Tim Cook’s Wiring Diagram
For years, Apple's public face was the magical Steve Jobs—the genius who changed the world à la Thomas Edison and Henry Ford.
Always in the shadows was number two executive Tim Cook, tall and reed thin like Jobs.
When Jobs died at age 56 in 2011, Cook was thrust into the spotlight. Techies, users and investors alike debated whether Tim Cook could fill Jobs' 888EEEEEEE shoes.
Four years later, Apple became the first U.S. company to generate $700 billion in market capitalization.
The Tim Cook Epoch at Apple is here.
Excerpts from Tim Cook's Landmark Speech
Where Steve Jobs wanted to change the world, Tim Cook is out to save America.
His address to attendees of the Feb. 13 Cybersecurity Summit at Stanford University is monumental.
[DH NOTE: I have formatted these remarks to be more readable. The words are entirely Tim Cook's.]
At Apple we start with a very simple premise. Our customers' trust means everything and we spent decades working to earn that trust. That's why privacy and security are built into every one of our products and services from their inception:
- We have strict policies that govern how all data is handled.
- Our networks and systems are segmented.
- Our hardware and software use encryptions and we have a security operations team monitoring our infrastructure 24/7.
Beyond that, we have a straightforward business model that is based on selling the best products and services in the world.
Not on selling your personal data.
- We don't sell advertisers any information from your email content, from your messages, or your web browsing history.
- We don't try to monetize the information you store on your iPhone or in iCloud.
- When we ask you for data, it's to provide you with better services. And even then you have a choice. You're in the driver's seat on how much information you share and when you want to stop sharing it.
We set the industry's highest standards and we are deeply committed to living up to them.
Today, so much of our information is digital.
Our memories of family and friends and our photos and our videos, our medical histories and our financial transactions, our most private conversations, at home and at work, this comes with great benefits.
It makes our lives better, easier, healthier.
But at Apple we have always known this also comes with a great responsibility.
We know hackers are doing everything they can do to steal your data.
It's why we use the technology to create the most secure devices and the most secure systems that we can.
In 2013, more than 13 million Americans were victims of identity theft, which is now one of America's fastest growing crimes.
In the last few years, hackers have infiltrated some of our biggest banks and companies, stealing the credit card and debit card information of hundreds of millions more.
Just the other week, we saw hackers steal information from one of America's largest healthcare providers.
The personal impact of these security breaches can be devastating.
By clicking on the wrong link, or simply using your credit card, too many people have had their identity stolen, their finances threatened, and their lives turned upside-down.
These offenses cost our economy billions of dollars every year.
There's some good news. The good news is that we have the ability to protect people from this growing threat.
With Apple Pay we put in place a mobile payment system that is significantly mere secure than the old days of the plastic card and the magnetic stripe.
This is another product security that wasn't an afterthought.
Security was part of the reason we developed the technology in the first place.
You see, Apple Pay starts with the premise your credit card information and purchases are personal to you, and they should stay that way.
- When you add a card to Apple Pay, your actual credit card numbers are never stored in your device, or on our servers.
- Instead, for every payment, we create a unique one-time code that is only good for that one transaction from your device.
- Your purchases are private.
- And we don't store the details of those transactions.
- They remain between you, the merchant, and your bank.
- We don't know your credit card number.
- Or what you bought, or how much you paid.
And we don't want to.
Just three months after we launched, over 2,000 banks have signed on to bring Apple Pay to millions of their customers.
And today, we're excited to announce that beginning in September, Apple Pay will be available for many transactions with the federal government.
Like, for example, when you pay for admission to your favorite national park.
We're also working to make sure that credit and procurement cards issued to government employees for expenses can be used with Apple Pay and we're working on initiatives with leading banks and networks to use this technology with benefit programs like Social Security and veterans pensions that serve citizens of both the state and federal levels.
We can imagine a day in the not so distant future when your wallet becomes a remnant of the past.
Your passport, your driver's license, and other important documents, can be digitally stored in a way that is safe, secure, and easy to access.
But only by you.
After all, we shouldn't have to trade our security for the convenience of having all of this information at our fingertips.
When a system is designed properly, security and convenience can actually work in harmony.
This is a world of greater privacy.
And a world where criminals find it much more difficult to carry out their crimes.
Without a doubt, safeguarding a world of digitized personal information is an enormous task.
And no single company or organization can accomplish it on its own.
That is why we're committed to engaging productively with the White House and the Congress and putting the results of these conversations into action.
Because when it comes to the rights of customers, and the rights of citizens, it's important to realize we're all talking about the same people.
Takeaways to Consider
- "Big Data" is invasive hooey practiced by dweebs and marketing cripples. Apple considers "Big Data" a plague.
- The latest "Big Data" horror story. AT&T just rolled out blazing fast fiber-to-home internet service in Kansas City for $70 a month. But there's a catch: customers who don't want the telecom giant spying on their web surfing will have to pay an extra $29.
- Yet without "Big Data" Apple has become the richest corporation in the history of the modern world.
- Everything online must be encrypted and impenetrable.
- As many as 80 million customers of the nation's second-largest health insurance company, Anthem Inc., have had their account information stolen. According to The Wall Street Journal Anthem Didn't Encrypt Data in Theft.
- The financial services sector must adopt the EMV (European Master Card-Visa) chip technology for credit card security.
- "The United States has not moved faster because retailers and card issuers have worried that the cost of adopting the technology, usually estimated at $15 billion to $30 billion, would be more than the cost of the fraud that it would prevent. Even with increasing fraud in the United States, it accounted for only about 5 cents for every $100 of credit card use."
- The above formula was concocted by venal bean counters in cahoots with greedy CEOs for one purpose only. To get rich by screwing their customers.
- "We estimate that the likely annual cost to the global economy from cybercrime is [between $375 billion and $575 billion] in losses. Even the smallest of these figures is more than the national income of most countries and governments and companies underestimate how much risk they face from cybercrime and how quickly this risk can grow." —McAfee/Intel Security
- Every facet of American Society has been corrupted by worldwide hackers who are smarter than our native IT people. Victims include consumers, businesses, corporations, government, the military, health care—even the weather warnings.
- Three months later, the State Department Hasn't Rooted Out Hackers. Amount of data lost in unclassified email network is unclear; Investigators point finger at Russia.
- Chinese hackers have gained access to designs of more than two dozen major U.S. weapons systems, a U.S. report said on Monday.
- Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said.
- A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever.
- More than 1,000 American businesses have been affected by the cyberattack that hit the in-store cash register systems at Target, Supervalu and most recently UPS Stores.
- At the same time, consumers must stop blabbing their most intimate information all over the Internet or they will be punished by data-driven criminals who will destroy their lives.
- In short, America is under siege by cyberterrorists out to destroy our safety, security and way of life. And the bickering boobs in charge—politicians—have one overarching agenda: to get reelected no matter what the cost.
Denny Hatch's new book is WRITE EVERYTHING RIGHT!
*****5.0 out of 5 stars
First, Get a Fresh Highlighter
You'll need it. This book is chock full of proven techniques to improve your writing today. Denny Hatch's prose is economical and packed with energy. Every word matters and the layout is designed to keep you reading and thinking. You'll dog-ear your copy and fill it with scribbled marginal notes—just as I did. Will Denny make you a better writer? I'm willing to bet he will, and I bet the future of my family on it. I just purchased two more copies for my kids (16 and 12 years old), because I KNOW they'll do better in college after learning from Denny. —Mark Pilipczuk
= = = = = = = = = = = = = = = = = = = = = =
CLICK HERE to read the first 3 Chapters FREE.
No cost. No Risk. No obligation.
For Kindle Edition information, CLICK HERE.