"iwatch"

Read Complete Research Material

"IWATCH"

"iWatch" new product from Apple

Executive Summary

It is believed to be Apple's next big thing - yet the secretive firm has not made a single comment about it. However, that hasn't stopped people around the world speculating on exactly what an 'iWatch' might look like and how it would work. Designers have even revealed their take on Apple's new 'smart watch' with professional looking mockups of the device, ranging from a glass cuff to a 'claw' design. It is believed the iWatch will run a version of iOS, the same software as the iPhone and iPad, allowing apps to be easily downloaded.

"iWatch" new product from Apple

The development of mobile technology has much of its history in the evolution of the cellular phone. From simple cell phones to modern smart phones, this technology still dominates the marketplace for devices used to connect with other phones and to the Internet. Phone technology has evolved through several generations, which has allowed for increasing capabilities. In the earlier days, 2G (known as GSM: Global System for Mobile communication) used digital signals and integrated a modem to call dial-up Internet service numbers provided by the phone carrier (Clark,2000,14-25). This technology was relatively slow compared to the subset of 2G mobile phones that were able to browse the Internet via a Wireless Application Browser (WAP) installed on the device, which enabled text messaging for the first time.

Industry analysis for Smart Watch

Macro-Frameworks

Political Factors

The major political factors associated in relation to the smart phone and tablets are the impact of exports due to the political barriers, and tariffs. Thus may harm the manufacturing capability of Apple if the political condition of the countries Importing smart phones are not stable with the home country. In addition, the security, confidentiality and integrity of the RFID system are also important things to consider. Especially, when the wireless technology, RFID tags cause potential security problems when users between tags and readers are exposed to listening, and traffic analysis. Safety concerns may arise from a compromise of data during wireless transmission, storage and physical security of the storage site. Supply chain applications can be particularly vulnerable to security risks, because the variety of external entities can use the tags or their associated databases (Carlsson, 2003, 10-60).

Social Factors

In the case of individual consumer markets, the main target market is formed by high-income professionals who need a portable device to coordinate their agendas and to communicate with family and colleagues. These consumers prefer low prices functional PDA with expandable memory. The secondary group consists of university undergraduate students and graduate students who need to organize studies, work and personal calendar, access and input information from anywhere at any time keeping in touch with family and friends (Carlsson,2003,10-60). For businesses, the target market is composed of medium and large enterprises that want to keep their employees in regular contact and have access to relevant information anywhere, anytime. The second segment in this market consists of organizational entrepreneurs and small business owners who need to stay in ...