Apple: The Success Of Steve Jobs And Steve Wozniak

1061 Words 5 Pages
Introduction
Apple was founded by college dropouts Steve Jobs and Steve Wozniak in 1976 in a garage in Santa Clara Valley, California. In the 40 years since this companies’ inception it has been the the designer, manufacture and distributor of “mobile communication and media devices, personal computers and portable digital music players, and sells various related software, services, accessories, networking solutions and third-party digital content and applications” (Rueters). Apple started with the sell and production of 50 Apple I personal computers, Steve Jobs reportedly sold his “Volkswagen microbus and Mr. Wozniak sold his Hewlett-Packard calculator” for a net profit of approximately $1,350 to get startup capital to fill the companies’
…show more content…
As a result of the success of these devices first-year sales topped $3 million and two years later, sales topped $200 million. On December 12, 1980, at $22 per share, Apple debuted on the market selling more than 4.6 million shares “generating more capital than any IPO since Ford Motor Company” (Dilger). The next phase of the company has been in dispute wherein a power struggle between then CEO John Sculley and Steve Jobs resulted in the ousting of Mr. Jobs in 1980. Notwithstanding continued power struggles within the company that would later see the eventual return of Mr. Jobs in 2007 and some mediocre product releases, as of FY 2015 Apple has produced and sold 335,000,000 million portable digital music players (IPods), 575,000,000 mobile communication and media devices (IPhones), 4,632,000 tablet computers (IPads), 11,650,000 smart watches (Apple Watches), 26,000,00 smart TV devices (Apple TVs), and 317,000,000 computers (laptops and desktops). As I write this on my Apple desktop with my Apple IPhone to the left of me Apple is now worth approximately $549,99 billion …show more content…
The greatest threat to Apple devices comes if consumers undertake a process on their devices called jailbreaking. In jailbreaking an individual will exploit software deficiencies removing software restrictions created by Apple. This process provides users with more control over their devices, use of applications not offered by Apple, and the ability to completely manipulate the interface. While jailbreaking your device provides you with numerous options and opportunities; jailbroken devices present more opportunities for compromise and many threats are designed to take advantage of jailbroken phones. “According to Symantec, of the 13 Apple threats documented by Symantec in FY2015, nine are designed to specifically infect jailbroken devices” (O’Brien, 2015). In order to mitigate the threat to Apple devices, Apple will first look to improve the encryption amongst its operating systems making it more difficult for hackers and other agencies to break their devices encryption. A clear signal of this is Apple’s recent rehiring of security encryption specialist Jon Callas who is the “top expert in practical cryptography” (Menn, 2016). Second, something that has not been a priority but is becoming more and more requested is the inclusion of a wider array of third party applications. Apple to date has been seriously apprehensive of allowing third party

Related Documents

Related Topics