> To recognize the best of its employees, Apple created the Apple Fellows program which awards individuals who make extraordinary technical or leadership contributions to personal computing while at the company. The Apple Fellowship has so far been awarded to individuals including Bill Atkinson, Steve Capps, Rod Holt, Alan Kay, Guy Kawasaki, Al Alcorn, Don Norman, Rich Page, and Steve Wozniak.
I wonder what qualifies “extraordinary”. For example, Chris Lattner, creator of Swift and LLVM, seems to have fit that adjective as well as anyone and yet his name is absent from this list.
The Mac graphics API was interesting, because it was all done in software, as opposed to platforms like the Amiga which relied on graphics hardware. Personally, I think relying on graphics hardware acceleration would have been smarter, as every platform this does now, but it was certainly a bold choice for the Mac.
Atkinson also created HyperCard, which could have been the first web browser had Apple managed it better — Tim Berners Lee references it in his original web proposal document.
It would be interesting to know how many stock options an Apple Fellow receives, and whether it is a one-time award, or continuing.
Hypertalk is also different in purpose and kind from JS. The former is easier to read than it is to write (Hypercard encouraged learning by copying / example), and was explicitly designed for everyday people. It was meant to bridge the gap between "users" and "programmers" and provide true computational media authoring.
Also it seems like what you're saying is confirming my point, not contradicting it? HyperCard has a presentation layer and a scripting language, and so too does the Web, both of which were directly influenced by their respective pieces in HyperCard. So how is this not analogous to the Web??
He made HyperCard on his own and licensed it to Apple for cash, though he stipulated that they had to release it for free. Unfortunately, HyperCard's biggest legacy is only Myst, and the Tim Berners Lee shout-out.
But I see Apple Fellows as something for people in retirement and he's still mid-career. They can always award it to him later.
The person missing from this list who I'd like to see added is Susan Kare. She defined the look of the early Mac and iPod, designing all the original bitmap fonts and icons. Hugely influential.
+1000 karma points for people like Vikram who stay in academia and continue to teach.
Susan Kare explains Macintosh UI ergonomics: https://www.youtube.com/watch?v=x_q50tvbQm4
Atkinson was given fellowship because Jobs wanted to make him happy. 
The way I see it, Apple gives fellowship to people to make them feel themselves important and keep everyone in the room happy and when the press put's their name next to other giants,that must be massive ego satisfaction -- in a positive sense(it was apparently Schiller's idea to use click wheel for original iPod.), for the lack of better choice of words on top of my mouth right now.
2.Valley of Genius
Tech output with high business impact + company loyalty = Fellowship
Formula works pretty much the same way at any tech company, including the one I work at now.
Eventually Iwerks returned to Disney making amazing imagineering tech, but wasn't added even in the first batch of Disney Legends in '87.
Ub Iwerks wasn't included in Disney's "Nine Old Men" either. 
Before Signal, iMessage was pretty much the only secure messaging system readily available to consumers. And more broadly Forstall had a huge role in making the Apple we know today.
There’s a serious point here. Highly technical, bare bones infrastructure componentry like this isn’t actually free to use. It requires that the user have an extensive set of incredibly valuable skills that are very expensive to acquire. In fact I’d argue the skills needed to understand and effectively use a solution like this from scratch, including setting up and running a server, cost a heck of a lot more than $600. That’s aside from the opportunity cost of learning all that, and setting up and running a server.
Also, iMessage never reached a level of polish to work on anything not produced by Apple. If we're taking proprietary vendor specific secure services, Blackberry did it before Apple, too. So, definitely not the first and not the only.
BBM was not E2E encrypted. BlackBerry always retained the capability to read your message traffic. Apple does not.
Well, I'm not _that_ familiar with BBM since it was never available in my country.
But what makes you think Apple can't read your messages? Do you have any encryption keys that you share between devices? Or you just enter login/password on a new device and voilà all your messages are displayed to you? If that is so, I guess I'll have to tell you something...
Anyway. Last time I checked, iMessage apps source code was not available, you can't verify fingerprints of your contacts in iMessage, so... how do you know Apple doesn't insert a very simple MitM agent that does e2ee both for your and your chat partner, having all messages nicely decrypted in the middle?
So far it looks like the only thing that makes you think Apple can't do that is because they pinky promised this to you. Sorry.
You should really look more into the iMessage encryption scheme before attempting to fear-monger about it. The approach it uses to multi-device encryption is well known, and is basically its entire innovation over other clients—an approach that every other piece of E2E-encrypted chat software has been encouraged heavily to copy, but for some reason none yet have. (WhatsApp specifically is often ridiculed for its requirement to route all your messages through a "primary device", which feels like going back in time after experiencing iMessage's approach.)
To save you the trouble of looking it up: you don't "log into iMessage." There's no such thing as a central "iMessage account." Instead, in iMessage, your devices synchronize state with one-another by participating in an ad-hoc group based on a shared "key bag" of all your devices' private iMessage signing keys.
When you get a new device and want to join it to this existing group, it sends out a signed request on an announce channel corresponding to your iCloud identity, requesting that another device in the group "invite" it to the group. From the user's perspective, this appears as their new device telling them that the iMessage sign-on needs to be confirmed on an existing device; and a modal popping up on all their existing devices, asking whether they want to accept the new device's join request.
If the user confirms the join request, then the existing device the user confirmed on will take its own iMessage keybag, encrypt it with the new device's public key, and send it to the new device. This will then allow the new device to securely "introduce itself" to the rest of the group.
Throughout this process, no key material ever travels unencrypted through Apple's servers. Apple can't recover your iMessage keys; nor are Apple's servers an implicit "participant" of your iMessage sync group. iMessage's cloud backend is, during this pairing process, just a dumb message-queue system between your client devices, one that sees only opaque encrypted messages.
(Note that this also means that it's totally possible to get "locked out of" your iMessage sync-group if you lose access to all your existing devices. This is usually fine, because 1. iMessage clients won't sync history from before a new device joined the group with that new device, so you're not losing access to anything you had any potential to recover anyway; and 2. you can make a new sync-group under an existing iCloud identity/phone number/IMEI/etc., because none of those visible identifiers are the primary key of the sync-group. The sync group has no primary key. It's not a central "entity" with an identifier. It's a mesh, that happens to be reachable through identifiers it registers to—sort of like softphone apps registering a DID number. But those actively-registered aliases aren't a means of security, nor recovery.)
> Last time I checked, iMessage apps source code was not available
People interested in messaging security don't tend to trust source code even if it is available. Unless the build process is deterministic and replicable by the researcher themselves—to produce exactly the artifact distributed by the store—then who knows what of the published source actually makes it into the published binary, and/or what-all else ends up in there as well. (Would you trust Chrome [the binary] just because Chromium is open-source? Would you trust macOS [the binary distribution] just because the XNU kernel and BSD userland are open-source?)
Instead, security researchers dump packet captures and analyze them.
And, in this case, those packet dumps reveal that iMessage does... exactly what is stated above.
Just a simple question. How do you know that when you connect to me over iMessage using state-of-the-art / end-to-end-encryption / made-from-carbon-free-alumeenium (sorry for that one), there is no man in the middle?
With this architecture without visible fingerprints, installing a MitM proxy that would relay data between two separate e2ee chats is not a problem at all:
You <-- e2ee chat --> MitM proxy <-- e2ee chat --> Me
UPD: ok, I get it that you downvoters don't have an answer to simple question and are just disturbed about the fact that security that was promised to you turned out to be just a security theater.
No, iMessage does that. That's no more "Apple" doing that, than the functioning of a copy of gpg that you installed from Ubuntu's apt repo would be the GNU Foundation or Canonical Inc. "doing that." The client is in ultimate control. Someone wrote that program, but now you have it, and you get to say what it does or doesn't do (if by nothing else than by choosing whether to run it.) The iMessage servers can't make the client do something that's not part of its executable.
You downloaded, and now have, the software—a collection of bits with a fixed function—on your device. You can do what you like to verify those bits, and then either trust them, or not; but either way they're not going to suddenly change out from under you without your consent (which you might supply implicitly by turning on auto-update, but you don't have to do that either.)
When entities like the US Navy use cryptosystems like Tor, they're not blindly installing it from the web, trusting the theoretical guarantees it makes; they're ensuring security in practice by isolating a specific version-under-test, static- and runtime-analyzing the binary to ensure it meets their needs, and then declaring that exact binary good and trustworthy, and giving operatives simple tools to acquire and validate that exact binary.
If you're paranoid, you do nothing less. But nothing about getting iMessage as part of your iPhone's OS stops you from doing any of that. You just take apart the IPSW it ships in, and throw it iMessage.ipa into Ghidra. Once you've verified it, you can say "the version of iMessage that ships in iOS with hash 0xXYZ, is known-good, and can be used for low-security comms."
> Let's trust (again) that they absolutely have no mechanism to intercept your password and do whatever they want with your data.
No, let's trust-but-verify that the binaries are E2E-encrypting the key-sharing process. Then there cannot be a man in the middle.
Also, as I said previously, you never "log into" iMessage, and so you don't have an iMessage "password" per se. iMessage uses your iCloud username to discover the device-group to attempt to join, but it doesn't use your iCloud account to authenticate to that group in any way. Instead, you're basically doing a https://en.wikipedia.org/wiki/Key_signing_party with yourself, manually pairing your devices with each-other through challenge-response. (This turns out to actually be a convenient kind of key-signing party—and so probably the only time key-signing parties are relevant in practice.)
In the design of the iMessage key-sharing process, the iMessage servers could be replaced with an ephemeral channel on a public IRC server, and the semantics—including the security guarantees—would remain the same. The servers only see—and pass along—opaque, encrypted blobs.
> How do you know that when you connect to me over iMessage using state-of-the-art / end-to-end-encryption / made-from-carbon-free-alumeenium (sorry for that one), there is no man in the middle?
You're moving the goalposts; intra-account multi-device key sharing, and inter-account key exchange, are separate concerns.
What you are asking about is the Fundamental Problem of Key Exchange. And the answers are as they have always been: you either do a key-signing party; or you choose a Central Authority to trust to act as a directory mapping identities to public keys (and then maybe use that key to do a challenge-response identification process with out-of-band signaling elements.)
iMessage solves key sharing better than other messaging services. Nothing really "solves" key exchange any better than anything else.
 Except maybe Keybase, but Keybase's unique shape—an identity-aggregating service—is a necessary element of that solution. No chat service can do what Keybase does without getting into the business that Keybase is in.
Actually, I'm not. See the post above, you claimed "BlackBerry always retained the capability to read your message traffic. Apple does not." , and I was responding to just that: Apple can read your message traffic. You yourself have proved it in the above reply: iMessage neither allows key-signing (nor even key verification, I must add!), and the Central Authority iMessage users have to trust are Apple themselves. It also has supreme control over all updates that are shipped to your phone, so even if someone does decompile and verify his build of iMessage, it doesn't mean that the targeted user was shipped the same version at all. So let's agree to put to rest your claim that Apple can't read your messages, OK? (note, I don't claim that it does, just that it can)
Now, being NOT paranoid, I'm actually not angry at it, not in the slightest. The downsides of a real privacy and security have a very serious and negative impact on user experience, so for most users the simple capability to sync all their messages from a central server (like Telegram does, "the most secure messenger", hahaha) far outweighs the dangers of being spied upon.
What irks me is the sheepish trust that people place on people who promise them "don't worry, you are super safe, without any downsides of real security, and people buy into it. The prime offender, of course, is Telegram, where users rarely, if ever, use the "Secret chats", but still think that they have the most protected messenger. Not concerning themselves that the features they like most (capability to access from the web, instant sync of messages on any device) comes from it being the least protected of any major messenger.
Which is kind of the point of all these services.
> you can't sync devices easily
Apple seems to handle this pretty easily with great UX.
I switched to a S20 this year. iMessage is one of the only things that I truly miss about my old iPhone.
Sigh. This again. Ok.
If have end-to-end encryption, you can't read messages on newly connected devices, unless you somehow pass encryption keys to your new device.
If you do not pass keys between devices, and can still read messages sent from other devices, you do not have end-to-end encryption.
If the only thing you put into device when connecting is your login/password, then even if Apple does retrieve keys from your device and passes it to new device, it can pass it to themselves and gain access to your super confidential messages.
So, no, Apple does not handle this pretty easily.
Source: our product has _real_ end-to-end encryption, and it gives the users a rather big amount of discomfort. If you are told you have really secure messenger, but you do not enter anything but your login/password, well, I've got bad news for you.
> Which is kind of the point of all these services.
If your point is privacy, and you really care about it, just run your own communication server for $2/month. You have all the niceties of server side search and device sync, and none of the pain in the ass that is brought by E2EE. And if your privacy isn't worth $2/month, then you probably don't need E2EE either.
> it can pass it to themselves and gain access to your super confidential messages
They can also send your PIN, private keys, all logins and passwords to their own servers, or simply log chats from the system keyboard and UI or any of the OS layers they control. The same is true for any app running on iOS/Android. If you don't trust the OS there is no working around it in software.
According to my rather brief examination of iMessage, you can't verify key fingerprints in iMessage. It means that Apple can install MitM on a probed subject any second, and you would never know that it is there. See:
You <-- end-to-end-encryption --> Apple MitM <-- end-to-end-encryption --> Your buddy
You have _zero_ control over it, and the only thing keeping your secure and private is Apple's pinky promise.
> The same is true for any app running on iOS/Android.
Umm, no. There are such things as open source, verifiable builds, and, yes, decentralized messaging protocols. You can take an open source client (for example, from a reputable source like F-droid), and connect to a server totally unrelated to client developer. You can run an encryption protocol where you can actually exchange public keys, verify your keys fingerprints, and confirm the identity of your chat partner. That's what people really concerned with privacy and security do. Others are satisfied with a promise that sounds good enough.
Indeed, that's what I meant in the last paragraph. It also means an open source, verified client, with fully secure encryption, is still powerless against the OS capturing keystrokes. You have to rely on that pinky promise either way unless you control the hardware.
But yea, it is correct that you can always prove something cannot be done once you tighten up some mutually exclusive constraints. Question is how much it maps the real world and whether some cannot be loosened.
You see, e2ee is only practical against the service provider that you have reasons not to trust. But if you don't trust Apple, then you should not trust it all the way to the bottom: and at the bottom we see that iMessage apps give a user zero control over said e2ee. You don't really know who decides your messages on another end: your chat partner or MitM proxy.
If you trust Apple that they do not have such proxy, you might as well trust them to not snoop on your chats and store them unencrypted on Apple's servers, saving you from a lot of problem worrying about your keys, devices, etc.
Yea, but most people don't think about security in terms of black and white, and neither should they. There is no such thing as "real security & privacy" and it's completely disingenuous to suggest that you've found it when it involves trusting you or your company as a third party in placement of, say, Apple.
As a universal statement, this is far too simplistic of a comment about a system's security and trust. Security without a notion of threat model is quite irrelevant. There's quite a large spectrum between trusting Apple with respect to the binary they serve me not being actively malicious and by-and-large does what it says it does; that they are not actively presenting someone else's key to my chat parties, vs. trusting them with my unencrypted data on their servers. At the very least, the latter would not be safe under subpoena, or data leak, or a rouge employee, for instance. Plus, in practice, if they present a malicious binary to everyone or substitute keys, someone likely notices at Apple scale. If I am that interesting of a target for them that they decide to target me specifically, I have bigger worries, as I am trusting the OS and hardware anyway (and still, there's hopefully some level of forward secrecy). In fact, to me, and to vast majority of people, a random exploit in their OS or physical theft of the phone carries a higher risk than Apple directly attacking them.
So, no, I fully reject that iMessage security is substantially equivalent to say, "Facebook Messenger" (even if run by Apple). I posit the delta is almost as much as HTTPS with Let's Encrypt cert compared to plain HTTP. And yes, there are no doubt use-cases that iMessage is ill-suited for; doesn't mean we should just give up on it for the other 99%.
Trust in entities is fleeting. You trust an entity today, you might not trust it tomorrow. End-to-end encryption, in contrast, is not fleeting, as long as you trust math.
And if someone's trust for his own service is fleeting... uh-oh.
I definitely won't trust my own code to keep me alive, if that's what's preventing a government from killing me or something.
There's a very good chance my homemade server config or encryption code has a big side channel vulnerability or something.
Also, if you are concerned about privacy, chances are, you are not a private individual and have specially trained people to install that server for you.
Then again, even if you DO need encryption to transmit a critical password or something, well, XMPP clients developers know their business (at least, some of them do), so it is unlikely that you'd be able to screw up something.
The typical idea is being concerned that a state will physically seize your server—you know, real security and privacy concerns.
> Also, if you are concerned about privacy, chances are, you are not a private individual and have specially trained people to install that server for you.
Is this not ultimtely what iMessages is to people?
Also, if you are concerned that state will seize your server physically - then you should probably put the server to a place where it can't.
I’m not sure what the point of pretending to be ignorant about encryption is supposed to do.
Of course, if you want a cozy sense of being secure, instead of real security, you say, 'I use end-to-end encryption which I was told makes reading my messages impossible'. With iMessages you can't really verify if your messages are not being sniffed (unlike Signal, or XMPP, I must add), and we now have proven Apple DOES have a potential way to read your messages if they really want it. But you TRUST them not to read your messages. So why bother with E2EE at all, if you already trust them not to spy on you?
(Also, how come people who religiously insist on using an always-on E2EE for their chats are totally fine with Gmail which stores every mail totally unencrypted?)
Among other things, you don’t write all the software that goes on your computer, let alone build the hardware yourself, so you’re not “really” secure at all. And because you do claim “real security”, I can’t square your statements with any threat model I can imagine.
I definitely would trust Apple more than a random "XMPP servers are really good these days you don't need e2e when you run your own" random commenter on the Internet.
Looking through the list (https://en.wikipedia.org/wiki/IBM_Fellow), some random names I recognize: Frances E. Allen, Gene Amdahl, John Backus, Kenneth E. Iverson, and Benoît Mandelbrot (!).
Pretty neat to see how one company was the hub for so many skilled people in the past (similar to Bell Labs and Xerox PARC). I wonder what that hub is today. Google or MSR?
Fellows are retired people who don't have to leave.
This is false. Retired people can be fellows but you do not have to be retired. Some Fellows at tech companies are quite young because they were lucky to invent or spearhead famous technology that changed the fortune of the company.
A few of his words or lines on stage have been fodder for people to argue on (“courage” when removing the headphone jack from iPhones) or make fun of (“can’t innovate my ass” when introducing the trash can Mac Pro that later went without any updates or news for years). But he was a natural and a master at presentations, IMO.
If one didn’t know about him and watched his presentation, they’d find it hard to believe that a “marketing” person could talk so well about tech.
Craig Federighi is another great presenter who brings in humor along with some puns involving tech terms (not all his jokes may land well, but you gotta give him credit for many that do).
In this mix, I don’t see Greg Joswiak in the same league. He may be a good senior VP of marketing, but a great story teller and presenter he’s not. Sorry, Greg, if you’re reading this. Those others have set standards that are difficult to beat.
I wish Phil well, and hope that he’s able to contribute to Apple for many more years to come.
Back when I worked at Apple we'd watch every presentation because, hey, it's a good excuse to slack off at the office.
Phil was always the most boring guy because you always knew exactly what he was going to say and exactly what kind of non-answers he'd give to questions.
I mean yeah, it's great he hits the mark perfectly every time, but it's also so, so boring. He's the classic marketing shill. I wonder if his name is really even Fill Shiller, it's too perfect.
> Phil was always the most boring guy because you always knew exactly what he was going to say and exactly what kind of non-answers he'd give to questions.
I never felt this way. Maybe it’s because I was never in a place where I could ask him questions or watched a presentation where someone could ask him questions.
> I mean yeah, it's great he hits the mark perfectly every time, but it's also so, so boring. He's the classic marketing shill. I wonder if his name is really even Fill Shiller, it's too perfect.
I didn’t see most of his presentations as marketing shill. Maybe I haven’t been paying much attention to that aspect.
I’ve seen senior folks at my former company do external talks that get rave reviews and my opinion was always “that’s not how it happened at all!”.
Sort of like not eating sausage anymore once you’ve seen how it’s made.
EDIT: Whoops, just saw someone posted the same clip below.
remember watching that on a postage stamp sized video as a kid... so magical (and whimsical) in those days
I've heard him talk casually on interviews and he seemed like a super interesting guy though.
He was responsible for messaging and positioning Apple’s products globally for 4 years, so I guess it’s reasonable to assume he knows something about technology.
They simply do not offer a PC that interests me.
Whereas for Nike they could make the ugliest shoe in the world and people would still buy it.
From what I've been told, Marketing owns product management at Apple, so it's very much a marketing-first organization.
> His influence on computing is deep.
Computing what exactly? Facebook and spreadsheets?
If you’re so happy with whatever you have, why don’t you talk about that, instead of taking the time and effort to go out of your way and getting in the face of someone you don’t even know like this?
I'm not so happy with whatever I have to be so blinded by all of its shortcomings to ignore everything else, I actually use all three OS platforms (Linux, Windows, MacOS) on a daily basis. That's why I find it so hard to understand how someone can be so infatuated by one platform that they ignore all others.
>Apple’s longtime marketing chief, Phil Schiller, is stepping into a slightly smaller role after decades with the company. Schiller is dropping his role as senior vice president of worldwide marketing, but he’ll remain in charge of the App Store and Apple Events. Greg Joswiak, previously the head of product marketing, will take over Schiller’s former position as Apple’s overall marketing leader.
I'd rather read the information from the original source, rather than a blog re-writing the Apple press release and then adding its own spin.
Meta question: I had submitted this link before posting the link here. IIRC this had a score of ~27 at the time; I don't need the karma, but what's best practice for changed-link submissions? Does it make your life easier if I delete my submission, or is there no real difference?
Perhaps when we eventually implement karma sharing for posts of the same article, the system will pick up cases like this and give earlier submitters a share.
On top of that, nothing is going to happen anyway. Even if in a few years of the process they decide to make changes it'll be a few more years before anything is legislated. So even if people that think what's going on needs to change get everything they want, realistically, it won't be until later in the decade until anything starts to move.
It must have something to do with the way politics is presented to the masses these days, but it's not a TV show. Playing guess the plot line doesn't really work.
Also, despite the fact that it’s shallow, status signaling is sometimes useful. Just like with the well-dressed Manhattan lawyer example in the recent thread about physical attractiveness in legal justice, having the right product in the right crowd subconsciously affects how others see you.
I'm not saying you're wrong to value those things, but a good amount of people don't. So no amount of explaining why iMessage is great will convince them, even if they understand and agree iMessage is great, since the "maximum appreciation" for any feature is capped by the perceived value of its premise.
Like here's an exercise, someone comes to you for a computer recommendation. They want a work laptop, home laptop/tablet (something with a keyboard), and an all-in-one. Give a recommendation from Apple, Dell, and HP.
Personally, I don't need to go to google to look up the Apple products I'd recommend, and I'm not even a fanboy. I don't think I can name a product from HP off the top of my head, and I know I'd need Dell's search tools to harrow in on something.
I heard the Dell 8930 was a good desktop. Or maybe the 8490?
And the HP Envy 14w71x and the Lenova Yoga 930?
What surprises me is that Apple continues to ship stuff like the base model 21.5 iMac that is just objectively a terrible computer (until yesterday, had a spinning boot drive!) when the whole idea is that you just buy the Apple thing and don't need to know that you should upgrade to an SSD.
They do seem to be coming out of it finally, but for a good while almost every Mac's entry level config was awful, the spinning hard drives being the worst offender considering a computer without an SSD just feels broken these days.
I was about to say that the 21.5" iMac isn't so bad now they've dropped the platters, until I checked and saw that they're still selling the model with a 1080p panel!
To me, Tim Cook's lasting influence on the Mac is the transition from a "good, better, best" set of configuration options to "poor, good, better". Continuing to sell old and crappy models to hit a price point—like the 2010 MacBook Air that continued to be sold with only minor spec bumps until 2018, and the aforementioned entry-level iMac which has been around since 2012—reflects very poorly on them.
Compare to Dell, whose equivalent datastructure would be a directed graph that probably contains cycles and non-sensical topology.
For example, I have a 2008 MacBook Pro that's whipped out on rare occasion to simply act as another computer when I need to test something. It works fine. It's on macOS Yosemite, I think, but it's certainly not up to date since most of its time is spent powered off in a closet. Whenever I boot it, I usually get a banner saying it got a security update or something while I'm using it.
I also have a tower PC that is used for tower PC things, also rarely. It has Windows 10 Enterprise Eval, and I decided to be a good consumer and give it a license because it's been unlicensed since 2017. It's also running far slower than it should be for the specs it has. Turns out, it hasn't updated since 2017, but that's fine, I'll just update it.
Well, I can't license it without updating. The build's expired.
I also can't seem to get it to discover that the Fall 2017 build of Win10 is not the current build. I think that's because it's unlicensed. I'm currently working on getting Windows reinstalled, I'm probably fucking it up some way, but I don't use this PC enough to warrant spending this much time on it.
What I'm trying to say here is that there is a decent amount of fanboyism contributing to Apple's success. However, the little things they do to make their software work better makes it worth it in my opinion. I have never had an issue with a Mac being too "out of date" to do stuff on; that 2008 Macbook Pro still works (with the wonders of an SSD). That's what sold me.
I was considering getting a windows laptop to replace my current macbook pro, but this experience, combined with many others, doesn't make it worth my time to save that money.
The email exchange had to do with difficulties we were having working with Apple hardware in the context of hardware we were developing. I reached out to Steve at 3:00 AM and got a response thirty minutes later. After replying with a detailed explanation of the issues we encountered I got a one sentence reply back from Steve: "I understand".
The next morning, actually, later that same morning, I got a call from someone from Apple. He said "Steve asked me to take care of this". That person was Greg Joswiak. We were invited to come up to headquarters to discuss the issues and work out a path forward. I met him and many other members of the engineering team while there.
What's more is that it's clear their new boss (Tim Apple), like millions of others, is only now beginning to realize that the "gangster tactics" (of using math to restrict app functionality) is not totally about about preventing malware, ensuring privacy and protecting the brand reputation with users. He seems almost blind-sided by the world governments moving to act on a level that even Billy and Balmy didn't have to face after many years of actually killing the life's work (and thus the life) of hundreds of earlier software professionals (RIP Jay Miner).
CNBC uses a more "obvious" headline, "Apple marketing chief Phil Schiller steps down from role". 
"Mr. Schiller owns over 69,491 units of Apple stock worth over $18,846,432 and over the last 16 years he sold AAPL stock worth over $73,528,915."
I believe I'd enjoy any role like that, if I'm skilled enough to tackle the problems I want to while having a trusted team which I can delegate things I know how to do but don't want to.
The navy used to have the concept of a "desk admiral", which was an admiral with no ships. It was effectively a promotion into a less relevant role - which is exactly what this feels like.
It strikes me as quite similar to what happened with Kaz Hirai at Sony.
Eddie still runs iTunes and Apple Music, iCloud, Maos, Apple Pay, and their productivity apps. He’s been known to work so hard he falls asleep in meetings.
Whatever I always enjoyed Phil Schiller on stage. While Jony Ive's voiceover looked like a real marketing material, Phil's presentations were always energetic and real. Especially his way of introducing new hardwares and processors. I'll miss his presentations. Hope he gets good time to do what he wants!
> I always enjoyed Phil Schiller on stage
My favorite Schiller keynote moment was his iBook stunt: https://www.youtube.com/watch?v=1MR4R5LdrJw
I've heard rumors that Schiller was actually afraid of heights, so this may not have been that easy for him.
Why would you change what works?
Utterly shocking, I wouldn't be surprised if the stock price plummets tomorrow.
The marketing is the product. This is exactly why so many people don’t get Apple and how they operate. Do you know who came up with the concept for the click wheel on the original iPod? It was Phil Schiller, he suggested it in a meeting with all the senior heads on how the device should work. Marketing, design and engineering work incredibly closely together at Apple.
Phil would be a great loss (it seems he’s not actually going yet), but Apple has lost major contributors before. They have a strong team and incredible depth of talent. They’ll be ok.
It’s always the End of Apple!!!!