Why Apple is making privacy a big deal
Anyone for an apple?

Why Apple is making privacy a big deal

5G and networked infrastructures are driving the next phase of technology innovation. Privacy will drive how that future marketshare will be captured.

My thoughts on why the next steps in bridging the digital divide will be driven by privacy.

CES (Consumer Electronics Show) in Las Vegas starting today and is expecting 182,198 attendees. Apple wont be there but they have taken out a colossal advert that no attendee can miss.

Source: Chris Velazco via Twitter


Apple decides to advertise its most important feature – Privacy.
But why Privacy?

As we all know the divide between the physical world and digital is closing. From AI to implants we humans just cant get close enough to our tech. What will privacy look like when there is no divide? No one can say for sure. What is certain is that privacy will be a part of it. Global companies understand that privacy is essential in all future technology. It has long passed a compliance issue it is now a competitive advantage.

This advert emphasizes how important the next phase like 5G and networked infrastructures will be crucial in moving the digital and physical world closer. 

Leading technology manufacturers know that without privacy by design their products have little chance of bridging the physical and digital divide.

Last year at CES there was a huge increase in HomeKit compatible products, from light bulbs to home shower systems integrations. HomeKit is a software framework by Apple that lets users set up their iOS Device to configure, communicate with, and control smart-home appliances.

Apple knows people buying these products at CES want to run them of a trusted infrastructure that has built-in privacy.

Privacy is now an essential as part of tech and innovation build.

Apple is not even going to be at the show but it has an ad on a building that every attendee will see.

Apple wants everyone looking to sell or buy products at CES to know that they can run them of a trusted phone, which is in the end, is the beginning of trusted networked infrastructure. 

要查看或添加评论,请登录

David Taylor的更多文章

社区洞察

其他会员也浏览了