Premium Essay

Modifying Software on Apple Devices

In:

Submitted By poipoipoi
Words 2781
Pages 12
Modifying Software on Apple Devices

My Name

Class
Teacher
29 May 2013

Modifying Software on Apple Devices
Apple, Inc. completely changed our view of cell phones and computers when it introduced the first iPhone in 2007 (Miller). With such an amazing, versatile technology entering the world marketplace, iPhone security immediately became an issue. “Jailbreaking,” or modifying the iPhone’s software to allow complete control over it, quickly became popular. Over the course of the iPhone’s existence, jailbreaking has become more and more important in the Apple community. However, jailbreaking has also struck up much controversy as its legality and effects are questioned.
The word “revolutionary” is an understatement when describing the iPhone. This single device kicked off a technological revolution in which personal computers were redefined. Prior to the iPhone, the most advanced cell phones had only very basic web browsers, poor cameras, and simple user interfaces. With the iPhone came a much faster web browser, photo and music storage, a nicer camera, and the iPhone’s touch screen display made the device extremely intuitive and user-friendly. However, this first iPhone had many shortcomings to be fulfilled. Data speeds were lacking, the operating system had little security, and the user could not install non-Apple, or third-party, apps (Miller).
The iPhone’s first operating system was named after Apple’s computer operating system, “OS X”. Cisco’s operating system was known as “IOS”, so Apple was only able to begin using the name “iOS” for the iPhone’s operating system after paying Cisco some money in 2010. This mobile operating system was much more like a computer’s operating system than any other at the time. iOS dealt with similar security issues and used many of the same defense mechanisms as computer operating systems (Miller). With a device as

Similar Documents

Premium Essay

Apple Inc in 2012

...EMBA 8700 – Apple Case Write-Up Executive Summary Apple Inc. is a global producer of personal computers, portable digital music players, and mobile communication devices for the consumer electronics industry. The company is also a provider of complementary software, services, accessories and peripherals, networking solutions, third-party applications and digital content. The company’s core strategic position is to differentiate themselves by delivering the best user experience through a combination of innovative industrial design (hardware) and software harmoniously working in concert resulting in a price premium that exceeds the cost of being unique. From an industry standpoint [see Chart 1], rivalry in consumer electronics is extremely high where product differentiation is short-lived (i.e. copycats). Even “the most valuable company in the world” cannot slow down. The industry, the competition, and advancements in technology are dynamic and continue to evolve at lightning speed. Apple must stick to its blueprint of success over the last two decades – differentiated product development and operational excellence without losing sight of the customer’s value chain – or risk falling behind and dropping market share. Analysis As a company, Apple has created an enviable and unique position in the industry of being able to design, manufacture, and market their own operating system, develop their own customer friendly hardware and application software, creating an ecosystem that...

Words: 1262 - Pages: 6

Free Essay

Mobile Operating Systems

...Term Paper on Mobile Operating Systems Submitted to Amity School of Engineering and Technology Guided By: Made By: Ms. Ankur Chaudhary Sagar Nenwani, 6CSE4X A2305213340 AMITY UNIVERSITY, UTTAR PRADESH GAUTAM BUDDHA NAGAR Declaration I, Sagar Nenwani, student of B.Tech (CSE) hereby declare that the project titled “Mobile Operating Systems” which is submitted by me to Department of Computer Sciences, Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida, in partial fulfillment of requirement for the award of the degree of Bachelor of Technology in Computer Science, has not been previously formed the basis for the award of any degree, diploma or other similar title or recognition. The Author attests that permission has been obtained for the use of any copy righted material appearing in the project report other than brief excerpts requiring only proper acknowledgement in scholarly writing and all such use is acknowledged. Sagar Nenwani 6 CSE 4 (x) A2305213486 May 7’ 2016 Certification This is to certify that Mr. Sagar Nenwani, student of B.Tech. in Computer Science has carried out the work presented in the project of the term paper entitle "Mobile Operating Systems"...

Words: 3460 - Pages: 14

Premium Essay

The Pros And Cons Of Mobile Phones

...towards these technology, as the names says smart phones are multifunction device which allows its users variety of options such as making phone calls, text, browsing the net, or playing games basically it allows the users to learn and earn while having fun at the same time with that options in mind this makes the popular target from the today's society.(occurring article named: eMarketer.com ) There is no doubt that smart...

Words: 1881 - Pages: 8

Free Essay

System Software

...System Software The operating system (OS) controls the overall operation of the computer and provides an easier way for users to interact with the computer’s hardware and software. The operating system does not have one job, in fact, the operating system is a set of programs that utilizes every task the computer performs and manages system resources, and this includes applications, I/O management, device drivers, memory management, CPU management, and hardware. The operating system is a very critical part of the computer simply because without it, the computer is useless because it cannot function. The operating system manages the computer’s running applications and since each program consists of at least one process, there are typically several processes running at the same time. What the operating system does is manage the computer’s resources in order to run them in an organized manner. This is called scheduling (process scheduling). There are five different states that a process can be in: new, ready, running, waiting, and terminated. The operating system helps the processor organize the processes according to their status in order to keep everything running seamlessly. The operating system operates to keep running programs working and user-ready by making it seem as though several processes are running simultaneously when in fact the available resources are being switched between the processes so quickly that is appears that they are running at the same time. The operating...

Words: 1369 - Pages: 6

Free Essay

Strategic Management

...Apple Computers Strategic Audit Guillermo Magana Embry-Riddle Aeronautical University Abstract This paper analyzes Apple Computers current state as a business and industry leader. Each part of their strategic audit is dissected and broken down to have a better understanding of it. From the company’s current performance and strategic posture to its leader, Steve Jobs, and the team that drives the company to its incredible success. Strengths, Weakness, Opportunities and Threats (SWOT) analysis is discussed to determine how External and Internal factors affect the decisions being made by management. Finally and attempt is made to provide alternatives and a strategy to further the success Apple currently enjoys. So kick back play your favorite song on iTunes, check your stocks on your iPad and make sure to put your iPhone on silent before we start. Apple Computers Strategic Audit Current Situation Current Performance: Strong financial results for the third fiscal quarter in 2011; no debt. Best quarter ever recorded with $28.57 Billion in revenue. Record $7.31 Billion in net profits. The number of retail stores amounted to over 300 retail stores worldwide. Strategic Posture: The company strategic posture is clearly stated, and is also backed up by its strong performance. Mission, Apple is committed to bringing the best personal computing and music experience to its customers. The company has a unique ability to design and development its own hardware and software...

Words: 1953 - Pages: 8

Premium Essay

Tying Method

...TYING CONTRACTS Tying is the practice of selling one product or service as a mandatory addition to the purchase of a different product or service. In legal terms, a tying sale makes the sale of one good (the tying good) to the de facto customer conditional on the purchase of a second distinctive good (the tied good). Tying is often illegal when the products are not naturally related. It is related to but distinct from freebie marketing, a common (and legal) method of giving away (or selling at a substantial discount) one item to ensure a continual flow of sales of another related item. Some kinds of tying, especially by contract, have historically been regarded as anti-competitive practices. The basic idea is that consumers are harmed by being forced to buy an undesired good (the tied good) in order to purchase a good they actually want (the tying good), and so would prefer that the goods be sold separately. The company doing this bundling may have a significantly large market share so that it may impose the tie on consumers, despite the forces of market competition. The tie may also harm other companies in the market for the tied good, or who sell only single components. One effect of tying can be that low quality products achieve a higher market share than would otherwise be the case. Tying may also be a form of price discrimination: people who use more razor blades, for example, pay more than those who just need a one-time shave. Though this may improve overall...

Words: 914 - Pages: 4

Premium Essay

Database Environment

...First and foremost, is the objective of the database system - which is to store the following information: which art is owned/possessed, which artists, and the location of the art within the museum. By having this information readily available in a managed database, it can help the museum prepare for showings, buy/sell/trade/acquire artwork, and maintain an accurate inventory. The Database’ Environment The database’ environment shall consist of metadata & data, software, hardware, people to operate the equipment, and the appropriate procedures for the individuals to follow. Within the museum, the following devices (iMac 21.5 inch model) will be used as workstations by employees and networked together in order to access the server of which the database will be stored. The iMac devices are expensive, but have the capability of running Boot Camp for employees that desire to use Windows. And they are also very reliable and are expected to last long enough to make the investment valuable. The following device for the server can be a Dell PowerEdge T320 – since the requirements for this environment aren’t that demanding, this will suffice. The database server itself shall run a server Operating System (OS) such as, Windows Server 2012. The database will also require a Database...

Words: 857 - Pages: 4

Premium Essay

Computer

...Software Basics Software is the instructions that tell a computer how to carry out tasks that are referred to as computer program. These programs form the software that prepares a computer to do a specific task, such as document production, photo editing, virus protection, file management, or Web browsing. It determines the tasks a digital device can help you accomplish. Some software helps you create documents; while other software helps you block viruses or fine-tune computer performance. The two main categories of Software System software are operating systems i.e. device drivers, utilities, and programming languages. It is designed for computer-centric tasks. For example, you would use system software to diagnose a problem with your hard disk drive or Internet connection. Application software includes music, graphics, mapping, finance, and entertainment. It is designed to help people accomplish real-world tasks. For example, you would use application software to edit a photo, write a term paper, or play a game. Music software offers many ways to work with music, sound effects, and narration from your desktop, laptop, or handheld computer. The most popular music software capabilities are as follows: download music and other sound files, play music and sound files, create playlists, transfer music to handheld devices, convert audio CDs into digital music, record music and narrations, edit volume, speed, and quality of digital recordings, crop and mix recordings, stream...

Words: 1319 - Pages: 6

Premium Essay

Helooo Woorld

...Tektronix, Inc.: Global ERP Implementation Business Context * Tektronix originally founded as maker of electronic test equipment in 1946 * Company had grown to a $1.3 billion high-tech manufacturer of electronic tools and devices * Headquartered in the U.S. with an international presence in almost 60 countries * Business split into three autonomous divisions: * Measurement Business Division (MBD): Worldwide leader in oscilloscopes - more than twice the market share of its next largest competitor; worldwide leader in television test, measurement and monitoring equipment * Color Printing and Imaging Division (CPID): market leader for workgroup color printers * Video and Networking Division (VND): video production, editing and transmission products, and storage and playback systems Key Business Drivers * Financial performance was suffering; gross margin had decreased from 42.9% in 1997 to 41.5% in 1998. * Tektronix was looking to maintain a competitive presence in the market * Company’s future success depended on ability of CFO to simplify and restructure operations by selling off unprofitable businesses, integrating new acquired businesses, changing business processes and increasing visibility into operations Initiative Objectives / Benefits Objectives | Benefits | Separate the needs / requirements of each division, but enforce standardization within each division | * Each division would have its own instance of the system...

Words: 1027 - Pages: 5

Premium Essay

Apple

...1.0 Executive Summary Formally known as Apple Computer Inc., this company was founded April 1, 1976. In January of 2007, the word “Computer” was removed from its name to reflect on its shifted focus towards consumer electronics. Being the World’s Most Valuable Brand today Apple manufacturers a host of hardware products such as the iPhone, iPod, Mac, and as if that isn’t enough they offer quite a bit on the software side as well such as their iOS6 and services such as iTunes. The purpose of this Marketing Plan focuses on the iPad through implementing various marketing strategies and innovations to improve sales and increase its tablet market share. We have found these goals to be attainable through enhancing the iPad’s features. More specifically by making it Adobe Flash compatible, the addition of a USB port, along with an expandable memory slot. 2.0 Situation Analysis Apple’s mission is to be committed to bringing the best personal computing experience to students, educators, creative professionals and consumers around the world through its innovative hardware, software and Internet offerings. Currently Apple holds the title of, “World’s most Valuable Brand.” It is evident that being committed to bringing the best personal computing experience to all its customers is paying off. Focusing on the company’s most recent addition to its products, the iPad; we would like to come up with new features to not only boost sales...

Words: 6042 - Pages: 25

Premium Essay

Mobile Phone Reliability and Security

...Mobile Phone Reliability and Security EMP5169 Mobile Phone Reliability and Security EMP5169 Haotian Zhang 7436928 Haotian Zhang 7436928 Table of Contents Abstract 2 1. Introduction 2 2. Mobile Phone Security Issues. 3 3. Mobile Threats and Vulnerabilities 6 3.1. Mobile threats 6 3.2. Web-based Threats 8 3.3. Network-Based Threats 9 3.4. Physical Threats 10 3.5. Mobile Vulnerabilities 11 4. Protection Method And Corresponding Vulnerabilities 13 5. Conclusion 17 6. Reference 18 Abstract Mobile phones especially smart phones have played an important role in nowadays business work. They are one of the most popular platform for people to transfer and exchange data for communication. With the development of technologies, now mobile phones also get involved in area like banking, remote control, m-commerce, internet access, entertainment and medical usage. However, there are more and more security issues along with the smart phone development. It is necessary to find a reliable and convenient way to prevent mobile phones from unauthorized access and diverse attacks. It is suggested that biometrics security technology is best way nowadays and the reliability of wireless services should be improved. This article will introduce many kind of threats and vulnerabilities which affect the mobile phones followed by a biometrics solution to secure the mobile phones. Introduction Mobile phones are booming since 21th century, with global...

Words: 3521 - Pages: 15

Free Essay

Google Technologies

...Google Technologies Glass Google Glass is an electronic eye wear device that essentially is the ability to access Google and updates from your smartphone device through the computerized frames. While currently still in the stages of development and beta testing, Google Glass has already started making an impact on the development of new technologies and the way in which we are able to see things through another person’s eyes. When linked with a persons smartphone device, Glass enables one to send and receive text messages displaying the message in a small visual to the user; Glass also provides the sync ability to make calls, take photos, record videos, and provide navigation. As Glass is still within it’s beta testing and development stages the applications associated and current features are limited, but the possibilities for this device seem to be the main focus of Google and it’s developers before introducing Glass to the public consumer. Currently Glass has been making headlines, as Google reaches out to promote this new technology providing testers to Police Officers in New York, and to NBA teams, the purpose to help provide a wider means for the technology in development. (Stein, 2014) When considering Glass, and the association of the Police or Emergency response teams one can consider the positive impacts Glass can provide such as development of applications compatible with the device to pull up a persons driver’s information, vehicle reports, background information...

Words: 2904 - Pages: 12

Premium Essay

Noname

...products with different features. However, Apple is the most popular and amazing company on the earth, brought us the most delicate, fancy, high-end electronic devices and software just like from future. It is the kind of company, who totally blew people’s mind and change people’s life on the way they listening to the music, making phone call, taking photos and etc. Apple Inc., formerly Apple Computer, Inc., is an American multinational corporation, which was founded by Steve Jobs, Steve Wozeniak on April, 1976 with a release of the Apple 1, and it was incorporated in Cupertino, California in 1977. Apple is the world’s second-largest information technology company by revenue after Samsung Electronics and the world’s third-largest mobile phone maker after Samsung and Nokia. However, the company is facing a problem for its contractor’ labor practices its declining market value. Board According to the Model Business Corporation Act, the Board has fiduciary duty, including duty of care, duty of loyalty and fair dealing, and duty of supervision. Also, based on the judgment rule, it protects board members from liability if they make reasonable decision. There is no certain form of board is perfectly good from every company. However, assuming all public firms have experienced and successful experts serving on a board, a good board generally has a higher fraction of non-insiders and with fewer members. Compare to other companies, Apple has a relatively small board with eight members...

Words: 1522 - Pages: 7

Premium Essay

Computer Technology

...Samantha A. Medina University of Phoenix Final Project: Expository Essay Computer technology has developed tremendously over the decades and centuries to become so modern in every aspect including education and personal leisure. It is breath taking to see how modernized out computer technology is today as opposed to the limited computer technology that was available in history. The changes that have occurred over history to today will be discussed and focused upon in this essay. The Mechanical Era: Early Computing Devices The Abacus The abacus was the first machine to be used computational science. It is considered to be the first computer. This machine was inspired by one of Charles Babbage’s designs. The abacus could process 15 digit numbers and calculate fourth-order differences. In 1885 the machine won gold medal at an exhibition in Paris and also helped calculate the orbit of mars! The abacus is still in use today. Imagine that a computing device from centuries ago still being used to this day! Charles Babbage Charles Babbage was an English mathematician, philosopher, inventor and mechanical engineer ("Charles Babbage", 2012). Babbage is known to have invented the first programmable computer. As stated earlier his design inspired the abacus and other complex designs. He won the Gold Medal of the Royal Astronomical Society for inventing an engine for calculating mathematical and astronomical tables. Babbage was also Lucasian Professor of Mathematics at Cambridge...

Words: 1624 - Pages: 7

Free Essay

Comparison of Some Os Booting

...International Journal of Research in Computer and Communication Technology, Vol 2, Issue 11, November- 2013 ISSN (Online) 2278- 5841 ISSN (Print) 2320- 5156 Windows, Linux and Mac Operating system Booting Process: a Comparative Study Prof. Amar Rajendra Mudiraj Assistant Professor MIT (E), Aurangabad,Maharashtra, India. Email:amarmudiraj@gmail.com Abstract This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process execution all other processes can get the chance to execute , so we may say that booting is the first process because of which all other OS processes can execute. This experimental study gives an overview on the similarity and difference in Booting Process. As every operating system have to initially do the booting and as every OS providing different feature of each others, the paper is highlighting those micro and essential similarities and differences having by the operating systems during the Booting Process. Keywords: Booting, Cold booting, Worm booting, Linux Booting, Windows Booting, Mac Booting. In Worm Booting the computer get restart without shutdown the system, in which the system application and memory just get cleared and then reloading the operating system in primary memory. With the above two booting types we also have some other flavor in the computer booting like Sleep, Hibernate. Power - ON Load Instruction...

Words: 2846 - Pages: 12