Free Essay

Mac Osx

In:

Submitted By marklugue
Words 1686
Pages 7
Mac OS X Operating System MEMORY

01/05/15

Mac OS X Operating System MEMORY At start up, the MAC OSX it divides the Random Access Memory into two broad sections. The system partition is a saved portion which always begins at the lowest addressable byte of memory and then extends upward. The other portion is available for use by software components and applications. When launching an application, the system OS only allows for a specific portion of memory to be utilized in what is called an application partition.
The system Heap is the main part of the system partition which exclusively reserves itself for the operating system and software components. The Heap loads system code, resources and data structures, including the system buffering and queues. The Heap starts at the low memory end and only expands when needed to the high memory area. In multitasking situations, each application is limited in its memory partition. It is only allotted in total what is assigned as its maximum intended usage to not over access memory usage.
If the application requires the use of more memory, the RAM grants the application Temporary memory from the Heap to allow for smoother function ability. The operating environment is controlled by the system global variables which is the elapsed time of each open applications since system start up. The Stack is an area of the application partition which utilizes the LIFO, it releases space at the top of the stack to ensure that no unallocated holes occur within the stack. The a5 world in the application partition is always a fixed amount.

FILE MANAGEMENT
Every computer system created has had some sort of filing system set in place for its end user. With that being said, it must be recognized that not all of computer operating systems use the same methods of organizing documents. As time has passed, so too have some of the antiquated forms of file management. Gone are the days where one had to store everything on giant hard drives the size of refrigerators, along with the use of floppy disk to save or run items. In today’s modern era of technology, society is able to explore new area of file management with the introduction of the ‘iCloud’ based system. Along with these advancements, the super corporate named company of Apple has still uses some of its previous forms of file management in order to enhance its current products.
In the case of Apple’s Mac OS X, the file system is broken into four key domains. The first domain is the user domain. It is within this portion of the filing system that resources are kept with regards to the specific user that logs on to the device. Although this portions basically covers all of its users, this field shows only the ‘home directory’ of only the user that is currently logged on. User home directories can reside on the computer’s boot volume (in the /Users directory) or on a network volume.
The local domain encloses files/ applications only on the specific computer that can be shared with all its users. This domain is typically managed by the system, but users with administrative privileges may add, remove, or modify items in this domain. (Warrell, 2013 )
The network domain is similar to the local domain only with the difference being that it can share with all users on the local area network. Items in this domain are typically located on network file servers and are under the control of a network administrator.
The system domain holds all of the software for the system that is originally installed by Apple. These files are needed in order for the system to function. Users cannot add, delete, or modify objects in this location.

SECURITY
Mac OSX was designed from the ground up with security in mind. Mac has enjoyed a fairly high rating for years as a leader in security for the most part due to the company keeping the systems internal workings a secret. As they moved to OSX they based the OS on open source code that is available to everyone. They did keep key components secret so as to not allow anyone to have access to the security of the system. They have shared some of this as they are now allowing antivirus programs to be installed on the system now and that means they need to share the code that is in some of the deepest levels of the OS. This is only shared with reputable companies and not allowed into the “wild”. This was a big step for Apple as sharing this information has always been a huge no no for them. This sharing of information does allow antivirus companies to create security suites for the OS but it can also allow the source code to be shared with people who want to do harm to Mac users. The other main thing that has kept Mac on the cleaner side of this is they have a very small market share in the world. The current Market Share for Mac is just above 5%. In the grand scheme of things this is not enough for malware writers to pay attention to. Those who write malware do this mostly for financial gain. Looking at it from this stand point the small percentage of users is not enough to make most malware writers want to spend the time to create malware that will run on a Mac. The security of a Mac is also quite formable. For instance no process that is outside the OS runs as root. Root is the Mac equivalent to running as Administrator in a Windows machine. There are some differences and we will get into this later in this paper.

The first thing we should go over is access rights. This can be quite complicated. Mac has lead the way in ensuring access rights are not blurred. The top of the chain is Root. Root essentially has access to everything. As stated above the only things allowed to run as root, without going through an extra security screen, are deep level OS files that require that kind of access. The user can bring up a terminal window in root but it does require a password that was set by the person who setup the OS. Any process that wants that kind of access must have that password and a user must enter it. The system files are also protected and the user is required to have the password and the permissions to access those files. If a program were installed that had malicious intent it would require this information on most Macs. Of course this can be circumvented by the end user who did not set the password in the first place. This is true of any OS. If the user has set up the system to require little or nothing to gain access to these files then the user has ended their own security.

Very few antivirus companies have entered into the game with Mac. The reasons for this are simple enough. As stated above the user base is low and most of them do not believe you can get an infection on a Mac computer. This is not true. There are some very high level infections that can take control of a Mac computer. This includes viruses, rootkits, botnets, and general malware have all been found running in Mac computers. Apple has recently had to change the way they advertise their products and remove anything that stated they cannot get infected. This has changed the playing field a bit and more people are looking to the security industry to help secure their Mac computers. This has also woken the malware writers to the fact that Macs have become more vulnerable. More infections have been found in the wild for Macs in the last 2 years then all previous years Mac has produced computers.

The most seen infections for Macs have been the Ransom/Scareware variety. These are always a fake program that has been altered to look like something legitimate. In many cases they are designed to look exactly like your favorite antivirus begins a fake scan that tells you it found many horrible infections on your system. Most of the names of the malware will be names pulled out of recent headlines to ensure the end user knows something about them and is afraid to not act. The infection then pops a link in front of the user saying something like “…. Infections were found on your computer. We will remove these infections and cleanup your computer if you are willing to pay $XX.XX. This is usually not a huge amount of money as the malware writers want this to look legitimate. They make the money later as in order to get the “cleaning” they are offering they require your credit card. Once they have you credit card information they will sell it. This is the most used vector, the user. In the world of IT security, the largest issue any admin will come across is not the OS that is used in the network but the people operating it.

Mac has worked hard to secure the OS they have been working on but the main issue is making sure the user is up to date, not the OS or the antivirus. Updates are always important and will help in keeping the world safe and nothing can replace a good antivirus. We has operators of these machines need to be aware of what is happening out there and keep the information we want secure in a safe place.

Refences

* http://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10&qpcustomd=0&qpcustomb=

* http://www.welivesecurity.com/2014/03/21/10-years-of-mac-os-x-malware/

* Inside Macintosh: Memory_APPLE.INC 1985 (reassessed 2007)

* Apple Inside Macintosh Volume I, II, III_CAROLINE ROSE 1985 (reassessed 2004) * Warrell, A. (August 16, 2013). File Management on the Apple Mac Computers. Retrieved from http://www-public.jcu.edu.au/libcomp/computing/computers/JCUPRD_034360 *

Similar Documents

Premium Essay

Apple History

...MAC SECURITY | managing information security Submitted by : srinivasa reddy marreddy Introduction Many years of operating system improvement and an accumulation of frameworks and features from many other systems joined with numerous interesting plans and executions brought the advancement of Apple, Inc's. OS X family. In order to understand the progress of the older systems of OS X it is necessary to examine the upgraded technology and their interaction with other systems. To protect and troubleshoot the system it is necessary to know and understand the working of OS X technology. The open source core of the system is an operating system called Darwin. Darwin is a variant of BSD Unix running on the Mach 3 microkernel from Carnegie Mellon University and the Open Software Foundation (Singh, 2007). On top of Darwin, Apple utilizes both open source and proprietary code and builds a intricate and complex operating system which resembles the look of classic Macintosh computers with almost no similarity to recorded (1980s) Macintosh underlying innovation. In fact OS X is more compatible with its sibling UNIX systems and with Microsoft Windows than with past Apple computers. OS X is a UNIX 03 system as certified by the Open Group and recorded on their register (The...

Words: 1735 - Pages: 7

Premium Essay

The Ultimate Battle: Pc Versus Mac

...The Ultimate Battle: PC versus Mac Throughout the past quarter century there has always been a huge argument between nerds and geeks all around the world: which is better, a PC or a Mac? If you want to get two nerds arguing in front of you that would be the question to ask. I will be discussing what I believe to be the key points in each system where one may outshine the other or where they may be equal, to determine which should be the best choice for the general, everyday consumer.My personal preference for computers is with PCs; however, I believe the final choice should be up to the customer based on the following points. First let’s start with the basics: how much is it going to cost? Immediately many people will tell you how expensive a Mac computer is and that a PC is so much cheaper. This I will have to agree with, but before we make that decision let’s break the PC and Mac down a bit. Mac computers come in a very short variety; you have the MacBook Air, MacBook, MacBook Pro, the Mac Mini micro desktop, the all in one iMac, and the Mac Pro power desktop. Not as many choices there as the PC and almost the entire line of Macs will carry at least $1,000 prices tags. Now that’s a very hefty price tag for a system that can’t be customized with the exception of what you get when you order it. PC’s on the other hand can range anywhere from $300 all the way to $3,000. But the main point here is how many options you have when it comes to choosing what you want with your computer...

Words: 1195 - Pages: 5

Free Essay

Hospital Architecture

...Current Network Systems in Use Currently, Patton-Fuller has good network system. The backbone network structure of the entire hospital is 1000BaseT. The logical network is interconnected by a network bridge, which separates the clinical functions from the administrative functions of the hospital. The administrative side of the network uses 100BaseT with CAT 6 cable, while the clinical side of the hospital uses 1000BaseF with single mode fiber. At Patton-Fuller there are many different operating systems in use. On the administrative side all executive management workstations as well as HR, OPNS and finance senior management are using iMac’s using MAC OSX Leopard and Windows XP. All personnel only involved in data entry in these departments use thin client computers by HP. In radiology all of the operating systems being used are MAC OSX Leopard, as well as Windows XP. The same can also be said for the RIS data center as well as the Operating Room,...

Words: 333 - Pages: 2

Free Essay

Release Note

...------------------------------------------------- 3.14.72/18/2016 New in 3.14.7 * Fixes an issue with Windows Explorer responsiveness. New in the 3.14 series * [Mac] On 64-bit OS X, Dropbox will run as a 64-bit application (except for dbfseventsd) * [Windows & Linux] Upgrade to Qt 5.5 * Many small fixes and improvements comments ------------------------------------------------- 3.14.52/9/2016 New in 3.14.5 * Fixes an issue that prevented Dropbox from starting on systems with certain firewall configurations New in the 3.14 series * [Mac] On 64-bit OS X, Dropbox will run as a 64-bit application (except for dbfseventsd) * [Windows & Linux] Upgrade to Qt 5.5 * Many small fixes and improvements comments ------------------------------------------------- 3.12.612/21/2015 New in 3.12.6 * Workaround for a connection issue for users in Oman New in the 3.12 series * New functionality for the badge * View if the document is shared, and change sharing permissions * Email file from the badge * Comments notifications * [Mac] UI improvements for the Tray Popup on Mac * [Windows] Support for Windows 10 Enterprise Data Protection * Changes to how the client runs before a user signs in * Reduced memory usage * Many small fixes and improvements comments ------------------------------------------------- 3.10.1111/5/2015 * Fixes rare error that causes Dropbox to fail to start with "Couldn't start...

Words: 3750 - Pages: 15

Premium Essay

Operating Systems

...managing connected devices such as a printer. An operating system will make a computer secure to each different user and user specific by requiring a password for each user. DIFFERENCES BETWEEN WINDOWS, MAC OS X, AND LINUX Microsoft Windows is the most preferred operating system among computer users. Microsoft Windows consists of different operating systems developed and sold by Microsoft. Windows is available on desktops, laptops, phones, servers, and tablets. The first Microsoft operating system was released in 1985 and MS-DOS was the only Graphical User Interface. The small Microsoft Company skyrocketed through the 90's and millennium with the massive growth of computers around the workplace and eventually at home. The latest Microsoft Windows operating system is Microsoft Windows 10 and was released in late 2014. Many desktops and laptops received a free upgrade courtesy of Microsoft. Microsoft 10 upgraded to stylish icons like Mac OSX. The Mac OS X is Apple specific to Macintosh machines. OS X was developed and marketed by Apple Inc. and came preinstalled on all Mac desktops and laptops since 2002. In addition, MAC OS X is a great platform for software and graphic engineers because it supports technologies like UNIX, Java, Cocoa, Carbon, Database, and Scripting. The Mac OSX comes with expansive software packages that come preinstalled or can be...

Words: 483 - Pages: 2

Premium Essay

Lovers

...prevent viruses, hackers or malware that can cause permanent damage to your hard drive and release personal info. - Norton, Kaspersky, and McAfee are examples of antivirus software 3. File compression programs: - Helps save space and providing fast loading by compressing files together to make them smaller. WinZip is a type of file compressor 4. Troubleshooting and diagnostic tools: - A type of diagnostic tool is the DirectX diagnostic tool that presents info about the components and drivers installed on your system. OS Software 1. Desktop Operating Systems: - controls the hardware so that users and application can make use of it - Mac, Window, Linux are all operating systems 2. Windows: - 1st Brought up in 1985 - Bill gates the CEO. - One of the biggest OS worldwide now available on phones 3. MAC OSX: - Steve Jobs was the CEO...

Words: 476 - Pages: 2

Premium Essay

Web Based Operating Systems

...Systems David Gonzales POS/355 Instructor John Buono June 18th, 2012 WebOS systems are operating systems that are scaled for internet computing (R. MacManus, May 11, 2006). There are many types of Web Operating Systems and the terminology can seem a bit fuzzy from a metacomputing standpoint. But with the growth of the internet so too has the term WebOS become serious in the ranks of computing systems. There have been many attempts to hoard market share on Web Operating Systems like Microsofts Windows 2003 Server Web Edition (Pingdom, 2011). But basically WebOS Servers are common operating systems serving the public over the internet. Most of these are server editions vary among todays popular operating systems like Windows, Linux, MAC, and UNIX. An additional platform is usually common to layer on top of these operating systems and these come in various flavors as well depending on the function of the website. This paper will target the popular server operating systems that are common on the internet today with emphasis on why these systems are popular and some of the features these systems offer as systems suitable for internet servers. Windows Servers Without question Microsoft Windows bases servers are among the most popular servers on the internet today. Need proof? Just look for the .htm extention at the end of the URL and you will find that most websites are easily identifiable as a Windows based server (J. Kyrnin, About.com). Windows based servers are popular...

Words: 1086 - Pages: 5

Premium Essay

Protein Article Research

...Checkpoint Computer Comparison Samantha Lorance CIS/105 May 24th, 2013 Jake Hornsby Check Point Computer Comparison When most people imagine computers, they do not see what makes up the computer system. Most state-of-the-art systems have the same components as a personal computer to meet any requirements you may have. Although state-of-the-art computers offer a larger memory and storage capabilities, my personal computer offers some of the same components and had quite a hefty price tag on it for these particular bonus features. I purchased my Apple Mac OSX specifically for school. My mother thought I was insane for spending as much as I did, but it was the best available for what I needed. It is a compact Computer with the built in processor, wireless keyboard and mouse, 2.7 GHz quad-core Intel Core i5 processor with 6MB L3 Cache, 1TB hard drive, 8gb of 1600MHz DDR3 memory, 21.5 Inch screen LED backlit display with ips technology. ("Apple - os," 2013) Despite what you would think, as an online student, the lack of mass storage and how my computer looks is not important to me. I want to have a computer that offers the necessary capabilities and allows me the opportunity to receive an education. A new state-of-the-art system can also allow a user the same portability as a personal computer, but with a higher price tag. A new state-of-the-art computer system has Intel Core Dual P8400...

Words: 405 - Pages: 2

Premium Essay

Process Design

...Applе аs а "mobile devices company" - thе largest оnе іn thе wоrld (Apple's revenues аrе bigger thаn Nokia, Samsung, оr Sony's mobility business). For ѕеvеrаl years Apple's product strategy involved creating innovative prоductѕ аnd services aligned wіth а "digital hub" strategy, whereby Applе Macintosh computer prоductѕ function аѕ thе digital hub fоr digital devices, including thе Аpplе iPod, personal digital assistants, cellular phones, digital video аnd ѕtіll cameras, аnd оthеr electronic devices. Моrе recently, thе full impact оf а vеry wеll throught оut brand strategy hаѕ cоmе intо focus - аnd onе іn whіch customer еxpеrіеncе іѕ central, аnd thе Mac іs nо longer thе hub оf аll things Applе. Тhе cоmpаnу nоw offers а harmonised, synchronised, аnd integrated user eхpеrіеncе аcrоѕѕ аll оf іtѕ mаіn devices (iPad, iPhone, аnd Mac), using iCloud aѕ thе hub. Apple's core competence іѕ delivering exceptional еxperіencе thrоugh superb user interfaces. Тhе company's...

Words: 1445 - Pages: 6

Premium Essay

Supplemental Instruction Information Document

...Online Supplemental Instruction What Is Online Supplemental Instruction? Free 1 hour live real-time sessions available through your registered course Conducted by a separate instructor from your registered course* Sessions are available multiple times throughout the week and recorded to review at your convenience Each session is broken into four areas of focus: 1. Review of one topic from the weekly learning objectives specified in the registered course 2. Provide broad guidance and suggestions on homework 3. Provide relevant examples and illustrations to reinforce key concepts and course material 4. Questions and Answers *Occasionally email reminders are sent from the Supplemental Instruction platform. These emails are not from your course professor and should not be replied to. What is the Benefit? The service provides students another opportunity and a different dimension to learn and retain new information taught in their registered course Experience real-time, live interaction with an instructor and classmates Opportunity to review homework problems, view demonstrations, and receive immediate feedback How do I access the Supplemental Instruction sessions? Supplemental Instruction sessions are conducted in the Collaborate platform; the interactive tool provided within Blackboard courses A link to the Supplemental Instruction sessions is available under the Student Center tab and under each weekly tab Once students click on the link for Supplemental Instruction; students...

Words: 923 - Pages: 4

Free Essay

Music

...Tufts Medical Center Remote Access (VPN) using the Cisco AnyConnect Secure Mobility Client (Windows and MAC OSx) Tufts Medical Center has implemented a new Remote Access (VPN) solution for users. The following pages provide instructions on how to install and connect to the Cisco AnyConnect Secure Mobility client for: Windows XP, Windows Vista, Windows 7, Windows 8, including both 32- and 64-bit versions. Macintosh OSx 10.4 (Tiger) and later Please Note: The Cisco AnyConnect Secure Mobility client requires minimal user configuration. The web based installation is normally straightforward and intuitive. You simply point your browser to https://remote.tuftsmedicalcenter.org . You will then be guided through the installation process by the AnyConnect application. The documentation below describes the process in detail, should you need a reference. 1 Windows Installation The installation of the AnyConnect client is performed from your web browser. Depending on your browser type and configuration the installation will either use ActiveX or Java to install. Once the install process starts you will either follow the ASP or Java instructions below. ActiveX Installation 1. 2. Point your browser to https://remote.tuftsmedicalcenter.org Enter your Tufts MC username and password. The installation will in most cases be automatic from this point. The Installer will perform compatibility checks (shown below) and will download and install itself. 2 When you see...

Words: 1204 - Pages: 5

Premium Essay

Fangsui

...Steve Jobs และ Steve Wozniak เป็นผู้ก่อตั้ง ต่อมาไม่นาน Apple ได้กลายเป็นผู้นำในอุตสาหกรรมอย่างรวดเร็ว อย่างไรก็ตาม หลังจากการเข้าตลาดของ IBM ส่งผลกระทบต่อ Apple เป็นอย่างมาก โดยที่ Macintosh ของ Apple ไม่สามารถแข่งขันกัน PC จาก IBMได้เลย จากปัญหาตรงนี้ ทำให้ Steve Jobs ถูกบีบให้ลาออกจาก Apple ในปี 1985 หลังจากการจากไปของ Jobs Apple computer ก็มีการปลี่ยนแปลงผู้บริหารและนโยบายตลาดมา แต่ก็ไม่ได้ทำให้ Apple ประสบความสำเร็จเลย จนกระทั่งในที่สุด Jobsได้กลับมา พร้อมกับการเปลี่ยนแปลงครั้งใหญ่ใน Apple โดยการเปลี่ยนชื่อจาก Apple computer เป็น Apple Inc. หลังจากนั้น Appleก็กลับมาประสบความสำเร็จได้อีกครั้ง Business Model 1. Value Proposition เสนอสินค้าที่แตกต่าง - ทันสมัย - ครบวงจร 2. Revenue Model รายได้หลักอยู่ที่ iPhone 3. Market Opportunity Mac, iPhone, iPad ยังมีโอกาสทางการตลาด 4. Competitive Environment การพัฒนาตัวเองให้ล้ำหน้าเกินคู่แข่งเป็นเรื่องสำคัญ 5. Market Strategy สร้างสรรค์ software, hardware รวมทั้ง applications ต่าง ๆ ได้ด้วยตัวเอง 6. Organization Development สามารถพัฒนาองค์กรให้เป็นองค์กรแห่งนวัตกรรม 7. Management Team การบริหารขึ้นอยู่กับ Steve Jobs Apple’s Strategy Branding emotional branding Innovation สร้างสิ่งใหม่ ๆขึ้นมาตลอดเวลา Perfectionist ผลิตภัณฑ์ที่สมบูรณ์แบบทั้ง Hardware-Software-Design ปัจจัยที่มีผลต่อการแข่งขัน Smart phone ในอนาคต • ความก้าวหน้าทางด้านเทคโนโลยี • life cycle • พฤติกรรมของผู้บริโภค • บทบาทของเทคโนโลยีในชีวิตประจำวัน ส่วนแบ่งตลาดของ Apple Inc. • OS ของ Smart phone Apple OS 48%, RIM OS 19%, Android 15% • Platform Apple 56%...

Words: 647 - Pages: 3

Premium Essay

Network Systems Administrator Tools

...BALTIMORE CITY COMMUNITY COLLEGE DIVISION OF BUSINESS, HEALTH, MATHEMATICS AND SCIENCE BUSINESS, MANAGEMENT AND TECHNOLOGY DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use...

Words: 856 - Pages: 4

Free Essay

Resume

...Kim Barnes 1400 East Pine Apt 1732 Knotsviller, NC 27798 Cell Phone- (919)-869-5803 (252)-259-6770 Email: Nikkinicolejones35@gmail.com Objective: To gain employment with a growing corporation and to use my skills and knowledge in assisting the corporation in meeting and maintaining extraordinary goals in its field. Education: July 2012-Present - Art Institute of Raleigh-Durham Major: Bachelors of Fine Arts: Fashion Marketing and Management Work Experience: July 2012- March- 2013 Wendy’s Durham, NC Cashier/Drive-thru May 2013 -Oct Which Wich, Durham, NC Cashier/Sandwhich Maker/Shift Leader Skills/Qualifications: Proficient Mac OSX platform -Food/beverage knowledge Proficient in PC platform -Food regulation Compliance Digital Illustrator -Able to handle food frequently General knowledge of computer software -Food preparation experience Project Management -Food Safety Certified Effective leader -Able to clean/work sanitary station Effective multi-tasker - Service oriented team player Consistently...

Words: 253 - Pages: 2

Premium Essay

Apple

...OS development on Intel platform, both of which didn’t bear any results. Spindler‘s (‘93-‘96) strategy to expand to international market gave short-term results, but did not help Apple in long term. Amelio (‘96-’97) decided to go back to premium price differentiation strategy and invited Steve Jobs to take over as CEO in 1997. Steve jobs restructured company around the original strategy of Apple and turn that into a competitive advantage. Apple’s competitive advantages are its control of software and hardware, marketing, digital asset management, retail strategy, product differentiation and Steve Jobs’s strategical decisions. Decisions such as switching to Intel processor resulted not only reduced power use & design ease but also made Macs able to run windows on it. Apple retails concept implements direct selling, creates first hand experience to customers, customer education, after sales service etc. With these advantages Apple built a barrier to five forces that shapes industry competition [1]. Analyze the PC industry. Are the dynamics favorable or problematic for Apple? Intel co-founder Gordon E. Moore predicted that the performance and capacity of an integrated circuit would double approximately every two years. Technology in PC industry became cheaper and affordable over time. Company’s Growth was driven by low price but revenue growth didn’t match with volume growth. This led to decrease in R&D spending. Hence almost all PC suppliers used cost differentiations as...

Words: 718 - Pages: 3