Submission
A conceiver of a product, service, or protocol in our targeted stream areas applies for consideration via this website.
K✗2 HASTENS PRE-ALPHA USABILITY TESTING : MOVING THE MVP OUT OF THE LAB & GARAGE… WITH SIMULTANEOUS FEEDBACK IN THE REAL WORLD, IN REAL-TIME, FROM A REAL END USER.
1
A conceiver of a product, service, or protocol in our targeted stream areas applies for consideration via this website.
2
We review it for initial clearance. Selected ideators are contacted and an intake/onboarding process occurs
3
Our testbed patron (AFAQ) temporarily allocates a physical or virtual site to serve as a testbed. Currently, this could be a household, farmland, expo ground, hangar, garage, office lobby, storage cloud, or metaverse world in AFAQ's UAE estate or partners. On it, ideators have 1 month to commence the buildout, deployment, or running of a live prototype, proof-of-concept, or pilot of the solution, vesting in the materials and effort themselves. We recommend an SLC (Simple-Lovable-Complete) approach, but MVP is okay.
4
We review the work. If it passes our series of tests and checks against our own standard, we certify it internally. We share feedback with the solution maker to improve how their solution looks or functions in our region's real-world conditions.
5
At this point, we actively present and demo it to AFAQ's owners and circle of associated families, who are invited to view and try it out. If any family wants to obtain the same, they are introduced to its maker for any contractual transactions.
6
Solutions successfully taken on by our network are further fielded and nominated by us to wider affiliated institutions, enablers, and government actors that will replicate them throughout their constituencies. If no takers, the test-instance/artifact of the solution remains on our patron testbed site for 1 year as a showcase, after which it is transferred to another patron, decommissioned, or returned to its maker. During this time, solution makers are given permission to cite adopting families as testimonials, and some may be open to receiving reference visits or calls from potential other adopters.
All K✗2-hosted projects can be managed, monitored, and analyzed from their natural place of deployment. “Shy tech” -- unobtrusive IoT monitoring and data dissemination -- is key to enabling this for physical, tangible objects.