Apple Inc. (AAPL) Resuming Coverage with CL-Buy: Platform Opportunity

Total Page:16

File Type:pdf, Size:1020Kb

Apple Inc. (AAPL) Resuming Coverage with CL-Buy: Platform Opportunity December 12, 2010 ACTION Buy Apple Inc. (AAPL) Return Potential: 34% Equity Research Resuming coverage with CL-Buy: platform opportunity still nascent Source of opportunity Investment Profile We are resuming coverage of Apple with a Buy rating and 12-month target Low High price of $430 and placing it on our Americas Conviction List. We believe Growth Growth Apple’s platform-centric business model is the secret sauce that has Returns * Returns * Multiple Multiple enabled it to quickly capture market share in new computing segments Volatility Volatility while simultaneously enjoying considerable margin leverage. Percentile 20th 40th 60th 80th 100th Furthermore, we believe significant growth and profit opportunities for Apple Inc. (AAPL) this platform still lie ahead. As a result, we expect revenue and earnings Americas Technology Peer Group Average * Returns = Return on Capital For a complete description of the expectations to continue to trend upward, and we view the shares as investment profile measures please refer to attractive at current levels. the disclosure section of this document. Catalyst Key data Current Price ($) 320.56 Apple’s recent gross margin trends and guidance have caused some 12 month price target ($) 430.00 concerns among the investing community. Our analysis of Apple’s Market cap ($ mn) 293,623.4 platform history not only suggests that this gross margin erosion is 9/10 9/11E 9/12E 9/13E normal, but also that we have probably already seen the worst of it. Revenue ($ mn) New 65,225.1 91,807.0 110,772.6 122,389.7 Indeed, we believe Apple’s margins have already bottomed, and we expect Revenue ($ mn) Old-------- EPS ($) New 15.15 19.86 24.91 28.29 the company to resume its leverage-driven upside in coming quarters. In EPS ($) Old -------- P/E (X) 21.2 16.1 12.9 11.3 addition, we expect iPad and iPhone momentum to exceed expectations in EV/EBITDA (X) 10.2 10.8 8.6 7.5 2011, driving further upside. We expect Apple to ship 37.2 million iPad ROE (%) 35.3 32.2 29.5 25.5 units in CY11, which could potentially make Apple one of the largest 9/10 12/10E 3/11E 6/11E vendors in the global personal computing market (Tablets plus PCs). EPS ($) 4.64 5.41 4.30 4.39 Valuation Price performance chart Our $430 price target represents a P/E multiple of 20.0 times our above- 340 1,400 320 1,350 consensus calendar 2011 EPS estimate of $21.46. Our target multiple is 300 1,300 14.4% below the stock’s five-year average multiple of 23.4 times. 280 1,250 260 1,200 Key risks 240 1,150 220 1,100 The key risks to our target include: macro deterioration, increased platform 200 1,050 competition, potential legal and regulatory restrictions, and uncertain 180 1,000 management succession plans. Dec-09 Mar-10 Jun-10 Sep-10 Apple Inc. (L) S&P 500 (R) INVESTMENT LIST MEMBERSHIP Americas Buy List Americas Conviction Buy List Share price performance (%) 3 month 6 month 12 month Absolute 21.7 28.0 63.2 Rel. to S&P 500 8.9 12.1 45.0 Coverage View: Neutral Source: Company data, Goldman Sachs Research estimates, FactSet. Price as of 12/10/2010 close. Bill Shope, CFA The Goldman Sachs Group, Inc. does and seeks to do business with (212) 902-6834 [email protected] Goldman Sachs & Co. companies covered in its research reports. As a result, investors should Elizabeth Borbolla be aware that the firm may have a conflict of interest that could affect (212) 357-4977 [email protected] Goldman Sachs & Co. the objectivity of this report. Investors should consider this report as Cristina Colon, CMA only a single factor in making their investment decision. For Reg AC (212) 902-9913 [email protected] Goldman Sachs & Co. certification, see the end of the text. Other important disclosures follow Stephen Oshman the Reg AC certification, or go to www.gs.com/research/hedge.html. (917) 343-3128 [email protected] Goldman Sachs & Co. Analysts employed by non-US affiliates are not registered/qualified as research analysts with FINRA in the U.S. The Goldman Sachs Group, Inc. Global Investment Research December 12, 2010 Apple Inc. (AAPL) Apple Inc.: Summary Financials Profit model ($ mn) 9/10 9/11E 9/12E 9/13E Balance sheet ($ mn) 9/10 9/11E 9/12E 9/13E Total revenue 65,225.1 91,807.0 110,772.6 122,389.7 Cash & equivalents 11,261.0 13,429.5 15,393.5 17,157.9 Cost of goods sold (39,541.0) (56,839.6) (66,785.7) (72,710.8) Accounts receivable 5,510.0 7,086.8 8,123.2 9,054.3 SG&A (5,517.0) (7,722.8) (9,264.9) (9,953.2) Inventory 1,051.0 1,320.0 1,495.9 1,631.9 R&D (1,782.0) (2,478.1) (2,966.8) (3,072.0) Other current assets 9,497.0 11,381.4 12,690.1 13,748.0 Other operating profit/(expense) 0.0 0.0 0.0 0.0 Total current assets 27,319.0 33,217.6 37,702.8 41,591.9 ESO expense -- -- -- -- Net PP&E 4,768.0 8,622.2 11,514.5 14,063.0 EBITDA 19,412.1 26,235.4 33,527.5 38,611.9 Net intangibles 0.0 0.0 0.0 0.0 Depreciation & amortization (1,027.0) (1,468.9) (1,772.4) (1,958.2) Total investments 39,750.0 58,893.3 83,983.8 113,449.2 EBIT 18,385.1 24,766.5 31,755.1 36,653.7 Other long-term assets 3,346.0 4,130.0 5,097.8 6,292.3 Net interest income/(expense) 155.0 260.0 260.0 260.0 Total assets 75,183.0 104,863.2 138,298.9 175,396.4 Income/(loss) from associates 0.0 0.0 0.0 0.0 Others 0.0 0.0 0.0 0.0 Accounts payable 12,015.0 14,755.3 16,721.8 18,241.1 Pretax profits 18,540.1 25,026.5 32,015.1 36,913.7 Short-term debt 0.0 0.0 0.0 0.0 Provision for taxes (4,527.0) (6,381.8) (8,163.9) (9,413.0) Other current liabilities 8,707.0 10,542.7 12,101.9 13,785.6 Minority interest 0.0 0.0 0.0 0.0 Total current liabilities 20,722.0 25,298.0 28,823.7 32,026.8 Net income pre-preferred dividends 14,013.1 18,644.7 23,851.3 27,500.7 Long-term debt 0.0 0.0 0.0 0.0 Preferred dividends 0.0 0.0 0.0 0.0 Other long-term liabilities 6,670.0 11,529.4 15,988.2 20,782.0 Net income (pre-exceptionals) 14,013.1 18,644.7 23,851.3 27,500.7 Total long-term liabilities 6,670.0 11,529.4 15,988.2 20,782.0 Post tax exceptionals (0.1) 0.0 0.0 0.0 Total liabilities 27,392.0 36,827.4 44,811.9 52,808.7 Net income (post-exceptionals) 14,013.0 18,644.7 23,851.3 27,500.7 Preferred shares 0.0 0.0 0.0 0.0 EPS (basic, pre-except) ($) 15.41 20.17 25.30 28.73 Total common equity 47,791.0 68,035.7 93,487.0 122,587.7 EPS (diluted, pre-except) ($) 15.15 19.86 24.91 28.29 Minority interest 0.0 0.0 0.0 0.0 EPS (basic, post-except) ($) 15.41 20.17 25.30 28.73 EPS (diluted, post-except) ($) 15.15 19.86 24.91 28.29 Total liabilities & equity 75,183.0 104,863.2 138,298.9 175,396.4 Common dividends paid -- -- -- -- DPS ($) 0.000.000.000.00 Dividend payout ratio (%) 0.0 0.0 0.0 0.0 Additional financials 9/10 9/11E 9/12E 9/13E Net debt/equity (%) (23.6) (19.7) (16.5) (14.0) Interest cover (X) NMNMNMNM Growth & margins (%) 9/10 9/11E 9/12E 9/13E Inventory days 7.0 7.6 7.7 7.9 Sales growth 52.0 40.8 20.7 10.5 Receivable days 24.8 25.0 25.1 25.6 EBITDA growth 55.6 35.1 27.8 15.2 BVPS ($) 52.18 73.01 98.24 127.23 EBIT growth 56.6 34.7 28.2 15.4 Net income (pre-except) growth 70.2 33.1 27.9 15.3 ROA (%) 22.8 20.7 19.6 17.5 EPS growth 67.1 30.9 25.5 13.6 CROCI (%) 46.4 41.1 35.0 28.8 Gross margin 39.4 38.1 39.7 40.6 EBITDA margin 29.8 28.6 30.3 31.5 Dupont ROE (%) 29.3 27.4 25.5 22.4 EBIT margin 28.2 27.0 28.7 29.9 Margin (%) 21.5 20.3 21.5 22.5 Turnover (X) 0.9 0.9 0.8 0.7 Cash flow statement ($ mn) 9/10 9/11E 9/12E 9/13E Leverage (X) 1.6 1.5 1.5 1.4 Net income 14,013.1 18,644.7 23,851.3 27,500.7 D&A add-back (incl.
Recommended publications
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • Tellstory a Medialogy Project About Storytelling in Handheld Games
    TellStory A Medialogy project about storytelling in handheld games Medialogy - 10th semester Project period: 01-02-2010 to 16-06-2010 Supervisors: Tony Brooks & Kristoffer Jensen Student: David Lindholm Abstract This paper describes a project made to explore storytelling in a game on a hand-held platform. The application used in the test is a small game-like iPhone app, implemented using the iPhone SDK 3.2 and various other tools. The application tells two stories using two different storytelling tools: Non-player character (NPC) dialogue and pure text. To evaluate the impact of having a character there to tell the story versus just reading a screen of text, a small group of people were tested and interviewed. The results give some insight into what factors influence storytelling in a hand-held game, as well as the understanding of the story and storytelling preferences. ------------------------------ David Lindholm David Lindholm 2 of 55 Reader's manual The report is numbered with Arabic numerals, and the appendix is numbered using Roman numerals. When referencing other sections, both the section and page numbers will be listed. All figures and tables are numbered incrementally using Arabic numerals. When reading this report, any mentions of previous or earlier projects are to be understood as previous projects and project groups I have been involved in. Acknowledgements Parts of the test application relies on graphics that were reused from previous projects. Additionally, as there is a small amount of overlap between this project and previous works, parts of this report contain content also used in earlier reports. For those reasons, I would like to thank my former associates Razvan Enescu, Qiong Jia, and Nicolaj Hansen, for allowing me to continue the work that we started together.
    [Show full text]
  • Secrets at Apple's Core [Entire Talk]
    Stanford eCorner Secrets at Apple's Core [Entire Talk] Adam Lashinsky, Author May 23, 2012 Video URL: http://ecorner.stanford.edu/videos/2973/Secrets-at-Apples-Core-Entire-Talk Adam Lashinsky, Fortune senior editor-at-large, shares an insider look at Apple, one of the world's most iconic and secretive companies. Based on his research into the technology giant's internal processes and approaches to leadership and building products, Lashinsky offers insights and surprises from his book, Inside Apple: How America's Most Admired--and Secretive-- Company Really Works. Transcript Almost exactly a year-ago this week I published an article in Fortune magazine with the same title as you see in front of you, Inside Apple. We decided at Fortune that in Apple we had a company that the entire world thought they knew a lot about because the world knew about Apple's products. And they knew about Apple's advertising and its image and its brand and its logo and so on. When in fact the world knew and really still does know very little about how Apple does what it does, what goes on inside Apple? There is a reason for that and it's a major part of my thesis and what I've learned in researching this company intensely over the last year and that is that Apple doesn't want us to know what goes on inside Apple. Apple is professionally focused on telling us, telling you about its products. Not about it. As a business journalist, my job is not to be concerned with what Apple is interested in us knowing, but what my readers at Fortune magazine ought to know and want to know.
    [Show full text]
  • 300Tage Tim Cook
    300 Tage Tim Cook Wie führt er Apple? Tim Cook führt Apple bei Redaktionsschluss seit 300 Tagen. Erste eigene Schritte hat Cook an der Spitze des desig- nverliebten Unternehmens mit den kühnen Produktvisionen absolviert, sein eigenes Profil hat er noch nicht gefunden. Dirk Kunde Tim Cook stellt die dritte Generation des iPad im Yerba Buena Center in San Francisco vor. FOTO: Getty Images / Kevork Djansezian Redaktionelles News & Trends Headliner Testlabor Mac Help Mac Life 109 ungenannter Branchenexperte in einem der wenigen Artikel, die man über Cook in US-Archiven findet. Die Summe ist natürlich zu hoch gegriffen, doch so ein Gerät unter 1.000 Dollar anbieten zu können, ist eine Meisterleistung. Genau für diese Aufgabe wirbt ihn Jobs im Frühjahr 1998 bei Compaq ab. Zu diesem Zeit- punkt betreibt Apple eigene Fabriken. Cook senkt die Zahl der Zulieferer von mehreren Hundert auf 24. Für Produkte wie Drucker oder den Newton kommt das as hat selbst Steve Aus. Neun von zehn Lagerhäuser werden geschlos- Jobs beeindruckt. Der sen. Bis dahin stehen für zwei Monate fertige Pro- sonst so ruhige und dukte in den Regalen. Cook senkt das auf zwei Tage. stille Tim Cook stei- Der Schnitt entschlackt die Bilanz um 500 Millionen gert sich in einer Tele- US-Dollar, denn Inventar ist totes Kapital. Just-In-Time- fonkonferenz in ein Produktion ist das Schlagwort Ende der 90er Jahre und minutenlanges Apple- somit ist die Auslagerung nach Asien unausweichlich. Glaubensbekenntnis. Jobs will Kontrolle über die Produkte von der Entwick- Es fallen Sätze wie lung bis zum Verkauf, und so treibt Cook den Aufbau D „Wir sind auf der Erde, eigener Läden voran.
    [Show full text]
  • The Apple Macintosh Computer
    The Apple Macintosh Computer Mouse-window-desktop technology arrives for under $2500 by Gregg Williams Apple established itself as one of strengthened that reputation with a The Macintosh arrives, finally, after the leading innovators in personal new machine, the Macintosh (above). a history of colorful rumors. It will computing technology a year ago by In terms of technological sophistica- cost from $1995 to $2495, weighs 22.7 introducing the Lisa, a synthesis and tion and probable effect on the mar- pounds, and improves on the mouse- extension of human-interface tech- ketplace, the Macintosh will outdis- window-desktop technology started nology that has since been widely tance the Lisa as much as the Lisa by the impressive but expensive Lisa imitated. Now the company has has outdistanced its predecessors. computer. A system with printer and 30 February 1984 C BYTE Publications Inc. second disk drive costs about $900 corner are selections for the current commercial product: the graphics/ more, but even at that price, the line width. By selecting the "open mouse orientation, the desktop meta- Macintosh is worth waiting for. oval" tool and the thickest line width, phor, the data-as-concrete-object we can draw empty ovals with thick metaphor, and the shared user inter- The Macintosh at Work borders (figure 1d). By selecting the face between programs. The Mac has Before we look at the Macintosh (or "paint bucket" tool and the "diagonal inherited these concepts; for further Mac) in more detail, lets look at how bricks" pattern, we can fill the oval details on them, see my article, "The it works.
    [Show full text]
  • Apple Inc. This Article Is About the Technology Company
    Apple Inc. This article is about the technology company. For other companies named "Apple", see Apple (disambiguation). Apple Inc. Type Public Traded as NASDAQ: AAPL NASDAQ-100 Component S&P 500 Component Industry Computer hardware Computer software Consumer electronics Digital distribution Founded April 1, 1976 (incorporated January 3, 1977 as Apple Computer, Inc.) Founder(s) Steve Jobs Steve Wozniak Ronald Wayne[1] Headquarters Apple Campus, 1 Infinite Loop, Cupertino, California, U.S. Number of 357 retail stores(as of October 2011) locations Area served Worldwide Key people Tim Cook (CEO) Arthur Levinson (Chairman)[2] Sir Jonathan Ive (SVP, Industrial Design) Steve Jobs (Chairman, 1976-1985/2011; CEO, 1997– 2011) Products Products list[show] Services Services list[show] [3] Revenue US$ 108.249 billion (FY 2011) [3] Operating income US$ 33.790 billion (FY 2011) [3] Profit US$ 25.922 billion (FY 2011) [3] Total assets US$ 116.371 billion (FY 2011) [3] Total equity US$ 76.615 billion (FY 2011) Employees 60,400 (2011)[4] Subsidiaries Braeburn Capital FileMaker Inc. Anobit Website Apple.com Apple Inc. (NASDAQ: AAPL ; formerly Apple Computer, Inc.) is an American multinational corporation that designs and sellsconsumer electronics, computer software, and personal computers. The company's best-known hardware products are the Macintoshline of computers, the iPod, the iPhone and the iPad. Its software includes the Mac OS X operating system; the iTunes media browser; the iLife suite of multimedia and creativity software; the iWork suite of productivity software; Aperture, a professional photography package; Final Cut Studio, a suite of professional audio and film-industry software products; Logic Studio, a suite of music production tools; the Safari web browser; and iOS, a mobile operating system.
    [Show full text]
  • By Michael L. Black Dissertation
    TRANSPARENT CULTURES: IMAGINED USERS AND THE POLITICS OF SOFTWARE DESIGN (1975-2012) BY MICHAEL L. BLACK DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in English in the Graduate College of the University of Illinois at Urbana-Champaign, 2014 Urbana, Illinois Doctoral Committee: Professor Robert Markley, Chair Associate Professor Ted Underwood Associate Professor Melissa Littlefield Associate Professor Spencer Schaffner Associate Professor John T. Newcomb ii Abstract The rapid pace of software’s development poses serious challenges for any cultural history of computing. While digital media studies often sidestep historicism, this project asserts that computing’s messy, and often hidden, history can be studied using digital tools built to adapt text-mining strategies to the textuality of source code. My project examines the emergence of personal computing, a platform underlying much of digital media studies but that itself has received little attention outside of corporate histories. Using an archive of technical papers, professional journals, popular magazines, and science fiction, I trace the origin of design strategies that led to a largely instrumentalist view of personal computing and elevated “transparent design” to a privileged status. I then apply text-mining tools that I built with this historical context in mind to study source code critically, including those features of applications hidden by transparent design strategies. This project’s first three chapters examine how and why strategies of information hiding shaped consumer software design from the 1980s on. In Chapter 1, I analyze technical literature from the 1970s and 80s to show how cognitive psychologists and computer engineers developed an ideal of transparency that discouraged users from accessing information structures underlying personal computers.
    [Show full text]
  • Enhanced Power Macintosh Computers
    Developer Note Enhanced Power Macintosh Computers Power Macintosh 6100/66 Power Macintosh 7100/80 Power Macintosh 8100/100 Power Macintosh 8100/110 Developer Note Developer Press © Apple Computer, Inc. 1994 Apple Computer, Inc. Motorola is a registered trademark of LIMITED WARRANTY ON MEDIA AND © 1994 Apple Computer, Inc. Motorola Corporation. REPLACEMENT All rights reserved. NuBus is a trademark of If you discover physical defects in the No part of this publication may be Texas Instruments. manual or in the media on which a software reproduced, stored in a retrieval PowerPC is a trademark of product is distributed, APDA will replace system, or transmitted, in any form or International Business Machines the media or manual at no charge to you by any means, mechanical, electronic, Corporation, used under license provided you return the item to be replaced photocopying, recording, or otherwise, therefrom. with proof of purchase to APDA. without prior written permission of ™ SoftWindows —Windows is a ALL IMPLIED WARRANTIES ON THIS Apple Computer, Inc. Printed in the trademark of Microsoft Corporation MANUAL, INCLUDING IMPLIED United States of America. and SoftWindows is a trademark used WARRANTIES OF MERCHANTABILITY The Apple logo is a trademark of under license by Insignia Solutions, AND FITNESS FOR A PARTICULAR Apple Computer, Inc. Inc., from Microsoft Corporation. PURPOSE, ARE LIMITED IN DURATION Use of the “keyboard” Apple logo Simultaneously published in the United TO NINETY (90) DAYS FROM THE DATE (Option-Shift-K) for commercial States and Canada. OF THE ORIGINAL RETAIL PURCHASE purposes without the prior written OF THIS PRODUCT. consent of Apple may constitute trademark infringement and unfair Even though Apple has reviewed this competition in violation of federal and manual, APPLE MAKES NO WARRANTY state laws.
    [Show full text]
  • Mosk: Later That Day
    MOSK: LATER THAT DAY There’s a whole other show waiting. Today, Jeff Gamet joins us to Tuesday, August 28, 2012 Tuesday, discuss all the Apple news that’s fit to pretend- print. Cross-Platform Zero-Day Vulnerability Found for Java 7; Affects Windows, Linux and OS X Tap If you’ve got Java 7 installed on your computer you seem to have a Here to serious security risk on your hands. Infoworld says “hackers are Listen! exploiting a zero-day vulnerability in Java 7,” one that “can be exploited through any browser running on any operating system, from Windows and Linux to OS X, that has Java installed...” According to the piece, "the vulnerability is not in Java 6, it's in new functionality in Java 7." While Apple stopped bundling Java in OS X with last year’s Lion release, the piece says users can and do install it on their own when they encounter a site that employs a Java applet. So far all of the known exploits in the wild have targeted Windows machines, though the piece says there’s nothing to stop an exploit aimed at the Mac. Security experts recommend disabling Java until Oracle delivers a patch. Java can be disabled on a Mac in the preferences of your chosen browser or browsers... and thanks to Information Security pro George Starcher for sending me this story... and freaking me the freak out. 1 The Apple v. Samsung Aftermath Continues Samsung Bashes Apple for Litigiousness Post Apple v. Samsung v. Apple Verdict August 28, 2012 Since the Apple v.
    [Show full text]
  • Introduction to Sound on the Macintosh 1
    CHAPTER 1 Introduction to Sound on the Macintosh 1 This chapter provides an introduction to managing sound on Macintosh computers. It’s intended to help you quickly get started integrating sound into your application. This 1 chapter introduces the concepts described in detail throughout the rest of this book and Introduction to Sound on the Macintosh provides source code examples that show you how to use the most basic sound-related capabilities of Macintosh computers. These examples use the Sound Manager to play sounds, the Sound Input Manager to record sounds, and the Speech Manager to convert text strings into spoken words. Even if your application is not specifically concerned with creating or playing sounds, you can often improve your application at very little programming expense by using these system software services to integrate sound or speech into its user interface. For example, you might use the techniques described in this chapter to ■ play a sound to alert the user that a lengthy spreadsheet calculation is completed ■ provide voice annotations for a word-processing document ■ read aloud the text string that is displayed in a dialog box If you want to use sound in these simple ways, this chapter will probably provide all the information you need. The Sound Manager, Sound Input Manager, and Speech Manager provide high-level routines that make it very easy to play or record sounds without knowing very much about how sounds are stored or produced electronically. If, on the other hand, you are writing an application that is primarily concerned with sound, you should read this chapter and some of the remaining chapters in this book.
    [Show full text]
  • Creating a Universal Mac OS X 10.4 Baseload
    Building a Universal Mac OS X 10.4 System with Radmind Andrew Mortensen University of Michigan [email protected] Abstract: By splitting Mac OS X 10.4 into PowerPC and Intel versions and delaying a Universal system until Mac OS X 10.5, Apple has complicated the adoption of Intel Macs in enterprise environments. Without a Universal Mac OS X 10.4, enterprise administrators must effectively double their responsibilities and maintain two operating systems. Using Radmind, a collection of open-source system management tools, administrators can create and maintain a single Universal Mac OS X 10.4 image that will boot and run on all supported PowerPC and Intel hardware. With the release of Intel Macintosh computers, Apple1 has again taken the difficult step of moving to an entirely new architecture. To ease the transition, Apple has provided developers with the tools to create “Universal” binaries that can be loaded and executed by either PowerPC or Intel hardware, the goal being a platform agnosticism that should, ideally, hide the differences between architectures from the average user. In most cases, this means developers must update applications or force users to run their software in Apple’s PPC emulation layer, Rosetta, and deal with performance hits accordingly. Nevertheless, whether they’re running applications in emulation or natively, most home users will find the transition little more than the effort required to set up a new computer and load it with their personal information. The same is not true for enterprise Mac OS X deployments. Most enterprise deployments rely on templates, images and loadsets to manage computers, built from a local configuration of the operating system.
    [Show full text]
  • Apple 1 Crisis Communication Plan #2: Technical-Error Harm Purpose
    Crisis Communication Plan #2: Technical-Error Harm Purpose: In the event that iTunes user accounts and the servers are hacked, we must take immediate action to respond and inform all our publics of the situation. We will provide systematic tips and preventative measures to ensure other user accounts are not hacked or fraudulent use of a user account occurs. Apple’s focus is to respond to this crisis through ensuring all parties have the most available information. This will allow information to be communicated consistently, openly, and accurately to all parties. The resolution to the crisis can be obtained through an efficient and quick response, leading to open communication with all parties at all times. This path will allow all communication barriers to cease and stop any other problems at the source. Objectives: 1. Assess the crisis situation: a. Locate source of problem. 2. Assemble the CMT (Crisis Management Team) as outlined in the staff directory. 3. Setup Crisis Control Center and start preparation of all-important materials needed for the response. 4. CMT will take the assessments and data gathered to determine the appropriate strategies to respond to the situation. 5. CMT Lead will assign and implement the use of the Methods of Communication Chart to the appropriate key publics. 6. CMT Lead will need to be the first to be notified of the situation. CMT will refer to List of key publics to know who takes priority to contact from first to last. 7. Have a data and system analyst collect all available data from the network and all other available resources.
    [Show full text]