Risk

4/16/2010
04:53 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Market Strongest In California

Despite its relatively small share of the PC market, Apple's overall market penetration makes it a major player in many parts of the country.

Apple sold 1,130,000 computers in the U.S. in the first quarter of 2010, according to IDC, a figure that represents 6.4% of the market.

But the popularity of Apple's iPod, iPhone, and now iPad lines means that the company can count 21.6% of adults nationwide among its customers, according to a new report from Experian Simmons. And that's to say nothing of those under age 18 who use Apple devices.

In many urban areas of the U.S., Apple's presence is stronger still.

The top geographic market for Apple is where it makes its home, in California's San Francisco Bay Area, including Oakland and San Jose. Almost one-third of all adult residents of the Bay Area own at least one of Apple's three core products: Mac, iPhone, or iPod.

Of Apple's top 10 regional markets, according to Experian Simmons, four are in California.

Beyond the Bay Area, where Apple product ownership is 49% above the national average, the three other Apple strongholds in California are San Diego (#3), Monterey-Salinas (#8), and the Santa Barbara-Santa Marina-San Luis Obispo region (#9).

In the San Diego area, 31.8% of the area's 2.2 million adults are "admitted Mac users," Experian Simmons notes, as if that were something to conceal.

In the Monterey-Salinas area, home to about half a million adults, about 151,000 or 28.1% own a Mac, iPhone or iPod. And there's only one Apple retail store in the vicinity.

The Santa Barbara area, meanwhile, is home to 141,000 Apple customers, or about 27.9% of area adults.

Other top Apple strongholds include Boston, MA (#2), New York, NY (#4), Washington, D.C. (#5), Chicago, IL (#7), and Las Vegas, NV (#10).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3018
PUBLISHED: 2018-05-24
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
CVE-2013-3023
PUBLISHED: 2018-05-24
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
CVE-2013-3024
PUBLISHED: 2018-05-24
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
CVE-2018-5674
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
CVE-2018-5675
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...