Risk
4/16/2010
04:53 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Market Strongest In California

Despite its relatively small share of the PC market, Apple's overall market penetration makes it a major player in many parts of the country.

Apple sold 1,130,000 computers in the U.S. in the first quarter of 2010, according to IDC, a figure that represents 6.4% of the market.

But the popularity of Apple's iPod, iPhone, and now iPad lines means that the company can count 21.6% of adults nationwide among its customers, according to a new report from Experian Simmons. And that's to say nothing of those under age 18 who use Apple devices.

In many urban areas of the U.S., Apple's presence is stronger still.

The top geographic market for Apple is where it makes its home, in California's San Francisco Bay Area, including Oakland and San Jose. Almost one-third of all adult residents of the Bay Area own at least one of Apple's three core products: Mac, iPhone, or iPod.

Of Apple's top 10 regional markets, according to Experian Simmons, four are in California.

Beyond the Bay Area, where Apple product ownership is 49% above the national average, the three other Apple strongholds in California are San Diego (#3), Monterey-Salinas (#8), and the Santa Barbara-Santa Marina-San Luis Obispo region (#9).

In the San Diego area, 31.8% of the area's 2.2 million adults are "admitted Mac users," Experian Simmons notes, as if that were something to conceal.

In the Monterey-Salinas area, home to about half a million adults, about 151,000 or 28.1% own a Mac, iPhone or iPod. And there's only one Apple retail store in the vicinity.

The Santa Barbara area, meanwhile, is home to 141,000 Apple customers, or about 27.9% of area adults.

Other top Apple strongholds include Boston, MA (#2), New York, NY (#4), Washington, D.C. (#5), Chicago, IL (#7), and Las Vegas, NV (#10).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4467
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.

CVE-2014-4476
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4477
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4479
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4480
Published: 2015-01-30
Directory traversal vulnerability in afc in AppleFileConduit in Apple iOS before 8.1.3 and Apple TV before 7.0.3 allows attackers to access unintended filesystem locations by creating a symlink.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.