Feeds

Jobs stand-in ranks iPhone over sex

Breathing, water, food, handset with crap antenna

SANS - Survey on application security programs

Apple's acting headman Tim Cook told an investment analyst that the iPhone is more important than sex.

Well, The Reg freely admits that we're exaggerating a bit – but not by much.

Apple's COO and Jobsian stand-in Tim Cook said that he ranks the iPhone "just below food and water on Maslow's hierarchy of needs," according to a Forbes report describing Cook's meeting with an analyst from Bernstein Research, self-described as "Wall Street's premier sell-side research firm."

Food and water reside on the bottom tier of psychologist Abraham Maslow's famous Heirarchy of Needs pyramid. Although they share that Physiological Needs level with a number of other necessities of life, one popular version of the pyramid places sex right after food and water:

Abraham Maslow's 'Hierarchy of Needs' pyramid

Don't blame Maslow for leaving "smartphones" off his pyramid – the psychologist developed it in the 1940s

Cook was joking, of course – not terribly successfuly, but we rush to acknowledge that his attempt at humor far surpassed some of the zingers uttered by Google's soon-to-be-ex-CEO Eric Schmidt.

In addition to promoting the iPhone to the rank of a physiological need, Cook's talk with the analyst revealed a number of less-risible but more-important points – such as the implication that Apple is hatching plans for less-expensive phones.

According to Forbes, the analyst said that Cook "appeared to reaffirm the notion that Apple is likely to develop lower priced offerings," and "that Apple did not want its products to be 'just for the rich'."

Cook was also reported to have said that the iPhone created "the mother of all halos," increasing the visibility and desirability of Apple's entire product line. This effect, the analyst reported, is especially strong in emerging markets such as China, in which Cook said that Cupertino had spent "huge energy", and which he identified as a "classic prepaid market" for mobile phones.

Musings about emerging markets aside, The Reg will refrain from obvious and easy wisecracks about the iPhone's seductive powers among some established-market fanbois, powers that make it more sought-after than even the horizontal no-pants dance. ®

SANS - Survey on application security programs

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.