Apple Inc.: Keeping the “I” in Innovation

Total Page:16

File Type:pdf, Size:1020Kb

Apple Inc.: Keeping the “I” in Innovation Apple Inc.: Keeping the “i” in Innovation Robin Chapman, Robert E. Hoskisson, Gail Christian / Arizona State University One of the most well known and respected com- position it has held since 2008.2 In March 2011, Fast panies in the world, Apple Inc. was one of the few Company also has named Apple the Most Innovative companies that emerged from the recession stron- Company. According to Editor Robert Safian, “in ger than ever. By spring 2011 Apple had an array putting together this month’s special package on the of impressive products including the iPad, iPhone, 2011. Most Innovative Companies, we really had iPod shuffle, iPod nano, iPod touch, iPod classic, no choice: Apple had to be No. 1.”3 With net sales Apple TV, MacBook, MacBook Pro, MacBook Air, of $37,491, $42,905, and $65,225 in 2008, 2009, Mac mini, iMac, and MacPro.1 Apple that has main- and 2010, respectively, Apple’s stream of innovative tained its status as number one for innovativeness on products supported CEO Steve Jobs’ philosophy that Fortune Magazine’s list of the World’s Most Admired if you make something “really great, then everybody Companies in both prerecession 2007 and postreces- will want to use it”4 (see Exhibit 1). sion 2011. Apple is also named the World’s Most Although Apple started in 1976 as a computer Admired Company overall in 2011 by Fortune, a business, much of Apple’s success has been attributed Exhibit 1 Apple Inc. Selected Financial Data 2010 2009 2008 2007 2006 Net sales ($) 65,225 42,905 37,491 24,578 19,315 Net income ($) 14,013 8,235 6,119 3,495 1,989 Earnings per common share ($) Basic 15.41 9.22 6.94 4.04 2.36 Diluted 15.15 9.08 6.78 3.93 2.27 Cash dividends declared per common share ($) 0 0 0 0 0 Shares used in computing earnings per share Basic 909,461 893,016 881,592 864,595 844,058 Diluted 924,712 907,005 902,139 889,292 877,526 Total cash, cash equivalents and marketable securities ($) 51,011 33,992 24,490 15,386 10,110 Total assets ($) 75,183 47,501 36,171 24,878 17,205 Total long-term obligationsa ($) 5,531 3,502 1,745 687 395 Total liabilities ($) 27,392 15,861 13,874 10,347 7,221 Total shareholders’ equity ($) 47,791 31,640 22,297 14,531 9,984 aThe company did not have any long-term debt during the five years ended September 25, 2010. Long-term obligations excludes non-current deferred revenue. Source: Apple Inc. Annual Report 2010. C-1 776812_Apple.indd6812_Apple.indd C-1C-1 88/25/11/25/11 44:54:54 PPMM C-2 Apple Inc.: Keeping the “i” in Innovation to its music- and video-related products, in addi- whose innovations and inspirations are so closely tion to the iPhone. According to Steve Jobs, Apple’s tied to the vision of one leader when that leader’s charismatic CEO and cofounder, “This will go influence is in decline?”10 down in history as a turning point for the music To understand how Apple became a leader in industry. This is landmark stuff. I can’t overestimate innovation and how closely Steve Jobs is associated it!”5 Jobs was referring to the April 2003 debut of with Apple and its many achievements, it is neces- Apple’s iTunes Online Music Store, the first legal sary to first examine Apple’s history. online music service to have agreements with all five major record labels. Although initially avail- Early Company History able only for Macintosh users, iTunes sold more than 1 million songs by the end of its first week in On April 1, 1976, Steve Jobs and Stephen Wozniak operation. Not only did iTunes change the nature of began the partnership that would eventually become the music industry, it also added greatly to Apple’s Apple Computer. Both electronics gurus, Jobs and revenues by way of promoting the purchase of the Wozniak had known each other since high school iPod—a portable digital music device that could and had worked together previously on other proj- store downloaded iTunes songs. As Apple quickly ects.11 In early 1976, Wozniak had been working became known as a company that made innova- on combining video monitors with computers. His tive consumer electronics products instead of just a idea was to invent a user-friendly computer that company that made computers, it changed its name ordinary consumers could buy. Wozniak, who in 2007 from “Apple Computer” to “Apple Inc.” worked for Hewlett-Packard (HP) at the time, Jobs said, “The Mac, iPod, Apple TV and iPhone. decided to approach his employer with his idea. Only one of those is a computer. So we’re changing HP, however, did not see a future for personal the name.”6 computers (PCs) and soundly rebuffed him. At that Apple’s focus on innovation has helped it main- point, Steve Jobs told his friend Wozniak that they tain a competitive advantage and marketing prow- should go into business together and sell computers ess over other industry players that have historically themselves.12 been much stronger than Apple.7 However, Apple Their first computer, the Apple I, was built in must continue to beat the competition on a number the garage of Jobs’s parents (see Exhibit 3). Known of levels. iTunes faces stiff competition from new as a “kit computer,” the original Apple consisted and existing online music and video download ser- merely of a circuit board and did not even have an vices. The iPod, iPad, Apple TV, and iPhone all face exterior casing. It was intended to be sold to hob- the threat of lower-priced rivals and possible sub- byists only. Jobs called the computer an “Apple” stitutes. in honor of his days working at an orchard while Then on January 17, 2011, Apple was faced seeking enlightenment—and because neither he nor with an additional challenge when Steve Jobs Wozniak could come up with a better name.13 The handed control of the company to chief operating Apple I received mixed responses from hobbyists, officer Timothy D. Cook, with the announcement of and the duo decided it was time to expand the mar- another medical leave.8 This would be his third med- ket for PCs by building a more attractive and useful ical leave in less than six years. Jobs would retain machine, the Apple II14 (see Exhibit 2). the title of CEO, but Cook would handle day-to- day operations at the company. He did not share his Growth reason for leaving the company or tell his employees when he might return.9 After taking on new partners to fund expan- Diagnosed with a rare form of pancreatic can- sion plans, the company officially became Apple cer in 2004, Jobs took an undisclosed leave of Computer, Inc., in early 1977.15 Within months, the absence that year for treatment. In 2009 he took recapitalized company introduced the Apple II, the a six-month leave to undergo a liver transplant first computer to come with a sleek plastic casing at the Methodist University Hospital Transplant and color graphics.16 Annual sales increased dra- Institute in Memphis. Although these absences did matically to $10 million, and the company began to not interrupt Apple’s run of successes, the new ques- grow quickly in size, adding thousands of employ- tion became: “What happens to a modern company ees.17 On December 12, 1980, Apple became a public 776812_Apple.indd6812_Apple.indd C-2C-2 88/25/11/25/11 44:54:54 PPMM Apple Inc.: Keeping the “i” in Innovation C-3 Exhibit 2 Select Apple Product Releases 1976 Apple I 2004 iPod Mini 1977 Apple II eMac iPod (Click Wheel) 1980 Apple III iPod (U2 Special Edition) 1983 Lisa iPod Photo 1984 Macintosh Graphical User Interface (GUI) 2005 iPod Shuffl e 1986 Macintosh Plus iPod nano 1987 Macintosh II iPod color iPod with video 1991 Macintosh Quadra PowerBook 100 2006 MacBook 1994 PowerMac 6100 Mac mini 1997 PowerBook G3 2007 Apple TV 1998 iMac iPhone 1999 iBook 2008 iPhone 3G 2001 iTunes iPod classic (120 GB) iDVD 2009 iPhone 3GS iPod 2010 iPhone 4 2003 iLife suite iPad iTunes 4 (online music store w/200,000 2011 iPad 2 downloadable songs) Source: www.apple-history.com. company. On the first day of trading, its share price The memorable commercial featured an Orwellian increased from an initial $22 offering to $29.18 By 1984 world filled with stoic human zombies, all the end of the year, Apple reached $100 million in watching a large-screen image of “Big Brother.” annual sales.19 The fledgling company, however, A young woman rushes into the room and dra- soon faced some experienced competition. matically destroys the screen. Apple used this 1984 In 1981, IBM released its first PC. IBM’s sheer imagery to depict IBM’s computer dominance being size ensured its domination of the young PC market. destroyed by the new Macintosh.21 With features Steve Jobs realized that Apple would have to move that made the Mac easy to use for publishing and fast in order to remain a viable company. Over a marketing strategy that concentrated on uni- the next few years, the company released several versities, the new computer sold very well, push- new computer models, most notably the Apple III ing Apple’s fiscal 1984 sales to an unprecedented and the Lisa. Neither of these models sold particu- $1.5 billion.22 larly well.
Recommended publications
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • Podcast Presentation
    3/18/2009 Today’s Goals Podcasts: Understanding, 1. What is a podcast? Creating, and Deploying them 2. How do I get podcasts? 3. How do I play podcasts? 4. Why should I care about podcasts for Dr. Rick Jerz ediducation? 5. How do I produce my own audio podcasts? [email protected] 6. How do I deliver (deploy) my own podcasts? www.rjerz.com 1 © 2009 rjerz.com 2 © 2009 rjerz.com Demos 1) What is a Podcast? • It must be nothing, since the “podcast” is not in my dictionary. • It is something only children do. • It has something to do with fishing. • It is a radio talk show. • It a music file. • It is a TV program. • It is a lecture. 3 © 2009 rjerz.com 4 © 2009 rjerz.com Podcast Definition1 Rick’s Podcast Definition • Podcasting is a new format for distributing A method of obtaining (subscribing) audio and video content via the Internet. Actually, podcasting is just multimedia computer files (episodes), usually content enclosed into an RSS file. audio (mp3) or video (m4v), from a • RSS means Really Simple Syndication. RSS is a catalog (RSS feed, XML) on the special format based on XML. In fact, RSS Internet (website), and having them feeds are XML files containing data according to the RSS specification, and usually located automatically delivered to your on a website. computer and then to your iPod (or • XML: an HTML‐like file for handling data. other multimedia player) • HTML: Hyper Text Markup Language 1 ‐ http://www.rss‐specification.com/sitemap.htm 5 © 2009 rjerz.com 6 © 2009 rjerz.com 1 3/18/2009 2) How do I get podcasts? iTunes: An Aggregator
    [Show full text]
  • The Effects of Digital Music Distribution" (2012)
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-5-2012 The ffecE ts of Digital Music Distribution Rama A. Dechsakda [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp The er search paper was a study of how digital music distribution has affected the music industry by researching different views and aspects. I believe this topic was vital to research because it give us insight on were the music industry is headed in the future. Two main research questions proposed were; “How is digital music distribution affecting the music industry?” and “In what way does the piracy industry affect the digital music industry?” The methodology used for this research was performing case studies, researching prospective and retrospective data, and analyzing sales figures and graphs. Case studies were performed on one independent artist and two major artists whom changed the digital music industry in different ways. Another pair of case studies were performed on an independent label and a major label on how changes of the digital music industry effected their business model and how piracy effected those new business models as well. I analyzed sales figures and graphs of digital music sales and physical sales to show the differences in the formats. I researched prospective data on how consumers adjusted to the digital music advancements and how piracy industry has affected them. Last I concluded all the data found during this research to show that digital music distribution is growing and could possibly be the dominant format for obtaining music, and the battle with piracy will be an ongoing process that will be hard to end anytime soon.
    [Show full text]
  • Surviving the Petabyte Age: a Practitioner's Guide
    • Cognizant 20-20 Insights Surviving the Petabyte Age: A Practitioner’s Guide Executive Summary The amount of time it takes for news to become common knowledge has shrunk, thanks to: The concept of “big data1” is gaining attention across industries and the globe. Among the drivers • An emerging network of social media and blogs are the growth in social media (Twitter, Facebook, that potentially makes everyone a publisher of blogs, etc.) and the explosion of rich content from good and bad news. other information sources (activity logs from the A rapid increase in the number of people who Web, proximity and wireless sources, etc.). The • are untethered from traditional information desire to create actionable insights from ever- receptacles and now have a highly mobile increasing volumes of unstructured and struc- means of collecting and ingesting information. tured data sets is forcing enterprises to rethink their approach to big data, particularly as tradi- • The meteoric rise of desktop tools housing a tional approaches have proved difficult, if even significant portion of information. Organiza- possible, to apply to structured data sets. tions need to understand the information and processes involved in the dispensation of desk- One challenge that many, if not most, enter- top-managed information (mostly Microsoft prises are attempting to address is the increas- Access and Excel). This information is most ing number of data sources made available for likely to be found in the form of: analysis and reporting. Those who have taken an Copies of operational data (including both early adopter stance and integrated non-tabular > sources and targets).
    [Show full text]
  • Macintosh Plus ®
    Macintosh Plus ® Overview The Macintosh® Plus per- lets you share files with board, mouse, operating sonal computer gives you other members of the system, and Apple’s excit- the most important bene- Macintosh family of com- ing HyperCard® software. fits of the Macintosh fam- puters. It can operate by HyperCard is an informa- ily—power, versatility, and itself or as a cost-effective tion-management toolkit ease of use—in an afford- part of an office network that lets you organize able, entry-level system. environment. And the information on your com- Like others in the Macin- ability to add a wide vari- puter the way you organ- tosh family, the Macintosh ety of peripherals means ize it in your mind—by Plus is simple to learn and you can expand your association and with un- use. It provides high- Macintosh system to fit limited cross-references. resolution text and graph- your individual needs. ics, is compatible with The Macintosh Plus existing Macintosh hard- computer comes standard ware and software, and with built-in monitor, key- Features Benefits 1 megabyte of RAM, expandable to Quickly executes applications, 4 megabytes even those requiring large amounts of memory. Provides room for memory- intensive applications and large models and databases. Lets you expand memory easily, ..................................................................................................................................without board swapping. 800K built-in disk drive Offers compatibility with single- sided 400K disks. .................................................................................................................................. SCSI (Small Computer System Transfers data at up to 265 kilo- Interface) port bytes per second, up to six times faster than serial or external disk- drive ports. Lets you expand your system with up to seven peripherals, including high-performance disk drives, tape backups, and other products made by Apple and third-party developers.
    [Show full text]
  • Annual Report 2016
    4 AUDIT +1.0 % 202.0 CHF million Net revenues 2016 Lukas Marty Head of Audit Transformation as a source of strength This past year the audit business was driven more than usual by transactions, restructuring and relocations. KPMG’s technologically innovative, interdisciplinary services were extremely successful on the market. The faster the transformation, the more important the peace of mind offered by auditors. The more companies change, the greater the potential for auditors to make a vital contribution. And this is something KPMG has been quite successful at over the past year. Digitization raises demand for advisory services On the other hand, technological transformation There are multiple factors at play here. On the has intensified even further. Many clients one hand, Swiss businesses and companies are restructuring their IT systems, often with located in Switzerland have been involved far-reaching consequences: Companies are in numerous deals which need to be assessed being reorganized and their age-old structures by auditors, even if they take place outside radically dismantled. Standardized IT solutions Switzerland. The bustling acquisition schedule now make it possible for tasks previously is partly attributable to the strong franc, which performed across a large number of subsidiaries has boosted the purchasing power of Swiss to be assigned to just a few global shared corporations enormously. Yet the strong franc service centers. Not only that, but standardized has also prompted both foreign and Swiss firms IT solutions also allow global guidelines to be to take a more critical look at which activities established within corporations, industries and they want to keep in high-priced Switzerland and even beyond.
    [Show full text]
  • Apple Lisa MRD (Marketing Requirements Document)
    LISA MRD/PRD AMENDMENTS I. ADDITIONAL LISA MRDS Some areas covered in the MRD will adhere to the direction stated but will be subject to change until detailed, separate MRDs are prepared for each one. These areas, and the target completion date for each, are as follows: 1. USER INTERFACE May 31, 1980 2. SOFTWARE THEFT PROTECTION May 31, 1980 3. USER SET-UP AND CUSTOMIZING June 30, 1980 4. TERMINAL EMULATION June 30, 1980 5. VISICABINET June 30, 1980 6. WORD PROCESSOR June 30, 1980 7. GRAPHICS EDITOR June 30, 1980 8. PERSONAL APPLICATIONS June 30, 1980 9. MASS STORAGE PERIPHERALS June 30, 1980 10. PRINTERS June 30, 1980 11. NETWORKING AND ELECTRONIC MAIL July 31, 1980 12. DIAGNOSTICS/TESTING July 31, 1980 13. BUSINESS GRAPHICS July 31, 1980 14. INTRODUCTORY INTERACTIVE MANUAL August 31, 1980 15. 'OEM PRODUCTS (DEVELOPMENT TOOLS) August 31, 1980 II. HARDWARE ENGINEERING AMENDMENTS 1. Both Alps and Keyboard Co. (bucket) keyswitches will be pursued as potential options at introduction. Other keyboard technologies will be investigated in parallel but may not be available at introduction. If a better alternative does turn up, it could be made available within a few months of introduction, either as a standard keyboard or as an option. Although the keyboard layout is nearly final, it has not frozen since it is not yet on the critical path. One remaining potential variation is the possible removal of the cursor cluster from the layout. 2. Engineering is concerned that the current cost objectives may not be feasible. 3. Although there is no requirement to have the Problem Analysis Guide (PAG) stowed within LISA, Engineering will continue to pursue methods by which the PAG may be attached to the main unit.
    [Show full text]
  • Macintosh Plus
    K Service Source Macintosh Plus K Service Source Basics Macintosh Plus Basics Overview - 1 Overview This manual contains complete repair procedures for the Macintosh Plus, shown at left. Figure: Macintosh Plus K Service Source Specifications Macintosh Plus Specifications Introduction - 1 Introduction Specifications information for this product can be found in this chapter and also in the Spec Database, which you can access in one of three ways: — Launch it directly by double-clicking the Apple Spec Database runtime alias at the top level of the Main Service Source CD. — Select "Apple Spec Database" from the Service Source drop-down main menu. — Click the Acrobat toolbar icon for the database, which is near the right end of the toolbar with the letters "SP." Specifications Processor - 2 Processor CPU Motorola 68000 microprocessor 7.83 MHz 32-bit internal data bus Specifications Memory - 3 Memory RAM 1 MB, expandable to 4 MB (150 ns or faster SIMMs) ROM 128K PRAM CMOS custom chip with 4.5 V, user-replaceable battery backup (includes 256 bytes of memory; remembers system parameters even with the machine switched off) Specifications Disk Storage - 4 Disk Storage Floppy Drive Internal, double-sided drive: uses 3.5-in., hard-case floppy disks—either double-sided, 800K capacity or single-sided, 400K capacity Specifications I/O Interfaces - 5 I/O Interfaces Floppy Drive External drive port; DB-19 connector SCSI One SCSI parallel port; DB-25 connector Mouse Mouse port; DE-9 connector Keyboard Synchronous serial keyboard bus; RJ-11 connector Serial Two RS-422 serial ports; mini DIN-8 connectors Specifications I/O Devices - 6 I/O Devices Keyboard 78 keys, including numeric keypad and cursor keys; RJ-11 connector Mouse Mechanical tracking; optical shaft encoding at 3.54 pulses per mm (90 pulses per in.) of travel; DE-9 connector Specifications Sound and Video - 7 Sound and Video Sound Generator Four-voice sound with 8-bit digital/analog conversion, using 22-kHz sampling rate Video Display 9-in.
    [Show full text]
  • Survey, Which Measured the Status of Computer Community for Use
    DOCUMENT RESUME ED 234 764 IR 010 831 TITLE The US6 of the Computer in Louisiana Schools. Bulletin 1679. Revised. INSTITUTION Louisiana Sta'te Dept. of Education, Baton Rouge. PUB DATE Apr 83 NOTE 70p. PUB TYPE Statistical Data (110) --- Reports Research/Technical (143) -- Teits/Evaluation Instruments (160) EDRS PRICE MF01/PC03 Plus Postage. DESCRIPTORS *Computer Assisted Instruction; *Computers; Elementary Secondary Education;_Information Networks; *Private Schools; *Public Schools; State Surveys; Technology Traii-gfer *USe Studies IDENTIFIERS Computer Uses in Education; *LouiSiana ABSTRACT This- publication briefly reports the findings of a second annual (1982=83) survey, which measured the status of computer use to identify problemt and needs_in the Louisiana educational community for use by the Department of Education in designing activities to Aid the state's schools in effective computer use. Data are_included from a survey instrument which was returned by 1,079 public' And nonpublic Louisiana schools. Currently 345 of.the responding Schools are using computers in instruction. A summaryof findings, which includes seven data tables, is followed by conclusions and recommendations. The major part of_the report comprises appeddices that are designed to enable educators to Iodate . schools using similar computers in similar areas in order to share ideas, educational software, and hardware information.. Included are the survey instrument and an indication of,the grade levelsand subject areas in which schools reported using computers, a list showing the make and model of computer used listed byschOol, and a list by computer make of the schools using specific cotputers. (LMM) *****************************************************************t***** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • VIDEO Blu-Ray™ Disc Player BP330
    VIDEO Blu-ray™ Disc Player BP330 Internet access lets you stream instant content from Make the most of your HDTV. Blu-ray disc playback Less clutter. More possibilities. Cut loose from Netflix, CinemaNow, Vudu and YouTube direct to delivers exceptional Full HD 1080p video messy wires. Integrated Wi-Fi® connectivity allows your TV — no computer required. performance, along with Bonus-view for a picture-in- you take advantage of Internet access from any picture. available Wi-Fi® connection in its range. VIDEO Blu-ray™ Disc Player BP330 PROFILE & PLAYABLE DISC PLAYABLE AUDIO FORMATS BD Profile 2.0 LPCM Yes USB Playback Yes Dolby® Digital Yes External HDD Playback Yes (via USB) Dolby® Digital Plus Yes BD-ROM/BD-R/BD-RE Yes Dolby® TrueHD Yes DVD-ROM/DVD±R/DVD±RW Yes DTS Yes Audio CD/CD-R/CD-RW Yes DTS-HD Master Audio Yes DTS-CD Yes MPEG 1/2 L2 Yes MP3 Yes LG SMART TV WMA Yes Premium Content Yes AAC Yes Netflix® Yes FLAC Yes YouTube® Yes Amazon® Yes PLAYABLE PHOTO FORMATS Hulu Plus® Yes JPEG Yes Vudu® Yes GIF/Animated GIF Yes CinemaNow® Yes PNG Yes Pandora® Yes MPO Yes Picasa® Yes AccuWeather® Yes CONVENIENCE SIMPLINK™ Yes VIDEO FEATURES Loading Time >10 Sec 1080p Up-scaling Yes LG Remote App Yes (Free download on Google Play and Apple App Store) Noise Reduction Yes Last Scene Memory Yes Deep Color Yes Screen Saver Yes NvYCC Yes Auto Power Off Yes Video Enhancement Yes Parental Lock Yes Yes Yes CONNECTIVITY Wired LAN Yes AUDIO FEATURES Wi-Fi® Built-in Yes Dolby Digital® Down Mix Yes DLNA Certified® Yes Re-Encoder Yes (DTS only) LPCM Conversion
    [Show full text]
  • Internet Peer-To-Peer File Sharing Policy Effective Date 8T20t2010
    Title: Internet Peer-to-Peer File Sharing Policy Policy Number 2010-002 TopicalArea: Security Document Type Program Policy Pages: 3 Effective Date 8t20t2010 POC for Changes Director, Office of Computing and Information Services (OCIS) Synopsis Establishes a Dalton State College-wide policy regarding copyright infringement. Overview The popularity of Internet peer-to-peer file sharing is often the source of network resource allocation problems and copyright infringement. Purpose This policy will define Internet peer-to-peer file sharing and state the policy of Dalton State College (DSC) on this issue. Scope The scope of this policy includes all DSC computing resources. Policy Internet peer-to-peer file sharing applications are frequently used to distribute copyrighted materials such as music, motion pictures, and computer software. Such exchanges are illegal and are not permifted on Dalton State Gollege computers or network. See the standards outlined in the Appropriate Use Policy. DSG Procedures and Sanctions Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas, and the secure environment for creating and maintaining information property, and subjects one to discipline. Any user of any DSC system found using lT resources for unethical and/or inappropriate practices has violated this policy and is subject to disciplinary proceedings including suspension of DSC privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. Although all users of DSC's lT resources have an expectation of privacy, their right to privacy may be superseded by DSC's requirement to protect the integrity of its lT resources, the rights of all users and the property of DSC and the State.
    [Show full text]
  • A Day in the Life of Your Data
    A Day in the Life of Your Data A Father-Daughter Day at the Playground April, 2021 “I believe people are smart and some people want to share more data than other people do. Ask them. Ask them every time. Make them tell you to stop asking them if they get tired of your asking them. Let them know precisely what you’re going to do with their data.” Steve Jobs All Things Digital Conference, 2010 Over the past decade, a large and opaque industry has been amassing increasing amounts of personal data.1,2 A complex ecosystem of websites, apps, social media companies, data brokers, and ad tech firms track users online and offline, harvesting their personal data. This data is pieced together, shared, aggregated, and used in real-time auctions, fueling a $227 billion-a-year industry.1 This occurs every day, as people go about their daily lives, often without their knowledge or permission.3,4 Let’s take a look at what this industry is able to learn about a father and daughter during an otherwise pleasant day at the park. Did you know? Trackers are embedded in Trackers are often embedded Data brokers collect and sell, apps you use every day: the in third-party code that helps license, or otherwise disclose average app has 6 trackers.3 developers build their apps. to third parties the personal The majority of popular Android By including trackers, developers information of particular individ- and iOS apps have embedded also allow third parties to collect uals with whom they do not have trackers.5,6,7 and link data you have shared a direct relationship.3 with them across different apps and with other data that has been collected about you.
    [Show full text]