CHAPTER 1 ORGANISATION PROFILE 1.1: History Founders Steve Jobs and Steve Wozniak Created Apple Computer on April 1 1976,And
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Apple & Deloitte Team up to Accelerate Business
NEWS RELEASE Apple & Deloitte Team Up to Accelerate Business Transformation on iPhone & iPad 9/28/2016 Deloitte Introduces New Apple Practice to Help Businesses Design & Implement iPhone & iPad Solutions CUPERTINO, Calif. & NEW YORK--(BUSINESS WIRE)-- Apple® and Deloitte today announced a partnership to help companies quickly and easily transform the way they work by maximizing the power, ease-of-use and security the iOS platform brings to the workplace through iPhone® and iPad®. As part of the joint effort, Deloitte is creating a first-of-its-kind Apple practice with over 5,000 strategic advisors who are solely focused on helping businesses change the way they work across their entire enterprise, from customer-facing functions such as retail, field services and recruiting, to R&D, inventory management and back-office systems. This Smart News Release features multimedia. View the full release here: http://www.businesswire.com/news/home/20160928006317/en/ Apple CEO Tim Cook and Deloitte Global CEO Punit Renjen meet at Apple's campus to Apple and Deloitte will also announce a joint effort to accelerate business transformation using iOS, iPhone & iPad. collaborate on the development (Courtesy of Apple/Roy Zipstein) of a new service offering from Deloitte Consulting called EnterpriseNext, designed to help clients fully take advantage of the iOS ecosystem of hardware, software and services in the workplace. The new offering will help customers discover the highest impact possibilities within their industries and quickly develop custom solutions through rapid prototyping. 1 “We know that iOS is the best mobile platform for business because we’ve experienced the benefit ourselves with over 100,000 iOS devices in use by Deloitte’s workforce, running 75 custom apps,” said Punit Renjen, CEO of Deloitte Global. -
Amazon's Antitrust Paradox
LINA M. KHAN Amazon’s Antitrust Paradox abstract. Amazon is the titan of twenty-first century commerce. In addition to being a re- tailer, it is now a marketing platform, a delivery and logistics network, a payment service, a credit lender, an auction house, a major book publisher, a producer of television and films, a fashion designer, a hardware manufacturer, and a leading host of cloud server space. Although Amazon has clocked staggering growth, it generates meager profits, choosing to price below-cost and ex- pand widely instead. Through this strategy, the company has positioned itself at the center of e- commerce and now serves as essential infrastructure for a host of other businesses that depend upon it. Elements of the firm’s structure and conduct pose anticompetitive concerns—yet it has escaped antitrust scrutiny. This Note argues that the current framework in antitrust—specifically its pegging competi- tion to “consumer welfare,” defined as short-term price effects—is unequipped to capture the ar- chitecture of market power in the modern economy. We cannot cognize the potential harms to competition posed by Amazon’s dominance if we measure competition primarily through price and output. Specifically, current doctrine underappreciates the risk of predatory pricing and how integration across distinct business lines may prove anticompetitive. These concerns are height- ened in the context of online platforms for two reasons. First, the economics of platform markets create incentives for a company to pursue growth over profits, a strategy that investors have re- warded. Under these conditions, predatory pricing becomes highly rational—even as existing doctrine treats it as irrational and therefore implausible. -
Mobile LBS: Status Update & Platform Assessment
Wireless Media Mobile LBS: Status Update & Platform Assessment Wireless Media Strategies (WMS) Report Snapshot This report provides Strategy Analytics’ high-level outlook for handset-based location-based services. Rising GPS penetration, the growing popularity of taxi- sharing, carpooling, and ride-sharing apps, third-party content integration into popular map applications, and the emerging wearables device category provide opportunities for growth and development in mobile LBS. This report also includes an update of our assessment of global location-platform leaders, HERE, Google, TomTom and Apple. November 2016 Nitesh Patel +441908423621 Tel: Email: [email protected] www.strategyanalytics.com Wireless Media Contents 1. Executive Summary 3 2. Key Trends in Mobile LBS 4 2.1 Reported Mobile LBS Use and Adoption 5 2.2 Mobile Maps & Direction Use in Context 6 2.3 Mobile Location Capability to Boost Emerging Market Opportunities 9 2.3.1 GPS handset penetration rises in the entry tier 9 2.4 New Trends in Urban Mobility 10 2.5 From Maps & Navigation to All-in-One Travel Planning Apps 11 2.6 Wearables Remain a Growth Opportunity 13 3. Location Platform Benchmark Update 16 3.1 Overall Assessment 21 Exhibits Exhibit 1: Overall Mobile Map & Directions Use in Context: Asia, Europe, and the US ............................................... 6 Exhibit 2: Regular Mobile Map & Directions Use in Context: Asia, Europe, and the US .............................................. 8 Exhibit 3: Mobile Map & Directions Use across All Countries ...................................................................................... 8 Exhibit 4 Rising Penetration of GPS Handsets by Price Tier ...................................................................................... 10 Exhibit 5 Global Wearable Device Sales by Type ...................................................................................................... 14 Exhibit 6 The Relative Strengths & Weaknesses of Major Location Platforms .......................................................... -
From Struggles to Stardom
AAPL 175.01 Steve Jobs 12/21/17 $200.0 100.0 80.0 17 60.0 Apple co-founders 14 Steve Wozniak 40.0 and Steve Jobs 16 From Struggles 10 20.0 9 To Stardom Jobs returns Following its volatile 11 10.0 8.0 early years, Apple has 12 enjoyed a prolonged 6.0 period of earnings 15 and stock market 5 4.0 gains. 2 7 2.0 1.0 1 0.8 4 13 1 6 0.6 8 0.4 0.2 3 Chart shown in logarithmic scale Tim Cook 0.1 1980 ’82 ’84 ’86’88 ’90 ’92 ’94 ’96 ’98 ’00 ’02 ’04 ’06’08 ’10 ’12 ’14 ’16 2018 Source: FactSet Dec. 12, 1980 (1) 1984 (3) 1993 (5) 1998 (8) 2003 2007 (12) 2011 2015 (16) Apple, best known The Macintosh computer Newton, a personal digital Apple debuts the iMac, an The iTunes store launches. Jobs announces the iPhone. Apple becomes the most valuable Apple Music, a subscription for the Apple II home launches, two days after assistant, launches, and flops. all-in-one desktop computer 2004-’05 (10) Apple releases the Apple TV publicly traded company, passing streaming service, launches. and iPod Touch, and changes its computer, goes public. Apple’s iconic 1984 1995 (6) with a colorful, translucent Apple unveils the iPod Mini, Exxon Mobil. Apple introduces 2017 (17 ) name from Apple Computer. Shares rise more than Super Bowl commercial. Microsoft introduces Windows body designed by Jony Ive. Shuffle, and Nano. the iPhone 4S with Siri. Tim Cook Introduction of the iPhone X. -
The Department of Justice Versus Apple Inc. -- the Great Encryption Debate Between Privacy and National Security
Catholic University Journal of Law and Technology Volume 27 Issue 2 Spring 2019 Article 3 2019 The Department of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy and National Security Julia P. Eckart Follow this and additional works at: https://scholarship.law.edu/jlt Part of the Communications Law Commons, Constitutional Law Commons, First Amendment Commons, Intellectual Property Law Commons, Internet Law Commons, Other Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Julia P. Eckart, The Department of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy and National Security, 27 Cath. U. J. L. & Tech 1 (2019). Available at: https://scholarship.law.edu/jlt/vol27/iss2/3 This Article is brought to you for free and open access by CUA Law Scholarship Repository. It has been accepted for inclusion in Catholic University Journal of Law and Technology by an authorized editor of CUA Law Scholarship Repository. For more information, please contact [email protected]. THE DEPARTMENT OF JUSTICE VERSUS APPLE INC.—THE GREAT ENCRYPTION DEBATE BETWEEN PRIVACY AND NATIONAL SECURITY Julia P. Eckart* I. THE FACTS UNDERLYING THE DOJ–APPLE DISPUTE ........................3 A. Timeline of the Parties’ Court-Filed Documents ......................................6 B. Issues Presented in the DOJ–Apple Litigation ..........................................8 II. APPLE’S iOS9.0 SECURITY GUIDE ..........................................................9 A. Some of Apple’s Encryption and Non-Encryption Security Features ........9 B. Other Hardware and Software System Security Features .......................11 III. DOES THIS CASE PERTAIN TO A SINGLE IPHONE OR ALL IPHONES? .......................................................................................................12 A. DOJ’s Position—It is About One, Single iPhone ....................................12 B. -
Legal Responses and Countermeasures to National Security Letters
Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D. -
Monetizing Car Data New Service Business Opportunities to Create New Customer Benefits
Monetizing car data New service business opportunities to create new customer benefits Advanced Industries September 2016 Foreword As privately owned vehicles become increasingly connected to each other and to external infrastructures via a growing number of sensors, a massive amount of data is being gener- ated. Gathering this data has become par for the course; leveraging insights from data in ways that can monetize it, however, is still in its nascent stages. To answer key questions around car data monetization and to understand how players along the connected car value chain might capture this potential, McKinsey & Company launched a large-scale, multimodality knowledge initiative course of research: Roundtable sessions conducted in Germany and the USA convened leaders from the automotive (OEMs, suppliers, sales), high-tech, insurance, telecommunications, and finance sectors. Surveys administered in China, Germany, and the USA assessed the preferences, trends, and concerns of about 3,000 customers regarding car data. One-on-one interviews explored the perspectives of car data leaders on the trends and monetization matters in the space. “Customer clinics” collected user observations around preferences and attitudes towards the practicality of various car connectivity features and services. A model was developed to quantify the overall revenue pool related to car data and the opportunity for key industry players based on selected, prioritized use cases. In the following you will find a synthesis of the key findings of this broad, ongoing knowl- edge effort. We would like to thank the many organizations that participated in this exploration of the potential and requirements of car data monetization and that through their contributions made this effort possible. -
Didi's COVID-19 Relief Efforts
DiDi's COVID-19 Relief Efforts Shuai Ren DiDi Chuxing DiDi’s Relief Efforts During the Outbreak Towards Post-Pandemic Dedicated Fleets for Healthcare Workers Point-to-Point: Commuter Bus and DRT Installing In-Vehicle Plastic Protective Sheets DiDi Hitch – Ride with Coworker Introducing AI to Verify Mask-Wearing DiDi Bike - 12 Days of Free Services “Transit Occupancy Alerting" System Joined City Consumer Voucher Plans Global Efforts to Combat COVID-19 Urban Traffic Activity Index Dedicated Fleets for Healthcare Workers 2020.1.23-24 2020.1.27 2020.2.1 2020.3 DiDi drivers organized to 2000+ healthcare Launched fund for special fleets, Launched sanitation stations operate multiple workers can call protective supplies and financial in close to 200 cities in China. emergency fleets online assistance for DPs. 2020.1.21 2020.1.25 2020.1.28 2020.2.3 COVID-19 task force Launched free services Launched free services Launched free services created for healthcare workers in for healthcare workers in for healthcare workers in Wuhan Shanghai Beijing Installing In-Vehicle Plastic Protective Sheets 2020.2.18, DiDi announced to install in-vehicle plastic protective sheets for DiDi’s car-hailing services all over the country, in order to prevent the spread of droplets as much as possible. Introducing AI to Verify Mask-Wearing AI technology to verify whether drivers are wearing masks. Driver partners who fail to follow safety requirements may not be permitted to provide rides to users through the platform. Technology advantages Accurate Multiple Steady Real-time Verification Adapt to various identification accuracy up to complex scenes and support for 99% in practice high concurrent commitment “Transit Occupancy Alerting" System DiDi's Smart Transportation Brain Team provided Shenzhen Bus Group with basic capabilities such as big data platform construction as well as application modeling and analysis, and helped it quickly build a “Transit Occupancy Alerting" system to ensure enough distance between passengers on buses. -
Secrets at Apple's Core [Entire Talk]
Stanford eCorner Secrets at Apple's Core [Entire Talk] Adam Lashinsky, Author May 23, 2012 Video URL: http://ecorner.stanford.edu/videos/2973/Secrets-at-Apples-Core-Entire-Talk Adam Lashinsky, Fortune senior editor-at-large, shares an insider look at Apple, one of the world's most iconic and secretive companies. Based on his research into the technology giant's internal processes and approaches to leadership and building products, Lashinsky offers insights and surprises from his book, Inside Apple: How America's Most Admired--and Secretive-- Company Really Works. Transcript Almost exactly a year-ago this week I published an article in Fortune magazine with the same title as you see in front of you, Inside Apple. We decided at Fortune that in Apple we had a company that the entire world thought they knew a lot about because the world knew about Apple's products. And they knew about Apple's advertising and its image and its brand and its logo and so on. When in fact the world knew and really still does know very little about how Apple does what it does, what goes on inside Apple? There is a reason for that and it's a major part of my thesis and what I've learned in researching this company intensely over the last year and that is that Apple doesn't want us to know what goes on inside Apple. Apple is professionally focused on telling us, telling you about its products. Not about it. As a business journalist, my job is not to be concerned with what Apple is interested in us knowing, but what my readers at Fortune magazine ought to know and want to know. -
FBI–Apple Encryption Dispute - Wikipedia, the Free Encyclopedia 6/2/16, 6:59 AM
FBI–Apple encryption dispute - Wikipedia, the free encyclopedia 6/2/16, 6:59 AM FBI–Apple encryption dispute From Wikipedia, the free encyclopedia The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose contents are cryptographically protected.[1] There is much debate over public access to strong encryption.[2] In 2015 and 2016, Apple Inc. has received and objected to or challenged at least 11 orders issued by United States district courts under the All Writs Act of 1789. Most of these seek to compel Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked iPhones running on operating systems iOS 7 and older" in order to assist in criminal investigations and prosecutions. A few requests, however, involve phones with more extensive security protections, which Apple has no current ability to break. These orders would compel Apple to write new software that would let the government bypass these device's security and unlock the phones.[3] The most well-known instance of the latter category was a February 2016 court case in the United States District Court for the Central District of California. The FBI wanted Apple to create and electronically An iPhone 5C, the model used by one sign new software that would enable the FBI to unlock a work-issued of the perpetrators of the 2015 San iPhone 5C it recovered from one of the shooters in a December 2015 Bernardino attack terrorist attack in San Bernardino, California, that killed 14 people and injured 22. -
Uber-Technologies-Inc-2019-Annual-Report.Pdf
2019 Annual Report 69 Countries A global tech platform at 10K+ massive scale Cities Serving multiple multi-trillion dollar markets with products leveraging our core technology $65B and infrastructure Gross Bookings We believe deeply in our bold mission. Every minute of every day, consumers and Drivers on our platform can tap a button and get a ride or tap a button and get work. We revolutionized personal mobility with ridesharing, and we are leveraging our platform to redefine the massive meal delivery and logistics 111M industries. The foundation of our platform is our MAPCs massive network, leading technology, operational excellence, and product expertise. Together, these elements power movement from point A to point B. 7B Trips UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2019 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-38902 UBER TECHNOLOGIES, INC. (Exact name of registrant as specified in its charter) Delaware 45-2647441 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1455 Market Street, 4th Floor San Francisco, California 94103 (Address of principal executive offices, including zip code) (415) 612-8582 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class Trading Symbol(s) on which registered Common Stock, par value $0.00001 per share UBER New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark whether the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. -
Court-Ordered Access to Smart Phones: in Brief
Court-Ordered Access to Smart Phones: In Brief Kristin Finklea Specialist in Domestic Security Richard M. Thompson II Legislative Attorney Chris Jaikaran Analyst in Cybersecurity Policy February 23, 2016 Congressional Research Service 7-5700 www.crs.gov R44396 Court-Ordered Access to Smart Phones: In Brief Summary The tension between the benefits and challenges of encryption has been an issue for law enforcement and policymakers since the 1990s, and was reinvigorated in 2014 when companies like Apple and Google implemented automatic enhanced encryption on mobile devices and certain communications systems. Companies using such strong encryption do not maintain “back door” keys and, therefore, now cannot easily unlock, or decrypt, the devices—not even when presented with a valid legal order. Law enforcement concerns about the lack of back door keys were highlighted by the November and December 2015 terrorist attacks in Paris, France, and San Bernardino, CA. Questions arose as to whether the attackers used strong encryption and, more importantly, if they did, whether and how this might have hindered investigations. Following the December 2, 2015, terrorist attack in San Bernardino, CA,, U.S. investigators recovered a cell phone reportedly used by one of the shooters. Federal Bureau of Investigation (FBI) Director James B. Comey testified before Congress two months later, indicating that the Bureau was still unable to access the information on that device. On February 16, 2016, the U.S. District Court for the Central District of California ordered Apple to provide “reasonable technical assistance to assist law enforcement agents in obtaining access to the data” on the cell phone.