Apple Still Has a Privacy Problem

Report Summary

It is evident that computer and phone technology companies are facing a continuum of security issues that impede privacy of consumers. Apple is one of the modern companies whose technologies have really attracted consumers. Nonetheless, security is a major concern among Apple users following the increased internet hackers and attackers who pose great danger to users.

Major security issues associated with using Apple iPhones, iPods, iPads, and Mac computers include internet use, lack of software updating knowledge, and installation of software and mobile apps from unsecure sites. Apple has invented System Software Personalization, safe App store, App code signing, and password and encrypted code systems to improve security. In essence, users must understand and frequently make the appropriate use of these innovations.

Background and the Main Problem

The rising demand for technology has led to integration of computerized mobile phones. Nonetheless, technology companies specializing in computer and mobile phone telecommunication devices and applications are currently facing serious security issues concerning the safety of data transfer, network security, and general user privacy. Computer and mobile phone technology has always faced security threats posed by the highly suave hackers and internet attackers, who threaten the privacy and security of consumers.

Technology firms have been losing billions of money and incurring detrimental losses because of hacked systems and lost data. Mobile phone companies dealing with Smartphones seem to face serious security issues and recently Apple is one of the innovative telecommunication companies that struggle to enhance security in their phone and computer operating systems (Wood par. 1). To counter security problems associated with phone and computer technologies, tech firms are struggling to increase their suaveness and innovation.

Notwithstanding its increased efforts towards improving consumer privacy via corporate principles, security in Apple has been an issue. The last three years have witnessed Apple and other mobile phone and computer technology companies undergoing public pressure and condemnation about their laxity in maintaining consumer privacy and security (Wood par. 2).

In 2013, Apple Company underwent a public censure and the American government agencies reprimanded the company, among other technology firms for revealing and sharing customers data discriminately. Within a period of six months, which is from December 2012 and May 2013, the law enforcement agencies in the United States made over 4,000 requests to compel Apple to divulge customers data for purposes of investigating crimes.

Such incidences have led to compromised market reputation due to loss of consumer trust on Apple phones and many of its technological devices (Wood par. 4). A continuum of legal issues concerning consumer privacy and security have affected the demand of Apple phone and computer products in the consumer market, consequently prompting Apple Company to strategize on means of protecting information of its consumers.

Purpose of the Report

As an approach to counter security concerns raised by the public and their consumers, Apple Company changed its approach towards commitment to customers privacy (Wood par. 1). Apple has been frequently strategizing on means of improving the operating systems of IOS 7 and IOS 6 to fix security concerns and enhance user privacy (Wood par. 1). In this view, there are two main purposes of this investigative report.

The first important purpose of this investigative report is to point out the security issues in Apple mobile phones and discuss about remedies for such lapses. In this purpose, the investigative report establishes a means of protecting consumers data, ways of protecting their rights by providing approaches of maintaining the security of the Apple operating system. Secondly, the investigative report seeks to assist Apple in recovering its lost market reputation and reduce the bad consumer influence that resulted from the security lapses.

Findings and Discussion

Despite having a tinted reputation following its laxity in consumer protection, Apple Company has an assortment of solutions that can help in improving the operating systems of its phones and computers to enhance user security. Major security problems arising from Apple iPhones, iPads, and iPods are lapses in the operating systems (Wood par. 3). Improvising and constantly improving the operating systems of phone and computer operating systems is one of the key components of fixing security problems (Wood par. 4).

System Software Personalization is one of the most effective techniques of protecting consumer data and personal information in their phones and computers. To evade security matters resulting from operating systems, Apple constantly releases software updates that allow consumers to tackle rising security concerns (Wood par. 3).

System Software Personalization using encrypted passwords and regular updating of operating systems of Apple iPhones, iPods, iPads, and computers would assist to avoid risks associated with using older versions of software that hackers often manipulate.

Apple has changed ways of installing and upgrading software and operating systems in its phones and computers that consumers should use to enhance their privacy and security (Wood par. 4). With the IOS 7 and IOS 6, Apple has managed to integrate better means of updating operating systems using Over the Air (OTA) software update system or the iTunes to install and upgrade software, where installation authorization server enhances user security (Wood par. 2).

Millions of malicious programs that hackers develop run through the basic network systems and the Internet surfing is one of the potential sources of viruses, malwares, and spywares. Security problem protracting from the Internet use has become very complicated over the years and users of Apple iPhones and other internet-enabled devices are not exceptional.

Wood states that IOS 7 and IOS 6 iphones have a secure App Store for downloading mobile applications and they have high-level firmware and hardware features that protect users against malware and other viruses (par. 2).

The most challenge in protecting consumer privacy in the Internet use is the inability of technology firms to control the Internet traffic system for communication between the users browser and the server is difficult to control (Wood par. 2). Apple has invested heavily in development of the Secure Socket Layer (SSL) and the Transport Layer Security (TLS), which use modern technologies that help in encrypting conversation between a users browser and the Internet server (Wood par. 2).

To avoid internet vulnerabilities that frequently befall consumers of Apple technology devices, Apple IOS technologies improved its software bug. The changes made it complicated for hackers to manipulate by making the memory addresses and offsets changeable to avoid code exploitation (Wood par. 3).

Regular updates of the OS X Mavericks, Mac OS X and other Apple iPhones help to improve the software bug and operating systems of the Smartphones. According to Wood (par. 5), Java is a major cause of all the Apple security issues despite flash being more popular among Apple users.

Java script and adobe flash player are major software that Apple uses to enable sharing information and access certain features of the Internet (Wood par. 3). Flash and java script memories have revealed evidence of possible hacking through manipulation of their codes, which consequently allow access to the privacy and information of the Internet users (Wood par. 3).

Recently, Apple Company discovered substantial evidence that linked the use of flash software in Macintosh (Mac) computers and Apple IPhones with increased user security vulnerability. The new low-level boot loader (LLB), user passwords and control of the flash software system using encrypted codes helps users to evade security issues resulting from integration of flash software (Wood par. 5).

Downloading software and mobile Apps from the reliable App store of Apple helps consumers to avoid using insecure websites to download software and mobile applications. Using the App configuration system that Apple Company constantly supervises, users can only access and install legitimate software and mobile apps.

Recommendations

To further assist in enhancing the security of Apple device users, Apple Company should consider the following:

  • As the company leaked user information to government, a stringent corporate code of business conduct must prevail in Apple.
  • User guides and manuals for Apple devices currently have little information regarding proper use of its devices and mobile apps to avoid security vulnerabilities. Fixing the manuals would improve the security of device users.
  • Apple Company must develop a platform for encouraging users to detect signs of hacking practices, unsafe internet websites, and the dangers of failing to update device software.

Conclusion

Due to the rising number of highly suave internet hackers with high abilities in software engineering, any existing and emerging computer or phone technology company faces the challenges associated with security of consumers using their tech devices. Users of iPhones, iPods, iPads with old iPhones Operating Systems (iOS), flash players and java script mobile apps and software, and the Internet are at higher risks of experiencing security problems in their Apple tech devices.

To counter such issues, Apple has developed the Secure Socket Layer, and the Transport Layer Security systems to combat internet security issues. Apple has invented System Software Personalization, safe App store, App code signing, and password and encrypted code systems to improve security. Apple regularly reinvents and releases software updates for device users to update their apps and software to reduce security risks.

Works Cited

Wood, Molly. Apples Serious Security Issue: Update your iPhone or iPad immediately. 2014. Web.

Technologies: Microsofts Cortana vs. Apples Siri

Abstract

Cortana and Siri are apparently two major direct competitors in the software industry. While both apps have a significant share in the market, it is prudent to mention that the prevailing stiff competition will eventually culminate into better and more enhanced products that are responsive in different devices. At this point, Apple is yet to revolutionize its voice command in Siri because in some cases, iPhone finds it cumbersome to interpret verbal commands.

MIS Article Critique

Currently, Microsoft is developing a new product intended to outwit market competition from other rivals such as Apple. Einstein is a man-made intelligence project that is being pursued by Microsoft as part and parcel of an improved personal assistant. The Windows phone has been using the Cortana personal assistant for some time now. When Windows 10 will eventually be ushered later this year, the new version will definitely be integrated into the desktop.

However, Microsoft expects to make Cortana a standalone app so that it can be used in a number of communication devices across the board. Individuals and experts who understand the progress of the project well have exuded their confidence over this personal assistant by arguing that it will eventually be compatibly used with both Android and iOS devices.

According to Rigby (2015), upon the next roll out of the project, users will be in a position to communicate with a lot of ease bearing in mind that the device will be able to read and comprehend email on its own. Microsoft Research projects are geared towards making sure that the company sets the pace and remain equally competitive especially when it comes to software innovation and development.

Nevertheless, there are no reports yet on the intention by Microsoft to integrate Cortana in devices using iOS and Android. Even the Einstein project has not been publicly documented anywhere. It is crucial to mention that the artificial intelligence concept is wide.

It is against this backdrop why dexterity with verbal language is profound in computers and mobile phones. The latter is also sifting through emails for information. However, the Information Technology company still stands a chance of transforming its digital assistant through search an machine learning as well as speech recognition.

From the outset, it is evident that Microsoft is confident that Cortana will eventually out-merit Siri from Apple. This can indeed be true because Cortana is quite an independent system compared to Siri. For example, the app does not depend on voice commands as it is the case with Siri.

In other words, it is a virtual assistant that is fully-fledged (Welinske, 2014). This attribute can attract more users into adopting the application owing to limited demand when it comes to third party usage. Siri is simply a voice assistant which still relies on other proxies for full operation.

In addition, the unique notebook feature in Cortana outsmarts Siri in a number of ways. Real-life personal assistants can be used alongside with this feature besides setting personal preferences. For instance, it allows the user to specify people who should be in the inner circle, set which news headlines to follow and also rearranging a list of music searches among other functionalities (Welinske, 2014).

As a standalone app, Cortana presents a broad view of the various features and attributes that can be directly accessed over a Windows phone. Since the immediate competitor (Siri) does not have the same feature, Microsoft is highly likely to make major advances in the software industry by leveraging on the loose ends and limitations of Siri.

References

Rigby, B. (2015). Microsofts Siri rival to be available on Android, Apple devices. Web.

Welinske, J. (2014). Developing User Assistance for Mobile Apps (2nd ed.). New York: Win Writers, Inc.

Apples Interactive and Intelligent Design

Introduction

Key among Apples sources of dominance and competitive advantage in the international technology arena is its reputation for creative and transcendent ideas that have profoundly influenced contemporary communication trends. Nevertheless, sustaining this position requires a constant stream of new ideas with a futuristic edge to them to ensure it keeps ahead of the competition in posterity.

Body

One possible direction Apple can take in keeping up with its avant-garde innovations is developing camera technology with highly specialized facial recognition software. Apple can design cameras that can synchronize with the growing online database of personal information and take advantage of wearable technology.

Case in point, instead of people swapping business cards or personal information manually. Their cameras could simply pick up facial features and download entire profiles to their phones. With such technology, Apple will be almost guaranteed continued ascendancy in digital and mobile photo technology a quarter a century from now, safe from the risk of being relegated to obscurity like erstwhile market leaders such as Kodak.

Competition by smartphone manufacturers has escalated above the traditional platforms, such as operating systems to new frontiers, especially the quality and capacity for integration of hardware and new software.1 Currently, Apple is expressing a great deal of interest in 3D and virtual technology related apps designed to recreate reality experiences.

In addition to experimenting with wearable technology similar to Google glasses, they are also developing custom-made headsets intended to enhance the interaction between their cameras and the users online and offline environments. Google is currently leading the pack with their Android OS,2 which they are working on integrating into their revolutionary glasses and other camera designs. Therefore, Apple needs to develop more innovative technology to make certain their grasp on the digital photography market.

With the growing popularity and influence of social networking, many people have created online profiles and this has motivated data companies to create systems where such personal data can be collected and indexed. While there are inevitable privacy concerns, the development of technology appears to be numbing people to the idea of intrusion as more personal information becomes accessible on the internet.

By developing cameras with facial recognition and indexing abilities, Apple can easily capitalize on the wave of indexing personal data that will emerge from the mainstreaming of social networks.

The ideal situation is one where, using wearable devices, one can scan a crowd and identify the person they are most likely to get along with, or whom they share common interests. The technology will be instrumental in actually making it easier for people to socialize, especially since contemporary handset and PC-based social networks have been criticized for being antisocial.

Conclusion

Ultimately, Apple needs to focus its creative energies on a more interactive and intelligent camera design so that it can be ready to integrate itself with the needs of tomorrows consumers. However, given the evident security and privacy concerns, it is critical that technology users are made aware of online security and privacy risks to prevent them from providing sensitive information that may be used against them.3 In the end, should Apple rise to the occasion and embrace the technological needs of the future, the firm will almost certainly retain their innovative edge for which their late founder was renowned.

Bibliography

Charnigo, Laurie, and Paula Barnett-Ellis. Checking out Facebook. com: The impact of a digital trend in academic libraries. Information technology and libraries 26, no. 1 (2013): 23-34.

Hong, Jason. Considering privacy issues in the context of Google glass.Commun. ACM 56, no. 11 (2013): 10-11.

Satyanarayanan, Mahadev. Mobile computing: the next decade. ACM SIGMOBILE Mobile Computing and Communications Review 15, no. 2 (2011): 2-10.

Footnotes

  1. Jason, Hong. Considering privacy issues in the context of Google glass.Commun. ACM 56, no. 11 (2013): 10.
  2. Mahadev, Satyanarayanan,. Mobile computing: the next decade. ACM SIGMOBILE Mobile Computing and Communications Review 15, no. 2 (2011): 4.
  3. Laurie, Charnigo and Barnett-Ellis, Paula. Checking out Facebook. com: The impact of a digital trend on academic libraries. Information technology and libraries 26, no. 1 (2013): 25.

Weaknesses and Strengths of Apple iPad

The iPad 2 received a favorable reception from the market, selling a commendable 3 million units in 80 days (Marc, 2010). This attributes to the fact that tablet devices continue to rise in popularity among prospective buyers. It also portends a great future for the same, since the market base expands by day. Analysts project that tablet devices have the potential of replacing laptops if suitable enhancements are incorporated. This is because of the features and advantages they possess, including portability among others (Picture 1). Consequently, they have been ranked higher that net books for efficiency and versatility.

Strengths

While others may argue that net books are compatible with a wider range of software programs, it is noteworthy that initial iPad devices could be jail broken. This infers to the altering of internal configuration and settings to enable it accept applications from other vendors. Data services also offered another grey area for iPad contrivances. Previous editions were restricted to the AT&T network. The new model is shipped unlocked and can be used with any data service provider, provided they have a micro sim-card.

The device has been designed to accommodate all applications, which run on previous editions of the device, including the iPhone. In addition, the tablet offers an enhanced storage capacity, of up to 64GB. These additions allow it to store more data and access more data sets as compared to the former editions. As a result, it is easier for prospective clients to make a transition from their previous devices to this model. A closer look at the appliance and similar gadgets on the market reveals the iPad 2 as a superior model, since it offers access to powerful hardware and an enhanced screen resolution. At the average price of $400 for a basic mold, it emerges as the competitive option (Kane & Raice, 2010).

Editors, students, secretaries and other interested persons may invest in the appliance confidently, since it is compatible with external keyboards. This feature has been absent from previous versions of the product. The package retails separately and includes a stand and Aluminum keyboard with the relevant cables. In spite of this fact, Bluetooth enabled keyboards can also work with the device. The result is increased efficiency whenever typing tasks are executed on the device.

It also has the ability to support several applications, including ePub and iWork. In addition, the device supports software necessary for image viewing and processing. With these additions, users are able to view and process images for leisure or official business. They can also create documents, design keynote presentations and manipulate spreadsheets whenever they desire. Most importantly, users can access eBooks using this device. It is a reputable reader of the same and performs better than computers and other similar appliances.

Weakness

The major weakness of this model is the resolution. This problem has bedeviled previous devices from the same manufacturer. In addition, the device does not support wide screen imaging. As a result, viewing of movies, music, games and other forms of entertainment may not be possible with this appliance. In the event they are attempted, most results have been unsatisfactory. This has drawn criticism from different quarters, especially detractors.

This factor tends to discourage persons interested in the appliance as an entertainment gadget, thus reducing its market share. In addition, competitors are furnished with a weakness to exploit as they counter the influence of the iPad in the market. To counter this Apple Inc. need to correct the problem by improving the display relayed by the device.

Opportunity

An opportunity to be exploited in order to maximize its effectiveness is allowing third party developers to create applications for use with this device. It is notable that a similar strategy proved effective for previous editions, including the iPhone. The device came with limited applications and benefits; hence, clients maximized their use of these appliances after Apple lifted the cap. This will increase their versatility; hence, their competitive edge against android devices. It is noteworthy that the latter support many applications from different authors. In addition, the enhanced functionality will position Apples wares competently, since they will compete equally with Google, Microsoft and many other rival products.

Threat

A threat to the advancement of this device is the lack of adequate distribution channels. It is noteworthy that several distributors received the model late, due to delays at the production stage. This is negative for the iPad, since distribution and retail of other tablets began earlier than Apples. Rival producers have also ensured retail stores have adequate supplies of their appliance. Once fixed, the iPad should rightfully assume its place as the product of choice among clients.

Conclusion

Summarily, it is noteworthy that the product has been a success since its introduction into the market. The sales volumes of the product upon release and the fact that it moves significant numbers to date evidence this fact (Marc, 2010). As expected, several firms have placed themselves in direct competition with Apple by releasing devices with a similar application. To their dismay, most of these firms have resolved to contend with playing a secondary role to Apples iPad, due to its superiority and brand loyalty established over the years.

References

Kane, Y & Raice, S. (2010). . Wall Street Journal.

Marc. (2010).

Picture 1. Description: Several images of the iPad tablet during its launch. Web.

Comparison of Apple Versus Windows Based Laptops

Introduction

An operating system is a software program that facilitates communication between the computer hardware and computer software. Over the years, computers have been going through periods of transformations and so are the operating systems. They can be classified according to technology, usage, licensing, among other characteristics. There are three types of operating systems; windows, apple, and Linux. A review is carried out to find the best-operating systems to use. In this report, a comparison between operating system windows and apple will be discussed at length in regards to price, design, features, pros and cons, and compatibility with 3rd party software.

Criteria for Purchasing a Laptop Computer

Laptops are increasingly being preferred to desktop computers by business professionals and academicians. They are light in weight, portable, and have a longer battery life as opposed to desktops. Before one goes for a laptop from the shops, it is good to investigate the laptop that is efficient for the purpose it is being bought. There are many types of laptops with different prices, weights, performance, and designs.

Some are compatible with 3rd party software while others are not (Anon. Laptop and Notebook Buying Guide 3). It is, therefore, appropriate to seek help from a professional who is well conversant with the different types of laptops that are offered in the market. This may take quite some time but the results are worth it. Laptops come in different shapes and weights and most people prefer the light ones which can fit in their briefcase.

It is good to first determine the reason behind buying the laptops before making the decision. In case it is a home-based laptop, the weight cannot be a big issue while for office use, the light ones are better. Laptops have a long battery life but there are some which can stay longer than others and this should be noted before a decision is reached. Regarding the prices, it is true that some are cheap than others but should not form a major ground for deciding to purchase.

Windows Operating System

Windows operating system was introduced by Microsoft in November 1985. Windows 1.0 was then released which was in use until 1987 when Windows 2.0 was released. Unlike windows 1.0, windows 2.0 could allow windows to overlap and the use of keyboard shortcuts was introduced. Several versions of windows were then released in the years that followed. In 1995, Windows 95 was released with a new user interface and could support long file names.

Windows 98 was released in 1998 and the second version of it was released in 1999. An updated version of Windows 98 was released in 2000 which was referred to as windows Me. Microsoft later released windows XP and in 2003 windows server 2003 was released (Anon. Windows Overview & History 2008 2). A more developed version of windows called windows vista was released in 2006 and its server (windows server 2008) was released in 2008. It is an upgraded system from windows XP. Many argue about the effectiveness of windows XP and windows vista. Some believe that Windows XP is faster than windows vista while others stand on the opposite side (Neil 2).

Its nearly a year now since the release of Windows 7. It was released towards the end of 2009 together with its server (windows server 2008 R2). For a long time, Microsoft windows have been dominating marketing.

Apple Operating System

Apple computer inc. develops and markets operating systems and graphical user interfaces called Mac OS which was introduced in 1984 one year before the introduction of windows. The first release was Mac OS which could not use a command-line interface. Other versions were later released; among them systems 1.0, 1.1, and 2.0 which used a flat system. Afterward system software 5 was released which could allow several programs to run together. This version was in the market for a very short period and was available in selected countries such as the United States, Canada, and Europe. System software 6 was then released which was a more upgraded operating system.

Laptop features were supported with the introduction of the Macintosh portable. In 1991, system 7 was introduced and system 8 referred to as Mac OS 8 was introduced six years later. Developments were made on Mac OS 8 and from it, Mac OS 9 was recognized. This version could support Airport wireless networking. Apple Inc. purchased the company in 1999 and released their first version called Mac OS X. Mac OS X was highly upgraded and lasted for a long time until Snow Leopard was discovered (Michael 4).

Consumer purchasing trends have been changing with the discovery of new versions of operating systems. At the introduction of windows and Mac OS, most people were not familiar with computers and the features of those computers could not be put into a wide range of uses. With time, these computers have advanced and people have become literate. Today, society has become dependant on the computer for the day to day operations, many people are now going for laptops which offer the freedom of working in any setting be it in the house or the office.

Cost

In 2009, the Apple operating system announced that it was going to lower its prices on Snow leopard. It was expected to drop to $29 per upgrade. That was a lower price compared to the price that was charged by Microsoft for Windows 7 upgrades. According to research carried out by Bott (2), it reviewed that the $29 upgrade offer on Snow Leopard was not economical at all. He observed that about 57% of the customers who had previously bought Apple software were not eligible for the new offer.

An approximate 90% of all the customers of windows have the opportunity of buying their operating systems when they are preinstalled with a new PC and any PC that was purchased since 2001 can access windows 7 upgrade at a discounted price. This makes Windows 7 cheaper than snow leopard for the old users. Only a selected number qualify for the snow leopard offer of $29 and majorities have to get it at $169. Some may not even be able to install the new upgrades. For a customer who is in a dilemma on which laptop to purchase, I think one with windows software will be better considering the future development that might be made.

The following table shows the cost of upgrading windows 7 and snow leopard for the users who purchased their computers since October 2001.

Figure 1.

p/c/ Mac purchase date Windows 7 upgrade cost Snow leopard upgrade cost
Oct. 2001- Jan 2006 $50-$120 Not supported
Jan 2006- Sep 2007 $50-$120 $158-$169 (Intel only)
Oct 2007-Jun 2009 $50-$120 $29
Jun 2009 or later $0 $0

Since 2001, Apples operating systems have been going for $129 but Microsoft has been having constant prices all through the lifespan of windows. Among the Apple users, some have been questioning themselves on what would have happened to Apples prices if windows were not in existence. The truth of the matter is that the prices of Apple would be too high for individuals (Bott 5). However, Snow Leopard is currently cheaper than windows 7 and every user seems to be going for it.

Performance and Speed

Before anyone decides on which OS to purchase, it is good to investigate other factors besides cost. Among the other factors to be considered before deciding which operating system to purchase is performance. Both Snow Leopard and Windows are new in the market. They have not been in use for more than one year and it is difficult to evaluate their performance. However, Ngo (2) attempted to evaluate their performance and speed and came up with the following table. He found out that Snow Leopard performed better than windows 7.

Time-based operating system tests

Ngo carried out another investigation to determine which operating system had longer battery life. He found that Snow Leopard could stay for a longer period after disconnection from a power source than windows 7. Figure 3 shows the result of the investigation.

Battery life

A laptop with longer battery life is more efficient especially for someone using it from the house. At homes, the only source of power is electricity which has no backups in case of power blackouts. A laptop with a longer battery life will be appropriate for such users. From the above bar graph, it is clear that Snow Leopard OS can stay for long even after a power blackout.

Compatibility with Third-Party Software

Both windows 7 and snow leopard are compatible with third-party software but the degree of compatibility defers. The snow leopard is compatible with a selected range of third-party software whereas Windows 7 is compatible with an unlimited number of software. Before deciding which laptop to purchase it is good to check the compatibility of the software in use depending on the purpose of the laptop. Most of the Mac applications require the use of a new version for them to be compatible with snow leopard. This is because snow leopard does not have a new user interface or a codebase. Only a few of these applications are not compatible with windows 7.

Recommendations

In deciding which laptop to buy, it is important to consider the speed of the OS, compatibility, battery life, and price. All these have to be scrutinized properly before the final decision is reached. Both windows 7 and snow Leopard are upgraded versions of the operating system. Windows 7 was released after some loopholes were discovered in the use of windows vista. For a long time Mac OS X has been performing better than windows but the new version Snow Leopard can not beat windows7 in terms of application and integration with third-party software.

Windows 7 is compatible with almost all software without the use of other versions while Snow Leopard is compatible with a limited number of software. For a customer who is in a dilemma on which laptop to go for, windows 7 would be the best fit for him. Although it is costly and has a shorter battery life than Snow Leopard, it stands in terms of performance and compatibility.

Works Cited

Anon. Laptop and Notebook Buying Guide. The smarter. team, 2010. Web.

Anon. Windows Overview & History 2008. microsoft. 2010. Web.

Bott Ed.  zdnet, 2009. Web.

Michael. . Slashdot, 2010. Web.

Neil, Henry. A Review of Windows Vista: The Best Operating System or Just a Fancy Windows XP? brighthub, 2008. Web.

Ngo, Dong. Performance showdown: Windows 7 vs. Snow Leopard. cnet, 2009. Web.

Weaknesses and Strengths of Apple iPad

The iPad 2 received a favorable reception from the market, selling a commendable 3 million units in 80 days (Marc, 2010). This attributes to the fact that tablet devices continue to rise in popularity among prospective buyers. It also portends a great future for the same, since the market base expands by day. Analysts project that tablet devices have the potential of replacing laptops if suitable enhancements are incorporated. This is because of the features and advantages they possess, including portability among others (Picture 1). Consequently, they have been ranked higher that net books for efficiency and versatility.

Strengths

While others may argue that net books are compatible with a wider range of software programs, it is noteworthy that initial iPad devices could be jail broken. This infers to the altering of internal configuration and settings to enable it accept applications from other vendors. Data services also offered another grey area for iPad contrivances. Previous editions were restricted to the AT&T network. The new model is shipped unlocked and can be used with any data service provider, provided they have a micro sim-card.

The device has been designed to accommodate all applications, which run on previous editions of the device, including the iPhone. In addition, the tablet offers an enhanced storage capacity, of up to 64GB. These additions allow it to store more data and access more data sets as compared to the former editions. As a result, it is easier for prospective clients to make a transition from their previous devices to this model. A closer look at the appliance and similar gadgets on the market reveals the iPad 2 as a superior model, since it offers access to powerful hardware and an enhanced screen resolution. At the average price of $400 for a basic mold, it emerges as the competitive option (Kane & Raice, 2010).

Editors, students, secretaries and other interested persons may invest in the appliance confidently, since it is compatible with external keyboards. This feature has been absent from previous versions of the product. The package retails separately and includes a stand and Aluminum keyboard with the relevant cables. In spite of this fact, Bluetooth enabled keyboards can also work with the device. The result is increased efficiency whenever typing tasks are executed on the device.

It also has the ability to support several applications, including ePub and iWork. In addition, the device supports software necessary for image viewing and processing. With these additions, users are able to view and process images for leisure or official business. They can also create documents, design keynote presentations and manipulate spreadsheets whenever they desire. Most importantly, users can access eBooks using this device. It is a reputable reader of the same and performs better than computers and other similar appliances.

Weakness

The major weakness of this model is the resolution. This problem has bedeviled previous devices from the same manufacturer. In addition, the device does not support wide screen imaging. As a result, viewing of movies, music, games and other forms of entertainment may not be possible with this appliance. In the event they are attempted, most results have been unsatisfactory. This has drawn criticism from different quarters, especially detractors.

This factor tends to discourage persons interested in the appliance as an entertainment gadget, thus reducing its market share. In addition, competitors are furnished with a weakness to exploit as they counter the influence of the iPad in the market. To counter this Apple Inc. need to correct the problem by improving the display relayed by the device.

Opportunity

An opportunity to be exploited in order to maximize its effectiveness is allowing third party developers to create applications for use with this device. It is notable that a similar strategy proved effective for previous editions, including the iPhone. The device came with limited applications and benefits; hence, clients maximized their use of these appliances after Apple lifted the cap. This will increase their versatility; hence, their competitive edge against android devices. It is noteworthy that the latter support many applications from different authors. In addition, the enhanced functionality will position Apples wares competently, since they will compete equally with Google, Microsoft and many other rival products.

Threat

A threat to the advancement of this device is the lack of adequate distribution channels. It is noteworthy that several distributors received the model late, due to delays at the production stage. This is negative for the iPad, since distribution and retail of other tablets began earlier than Apples. Rival producers have also ensured retail stores have adequate supplies of their appliance. Once fixed, the iPad should rightfully assume its place as the product of choice among clients.

Conclusion

Summarily, it is noteworthy that the product has been a success since its introduction into the market. The sales volumes of the product upon release and the fact that it moves significant numbers to date evidence this fact (Marc, 2010). As expected, several firms have placed themselves in direct competition with Apple by releasing devices with a similar application. To their dismay, most of these firms have resolved to contend with playing a secondary role to Apples iPad, due to its superiority and brand loyalty established over the years.

References

Kane, Y & Raice, S. (2010). . Wall Street Journal.

Marc. (2010).

Picture 1. Description: Several images of the iPad tablet during its launch. Web.

Steve Jobs Stanford Commencement Speech

Steve Jobs was invited to speak at Stanford Universitys commencement exercise. He delivered a powerful speech that connected with the audience. There were many reasons why Steve Jobs succeeded and delivered a memorable speech. He came prepared and talked about a topic that was very interesting.

He analysed his audience and utilized what he knew about campus culture using his experience as a former college student. He was mindful of the elements required for an introduction. But more importantly Steve Jobs spoke about something that can help future graduates navigate the real world.

The introduction only contained three out of four parts discussed in class (Jaffe 90). The speaker did not provide a clear preview of the major points. But this omission did not weaken the speech because there was a good reason why he did not provide an overview of the topic.

The modification was made to adjust to the core message of the speech. The core message talked about the inability to see the future and yet there is no need to worry. Although he omitted the last part, Steve Jobs was able to draw the attention of the audience to the topic. He was also able to relate the topic to the concerns of the graduates and finally he was able to link himself to the subject.

The strength of the speech can be explained through the careful disclosure of the proposition. Steve Jobs was able to connect to the audience by letting them know that he was in their shoes when he was young. The second reason for the powerful delivery was that the overall organization was clear and well thought out. Steve Jobs knew the anxious thoughts in the minds of the graduates. He also knew the struggle that they went through to get their diploma.

Another important feature of the speech was the use of transitions. Jobs demonstrated his skill as communicator by providing transitions from one sub-topic to the next. He was able to accomplish this by dividing the speech into three short stories. But even if the stories were different there was a unifying thread.

He talked about the uncertainty of life. He talked about setbacks and problems. He encouraged the graduates that more often than not they will experience failure. But he told them that even failures can be used as stepping stones towards success.

The effectiveness of the speech was enhanced further when the speaker delivered a definitive ending. He clarified the correct mindset needed to succeed in the real world. There is only one minor weakness. Steve Jobs was dependent on his notes all throughout the delivery. He was actually reading the speech and was unable to add words in an extemporaneous fashion.

Conclusion

The effectiveness of Steve Jobs speech can be explained through the proper use of audience analysis and selection of topic. The speaker knew that he was tasked to speak in the presence of graduates. Thus, he developed the speech to cater to the needs of the audience.

Although organization and careful development of the speech was made evident during the delivery, it can be said that the main reason for its effectiveness is the content. Steve Jobs did not talk about a topic that was boring. In fact, Steve Jobs talked about something that was important for the listeners. As a result they listened attentively and they learned so much from the speech delivered

Works Cited

Jaffe, Clella. Public Speaking: Concepts and Skills for a Diverse Society. CA: Thomson Learning, 2007. Print.

Stay Hungry, Stay Foolish by Steve Jobs

Expression is influenced by context and environment or audience. In order to analyze gender perspectives in a speech, it is of essence to appreciate type of the audience, purpose of the expression, position of the speaker, and gender.

Irrespective of current perceptions, the intension of expression is part and parcel of learning through exchange of opinions and collaboration. Thus, this reflective treatise attempts to identify and explain gender aspects in the speech Stay hungry. Stay foolish by Steve Jobs presented at Stanford University. In addition, the analysis resonates on actions rather than perceptions.

In order to interpret gender in Steve Jobs speech, it is essential to embrace conversation analytic approach. The focus is based on perception of the speaker on gender categories. To begin with, the essay concentrates on the conundrums of speech reflection on compatible analytic stances.

In the introductory part, Steve uses adjacency pairs in presenting responsive pairs of different circumstances occurring in sequence. This is common among male speakers. For instance, Steve avers, Your time is limited, so dont waste it living someone elses life. Dont be trapped by dogma and relates this to his childhood.

Steve is assertive and use commanding language across the speech. He has full control of the direction of the speech and strong mastery of the subject. Despite the fact that his line of action to drop out of collage was risky at the time, he has learnt to follow instinct. Consequently, his success was based on personal initiative and not largely influenced by perceptions and views of people surrounding him. Related to gender, Steves character depicts male competence and credibility associated with mens language as risk takers.

At subconscious level, the speech is presented in an acquiescent tone with precise description of events and opinion. In addition, Steve uses humor to cover up the less apologetic intonation on controversial aspects of collage life and ultimate drop put. He is certain in the declarative statements such as Your time is limited, so dont waste it living someone elses life. Instead of using modal constructions such as should or would, Steve is sure about his next line of action.

Steves personality is modest. In fulfilling his role as the speaker, he reminds the audience of the need for determination and personal initiative when handling dreams. As a matter of fact, the title of the speech reaffirms this personality. Interestingly, the aspect of multiple personae plays out across the speech.

From the beginning through to the end, Steve is a socialite who uses polite words to trivialize sensitive issues in an appealing way to the audience. As a public speaker who is sensitive of the type of audience and environment from where a conversation is based, Steve dominates in the properly presented speech. He is context specific and fulfills the purpose of the speech. Raised in an environment of different subcultures and expectations, Steve has learnt the essence of continuous learning despite these variances.

Steve is consistent in creativity and formal approach to emotive issues. Despite deep emotions his story attracts, he refrains from using emotional words and indirectness. Rather, the intonation is plain and void of declaratives and diminutives.

Conclusively, Steves speech indicates dominance as the language used is commanding, emotion-free, and assertive. Despite the emotive aspects in the speech, the author is plain and would rather prefer formal approach in discussing them to the audience.

Steve Jobs Speech Analysis

Introduction

Steve Jobs speech to students at Stanford University is still considered one of the most iconic and significant in history. It is imbued with the spirit of creativity and cleverness of a man who has seen and experienced so much in his life. It is something he wants to share, one of the most valuable materials imaginable, namely experience. In his speech, he draws on the personal situations that have occurred throughout Jobs life, as well as the conclusions he has come to over time (Jobs). This essay concentrates on how this speech uses logos and how influential it is for other people.

Discussion

He tells the stories in his speech, essentially retelling his biography and life. It is filled not only with fantastic events and entanglements but also with inspiration, something students sometimes lack for the sake of advancing in the future. It also touches on the companies he has worked for or helped found. Jobs whole life can be described as something out of the blue that only some are capable of doing. It was this speech that was able to inspire a large number of students to accomplish things, allowing them not to despair in themselves and to seek their personal destiny in this world.

Conclusion

This speech showed the greatness of Steve Jobs, being a role model, whose views made a breakthrough in every industry he touched according to the words of the students listening to it. That is the definition of how great a man is and how much he is revered, even after a long time. Jobs was a genius who put meaning into his every move, making him a unique and distinctive designer and an inspiration for others. The way of interaction using words is influential and provides a vast amount of information in minutes.

Work Cited

Jobs, Steve. . Ted.com, TED Talks, 2011, Web.

Steve Jobs Commencement Speech Analysis

Looking for Steve Jobs commencement speech analysis? Want to understand how Jobs uses ethos, logos, pathos, and figurative language? Take a look at Steve Jobs Stanford speech analysis below.

Introduction

Is it necessary to follow passions or reasons while choosing a career? What effects can losses and failures have on a persons life? In spite of the complex character and deep ethical, philosophical, and psychological meanings hidden in these questions, they are answered completely in Steve Jobs commencement speech at Stanford University in 2005.

Steve Jobs, the co-founder of Apple, Inc., is known as one of the world-famous and successful entrepreneurs whose unique approaches to business and marketing provoked the great publics interest. That is why Jobs speech on the importance of finding an interesting and loved job drew the attention and gained the recognition of the graduates during the Commencement Day at Stanford University in 2005.

Steve Jobs Stanford Speech Analysis

The goal of Steve Jobs speech is to persuade the graduates to find jobs that they can truly love because of their passion for definite activities. Thus, Jobs is successful in achieving his goal because of his exclusive approach to structuring the speech and to blending the rhetoric appeals in order to discuss well-known concepts and ideas of love, loss, and death in a unique form; that is why it is appropriate to examine Jobs manipulation of methods of persuasion in detail.

In his speech, Jobs demonstrates the virtuous use of rhetoric appeals in the development and presentation of one of the most persuasive commencement speeches in order to draw the students attention to the significant questions which can contribute to changing a persons life.

Steve Jobs Commencement Speech: Rhetorical Appeals

The strategies used in developing the structure of the speech and the rhetorical strategies are closely connected. Jobs speech can be divided into five parts which are the introductory part to evoke the graduates interest regarding the topic discussed, the three life anecdotes, and the concluding part, which restates and supports the authors arguments presented in the main part of the speech.

It is important to note that each of the three stories told by Jobs is also developed according to the definite structure pattern where the first sentences of the stories can be referred to the pathos, the personal experience can be discussed with references to the ethos, and the final parts of the stories are organized as the logical conclusions, using the logos.

The first reference to ethos is observed in the introductory part when Jobs states, I never graduated from college. Truth be told, this is the closest Ive ever gotten to a college graduation (Jobs).

The uniqueness of Jobs approach is in the use of the reverse variant of the ethos as the rhetorical appeal because Jobs has no credibility to discuss the importance of university education, but he has the credibility to discuss the points necessary for professional success because of stating his position as the co-founder of Apple, Inc., NeXT, and Pixar.

The next three stories presented in the speech are used to develop Jobs argument about the necessity of doing what a person loves and the importance of finding these things and activities. This argument is developed with references to the concluding or logical parts of the authors stories which are also highly emotional in their character. Steve Jobs uses pathos in the first sentences while telling his stories.

Thus, the discussion of the details of the child adoption in the first story, the reflection on the happiness of building the first company, and the mentioning of the main question in life, If today were the last day of my life, would I want to do what I am about to do today?, contribute to the audiences emotional reaction because of describing the authors own feelings and emotions (Jobs).

The credibility of Jobs considerations depends on the presentation of his own personal and life background and experiences to support his ideas. The use of pathos in the speech is observed when the author concludes with the results of his experience: If I had never dropped out, I would have never dropped in on this calligraphy class, and personal computers might not have the wonderful typography that they do (Jobs).

Discussing the near death experience, the author uses the sentence About a year ago I was diagnosed with cancer, which combines the ethos and pathos strategies (Jobs). Thus, Jobs can use more than one rhetorical appeal in a sentence.

Nevertheless, Jobs goal is to persuade the graduates to act and find the things that they love to do, and the focus on logos is observed in the stories concluding sentences when Jobs provides the logical argument: Your work is going to fill a large part of your life, and the only way to be truly satisfied is to do what you believe is great work (Jobs). These concluding remarks are based on the logical rethinking of the evidence and facts presented as examples from the authors experience.

The repetition of such phrases as Dont settle and the final phrase, Stay Hungry. Stay Foolish, contributes to drawing the audiences interest in the presented facts and ideas (Jobs). The effectiveness of using rhetorical appeals depends on the authors style and his use of repetitive structures and imperative sentences, which sound persuasive.

Conclusion

In his speech, Steve Jobs achieves the main goals of the speech by focusing on ethos, logos, and pathos and by using the authors unique style. Jobs presents his developed vision of his career and passions in life with references to the ideas of love and death and supports considerations with autobiographical facts.

Works Cited

Jobs, Steve.. 2005. Web.