Halaman Judul Halaman Pengesahan Pembimbing

Total Page:16

File Type:pdf, Size:1020Kb

Halaman Judul Halaman Pengesahan Pembimbing PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI HALAMAN JUDUL PENGARUH KUALITAS PRODUK, HARGA, DAN PROMOSI TERHADAP KEPUTUSAN PEMBELIAN SMARTPHONE IPHONE (studi kasus konsumen Iphone di kampus 1 Universitas Sanata Dharma) Skripsi Diajukan dalam Rangka Menulis Skripsi Program Studi Manajemen, Jurusan Manajemen Fakultas Ekonomi Universitas Sanata Dharma Oleh : Leonardus Niko Andira NIM: 152214089 PROGRAM STUDI MANAJEMEN JURUSAN MANAJEMEN FAKULTAS EKONOMI UNIVERSITAS SANATA DHARMA YOGYAKARTA 2019 HALAMAN PENGESAHAN PEMBIMBING PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI HALAMAN JUDUL PENGARUH KUALITAS PRODUK, HARGA, DAN PROMOSI TERHADAP KEPUTUSAN PEMBELIAN SMARTPHONE IPHONE (studi kasus konsumen Iphone di kampus 1 Universitas Sanata Dharma) Skripsi Diajukan dalam Rangka Menulis Skripsi Program Studi Manajemen, Jurusan Manajemen Fakultas Ekonomi Universitas Sanata Dharma Oleh : Leonardus Niko Andira NIM: 152214089 PROGRAM STUDI MANAJEMEN JURUSAN MANAJEMEN FAKULTAS EKONOMI UNIVERSITAS SANATA DHARMA YOGYAKARTA 2019 HALAMAN PENGESAHAN PEMBIMBING i PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI Moto dan Persembahan “Kamu harus bisa menghibur dirimu, karena kebahagian tidak datang dari manapun melainkan dari dalam dirimu sendiri” (CakNun) “Apa yang membuatmu bahagia lakukanlah dan apa yang membuatmu bersedih tinggalkan” Skripsi ini saya persembahkan untuk : Tuhan Yesus Kristus dan Bunda Maria yang selalu memberkati saya dalam mengerjakan skripsi dari awal hingga selesai. Ayah dan ibu saya yang selalu mendoakan, mendukung, dan selalu memberi semangat. Untuk almarhum nenek saya yang ingin sekali menemani saya saat wisuda. PERYATAAN KEASLIAN KARYA TULIS iv PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI UNIVERSITAS SANATA DHARMA FAKULTAS EKONOMI JURUSAN MANAJEMEN-PROGRAM STUDI MANAJEMEN PERNYATAAN KEASLIAN KARYA TULIS Saya yang bertanda tangan di bawah ini, dengan ini menyatakan bahwa skripsi dengan judul: PENGARUH KUALITAS PRODUK, HARGA, DAN PROMOSI TERHADAP KEPUTUSAN PEMBELIAN SMARTPHONE IPHONE dan diajukan untuk diuji pada tanggal …………… adalah hasil karya saya. Saya juga menyatakan bahwa dalam skripsi ini tidak terdapat keseluruhan atau sebagian tulisan orang lain yang saya ambil dengan cara menyalin, atau meniru dalam bentuk rangkaian kalimat atau simbol yang menunjukan gagasan atau pendapat atau pemikiran dari penulis lain yang saya aku seolah-olah sebagai tulisan saya sendiri, dan atau tidak terdapat bagian atau keseluruhan tulisan yang saya salin, saya tiru, atau saya ambil dari tulisan orang lain tanpa memberikan pengakuan (disebutkan dalam referensi) pada penulis aslinya. Bila di kemudian hari terbukti bahwa saya ternyata melakukan tindakan tersebut maka saya bersedia menerima sanksi, yaitu skripsi ini digugurkan dan gelar akademik yang saya peroleh (S.E.) dibatalkan serta diproses sesuai dengan aturan perundang-undangan yang berlaku (UU No 20 Tahun 2003, pasal 25 dan pasal 70). Yogyakarta, 08 Agustus 2019 Yang membuat pernyataan, Leonardus Niko Andira NIM: 152214089 v PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI LEMBAR PERNYATAAN PUBLIKASI KARYA ILMIAH UNTUK KEPENTINGAN AKADEMIS Yang bertanda tangan dibawah ini, saya mahasiswa Universitas Sanata Dharma: Nama : Leonardus Niko Andira NIM : 152214089 Demi pengembangan ilmu pengetahuan, saya memberikan kepada Perpustakaan Universitas Sanata Dharma karya ilmiah saya yang berjudul: PENGARUH KUALITAS PRODUK, HARGA DAN PROMOSI TERHADAP KEPUTUSAN PEMBELIAN SMARTPHONE IPHONE studi kasus konsumen Iphone di kampus 1 Universitas Sanata Dharma Dengan demikian saya memberikan kepada Perpustakaan Universitas Santa Dharma hak untuk menyimpan, mengalihkan dalam bentuk media lain, mengelolanya dalam bentuk pengkajian data, dan mempublikasikannya di internet atau media lain untuk kepentingan akademis tanpa meminta ijin kepada saya maupun memberikan royalti kepada saya selama tetap mencantumkan nama saya sebagai penulis. Demikian pernyataan ini saya tulis dengan sebenarnya. Dibuat di Yogyakarta, Pada tanggal 08 Agustus 2019 Yang menyatakan, Leonardus Niko Andira vi PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI KATA PENGANTAR Puji syukur atas berkat Tuhan Yesus atas segala anugerah, berkat, dan karuniaNya yang diberikan kepada penulis, sehingga penulis dapat menyelesaikan skripsi yang berjudul “ Pengaruh Kualitas Produk, Harga, dan Promosi Terhadap Keputusan Pembelian Smartphone Iphone “. Studi kasus pada konsumen di Kampus 1 Universitas Sanata Dharma Yogyakarta. Skripsi ini ditulis sebagai salah satu syarat untuk memperoleh gelar Sarjana Ekonomi pada Program Studi Manajemen Fakultas Ekonomi Universitas Sanata Dharma. Penulisan skripsi ini dapat selesai dengan baik berkat bantuan berbagai pihak. Untuk itu penulis ingin mengucapkan terimakasih kepada: 1. Bapak Albertus Yudi Yuniarto, S.E., M.B.A., selaku Dekan Fakultas Ekonomi Universitas Sanata Dharma. 2. Bapak Dr. Lukas Purwoto, M.Si., selaku Ketua Program Studi Manajemen Universitas Sanata Dharma. 3. Drs. Hyginus Suseno TW., M.S., selaku dosen pembimbing I yang telah meluangkan waktu, mengarahkan, dan membimbing sehingga penulis menyelesaikan skripsi ini. 4. Drs. P. Rubiyatno, M.M., selaku dosen II yang juga mengarahkan, membimbing, dan memberikan masukan dalam skripsi ini. 5. Bapak, Ibu Dosen, dan karyawan Fakultas Ekonomi Universitas Sanata Dharma Yogyakarta. vii PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI 6. Responden yang telah membantu mengisi kuesioner yang sudah saya buat dengan sangat serius. 7. Papa dan Mama saya tercinta yang selalu memberikan kasih sayang, doa, dan dukungan yang membuat saya untuk segera menyelesaikan skripsi ini. 8. Pacar saya Andini yang selalu memberikan semangat untuk segera menyelesaikan skripsi ini agar menjadi motivasi untuk dirinya menyelesaikan skripsinya supaya segera saya nikahi. 9. Sahabat-sahabatk saya EASTPOOL ( Kolam Timur ) sekaligus teman seperjuangan yang selalu ada untuk memberikan semangat, motivasi, dan tawa canda walaupun bercandaannya diluar batas yaitu Dyon, Eldon, Siman, Hendri, Dinda, Hobby, Bertus, Sony, Rio, David, Rico, Merlin, Priska, Della, Neda 10. Untuk Aloysius Unil sahabat yang selalu dengan sabar mengajari saya mengolah data walaupun saya kurang serius saat diajari. 11. Untuk Momsky nya Dyon yang selalu memasak makanan untuk saya dan teman-teman saat mengerjakan skripsi dirumah Dyon, serta Wifi gratis dirumah dyon yang bernama “KandangMelly” 12. Untuk Cafe Bjong yang menjadi tempat pertama saya mengerjakan skripsi. 13. Terimakasih juga untuk adek saya Vivi yang juga sudah membantu dalam mengerjakan skripsi ini. Penulis menyadari bahwa dalam penulisan skripsi ini masih banyak kekurangan, untuk itu penulis mengharapkan kritik maupun saran yang viii PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI sifatnya membangun demi perbaikan dimasa yang akan datang. Semoga skripsi ini bermanfaat bagi semua pihak yang membutuhkan. Yogyakarta, 08 Agustus 2019 Leonardus Niko Andira NIM : 152214089 ix PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI DAFTAR ISI HALAMAN JUDUL ........................................................................................................... i HALAMAN PERSETUJUAN PEMBIMBING ................................................................. ii HALAMAN PENGESAHAN............................................................................................ iii HALAMAN PERSEMBAHAN ........................................................................................ iv HALAMAN PERNYATAAN KEASLIAN KARYA TULIS ............................................ v HALAMAN PERNYATAAN PUBLIKASI ..................................................................... vi HALAMAN KATA PENGANTAR ................................................................................. vii HALAMAN DAFTAR ISI ................................................................................................. x HALAMAN DAFTAR TABEL ...................................................................................... xiii HALAMAN DAFTAR GAMBAR .................................................................................. xiv HALAMAN DAFTAR LAMPIRAN .............................................................................. xv ABSTRAK ....................................................................................................................... xvi BAB I PENDAHULUAN ................................................................................................... 1 A. Latar belakang ......................................................................................................... 1 B. Rumusan Masalah ................................................................................................... 4 C. Batasan Masalah ..................................................................................................... 4 D. Tujuan Penelitian .................................................................................................... 4 E. Manfaat Penelitian .................................................................................................. 5 BAB II KAJIAN PUSTAKA .............................................................................................. 6 A. Landasan Teori ........................................................................................................ 6 1. Pengertian Pemasaran ......................................................................................... 6 2. Produk ................................................................................................................. 8
Recommended publications
  • Ios Security
    iOS Security May 2012 2 Contents Page 3 Introduction Page 4 System Architecture Secure Boot Chain System Software Personalization App Code Signing Runtime Process Security Page 7 Encryption and Data Protection Hardware Security Features File Data Protection Passcodes Classes Keychain Data Protection Keybags Page 13 Network Security SSL, TLS VPN Wi-Fi Bluetooth Page 15 Device Access Passcode Protection Configuration Enforcement Mobile Device Management Device Restrictions Remote Wipe Page 18 Conclusion A Commitment to Security Page 19 Glossary 3 Introduction Apple designed the iOS platform with security at its core. Keeping information secure on mobile devices is critical for any user, whether they’re accessing corporate and customer information or storing personal photos, banking information, and addresses. Because every user’s information is important, iOS devices are built to maintain a high level of security without compromising the user experience. Data Protection Class iOS devices provide stringent security technology and features, and yet also are easy to use. The devices are designed to make security as transparent as possible. Many security App Sandbox features are enabled by default, so IT departments don’t need to perform extensive configurations. And some key features, like device encryption, are not configurable, so Software User Partition users cannot disable them by mistake. For organizations considering the security of iOS devices, it is helpful to understand OS Partition how the built-in security features work together to provide a secure mobile computing platform. Encrypted File System iPhone, iPad, and iPod touch are designed with layers of security. Low-level hardware and firmware features protect against malware and viruses, while high-level OS features allow secure access to personal information and corporate data, prevent unauthorized Kernel use, and help thwart attacks.
    [Show full text]
  • Stone Soup Spring 2019
    Spring 2019 & Spring Classes Catalogue The Journal of the San Geronimo Valley Community Center Rolling Stones St. Patrick’s Day by Dave Cort, Executive Director Youth Talent Show By Howie Cort Community Center “We Have a Really Big Shew Tonight” - Ed Sullivan th 50 Anniversary Year First there was The Ed Sullivan Show on Sunday nights. Then there was America’s Got Talent, followed by American Idol, but none of these shows can compare to our sweet, down-home, annual St. Patrick’s Day Talent Show. If you have been to this event you know what I’m talking about. Our Valley kids get up on the stage and open themselves Honoring The Past and their hearts to the audience by singing, dancing, reciting poetry, telling stories, jokes, and playing their instruments. It is an evening where our community of family and friends gather together to celebrate what’s really important: the children and youth Embracing The Present of our Valley. The evening is set up in three parts. The younger kids, between the ages of 5 to 10, will perform in the first act that will start at 4 p.m. and last until 5 p.m. We will take a break and, for an additional fee, you can enjoy a delicious dinner, along with Planning For The Future beverages and sweets. At 6 p.m., the second half will begin with the older kids. Instead of Ed Sullivan, we have MC extraordinaire Jasper Thelin and his amazing assistant Alexander McQuilkin who will entertain the audience and introduce the acts for the It is such an honor for me to be serving as Executive Director of the San Geronimo Valley show.
    [Show full text]
  • GOAL Global Opportunity Asset Locator Outlook for 2021 Rotation
    20 November 2020 | 5:46PM GMT GOAL: Global Opportunity Asset Locator Outlook for 2021: Rotation inoculation — remain pro-risk Christian Mueller-Glissmann, CFA +44(20)7774-1714 | christian.mueller- [email protected] Goldman Sachs International Alessio Rizzi n We are pro-risk for 2021 and expect the pro-cyclical rotation across and within +44(20)7552-3976 | [email protected] assets to continue, supported by a strong economic recovery from the COVID-19 Goldman Sachs International Cecilia Mariotti shock. With a favourable growth/inflation mix and still elevated equity risk premia +44(20)7552-0450 | [email protected] we are OW equities and UW bonds. With tighter credit spreads we are N credit Goldman Sachs International but still see opportunities to move down in quality. Over a 12m horizon we are Andrea Ferrario +44(20)7552-4353 | OW commodities (N for 3m), supported in particular by a bullish oil view. [email protected] Goldman Sachs International n While absolute equity valuations are high after the sharp recovery, they remain Peter Oppenheimer +44(20)7552-5782 | attractive vs. bonds. And equities should be able to digest a gradual increase in [email protected] bond yields better than fixed income as long as they come alongside better Goldman Sachs International David J. Kostin growth. We expect more rotation within equities – the leadership in regions, +1(212)902-6781 | [email protected] sectors and styles has been unusually defensive in the recovery. Goldman Sachs & Co. LLC Kathy Matsui n Our Risk Appetite Indicator (RAI) has turned positive, which alone is not a +81(3)6437-9950 | [email protected] Goldman Sachs Japan Co., Ltd.
    [Show full text]
  • MOVR Mobile Overview Report April – June 2017
    MOVR Mobile Overview Report April – June 2017 The first step in a great mobile experience TBD 2 The first step in a great mobile experience TBD 3 The first step in a great mobile experience Q1 2017 to Q2 2017 Comparisons Top Smartphones Top Smartphones Africa Asia Europe N. America Oceania S. America • New to the list this Apple iPhone 5S 1.3% 2.9% 4.1% 3.5% 3.9% 3.1% quarter are the Apple Apple iPhone 6 2.2% 4.8% 5.6% 9.3% 10.1% 4.5% iPhone SE and the Apple iPhone 6 Plus 0.8% 2.4% 0.9% 3.7% 3.2% 1.0% Samsung J7 Prime. Apple iPhone 6S 1.7% 4.4% 6.3% 11.0% 13.9% 3.1% Apple iPhone 6S Plus 0.7% 2.6% 1.1% 6.1% 4.6% 0.9% • Dropping off the list Apple iPhone 7 1.2% 2.9% 4.0% 7.6% 9.3% 2.2% are the Motorola Moto Apple iPhone 7 Plus 0.7% 3.1% 1.3% 6.9% 6.2% 1.1% G4, Samsung Galaxy J2 Apple iPhone SE 0.3% 0.6% 2.4% 2.2% 2.1% 1.0% (2015), and the Huawei P8 Lite 2.2% 0.3% 2.1% 0.2% 0.2% 0.6% Vodafone Smart Kicka. Motorola Moto G 0.0% 0.0% 0.1% 0.2% 0.0% 2.1% Motorola Moto G (2nd Gen) 0.0% 0.1% 0.0% 0.1% 0.1% 2.6% • North America and Motorola MotoG3 0.0% 0.1% 0.1% 0.2% 0.1% 3.1% Oceania continue to be Samsung Galaxy A3 1.2% 0.9% 2.2% 0.1% 0.2% 0.5% concentrated markets Samsung Galaxy Grand Neo 1.8% 0.8% 0.8% 0.1% 0.1% 0.6% for brands, with the Samsung Galaxy Grand Prime 0.5% 1.0% 1.5% 0.9% 0.1% 3.5% top smartphones Samsung Galaxy J1 1.8% 0.6% 0.3% 0.1% 0.3% 0.8% accounting for 63.7% and 74.4% Samsung Galaxy J1 Ace 2.5% 0.2% 0.0% 0.1% 0.3% 0.7% respectively.
    [Show full text]
  • Proposition De Stratégie
    iOS applications auditing AppSec Forum Western Switzerland Julien Bachmann / [email protected] › Motivations › Quick review of the environment › Common flaws › Information gathering › Network analysis › Software reverse engineering Preamble › Security engineer @ SCRT › Teacher @ HEIG-VD › Areas of interest focused on reverse engineering, software vulnerabilities, mobile devices security and OS internals › Not an Apple fanboy › But like all the cool kids... › Goals › This presentation aims at sharing experience and knowledge in iOS apps pentesting › Contact › @milkmix_ motivations | why ? › More and more applications › Most of Fortune-500 are deploying iPads › Growth in mobile banking › Mobile eShop › Internal applications › Need for security › Access and storage of sensitive information › Online payments environment | devices › Latest devices › Apple A5 / A5X / A6 / A6X › Based on ARMv7 specifications › Processor › RISC › Load-store architecture › Fixed length 32-bits instructions environment | simulator › Beware › Simulator != emulator › More like a sandbox › Code compiled for Intel processors › 32-bits › ~/Library/Application Support/iPhone Simulator/<v>/Applications/<id>/ environment | applications › Localisation › ~/Music/iTunes/iTunes Music/Mobile Applications/ › /var/mobile/Applications/<guid>/<appname>.app/ › .ipa › Used to deploy applications › Zip file environment | applications › .plist › Used to store properties › XML files, sometimes in a binary format › Associates keys (CFString, CFNumber, …) with values › plutil (1) › Convert binary plist file to its XML representation flaws | communication snooping › Secure by default › Well... at least if the developer is using URLs starting with HTTPS:// › Even if a fake certificate is presented ! › The DidFailWithError method is called flaws | communication snooping › Ok, but what about real life ? › A lot of development environments are using self-signed certificates › No built-in method to include certificates in the simulator › Obviously, what did the developers ? › Let's check what's on stackoverflow.com..
    [Show full text]
  • Starbucks Corp. (SBUX) Annual General Meeting
    Corrected Transcript 18-Mar-2020 Starbucks Corp. (SBUX) Annual General Meeting Total Pages: 14 1-877-FACTSET www.callstreet.com Copyright © 2001-2020 FactSet CallStreet, LLC Starbucks Corp. (SBUX) Corrected Transcript Annual General Meeting 18-Mar-2020 CORPORATE PARTICIPANTS Kevin Johnson John Culver President, Chief Executive Officer & Director, Starbucks Corp. Group President-International, Channel Development and Global Coffee & Tea, Starbucks Corp. Rachel A. Gonzalez Executive Vice President, General Counsel & Secretary, Starbucks Corp. Rosalind Gates Brewer Chief Operating Officer, Group President & Director, Starbucks Corp. Justin Danhof General Counsel & Director-Free Enterprise Project, The National Patrick J. Grismer Center for Public Policy Research Executive Vice President & Chief Financial Officer, Starbucks Corp. Rossann Williams Executive Vice President & President-U.S. company-operated business and Canada, Starbucks Corp. ..................................................................................................................................................................................................................................................................... MANAGEMENT DISCUSSION SECTION Kevin Johnson President, Chief Executive Officer & Director, Starbucks Corp. Well, good morning from Seattle, Washington, and welcome to Starbucks' 28th Annual Meeting of Shareholders. I'm so pleased to have you join this webcast and I want to open by thanking the Starbucks Board of Directors, all of whom are joining
    [Show full text]
  • Rich Corporations Poor Societies
    Rich corporations, poor societies: The financialisation of Apple By Rodrigo Fernandez (SOMO) and Reijer Hendrikse October 2015 Contents 1 Introduction ..................................................................................................... 3 2 Corporate financialisation .................................................................................. 5 3 The financialisation of Apple ............................................................................10 3.1 A short overview ......................................................................................10 3.2 Offshoring/outsourcing production ...............................................................12 3.3 Offshoring paper trails ...............................................................................13 3.4 Apple’s cash pile ......................................................................................15 3.5 A corporate cash machine .........................................................................17 4 Conclusion .....................................................................................................19 Glossary .............................................................................................................21 Colophon ............................................................................................................22 1 Introduction At the dawn of the new millennium, Apple Inc. stands as the epitome of a digitalised and globalised economy shaped by information and communication technologies. A world
    [Show full text]
  • Apple, Inc. Collegiate Purchase Program Premier Price List January 11, 2011
    Apple, Inc. Collegiate Purchase Program Premier Price List January 11, 2011 Revisions to the December 7, 2010 Collegiate Purchase Program Premier Price List Effective January 11, 2011 PRODUCTS ADDED TO THE PRICE LIST PRODUCTS REPRICED ON THE PRICE LIST PRODUCTS REMOVED FROM THE PRICE LIST This Price List supersedes all previous Price Lists. Products subject to discontinuation without notice. Prices subject to change without notice. Education Solutions Apple iPod Learning Lab The Apple iPod Learning Lab provides schools with the ideal solution for managing multiple iPod devices in the classroom. The solution includes (20) iPod touch 8GB devices housed in a durable and easy-to-use Apple-exclusive mobile cart capable of storing and charging up to 40 iPod devices. The cart's ability to sync up to 20 iPod devices at a time from one computer makes it quick and easy to set up the devices for student use. The mobile cart's secure, roll-top door can be locked for safe iPod storage. The cart also includes room for storage of up to four notebook computers and a variety of iPod accessories. And, because the cart is mobile, it can be easily shared among multiple classrooms. Choose one of the pre-configured solutions below, or build your own custom iPod lab by visiting http://edu1.apple.com/custom_ipod_lab/. Recommended add-ons: The MacBook is an ideal companion for the Apple iPod Learning Lab. Create compelling education content with iLife and organize and share that content via iTunes. Apple Professional Development prepares teachers to effectively integrate iPod devices and podcasting into their curriculum.
    [Show full text]
  • Open APPLE THESIS FINAL__1 .Pdf
    THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF SUPPLY CHAIN AND INFORMATION SYSTEMS SUPPLY CHAIN AS A SWORD AND A SHIELD: LESSONS FROM APPLE LAUREN E. STERN SPRING 2013 A thesis submitted in partial fulfillment of the requirements for a baccalaureate degree in Supply Chain and Information Systems with honors in Supply Chain and Information Systems Reviewed and approved* by the following: Felisa Preciado Clinical Associate Professor of Supply Chain and Information Systems Thesis Supervisor John C. Spychalski Professor Emeritus of Supply Chain Management Honors Adviser * Signatures are on file in the Schreyer Honors College. i ABSTRACT In the past few decades, Apple has gone from being an incredible startup success story, to a company on the very brink of failure, to its current status as one of the most valuable and emulated companies in the world. It originally got its start through technological innovations, laser-like focus and a sometimes uncanny understanding for what consumers would want, and those things have certainly been constant themes during its periods of success. But one of the biggest reasons for its outstanding success in the past decade has been the way Apple has leveraged its supply chain both to control costs and to give it a competitive advantage unmatched by any of its competitors. This paper analyzes the Apple supply chain to try to identify the way in which Apple has taken advantage of its supply chain, adapted it to changes in the market, and used it as both a defensive and offensive competitive weapon to become one of the most successful and influential companies in the world.
    [Show full text]
  • The Courts' Indecipherable Approach to Encryption
    WARNING—WEAK PASSWORD: THE COURTS’ INDECIPHERABLE APPROACH TO ENCRYPTION AND THE FIFTH AMENDMENT Matthew J. Weber TABLE OF CONTENTS I. Introduction ......................................................................................... 456 II. Background ......................................................................................... 458 A. The Rise of Encryption ................................................................ 458 B. What Is Encryption? .................................................................... 458 C. Encryption and Tech Companies ................................................. 459 III. Analysis ............................................................................................... 461 A. Existing Framework/Legal History ............................................. 461 1. Fisher v. United States .......................................................... 461 2. Doe v. United States .............................................................. 462 3. United States v. Hubbell ........................................................ 463 B. Applying the Existing Framework to Encryption Cases ............. 464 1. Boucher I and II ..................................................................... 465 2. United States v. Friscosu ....................................................... 468 3. United States v. Doe (In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011) .............................................. 468 C. Encryption Law in the Future/Current Events ............................
    [Show full text]
  • NC Sizemore,President
    Key articles..... A Clean Mac— Simple ways to banish grunge, dirt and dust bunnies from Next Monthly Meeting - Feb. 14, 2012, 7 PM your computer and peripherals— Using a Mac to Trace Your Family History, page 3. Bobby Adams, OMUG Member January 2012 Life After iWeb— What do you do now. What alternative website software is available— page 5. Everything you ever wanted to know about using the App Store presented in step-by-step style— page 6. February 2012 Hi All..... org/workshops/workshop_12.html and here: to learning about some new research tools (hope- The Christmas decorations are http://ocalamug.org/wp3/?page_id=181. fully free ones) myself. put away and dozens (it seems) One of the topics was “Using Text Edit as your As for me, I’m currently working my way of spring projects are upon me. primary word processor”. That is exactly what I am through “Steve Jobs” by Walter Isaacson. It is 571 I assume on you also. If you were in doing now as I write this message, and it is work- pages plus notes and references. I’m less than half the January meeting you no doubt ing great. TextEdit is doing everything I want it to way through and have found it to be a fascinating added to your spring “to do” list and it is easy to use. I save and transmit my files in story — almost stranger than fiction. I recommend with all the house cleaning and .rtf (rich text format) and have never had anyone it. You will find out a lot about Steve and about organizing tips Phil gave us.
    [Show full text]
  • The Ipad Comparison Chart Compare All Models of the Ipad
    ABOUT.COM FOOD HEALTH HOME MONEY STYLE TECH TRAVEL MORE Search... About.com About Tech iPad iPad Hardware and Competition The iPad Comparison Chart Compare All Models of the iPad By Daniel Nations SHARE iPad Expert Ads iPAD Pro New Apple iPAD iPAD 2 iPAD Air iPAD Cases iPAD MINI2 Cheap Tablet PC Air 2 Case Used Computers iPAD Display The iPad has evolved since it was originally announced in January 2010. Sign Up for our The iPad 2 added dual-facing cameras Free Newsletters along with a faster processor and improved graphics, but the biggest jump About Apple was with the iPad 3, which increased the Tech Today resolution of the display to 2,048 x 1,536 iPad and added Siri for voice recognition. The iPad 4 was a super-charged iPad 3, with Enter your email around twice the processing power, and the iPad Mini, released alongside the iPad SIGN UP 4, was Apple's first 7.9-inch iPad. Two years ago, the iPad Air became the TODAY'S TOP 5 PICKS IN TECH first iPad to use a 64-bit chip, ushering IPAD CATEGORIES the iPad into a new era. We Go Hands-On 5 With the OnePlus X New to iPad: How to Get The latest in Apple's lineup include the By Faryaab Sheikh Started With Your iPad iPad Pro, which super-sizes the screen to Smartphones Expert The entire iPad family: Pro, Air and Mini. Image © 12.9 inches and is compatible with a new The Best of the iPad: Apps, Apple, Inc.
    [Show full text]