video https://www.youtube.com/watch?v=vg7LPcFUxg8
audio / HD video download http://media.ccc.de/browse/congress/2014/31c3_-_5997_-_en_-_saal_6_-_201412282030_-_preserving_arcade_games_-_ange_albertini.html
complete animated presentation + extras (~1Gb):
https://archive.org/details/arcade31c3
more infos @ https://code.google.com/p/corkami/wiki/Arcade
video https://www.youtube.com/watch?v=vg7LPcFUxg8
audio / HD video download http://media.ccc.de/browse/congress/2014/31c3_-_5997_-_en_-_saal_6_-_201412282030_-_preserving_arcade_games_-_ange_albertini.html
complete animated presentation + extras (~1Gb):
https://archive.org/details/arcade31c3
more infos @ https://code.google.com/p/corkami/wiki/Arcade
This is a lightning 5-minute talk given SyncHerts in Stevenage UK on 14 Jan 2016. It very quickly tells you what the 2600 can do, shows how we get something on the screen, and how we must count every single clock cycle to make our code work! Finally, we delve into *why* someone might want to try this..
Feasibility of Security in Micro-Controllersardiri
Is it possible to secure micro-controllers used within IoT?
With the introduction of micro controllers such as the Arduino, Raspberry Pi and BeagleBone – it has become easy to connect sensors to gather information and utilise network connections to build an IoT ecosystem. Strong encryption schemes like RSA/AES/SHA and ecliptic curves cryptography (ECC) have been difficult to introduce due to limited performance and memory capabilities of the micro controllers used and using standard libraries just isn’t feasible – we find that designated and optimised software is the only feasible way forward.
London Spark Meetup Project Tungsten Oct 12 2015Chris Fregly
Building on a previous talk about how Spark beat Hadoop @ 100TB Daytona GraySort, we present low-level details of Project Tungsten which includes many CPU and Memory optimizations.
"Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. For decades, fax machines were used worldwide as the main way of electronic document delivery. But this happened in the 1980s. Humanity has since developed far more advanced ways to send digital content, and fax machines are all in the past, right? After all, they should now be nothing more than a glorified museum item. Who on earth is still using fax machines?
The answer, to our great horror, is EVERYONE. State authorities, banks, service providers and many others are still using fax machines, despite their debatable quality and almost non-existent security. In fact, using fax machines is often mandatory and considered a solid and trustworthy method of delivering information.
What the Fax?! We embarked on a journey with the singular goal of disrupting this insane state of affairs. We went to work, determined to show that the common fax machine could be compromised via mere access to its fully exposed and unprotected telephone line -- thus completely bypassing all perimeter security protections and shattering to pieces all modern-day security concepts.
Join us as we take you through the strange world of embedded operating systems, 30-year-old protocols, museum grade compression algorithms, weird extensions and undebuggable environments. See for yourself first-hand as we give a live demonstration of the first ever full fax exploitation, leading to complete control over the entire device as well as the network, using nothing but a standard telephone line.
This talk is intended to be the canary in the coal mine. The technology community cannot sit idly by while this ongoing madness is allowed to continue. The world must stop using FAX!"
Copy Protection Wars: Analyzing Retro and Modern Schemes (RSA 2007)Nate Lawson
History and future of copy protection. Builds on the property of asymmetry as a way of analyzing copy protection features. Defenders only need to increase cost to attackers, not build an impenetrable wall. Included a live demo of reading a C64 game and cracking its protection, as well as an intro to the Xbox 360 drive hacks. Ended with some simple recommendations for repairing the 360 hacks.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
This is a lightning 5-minute talk given SyncHerts in Stevenage UK on 14 Jan 2016. It very quickly tells you what the 2600 can do, shows how we get something on the screen, and how we must count every single clock cycle to make our code work! Finally, we delve into *why* someone might want to try this..
Feasibility of Security in Micro-Controllersardiri
Is it possible to secure micro-controllers used within IoT?
With the introduction of micro controllers such as the Arduino, Raspberry Pi and BeagleBone – it has become easy to connect sensors to gather information and utilise network connections to build an IoT ecosystem. Strong encryption schemes like RSA/AES/SHA and ecliptic curves cryptography (ECC) have been difficult to introduce due to limited performance and memory capabilities of the micro controllers used and using standard libraries just isn’t feasible – we find that designated and optimised software is the only feasible way forward.
London Spark Meetup Project Tungsten Oct 12 2015Chris Fregly
Building on a previous talk about how Spark beat Hadoop @ 100TB Daytona GraySort, we present low-level details of Project Tungsten which includes many CPU and Memory optimizations.
"Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. For decades, fax machines were used worldwide as the main way of electronic document delivery. But this happened in the 1980s. Humanity has since developed far more advanced ways to send digital content, and fax machines are all in the past, right? After all, they should now be nothing more than a glorified museum item. Who on earth is still using fax machines?
The answer, to our great horror, is EVERYONE. State authorities, banks, service providers and many others are still using fax machines, despite their debatable quality and almost non-existent security. In fact, using fax machines is often mandatory and considered a solid and trustworthy method of delivering information.
What the Fax?! We embarked on a journey with the singular goal of disrupting this insane state of affairs. We went to work, determined to show that the common fax machine could be compromised via mere access to its fully exposed and unprotected telephone line -- thus completely bypassing all perimeter security protections and shattering to pieces all modern-day security concepts.
Join us as we take you through the strange world of embedded operating systems, 30-year-old protocols, museum grade compression algorithms, weird extensions and undebuggable environments. See for yourself first-hand as we give a live demonstration of the first ever full fax exploitation, leading to complete control over the entire device as well as the network, using nothing but a standard telephone line.
This talk is intended to be the canary in the coal mine. The technology community cannot sit idly by while this ongoing madness is allowed to continue. The world must stop using FAX!"
Copy Protection Wars: Analyzing Retro and Modern Schemes (RSA 2007)Nate Lawson
History and future of copy protection. Builds on the property of asymmetry as a way of analyzing copy protection features. Defenders only need to increase cost to attackers, not build an impenetrable wall. Included a live demo of reading a C64 game and cracking its protection, as well as an intro to the Xbox 360 drive hacks. Ended with some simple recommendations for repairing the 360 hacks.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. MACINTOSH PRELIMINARY PLAN
Macintosh Markets
& Software Ranking
Macintosh Organization,
Staffing & Budget
Open Issues
3. Product Hardware Comparisons
-.:
.
.... ~.~.:
~~~.:~~~~
..
.·m:·m~::~
~.",.",,,V.' ~
"'''', ·v...
.
•.•••.
. -Q-:
"
Product Lines IUl aa
Apple III
I~I ~~
~
Mac
Introduced 1977 /78 1980/81 1982 1982
ietail Price $ 2500 $ 4500 $1500 $5000 +
Neight 15 to 30 Ibs 26 to 40 Ibs 15to181bs 45 + Ibs
Vlicroprocessor 6502 6502 68000 68000
Vlemory size 32 to 64 k 128 to 256 k 64 to 128 k 256 to 1000 k
)isplay External External Built.in 9 II Built.in 12 11
:hroma Color& BW Color&BW BWonly BWonly
iesolution 280 x 192 560x192 384 x 256 720 x 360
Graprr!c3 memory 8k bytes 16k bytes 12k bytes 32k bytes
Key~oard Built·in Built·in Detached Deta.ched
Numeric Pad No Yes No Yes
Pointing Device 2 arrows 4 arrows Mouse Mouse
ntegral Disks 0 1 1 2
~dd·on Disks 2 to 4 1 to 3 1 0
:apacity / Disk 143 k bytes 143 k bytes 143 k bytes 850 k bytes
)Iots 8 4 0 3
~S·232 ports 0 1 2 2
)ther ports Game I/O Silentype none Parallel
)ound 1 bit 6 bit aid 5 bit Delta·mod
;Iock No Yes (?) Yes Yes
C Boards 6 6 5 10
4. Screen Size Comparisons
··
·· . .
. . . . . . . . . . . . . . . . . . . . ..
......... ,', ..
· ' '
.
:::::::::::::: Apple ':::::::::::
'Ii .
:::::::::::::: 280x192 :::::::::::
::::::::::::::. 8k bytes . '::::::::::
· ·.·.·.·."0·.. . .°0 . . ..
·...
....... . ",', ..
..
·· ..
'
··· ..
..
·
~·l~.. 384 x 256 12k b te s :.: .
Disk Compatability Between Products
143 k Bytes 850 k Bytes 143 k Bytes
16 sector 16 sector 16 sector
Apple II Lisa Card plugs into Lisa slot and
Apple III Doublemint 143k byte disk drive, Lisa can
Macintosh then read & write Macintosh,
VLC VLC, Apple II& Apple III diskettes,
5. 192 256 192 360
----- ---------
280 560
3:84
720
LISA
I I I
MAC
I
All Alii
720 X 360 384 X 256 280 X 192 560 X 192
32K bytes 12K bytes 8K bytes 16K bytes
6. Clustering of Retail System Prices
6 •
$5000
IBM Displaywriter, LISA, Wangwriter
~ Cromemco, North Star 1:];;]:4
4 •
$3000
HP·85, IBM "chess", Xerox 820
~, Atari 800, CBM 3020, TRS3 I[]E!]
2 • FUJitsu, NEC 8001, Sharp, Oki, etclI"
Osborne 1 . . ............ ...•.....
$1500 >N •u .u ...•.
••••••••••••••••••••••••••••••••• I •• ' ,,",'''''''''''' ••••••••••• JI1'" •• 1'fI •••• , •••• , ,
MaCintosh
I:::::::::~~:~:~::~::::::::I
1
$500
•
-VLC
V IC, TRS Color, Hand Helds ... ("'sancH""
:' '"''''''''''''
Notes:
Observe that everyone is introducing products in Band 3 (Apple II's band).
Also, the upper end of Band 4 is really $10.12,000 today, but I expect it to
fall to the $5000 level in '82, I expect LISA, IBM Displaywriter, Wangwriter,
etc. to lower their prices to just under the $5000 wire,
I currently know of no products being developedby competition for Band 2
(unfortunately this doesn't mean there arn't anyr One would expect serious
D
business customers will move up to Band 4 and the job of Macintosh and
VLC is to migrate the remaining Band 3 customers down to Band 2, leaving
Band 3 manufacturers out in the cold!!
7. MACINTOSH PRELIMINARY PLAN
Apple Product
Overview
MacIntosh Markets
& Software Rankin
Macintosh Organization,
Staffing & Budget
Open Issues
8. TM Actvctntage
of ct Proctuct Line
ts that
E~h ImtividuaJ Proa.w::t
Does not have to
Do EverythJ~.
(lA,lLd, tOMY is the first MY of the rest of your ~ife...)
9. PRODUCT
LINE
II=:
tI r= oC
Year of introduction 19n/78 1980/81 1982 1982
current retail price $2000 to $2500 $4500 $1000 to $1500 $6000 to $7000
weight 15-30 Ibs 26-401bs 15-18 Ibs 45+ Ibs
f Microprocessor 6502 (1 MHz) 6502 (2 MHz) 168000 (8 MHz) 68000 (6'MHz)
memory size 32 to 64K bytes 128 to 256K bytes 64 to 128K bytes 256 to 1,000K bytes
Display CRT External External (look-alike) Built-in, 9" Built-in, 12"
croma color or B&W color or B&W B&W B&W
graphics resolution 280 X 192 560 X 192 384 X 256 720 X 360
graphics memory 8K bytes 16K bytes 12K bytes 32K bytel'
Keyboard Built-in Built-In Detached Detached
numeric pad no yes no yes
pointing device 2 cursor arrows 4 cursor arrows mouse mouse
Slots 8 4 0 3
built-in I/O game 1/0 1 RS232, silentype 2 RS232 2 RS232, Parallel
sound 1 bit speaker 6 bit speaker 1 bit speaker delta-mod speaker
10. 48K All plus
disk w/controller
1530 CONFiDENTIAL
645
monitor, 9" B/W 150
software 150
Total $2475
.~
=0
128K Alii
including information
analyst package and
12" B/W monitor 4690
Total $4690
II ---B
-8
o
256K LISA
w/software
Total 6000+
I
64K1128K Macintosh
w/software
Total $1000 to $:1500
!
11. Macintosh Positioning
Imagine two posters next fall,
I • I I
the first appearing In retail
dealers and Sears, The message:
IIApple II has evolved into two
new products, each one the best
in its class and both low cost.
Buy one", Or both !!II
Apple II THE MOST SUCCESSFUL
II lUll 11IIII 11II1111II11 BUSINESS TOOL
FOR THE 80's
THE MOST SUCCESSFUL
PERSONAL COMPUTER
IN THE WORLD
BEARS FRUIT
And Its
And a second poster for LISA Younger Brother" '"
dealers positioning MAC as
IIL1SA's younger brother·"
12. c::!~~ Prod~meline I
$5000 ., LISA
I
$4000
-
AlII
. ,
A 1:11 j M•• ~
$3000 LISA 2
-
All
~
???
$2000 I I ,
'1IIIiIP'
MAC
$1000 -
VLC MAC2
~
Color
~
. I
. I I i
1981 1982 1983 1984 1985
Notes:
1, Prices are retail prices for a "usable" system including a
disk and some software, but not including a printer,
2, Lisa 2 is a least as powerful and runs all Lisa 1 software.
~ , "
3I ??? IS a product opportUnity, Any Ideas??
~
4, Macintosh 2 runs all Mac 1 software, incorporates a flat·
panel display and is physically smaller and lighter,
~
5, Color is a product opportunity for a low·end color
~
computer (VLC 2 ??), Any' Ideas??
13. Market Segment Emphasis
LISA MAC Apple II/VLC Apple III
'," ',',,'
Managers
IIIIIIIII!III!I!IIIII!I!I!IIIII!III!III! !1111
!1!1!111!111!1!1!1!1!1!lllll! !il! !il! il
Se c retari es
Professionals
IIIIIIIIIIIIII!IIIIIIIIIIIIIIIIIIIIIIIIII:I!
'ery Small Business
Scientific/ Industrial
I1111111111I1I1111111111111111111111I11111111111II
Elementary
High School
IIIIIIIII!I!IIIIIIIIIIIIIIIIIIIIIIIII
College
Home
Home Business
14. SOFTWARE: EVALUATION
Software: OFFICE EDUCATIONAL HOME Total
I
Manager / Low End Colll~geWord High Consumer
Professional Home
Clerical/ Prllcessing Schools Home Business
Secretarial
MacWriter 3 3 3 3 2 2 I
16
MacFile 3 3 1 1 3 3 14
MacCalc 3 3 1 1 2 2 12
Mac Basic 1 1 3 3 3 2 13
MacSketch 2 1 2 2 3 1 11
MacGraph 3 2 1 1 1 2 10
Games 2 1 3 3 3 1 13
Typing Tutor 1 1 2 3 2 1 10
Telecommunications 2 1 1 1 3 2 10
Personal Finance Manager 2 1 1 1 3 3 11
Mail List 1 2 1 1 3 3 11
PASCAL 1 1 3 2 1 1 9
Tax Planner 2 1 1 1 3 2 10
Calendar 2 2 1 1 2 2 ' 10
Sesame St. 1 1 1 1 3 1 8
SmallTalk l' 1 3 1 2 1 9
15. OFFICE RELATED
Manager / Professional Low End ClericaVSecretarial
"Every Manager's Tool" "Little Lisa" Mark:t
Positioning Every day, more managers rely on MAC will substantially increase the MAC can help every
computers to help perform their productivity of every manager by secretary grow into an area
functions effectively and efficiently. providing some of Lisa's advanced associate. With '.1acintosh
MAC makes it possible forany capabilities at an entry level price. secretaries can take on more
manager to experience the automated interestins assignments and
office with minimum investment of 1) With promotion and associated more responsibility which
time and money. MAC will be a increase in responsibility, a manager can make the manager more
rewarding first computer experience. will be ready to graduate to a Lisa. productive.
2) Managers already using Lisa can
use MAC when away from the office
(Traveling, Home).
Applications Modeling & Forecasting Same as "Every Manager's Tool" Document Preparation,
Communications, Data Management, Communications, Form
Document Preparation, Time Fillin, Some Data
Management Management, Time
Management
Software MACCalc, MACBASIC, Same as "First Computer" Market MACWriter, MACGraph,
Communications Software, Personal MACCalc, Communications
DBM, MACWriter, MACGraph, Software, Calendar
Calendar
Competition Japanese, Xerol( 820, IBM, Radio none WangWriter, DisplayWriter,
Shack, Commodore Xerox 820, Radio Shack,
Commodore
Dis~ribution Apple Dealers Lisa Dealers NAD, Office Supply Stores,
Apple Dealers, (Sears1)
Acceptable Price Range (with <2,000 <2,000 <1,500
software, without printer)
16. EDUCATION
College Student Word Processing High Schools
Positioning In colleges, MAC will revolutionize As Word Processors are replacing
paper writing much as calculators typewriters in the real world, students
revolutionized number crunching need to learn word processing, not
just typing. MAC will help the
student of the 80's learn the tools of
the 80's and prepare Computer
Literate students for colleges and
employment.
Applications Paper Writing, General Homework Typing, Computer Literacy. Science
preparation (Computer Literacy) courses
Software MACWriter, MACSketeh. Typing courseware, MACBASIC.
MACBASIC, PASCAL PASCAL, Science courseware
Competition none Apple II, Commodore. Tandy, Atari
Distribution Direct to Colleges Apple Dealers, Direct
Acceptable Price Range (with <1,000 <1,500
software. without primer)
17. Macintosh Market (U.S. only)
Office Related Education Home
Manager / Low End Clerical/College Student High Consumer Home
Professional Secretarial WP Schools Home Business
Every "Little Lisa"
Manager's Market
IQQl
Total Available Market 9M 4M 4.7M 11.2M 19.000 16M 205M"
(schools) ($35K'+ )
1985 Industry Penetration .2 ,3 .1 ,35X20 units .2 .2
,
'82·'85 Industry Sales 1.8M 104M l.lM 133K 3.2M 500K
II
MacIntosh Share 20% 25% 50% 20% 10% 33%
MacIntosh Sales '82·'85 360K 480K· 350K 550K 27K 320fC 167K
Office Total: 1.190K Education Total: 577K H(}me Total: 487K
Total MacIntosh 2254K (563K/yr.or47K1mo.)
Sales '82-'85
·2:1 ratio to Lisa Sales (in offices which buy a Lisa).
(300KX.8X2)
··Worldwide Amway, Shakle~, Mary Kay, Avon, Fuller Brush, and Tupperware.
18. HOME
Consumer Home Home Business
Positioning The family Macintosh facilitates The powerful tools the big businesses
management of personal finances and have been using to decrease their
records, makes it possible to take paperwork and increase effectiveness
advantage of convenient services such are made affordable to every home
as home banking and home shopping. business by Macintosh. MAC
MAC also provides Entertainment simplifies the task of the headoffice,
and Education for every member of by allowing every home
the family. businessperson to use the same
advanced means of running his
business.
Applications Managing Time and Money, Home Correspondence, Inventory Control,
Shopping, Correspondence, Bookkeeping, Order Entry, Personal
Animation, Games, Computer File Systems. Communication with
Literacy, Education Central Office.
Software Information Services, Personal MACWriter, Inventory Control,
Finance Management, Personal OEM. Mail List. Single Entry Ledger,
OHM, Mail List, MACWriter, Space Communications Software
Shuttle, Chess, MACSketeh, Other
games, MACBASIC, Sesame Street
Software
Competition Apple 11,Japanese, Atari 400/800, Radio Shack. Alari 800, Commodore,
Radio Shack color computer, Japanese
Commodore (VIC 20)
Distribution Retail outlets (Macy's, Sears, etc.), Direct to Sponsors (Avon, Amway.
Apple Dealers Mary Kay. Fuller, Insurance, etc.),
Apple Dealers
Acceptable Price Range (with <1,000 <2,000
software, witllOut printer)
19. IJ 1982
"Get the Train out of the Station"
Software Hardware
Introduction 1. Mac Writer 1. 64K1128K Mac Intosh
Ql, '81 2. Mac Calc 2. 2nd floppy disk drive
3. Mac Basic 3. R5-232 cables
Q3-Q4 4. Mac Graph 4. 300 baud Mac Phone
1982 5. Mac Sketch 5. R5-232 Mac Net
6. Mac Pascal 6. Mac Intosh w/o disk drive
Q2 7. Mac Dow Jones
1983 8. Mac File
20. Curatorial staff at the Computer History Museum have
determined that the chapter header for this section is
missing.
It should read:
Macintosh Organization, Staffing and Budget
21. Steve Jobs
Sharp
I I I 1
PUBS/NPR HARDWARE MARKETING SOFTWARE
Jef Raskin Rod Holt SJ Acting Bud Tribble
(.
I I
..... E,sE!.!JPza, Alexio Ferris Daniels
Howard Hoffman Dennmar
Hertzfeld
I Wigginton
INDUSTRIAL
, DESIGN Askeland Nicholson
Jerry Mannock Crow Riddle
. ,~
Oyama
I Roots
Horn
Kottke
l Smith
22. MACINTOSH HEADCOUNT 1981
ACTUAL JUNE JULY AUG SEPT OCT NOV DEC
PRODUCTION ENG. o 1
(MGR)
TAIWAN LIAISON o 1
KEYBOARD/ o 1
DISK LIAISON
DOCUMENTATION o 1 2 3
(ANALYST) (DRAFTER) (MISC)
JIGS & FIXTURES o 1
(DESIGN/PROTO)
QA o 2
(MECH & ELEC)
TEST EQUIP o 1 2 3 4
(MGR) (ASSOC) (TECH) (TECH)
SPECIALS o 1 2 3 4
(ENG) (ENG) (ENG) (ENG)
STANDARD o 1
(ENG)
SOFTWARE TEST/ o 2 3 4
MAIN
..................................................................................
SUBTOTAL o o 2 6 9 12 14 22
... ......... . ..... .... . .. ................. ................... ...... .
a.a:ll.:II~=-•• =.:a:g_:::I.=:II.=lI:I= •• :::I
•••• a••• _::a•••• :a.=".::I::aI=:II::::I::::;::::I.;a
•• :lI:::I:&.:a:a;;l:l:ll_==-••• =====-a:a •• ::a:a:a:a:ll;a_a.:_.:a .=._.
GRAND TOTAL 16 18 28 39 47 52 55 63
••••• __ :a••• :::a:a.==:a:::l::ll== •••••••• :aa.:a •• __ :azaa:ca=.::&:a:::a=====-::za::J:::I.:a
••• a •• a.=:a •• =:::I•• =a:::l:a.:::I:::1•••• a ••• :II:au •••••••• =a.*
23. MACINTOSH HEADCOUNT 1981
ACTUAL JUNE JULY AUG SEPT OCT NOV DEC
-------------------------------------------------------------------~-----------------------------
ADMIN 4 /
5
(ASSOC)
MARKETING 1 2 4 5
(PMM) (PME) (PMM)
(ASSOC~
PUBS/NPR 234 5
(BASIC, DBM, OS, OEM PROGRAMERS)
•••••••••• II •••••••••••••• II ••••••• 1,." •••••••• II •••••••••••••••••••••••••••••• II
SUBTOTAL 7 7 8 10 13 14 15 15
••••••••••• II •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ENGINEERING 1
MAIN LOGIC BD 1 2
(MTS)
SR RFI ENG o 1
VIDEO/POWER SUP o 1 2 3
(ANAL ENG) (TECH) (SUPPORT ENG)
KEYBOARD 2 3
(SOFT/HDWARE)
DISK o 1 2 3
(HORN) (TECH) (ANALOG/TEST EQUIP)
PACKAGING 3 4 4.5
(DRAFTER) (LAZLO)
SOFTWARE 2 3 5 7.5 8.5
(NUM) (BASIC) (DBM) (ASSOC)
(BASIC) (OS) (DEMO)
(MACWRITER)
.... ,' .
SUBTOTAL 9 11 18 23 25 26 26 26
••••••••••••••••••••••• I ••••••• I ••••••••••••••••••••••••••••••• I ••••••••••••• • •••
24. Macintosh Costing - $ 397
Logic PC Board $ 139 Manuals & Lit. $ 3
Analog PC~CRT& Yoke 55 Shipping Box 5
Floppy Disk Mechanism 40 Software & Manuals 9
Disk Analog PC Board 12 Power Cord 1
Plastic & Metal Housing 14 Mouse 30
TOTAL MA IN UNIT $ 260 TOTAL MISC $ 48
Keyboard Matrix with Assembly~ Test & IQC
electronics $ 17 (3 hrs @ $20/hr,) $ 60
Keyboard plastic 5 Tooling & Maint. 2
Instruction cards 2 x
'.
Production Engr, 2
.."
Keyboard calJie 1 .6
:~
:~:
.:
TOTAL KEYBOARD $ 25 '.' TOTAL ASSEMBL Y $ 64
..:
25. Distribution Margin Anaylsis
"'l1VI W • ••••••• ••• •••••••••• •• •• 11....... IOU •••••• •••• •• ••••••••••••••••••••••••• ".... ,.. •••••••••••••••• 1& •••••••• 'fl 191 'VI ••••••••••• 19!•• '." •••• , ••••••• ••
Macintosh Retail Price $995 $1095 $1195 $1295 $1395 $1495
" 'fl •••••••••••
'h' hi ••••••••••••••••••••• •• •••• Ii ••••• I'r •••••••••••••••• "., ••••• , Ii. i" ....
Operating Profit $197 $257 $317 $377 $437 $497
(assuming 40% cost
of distribution and
$400 cost.)
_ % Operating Profit 33% 39%
..................................................................................•........................................................................•..•.........................•.....
44% 49%2%
5
__ .....•••................•.....•..•• __ .......•....
55%
Distribution Margin 20% 27% 33% 38% 43% 46%
(assuming $800 Fasp)
26. SPECIAL TASK FORCE BUDGET
DEPT: 6500 ACTUAL FORECAST
6/30/81 1981 1982
Q2 Q3 Q4 Q1 Q2 Q3 TOTAL
---------------------------------------------------------------
SALARIES & FRINGE 75.61 212.10 392.81 610.26 708.29 736.57 2735.64
EXPENDABLE TOOLS 0.25 0.27 200.30 20.40 296.50 1.50 519.22
OUTSIDE SERVICES 0.21 5.91 84.50 6.00 84.50 84.50 265.62
OPR/OFFICE SUPLS 45.48 36.29 43.00 99.00 53.00 15.00 291.77
TOTAL EXPENSES 133.08 294.63 889.97 931.84 1258.17 929.67 4437.36
~ 1990
"ACINTOSH OPERATING EXPENSES
P 968
fi aea
s 788
~ 6ea FORECAST
I 58
N
490
$ 38
I zea
s 189
8
JFftA"JJASONDJF"AftJ
1981-1982
27. MACINTOSH PRELIMINARY PLAN
Apple Product
Overview
Macintosh Markets
& Software Ranking
Macintosh Organization,
Staffing & Budget
28. I-=:-.J
1, Europe has not been given much consideration yet, Although
the unit is being designed to meet VDE, etc. we still have much
work to do for Europe (software, manuals, et al,)
2, We are designing our packaging to accept a door·less disk
drive only. We feel Vennard will come through, Should we
be taking this risk?
3, Who 'tIill manufacture Macintosh? Should we
7 should PCS7
S'Ingapore, AI ps."
???
4. Is our schedule realistic?
5, How do we get PCS to feel a "part" of Macintosh?