preview

Case Study : Apple Inc.

Better Essays

Apple Inc. is a California based company that was incorporated in 1977. According to University of Oregon Investment Group, “Apple operates out of 8 different segments: Desktops, Portables, iPod, iPhone, iPad, other music related products and services, peripherals and other hardware, software, service and other sales” (2012). According to the company’s 2013 10-K, “Apple sells its products worldwide through its retail stores, online stores, and direct sales force, as well as through third-party cellular network carriers, wholesalers, retailers, and value-added resellers.” For the fiscal year end 12/31/13, Apple’s approximated sale was $171 billion. The net income margin was 21.7%. The company’s assets were $209 million and Net Worth was …show more content…

Technology Concerns Apple is heavily dependent on technology because the customer’s expect cutting edge technology from them. The company needs to be up-to-date to with the advancement in technology to provide their best products and services to the customers. The company uses technology to attract their customers with products like MAC books, iPhone, Apple Watch, etc. These products require the fastest software and data storage capabilities to stay competitive in their industry. Furthermore, technology is used to forecast the amount of product Apple needs to produce. Apple’s branding and business could be greatly affected via interruptions to networks and failures to their implemented IT structures. These can be resulted from natural disasters, accidents, power disruptions, viruses, etc. (Apple 10-K Pg. 12). The information contained in these IT systems can be stolen, resulting ruined relationships with related consumers/partners. Additionally, this could lead to public legal matters and losses to the company’s finances. Apple uses the PII system. Apple’s 2013 10-K provides the following information about the PII system: The Company requires user names and passwords in order to access its technology systems. Apple use encryption and authentication technologies to secure the transmission and storage of data and prevent access to Company data or accounts. Apple’s business

Get Access