Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/21/2010
07:49 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: Will Steve Jobs Ban Google From AppleWorld?

An imaginative Apple investor says Steve Jobs is preparing to rock Google's world.

"The moral of the story is that Steve Jobs is not someone you want to depend on for your livelihood... I'll bet that in one of those Apple board meetings that Google CEO [Eric] Schmidt used to attend, he realized that Jobs was on the verge of building AppleWorld and he's been scared ever since." Concerned, sure--but is almighty Google "scared" of anything?

That opening quotation comes from a zealous Apple investor and money manager Jason Schwarz, who holds a long position on Apple and therefore is not exactly an unbiased source. But I've read a lot of Schwarz's analyses in the past year (you can find many of them here) and while he can sometimes be more cranked-up than a Jolt-chugging and deadline-stressed programmer, he also offers some unique and compelling perspectives on Apple and its singular CEO.

Here are the two full opening paragraphs from his blog entry yesterday on SeekingAlpha.com in which he lays out his theory for why Google is, indeed, scared:

"Steve Jobs is walking the same path as Walt Disney," writes Schwarz. "As soon as California's Disneyland was completed, Walt knew he had made a terrible mistake by not securing the surrounding real estate. He had built this wonderful destination but his oversight allowed hotel chains and restaurants to come in and make more money off his customers than he did. So Walt immediately went to Orlando, FL and built Disneyworld the right way.

"The moral of the story is that Steve Jobs is not someone you want to depend on for your livelihood. His goal is to build a closed digital neighborhood where Apple controls who makes money and who doesn't. I'll bet that in one of those Apple board meetings that Google CEO Steve [Eric] Schmidt used to attend, he realized that Jobs was on the verge of building AppleWorld and he's been scared ever since."

Now, as I said, Schwarz has a big dog in this fight via his investments in Apple. But the DisneyWorld metaphor was intriguing enough that I wanted to share it, particularly as it relates to the oncoming explosion of mobile computing that Schwarz says lies at the heart of Jobs' desire to build AppleWorld. As Schwarz puts it:

"Apple quickly realized that apps would one day overtake .coms. They knew that mobile devices would overtake PCs. And last but not least, they knew that they had a two year head start to completely control this mobile community. This did not sit well with Eric Schmidt."

Will the mobile phenomenon be powerful enough to rattle companies of the size and significance of Google? Can Steve Jobs--or any tech CEO in these days of the primacy of openness--create a business ecosystem in which that CEO determines who makes money and who doesn't? Can such a narrow construct survive in these days of near-unlimited choice?

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.
Schwarz clearly has his opinion on that, and whether you're an Apple zealot like he is or a Google devotee, I think you'll enjoy his piece and the premise he lays out for how the next few mobile-madness years might shape up.

The significance of this for CIOs, of course, is the inexorable move toward more mobile devices and more mobile applications, and along with that the remarkable rise of the iPhone and the AppStore as the richly connected and fully capable device of choice for professionals.

In that context, if Steve Jobs is able to build the AppleWorld of Schwarz's imagination, and if Jobs is able to dictate who's in and who's out, then Google might very well have good cause to be concerned. And maybe even a little scared.

RECOMMENDED READING:

Bob Evans is senior VP and director of InformationWeek's Global CIO unit.

To find out more about Bob Evans, please visit his page.

For more Global CIO perspectives, check out Global CIO, or write to Bob at [email protected].

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.