Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/21/2010
07:49 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: Will Steve Jobs Ban Google From AppleWorld?

An imaginative Apple investor says Steve Jobs is preparing to rock Google's world.

"The moral of the story is that Steve Jobs is not someone you want to depend on for your livelihood... I'll bet that in one of those Apple board meetings that Google CEO [Eric] Schmidt used to attend, he realized that Jobs was on the verge of building AppleWorld and he's been scared ever since." Concerned, sure--but is almighty Google "scared" of anything?

That opening quotation comes from a zealous Apple investor and money manager Jason Schwarz, who holds a long position on Apple and therefore is not exactly an unbiased source. But I've read a lot of Schwarz's analyses in the past year (you can find many of them here) and while he can sometimes be more cranked-up than a Jolt-chugging and deadline-stressed programmer, he also offers some unique and compelling perspectives on Apple and its singular CEO.

Here are the two full opening paragraphs from his blog entry yesterday on SeekingAlpha.com in which he lays out his theory for why Google is, indeed, scared:

"Steve Jobs is walking the same path as Walt Disney," writes Schwarz. "As soon as California's Disneyland was completed, Walt knew he had made a terrible mistake by not securing the surrounding real estate. He had built this wonderful destination but his oversight allowed hotel chains and restaurants to come in and make more money off his customers than he did. So Walt immediately went to Orlando, FL and built Disneyworld the right way.

"The moral of the story is that Steve Jobs is not someone you want to depend on for your livelihood. His goal is to build a closed digital neighborhood where Apple controls who makes money and who doesn't. I'll bet that in one of those Apple board meetings that Google CEO Steve [Eric] Schmidt used to attend, he realized that Jobs was on the verge of building AppleWorld and he's been scared ever since."

Now, as I said, Schwarz has a big dog in this fight via his investments in Apple. But the DisneyWorld metaphor was intriguing enough that I wanted to share it, particularly as it relates to the oncoming explosion of mobile computing that Schwarz says lies at the heart of Jobs' desire to build AppleWorld. As Schwarz puts it:

"Apple quickly realized that apps would one day overtake .coms. They knew that mobile devices would overtake PCs. And last but not least, they knew that they had a two year head start to completely control this mobile community. This did not sit well with Eric Schmidt."

Will the mobile phenomenon be powerful enough to rattle companies of the size and significance of Google? Can Steve Jobs--or any tech CEO in these days of the primacy of openness--create a business ecosystem in which that CEO determines who makes money and who doesn't? Can such a narrow construct survive in these days of near-unlimited choice?

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.
Schwarz clearly has his opinion on that, and whether you're an Apple zealot like he is or a Google devotee, I think you'll enjoy his piece and the premise he lays out for how the next few mobile-madness years might shape up.

The significance of this for CIOs, of course, is the inexorable move toward more mobile devices and more mobile applications, and along with that the remarkable rise of the iPhone and the AppStore as the richly connected and fully capable device of choice for professionals.

In that context, if Steve Jobs is able to build the AppleWorld of Schwarz's imagination, and if Jobs is able to dictate who's in and who's out, then Google might very well have good cause to be concerned. And maybe even a little scared.

RECOMMENDED READING:

Bob Evans is senior VP and director of InformationWeek's Global CIO unit.

To find out more about Bob Evans, please visit his page.

For more Global CIO perspectives, check out Global CIO, or write to Bob at [email protected].

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15058
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-15059
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
CVE-2020-15060
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
CVE-2020-15061
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
CVE-2020-15062
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.