0% found this document useful (0 votes)
149 views16 pages

MIS Project

This document provides an overview of Apple Corporation. It begins with acknowledgements and a preface stating the objective is to provide insight into Apple's success. It includes an executive summary highlighting Apple's history of highs and lows, successful product introductions like the iPod, and their focus on refining existing products. The introduction states that Apple designs consumer electronics, software, and computers. It also notes they operate retail stores worldwide and are one of the largest technology companies.

Uploaded by

mehmoodkhattak
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views16 pages

MIS Project

This document provides an overview of Apple Corporation. It begins with acknowledgements and a preface stating the objective is to provide insight into Apple's success. It includes an executive summary highlighting Apple's history of highs and lows, successful product introductions like the iPod, and their focus on refining existing products. The introduction states that Apple designs consumer electronics, software, and computers. It also notes they operate retail stores worldwide and are one of the largest technology companies.

Uploaded by

mehmoodkhattak
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 16

Apple Corporation

ACKNOWLEDGEMENT
It gives us great pleasure in presenting our project work on “APPLE
CORPORATION”. We, the students of FUUAST Islamabad successfully
completed our project and would like to thank sir Naseem Qaiser for his timely
encouragement, guidance and support.

We, as co-workers are also grateful to each other for the team work without
which this study could not have been completed successfully.
PREFACE
The primary objective of this report is to provide the readers the insight into the
success of apple industry.

We hope that the report has made the text interesting and lucid. In writing this
report, we have benefited immensely by referring to many publications and
articles. We express our gratitude to all such authors and publishers.
Any suggestions to improve this report in contents or in style are always
welcome and will be appreciated and acknowledged.
Table of Content
Apple Corporation...............................................................................................................1
ACKNOWLEDGEMENT...................................................................................................2
PREFACE ...........................................................................................................................3
Table of Content..................................................................................................................4
EXECUTIVE SUMMARY.................................................................................................5
Introduction:........................................................................................................................6
Hardware Technologies Used by organization....................................................................6
Existing Hardware Used:.................................................................................................6
Latest Hardware Available for same purpose..................................................................7
Software Technologies Used by organization.....................................................................7
MIS Software used by organization................................................................................7
Database Technologies........................................................................................................7
Communication Technologies (Internal External)..............................................................8
Data Backup Policies...........................................................................................................8
How they manage data backup .......................................................................................9
System Security Software Used by organization:...............................................................9
Online Presence of your organization................................................................................11
What Facilities?.............................................................................................................12
Security Plan for disasters or any damage.........................................................................12
Technical HR required to manage system.........................................................................13
Estimated Cost to Purchase Hardware, Software, Data based, Communication cost.......13
Training cost of HR.......................................................................................................13
Recommendation...............................................................................................................14
FOR COMPANY:.........................................................................................................14
FOR OTHERS:..............................................................................................................14
Conclusion:........................................................................................................................15
Reference:..........................................................................................................................16
EXECUTIVE SUMMARY
Apple Computer’s 30-year history is full of highs and lows, which is what we
would expect in a highly innovative company. They evolved throughout the
years into an organization that is very much a representation of its leader,
Steven Jobs. Apple made several hugely successful product introductions over
the years. They have also completely fallen on their face on several occasions.
They struggled mightily while Jobs was not a part of the organization. Apple
reached a point where many thought they would not survive. When asked in
late 1997 what Jobs should do as head of Apple, Dell Inc.'s (DELL) then-CEO
Michael S. Dell said at an investor conference: "I'd shut it down and give the
money back to the shareholders.” (Burrows, Grover, and Green)

Well, times changed. Less than 10 years later,Business Week ranked Apple as
the top performer in its 2006 BusinessWeek 50. Apple attributes their recent
success to robust sales of iPod music players (32 million in 2005). They are
optimistic about the economies of scope with media giants, such as Disney
and Pixar. (BusinessWeek)

Apple rarely introduces a new type of product. Thus, instead of being the
pioneer, they are an expert “second mover” by refining existing products.
Portable music players and notebook computers are examples. Apple
increases the appeal of these products by making them stylish and more
functional. They now appear poised to make significant strides in the home
computer market and to creating a total digital lifestyle whereby the home is a
multimedia hub
Introduction:
Apple Inc. (previously Apple Computer, Inc.) is an American multinational
corporation that designs and markets consumer electronics, computer software,
and personal computers. The company's best-known hardware products include
the Macintosh line of computers, the iPod, the iPhone and the iPad. Apple
software includes the Mac OS X operating system; the iTunes media browser;
the iLife suite of multimedia and creativity software; the iWork suite of productivity
software; Aperture, a professional photography package; Final Cut Studio, a
suite of professional audio and film-industry software products; Logic Studio, a
suite of music production tools; and iOS, a mobile operating system.

As of August 2010, the company operates 301 retail stores in ten countries, and
an online store where hardware and software products are sold. As of May 2010,
Apple is one of the largest companies in the world and the most valuable
technology company in the world, having surpassed Microsoft.

Hardware Technologies Used by organization


Hardware is the name for the physical devices that are used in order to
accomplish various tasks. As apple is a world largest technology company, they
used the latest hardware available in market.

Existing Hardware Used:


Computer
• Apple uses the world most efficient Computers and Laptops as they
are manufactured by itself so each and every member is provided with
a laptop.
• Apple LCDs are hanged over in Halls and Conference rooms
• IPADs are now widely used in their own office structure
• Wireless Keyboard, Wireless Mouse and many other wireless
components are used for work easement.

SmartPhones
• Apple provide Iphone to its employees. This work brilliantly in a office
and has long battery life. This multi-app device makes it easy to look
up contacts and access your email.

Printing, Faxing, Scanning, and Copying


• Most productive home businesses need much more than a simple
printer; they also need to fax, scan, and copy. While it is possible to get
a specific piece of equipment for each of these functions, similar to
those available in a regular office, Apple cares about space. For this
reason, they choose multi-functional printer

A Laptop Stand
• A classic easy to use laptop stand is provided to employees to make
longer work easy and compatible to desktop computer.

Telephone Headset
• In order to make the interest of the employee in the work environment,.
Headsets are provided and for entertainment and relaxing IPOD nano
and other Apple own manufactured music hardware are provided.

Latest Hardware Available for same purpose


• Window based PC are much efficient Apple can use server PC of
Microsoft.

• The coming Apple products will be used once launced

Software Technologies Used by organization


Apple is a technology company. They use latest own developed software.

MIS Software used by organization


Operating system used by Apple Inc. is iMac and Macintosh.

Database Technologies
The company use MYSQL in website management. They used latest website
software in order to make sure the quality standard and customer support. They
have very well known goodwill so they take a decent care of their customers.
• My SQL

• Oracle database

• SQL SERVER

• MS Access

They website is developed in uptodate programming language. They use


different combinations like as below:

• PHP
• Java

• Dot Net

• JSP

• J boss

Communication Technologies (Internal External)


Communication technology refers to internal and external path therough which
they communicate with their employees and outside environment. They have
very rich system as the company is very much concerned about the goodwill so
they take a decent care of their clients. They oversee all the processes and all
the communication channel to make sure the quality of management.

Communication Technologies used by them are:


• Internet
• Extranet (Used for public data)
• Intranet (Used for Confidential data)
• Drop Box
• Emails
• Mobile and wireless communication.

Data Backup Policies


All departments utilize the methodology to properly backup and store media that
contains confidential data like the new launch, technology they use, etc.

Unfortunately, data stored on disk drives can too easily be lost. The National
Archives & Records Administration in Washington reports that 93 percent of
companies they surveyed, that lost their data center for 10 days or more due to a
disaster, filed for bankruptcy within one year of the disaster. Fifty percent of
businesses that found themselves without data management for this same time
period filed for bankruptcy immediately.

The Apple Inc spends between $1Million and $100Million in total ramifications
per year for desktop-oriented disasters (both hard and soft costs), according to
the 7th Annual ICSA Lab's Virus Prevalence Survey (March 2002).

Even a single megabyte of lost data is costly.


How they manage data backup

They have a separate department who is responsible for the security


management. They hired most efficient and skilled experts for the purpose. They
trained them to handle the issues either they are common or more complex.

The primary purpose is to recover data as a reaction to data loss, be it by data


deletion or corrupted data. A differential backup copies files that have been
created or changed since the last full backup. It does not mark files as having
been backed up (in other words, the archive attribute is not cleared). Apple
performing a combination of full and differential backups, restoring files and
folders requires that you have the last full as well as the last differential backup.

System Security Software Used by organization:


Apple Inc much values the security. If you are developing an app for apple
iTunes then you consider your self in a security room that is protected by
thousands of guards. They protect each and every event. They have sued IBM,
Microsoft, DELL and many renowned companies and claimed that they have
copied the design of their product.

Apple Inc believes no seven points. They consider them as the tool for their
system security.

1. Don’t put files on your system that are likely to be interesting to


hackers or nosy employees. Trade secrets, personnel files, payroll data,
election results, etc., must be handled carefully if they’re on-line.
Reasonable security can be attained using compress and crypt on
sensitive files.

2. Plug holes that hackers can use to gain access to your system.
Read bulletins from your vendor, the security mailing lists and Usenet
News groups that provide patches for security holes.

3. Don’t provide places for hackers to build nests on your system.


Hackers often break into one system and then use it as a base of
operations to get into other systems. World-writeable anonymous ftp
directories, group accounts, and accounts with poorly chosen passwords
all encourage nesting activity.

4. Set basic traps on systems that are connected to the Internet.


Tools such as tripwire, crack, SATAN, tcpd, and COPS will help to
keep you abreast of infestations.
5. Monitor the reports generated by the security tools. A minor
problem that is ignored in one report may grow into a catastrophe by the
time the next report is sent.

6. Teach yourself about UNIX system security. A number of high-


priced security consultants will happily come to your site and instill terror
in you and your management about the insecurity of your systems.
They’ll explain that for only $50K they can make your site secure.

7. Prowl around looking for suspicious activity. Investigate anything


that seems unusual, such as odd log messages or changes in the
activity of an account (more activity, strange hours, activity while the
owner is on vacation).

Account Security
– Password security is one of the most important areas the system
manager has to monitor.

– Most versions of UNIX have implemented some form(s) of


password protection.

– The best security tool at any site is an alert administrator.


• Watch for users logging in at odd hours, or logged in while
they are on vacation.
• Watch for off-site logins by local users.
• Scan the password file to look for users with UID or GID of
zero.

File Permissions
– Once you have established reasonable access security for a
system you need to look at the system binaries to ensure they are
secure.
– Once you make the system files secure, you have to look at what
the users do with their accounts.

Data Encryption
– One cheap method of providing security is to use some form of
data encryption for sensitive files.
Security Tools
– The System administrator can take security one step further by
using several public domain tools to periodically scan passwords,
system and user files looking for vulnerabilities:
• COPS - (Computer Oracle and Password System) checks
file/directory/device permissions, monitors the password
and groups files, monitors the system startup scripts and
crontab files, and mails the administrator a report.
• crack - password cracking program.
• SATAN/SAINT - checks well-known security holes in system
binaries, and tries many means of gaining access to
systems.
• Nessus - New Satan-like scanner (more thorough).
• Nmap – port scanner.

Online Presence of your organization


Apple could be about to venture in to a new and innovative online presence,
possibly on virtual world Second Life. Speculation over the move has come about
after the iPod, Mac and iPhone maker has filed a patent at the U.S. Patent &
Trademark Office called Enhancing Online Shopping Atmosphere.

MacNN first noticed the application, which although filed in September 2006,
wasn’t made public until the end of last week.

Apple obviously already has a high profile online presence with the Apple Online
Store, but the nature of this patent seems to signal the company are looking to
improve the experience for customers shopping online for Apple products.

This isn’t just a sprucing up of the already existing online store though, as the
wording in the patent application seems to suggest a more revolutionary
approach, and which could see Apple taking up residence in Second Life.

(O)ne drawback of online shopping is that the experience can feel sterile and
isolating. Customers in such an environment may be less likely to have positive
feelings about the online shopping experience, may be less inclined to engage in
the online equivalent of window shopping (e.g., will not linger in front of a
display), and may ultimately spend less money than their counterparts who shop
in physical stores.

This seems to point toward an attempt by Apple to make the online shopping
experience less sterile, and more intuitive, fun, and interactive. One way to
achieve that would certainly be to enter Second Life, where stores are populated
by avatars, making it more like shopping in a physical store.
Certainly Apple wouldn’t be the first high profile company to enter Second Life,
and try to use the virtual world as another place to sell its products. IBM and Nike
are two global brands which are now dominant in Second Life.

The fact that this patent application dates from 2006 would lead me to believe
Apple was merely hedging its bets and looking in to the possibility of making the
move at a time when Second Life, and the role it could play in future retail
ventures, was making the news.

What Facilities?
They provide many facilities through the website. The main facilities are as
follows
• iTunes
• Apple Store
• Customer Support
• Online membership for App developers
• Online Community
• FAQs
• Online Booking or Buying of products and Online Payments.
• Warranty Claims
• Free Apps Downloading and Firmware support.
• Online Profile for each product, complete details and Manuals.

Security Plan for disasters or any damage


Apple has up-to-date disaster recovery plans (DRP) to protect people and
property, and sustain continuity when natural or man-caused disaster strikes.
They use to take the backup of all events daily on their secured servers. Double
backup policy makes the data security more reliable. They use the software that
automatically tracks all the updates made on their servers. They separately
manage the client profile and handle all the visitors and users of their website.

They used to refresh their servers every 48 hours. Also server update all the new
updates as they updated.

• Prevent or mitigate disasters,


• Prepare for the most likely emergencies,
• Respond quickly to minimize damage if disaster strikes, and
• Recover effectively from disaster while continuing to provide services to
your community.
Technical HR required to manage system
Apple would be nothing without its wonderfully dedicated, diverse, and talented
staff. Human Resources is responsible for recruiting and developing the best and
brightest employees in every division, and supporting them throughout their
careers. From benefits to training to employee relations, HR keeps our valued
team members happy so that they can keep Apple one step ahead of the
competition.

If one is an organized person with great people skills and a talent for negotiation,
one may be exactly what they’re looking for.

• Human Resources Management


• Staffing
• Compensation
• Employee Relations
• Benefits
• Training and Development
• Human Resources Information Systems (HRIS)

Estimated Cost to Purchase Hardware, Software, Data


based, Communication cost.
Apple Inc is the name of standard. They incur a huge cost in management and
standard matters. They have revenues of $65.23 billion and profit of $ 14.01
billion. They have specified 60% budget to hardware and software purchasing
and rest to communication and database management. They are raising reserve
amounts and building up assets. They crossed the budget of Microsoft.

Training cost of HR

In training HR they incur many costs like

• Facilitator fees
• Training design
• Course materials
• Videos and workbooks
• Facilities rental
• Equipment rentals (such as overhead projectors)
• Production downtime (including employee time off the job)
• Videoconferencing facilities
• Specialized computer equipment
• Administration (such as registration procedures or confirmation notices)
• All the relevant costs, divided by the anticipated number of participants,
gives the cost per participant.

And get the benefits in these ways

• Fewer errors , Reduced customer turnover


• Less equipment downtime, Increased revenue collection
• Faster equipment startup time
• Reduced employee turnover, when turnover is attributable to poor
supervision
• Proper implementation of new customer strategies
• Higher workplace morale through more effective management practices
• Less time lost to grievance hearings and work stoppages because of
ineffective supervision
• Reduced recruitment costs (because training can create more job-ready
candidates for promotions)
• Maximized productivity of new employees through efficient orientation
training

Recommendation
FOR COMPANY:

• Lowering the cost of products and maintaining the same quality standards
• Can form joint – ventures
• Knowledge Management
• More number of retail stores for easy access
• Continuous innovation to expand

FOR OTHERS:

• Do not compromise on price for quality


• Choose the products based on individual needs
• Be unique and different
Conclusion:
We feel that Apple must focus on several key aspects to continue to grow and
succeed. They must continue a stable commitment to licensing, push for
economies of scope between media and computers, and become a learning
organization.

Apple apparently made a commitment to licensing. Although it should continue,


Apple may want to consider other forms of strategic alliances. An equity strategic
alliance may offer Apple the opportunity to obtain additional competencies. An
effective way for a company like Apple to accomplish this would be in the form of
a joint venture.

Apple should continue pushing the new line of media-centric products.


Meanwhile, Apple should not lose focus on its computers. Macintosh computers
were 39% of Apple’s sales in 2005. (Burrows) This very innovative company
exploits its second-mover position. In the future, they will need to continue
innovating to expand the boundaries of both media and computers.

One persistent element of both competitive advantage and risk is Steve Jobs. He
is both synonymous with Apple’s success and has a large equity interest in Apple
and Disney. If he were to divest his leadership position, the reaction of both the
market and consumers would be uncertain. Given his position within the
organization as well as the history of the company when he was gone, Apple
must find a way to learn as an organization. This will allow the company to
withstand a departure by Jobs.

Based on the actions of the organization, we feel that the mid-term performance
of Apple will be strong. This period allows Apple time to overcome their
challenges if they move swiftly. For this reason, we feel that they will continue to
succeed and will continue to outperform their peers
Reference:
• www.appleinc.com
• www.google.com
• http://trad.org
• http://www.divisiontwo.com/articles
• http://www.cnet.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy