Digital & Virtual Fences Danielle & Ibrahim
  • 2. How it all started…
  • 3. Digital Fence Regularfencewithadd-on sensorsaddedthatdetect intrusions SafeFence(Joeun): TautWireFence Vibration-baseddetection PIDSFence(Securenics): Electric Charge Fence Monitors changes in electric charge
  • 4. Virtual Fence Intelligent Video Surveillance System Monitors intrusions through CCTV cameras
  • 5. Initial Research TreatedFences as BurglarAlarm Systems Investigatedmarket for US Alarm Systems Identified major players in the AlarmIndustry
  • 6. “If you feel that the problems are intractable and you'd rather discontinue the project” Strike 1…
  • 7. Market for Fences US FenceMarketexpected to reach$3 Billion USD in sales by 2010 Revenue fromfencessold: $1.9 Billion Revenue fromMetalfences: $1.2 Billion
  • 8. Market for ElectronicPhysical Security (EPS) US EPS Market 2007: $9.7 Billion Intrusion Detection: $1.2 Billion CCTV/Video Surveillance: $3.2 Billion
  • 9. Breakdown of EPS Number of projects where EPS occurs in specifications (2006-2007)
  • 11. Marketing Messages SafeFence: perimeter intrusion detection and prevention PIDSFence: mostadvancedperimeter intrusion detectiontechnologyavailable Virtual Fence: software thatconverts a regularfenceinto a smart fence Developed content based on competitors’ websiteswithoutmuchemphasis on keywords
  • 15. “Amyand Ibrahim's Taut Wire Fence has garnered a quality lead from Bombardier Transport who is a large contractor at JFK (and numerous other airports).” Grand Slam…
  • 16. Improvements Focused on only 1 keyword MatchedTitle, Header and Page Name Increased keyword density
  • 18. Key Takeaways Sometimesyou are stuckwith a weakproduct Onusis on you as a marketer to find a way to sell the product   Don’tbeafraid to try new things but bepreparedto go back to the basics Perseverance = success (somewhat)
  • 19. ‘‘It takes more hard work, money and brains to reachyour goal thanyouoriginallypredicted. Perseverance, however, isalways the key to succeeding if youonly have two out of the three.’’ Questions…

Editor's Notes

  1. So having a good idea of the competitve landscape, our SEO strategy involved research and imitation. We decided that our best chance for success required doing what clearly worked well for our competitors google rankings. We created a list of keywords most commonly used by our competitors. We would then use googleadwords and chose keywords that had a relatively high search volume, meaning it had to be greater than 100. If those keywords had google hits less than 1 million, then we decided that those would be good keywords to optimize for.
  2. Our initial results were somewhat of a letdown. We thought we had chosen the right keywords to increase our online presence, yet our actions did not yield the results we wanted
  3. So, rather than having 2-3 keywords optimized per page, we decided to focus on only one keyword.We opted for consistency across the titles, headers and page names and we increased keyword density throughout the content of the page
  4. So, rather than having 2-3 keywords optimized per page, we decided to focus on only one keyword.We opted for consistency across the titles, headers and page names and we increased keyword density throughout the content of the page