Friday, May 22, 2020

Cinematography Treatment Example - 4304 Words

The Might of Spite Plot Summary The movie is about a guy (Antagonist) and a girl (Protagonist) living together that get turns to do the laundry. The guy (Thando) is very lazy, watches TV the whole day and refuses to do the laundry even after the girl (Carrie), tries to force him physically. Carrie is miserable after that but then finds another way to get him of the couch. She tells him that his car is being stolen and when he gets outside, Carrie locks the door behind him. Thando sees his car isn’t being stolen. He then sees the washing basket outside and sees Carrie through the window enjoying the victory and waving the key mockingly. Genre When filmmakers and movie critics refer to a film genre, they generally mean a specific†¦show more content†¦The TV room will be a bit darker though with pale look and feel to it because it is the antagonist’s lair. The outside will have more of a bright contrast and colourful look to it, because the antagonist is out of his territory and that is where he will be defeated. The kitchen will have a more stable feel to it with some solid colours and shadows. Lighting Lighting shapes the realty in front of the lens, giving it depth or flatness, excitement or boredom, reality or artificiality. Light can fall on the scene in a variety of ways to create many different moods to help tell the story.* (Kodak: the art of lighting-notes, 2003) To amplify this laidback light hearted comedy, soft lines and shadows will be used more. In a comedy high key-light is usually used to amplify the narrative. This is what I will be doing but also use mixed lighting at one location. The TV room will have a different light setting that is gloomier than the high contrast the kitchen and the garden will have. This is because it is where the antagonist spends most of his time and there will be mixed light used that strategically falls on certain places. The sun coming through a window and or a lamp on a table will also be used as extras to get enough light on the subjects so that low key light won’t be made. With the face of the antagonist in a darker part of the room the flicker of the TV will slightly be seen by using aShow MoreRelatedThe Theme Of Cinderella826 Words   |  4 Pagestrue love. Sounds familiar? This is the tale of Cinderella. Various movies from 1950s until now has deeply incorporated this theme to fit more modern situations, many items take into effect such as; the narrative, cinematography, mise-en-scene, sound, editing and overall theme. An example of the Cinderella theme would be Another Cinderella Story, which was produced in 2008. Mary, a talented dancer with big dreams goes to a dance her stepmom forbids her not to and dances with superstar Joey ParkerRead MoreWar Horse Movie Analysis1083 Words   |  5 PagesWar Horse During the first World War, Britain lost approximately 887,000 men, nearly 2% of its population as a whole. To this day, World War 1 remains Britains costliest conflict. Given the enormous carnage of the war, any serious artistic treatment of World War 1 has to take the basic truths of war into consideration. Such is the case with director Steven Spielbergs film War Horse, adapted from the novel of the same name by Michael Marpurgo. War Horse is a film that follows a horse named JoeyRead MoreMental Health In The Film My Friend Dahmer And The Fire Within, Directed By Louis Malle1119 Words   |  5 Pagesthe insanity of a particular character or characters. The films My Friend Dahmer and The Fire Within, a French film directed by Louis Malle, introduce characters with mental illnesses in different eras of Hollywood media. The two films utilize cinematography and narrative to express the mental health issues impeding the two protagonists. Mental illness has been a constant subject in American cinema that later translated to other countries. Symptoms like â€Å"hallucinations [,] depression [, and] mania†¦lendRead MoreA Movie Review on El Presidente1626 Words   |  7 Pagessudden he understood it. That is just an example of the lack of continuity of the script. III. Direction The Director in this movie did a decent job of portraying the life of Emilio Aguinaldo. I said decent because I was quite disappointed with the way the movie played out. I expected so much from this movie, but in every scene, I don’t know if the director overlooked it, but I really am discontented with every scenes. IV. Cinematography The Cinematography was good in terms of portraying the properRead MoreAnalysis Of Pariah, Directed And Written By Dee Rees Essay1420 Words   |  6 Pagesintended to highlight a diversity of sexuality and gender identity-based cultures. Historically, LGBT people have had to deal with being brutalised and misunderstood because of the misconception that being gay is different and deserves different treatment. However, there are efforts being made daily by the community in order to educate people and ease their fears. The purpose of the following analysis is to deconstruct how people who fought back while growing up realizing they are apart of communityRead MoreDystopian Comparisons Essay1431 Words   |  6 Pagesthe Book A Clockwork Orange, the short stories Harrison Burgeron, The Lottery and the movies Gattaca and the Truman Show by Anthony Burgess, Kurt Vonnegut, Shirly Jackson, Andrew Niccol and Peter Wier respectively. These pieces of literature(and cinematography) all have a so ciety that controls and manipulates the individual or Protaganist. The society does this because it wants total control over both the individual and the society as a whole. A Clockwork Orange is futuristic look at England. WhereRead MoreThe National Association For The Advancement Of Colored People Essay1153 Words   |  5 Pagesopinions on the tragedies in Baltimore, Ferguson, Miami and countless others. While the infamous performer, Beyoncà © Knowles created a more influential narrative. In the music video for her song â€Å"Formation† she uses unsubtle symbolism, powerful cinematography, influential figures, indicative lyrics, as well as cultural and popular references in order to bring attention to a multitude of the current racial relations and social justice issues regarding police brutality and black empowerment. Very fewRead MoreThe Culture Industry : Enlightenment As Mass Deception By Adorno And Horkheimer1086 Words   |  5 Pagestexts, we see a narrative of unconscious hegemony sustaining a dominant culture. This essay will compare and contrast the two texts in dialogue with the example of the Universal Studios Hollywood theme park. Adorno and Horkheimer first explain the culture industry as a system akin to a factory: â€Å"The hero’s momentary fall from grace, the rough treatment which the beloved gets from the male star†¦ready made clichà ©s to be slotted in anywhere† (Adorno and Horkheimer 7). In this quote, Adorno and HorkheimerRead MoreEssay about Treatment of Female Sexuality in Last Tango in Paris1685 Words   |  7 Pagessexuality, making for a very interesting film experience. In Italian Cinema, through exploring the films viewed through the semester, some are more on point with the treatment of female sexuality. These often stand out, for various reasons, but most frequently due to lots of sex and sexual themes within the film. For discussion of the treatment of female sexuality in Italian film are is one film. This film is the iconic film, Last Tango in Paris, or Ultimo tango a Parigi. This film has a very interestingRead MoreHeroes or Villains? - The Taliban1464 Words   |  6 Pagesgovernment will not be able to implement any decision to which he does not agree. General elections are incompatible with Sharia.† The Taliban’s greed for power is an example of corruption, a villainous characteristic. Under the Taliban regime, Sharia law was interpreted to ban objects such as â€Å"pork [products] †¦ satellite dishes, cinematography †¦ alcohol †¦ computers, VCRs, television †¦ statues, pictures, Christmas cards†¦Ã¢â‚¬  (Waldman, 2009). The U.S Country Report on Human Rights Practises – Afghanistan (2001)

Saturday, May 9, 2020

Sonnet 130 and My Ugly Love Contrast and Comparison Essay

Sonnet 130 and My Ugly Love Contrast and Comparison Shakespeare’s sonnet 130, â€Å"My mistress’ eyes are nothing like the sun† and Pablo Neruda’s â€Å"My ugly love† are popularly known to describe beauty in a way hardly anyone would write: through the truth. It’s a common fact that modern lovers and poets speak or write of their beloved with what they and the audience would like to hear, with kind and breathtaking words and verses. Yet, Shakespeare and Neruda, honest men as they both were, chose to write about what love truly is, it matters most what’s on the inside rather than the outside. The theme of true beauty and love are found through Shakespeare and Neruda’s uses of imagery, structure, and tone. The imagery portrayed in both†¦show more content†¦In like manner, the last verse in Neruda’s sonnet, â€Å"My love: I love you for clarity, your dark† could be interpreted to mean that the speaker loves his beloved to continue being a mystery for him in so that he could find more beautiful qualities about her by focusing on her unattractive qualities first. Similarly, Shakespeare’s last couplet, â€Å"And yet, by heaven, I think my love as rare as any she belied with false compare† display’s the speaker’s love for what is real rather than how his beloved ought to be. In brief, the imagery plays a huge part within both sonnets because it can give readers insight as to how the speakers think. Shakespeare and Neruda’s poem are obviously known to be sonnets, however they don’t both share the same structure; Shakespeare’s is of course a Shakespearean sonnet containing fourteen lines and has a particular rhyme scheme (ababcdcdefefgg), but Neruda’s sonnet doesn’t follow Shakespeare’s or the traditional Italian sonnet. Rather, Neruda’s sonnet does indeed contain fourteen lines, but most follows the free verse sonn et structure, since there is no rhyme scheme. Yet, likewise, both sonnets do present a problem in the first verses and then develop towards a solution. In the following, on Neruda’s lines, â€Å"My ugly†¦My beauty†¦Ugly:†¦Beauty:..† the speaker starts acknowledging his beloved that he is proud she is his for him to say â€Å"my†, but as theShow MoreRelatedA Comparison of Shakespeares Sonnets 116 and 1301354 Words   |  5 PagesComparison of Shakespeares Sonnets 116 and 130 Shakespeare examines love in two different ways in Sonnets 116 and 130. In the first, love is treated in its most ideal form as an uncompromising force (indeed, as the greatest force in the universe); in the latter sonnet, Shakespeare treats love from a more practical aspect: it is viewed simply and realistically without ornament. Yet both sonnets are justifiable in and of themselves, for neither misrepresents love or speaks of it slightingly. IndeedRead MoreAnalysis Of Shakespeare s Sonnet 130 1048 Words   |  5 Pages 2015 Sonnet 130 Shakespeare’s â€Å"Sonnet 130† uses imagery to compare his lover to other objects in order to convey his true feelings towards his mistress. With this idea, one can make the assumption that Shakespeare’s argument is accepting the normality of women by understanding that they don’t all look like supermodels or goddesses. His views about his mistress can relate to how present day men look at their significant other. Shakespeare’s view towards women shifts between his sonnets. ComparingRead MoreLanguage of Advertising20371 Words   |  82 Pagesand persuasive words in our language. You Discovery Safety Money Proven Results Love Guarantee Save New Easy Health. Notice the overused word free is not on the list. As excited as you may be about your product or service the largest ad with the boldest type doesn`t necessarily receive the attention you might expect. In fact, sometimes the big and the bold just end up looking like the big, the bad and the ugly. For instance, in newspapers where advertisement are surrounded by small typeRead MoreMetz Film Language a Semiotics of the Cinema PDF100902 Words   |  316 Pagesallowed myself to excise or replace passages that, as a result of the lapse in time between their original publication and the printing of this volume, have become obsolete and no longer correspond to the present state of my investigations.** Thus, in the case of partial changes in my orientation, or simply of new developments, or even when recent contributions to the field by other authors had to be accounted for, I have preferred toupdate merely by adding notes (rather long ones when necessary) instead

Wednesday, May 6, 2020

The Apple, Authentec Merger Free Essays

Abstract This paper critically evaluates the merger between Apple Inc and AuthenTec that took place on the 26th July 2012. The paper analyses the process of the negotiations and with a keen interest on the motivation behind the deal. This is Apple’s biggest deal ever and there are many questions pointing at the reason and the speed of this merger. We will write a custom essay sample on The Apple, Authentec Merger or any similar topic only for you Order Now This paper delves into the timing of the negotiations examining indicators that could reveal any hidden motives that Apple could have had that led to the signing of the final agreement. The paper uses a theoretical lens to explain the occurrences, the nature of negotiations and who actually exerted pressure on the process and the reason why. The paper investigates the relationship between Apple’s aggressiveness and the pending release of its new product. Introduction Fingerprint sensor technology company AuthenTec Inc announced its acquisition by Apple on July 27. The agreement was at $356 million and was to be the biggest acquisition in Apples 36 year period, in operation. A year after Apple Inc (AAPL.O) acquired AuthenTec Inc AUTH; a patent application was made public by the US Patent Trademark Office (Purcher, 2012). This application from Apple pointed at a new technology for the iPhone and its other devices, a security feature that would incorporate fingerprint scanner. Interesting was the fact that this technology was acquired from AuthenTec. Purcher (2013) explains that Apple had made such applications earlier in 2009, an indicator that it was interested in fingerprint scanners for its future devices. It appears that this research was at an advanced stage in 2012 with the revelation that this technology would be used together with face or Retina recognition as a sophisticated security measure on its iPhone and MAC. The Q-Theory of Mergers explains that mergers can be used as means for technology transfer and capital reallocation (Jovanovic et al., 2002). This paper focuses on the former in regard to the merger and acquisition in question. It is the light of this argument that this investigation delves into the background of this deal, Apples agenda and maneuvers and the eventual take over to bring to light its real purpose. The Process According to Brian (2012), the negotiations between AuthenTec and Apple started towards the end of 2011 with a simple approach by AuthenTec whether Apple would be interested in implementing its latest technology. Brian’s (2012), revelation extends to the fact that Apple was not the only company that Authentic approached and despite its wealthy customer base that included â€Å"Alcatel-Lucent, Cisco, Fujitsu, HBO, HP, Lenovo, LG, Motorola, Nokia, Orange, Samsung, Sky, and Texas Instruments† (Brian, 2012), Its only Apple that responded to AuthenTec’s approach and by showing interest in developing the technology. At this moment, it appeared as though the main reason Apple was interested in commercially pursuing this technology was cost. Nonetheless, the negotiations began with the focus turning to the extent to which Authentic would grant intellectual property (IP) to Apple for the latest technology (Bell, 2012). At this point, it seemed there was a lack of agreemen t on such terms and this completely shifted the nature of the agreement. This was the beginning of these negotiations in late February 2012 and Davidoff (2012 ), in his article revealed the nature of these negotiation as Apple would direct. According to Ogg (2012), the deal took a different turn with many consultations between the two parties over licencing, exclusivity, cost as well as issues over the new product and, as a result, Apple was unsatisfied with the proposed commercial agreement. On May 1, it made a counter proposal to AuthenTec’s negotiation team to acquire the company instead (Brian, 2012). In its proposal, Apple gave a price of $7.00 for each share, and valued the firm at a 115 percent of its previous day common stock ending price (Ogg, 2012). Apple knew that no other potential buyer would make such an incredible offer to AuthenTec and as such it began to intensify the negotiations. It also believed that AuthenTec technology would not benefit Apples rivals, wh o utilized different smart phone platforms (Brian, 2012). Apple’s products are known to have a narrow platform that is compatible with component parts of universal unit volumes. Nonetheless, Apple wanted this negotiations as quite as possible it appeared to value its privacy on this one, it did nothing as far as news releases on this deal were concern. AuthenTec on the other hand did not mention the acquisition, despite its penchant to news release on every issue (Davidoff, 2012 ). Ross et al. (2007) rightly express that acquisition process is the most dramatic and controversial undertaking in corporate finance (Ross et al., 2007). Apple did not want controversy surrounding the revelation of its true intention in the merger. Apple has long been known for its innovation, an asset that it has struggled to maintain since its last release. Apples innovation has put it at the top of the market with pundits valuing it at $1 trillion US dollar market cap (Wohlsen, 2013). The secrecy surrounding this deal was not only an indication of Apples reduced innovation, but protection of its reputation and market share, Apple was buying technology at a cost of $356 million. Acquisitions of this nature make headlines in the financial press, which could be scandalous (Ross et al., 2007). Subsequently, Apple proposed a transaction structure and timeline for the acquisition an indication that it needed something more than just AuthenTec, it needed its technology and it needed it fast. The Technology Integration Strategy At the pre-merger negotiation phase, the Apple negotiation team expressed their company’s desire for the process to move quickly as a result of its product plans as well as what it referred to as engineering efforts (Cheng, 2012). Apple was in a hurry and wanted the pre-merger negotiation rushed, due to its focus on timing. In addition, the company was against the auction process and threatened to rescind its proposal if AuthenTec further proposed alternative proposals (Cheng, 2012). It is important to note that since the beginning of these negotiations, at no point did AuthenTec filing indicate Apples intention to include neither hardware nor a soft ware feature. However, in Apple’s acquisition proposal to AutheTec, there was an inclusion of a $20 million IP agreement that gave it a free hand on the patents (Brian, 2012). These patents, AuthenTec, earlier in the strategic planning could have costed Apple as much as $115 million. The filing incorporated an agreement allowing Apple the right to have non-exclusive license as well as other rights that included hardware and software technology, as well as patents for the commercial use of 2D fingerprint security sensors intended for use in or with their products (Bell, 2012). Based on this, it is reasonable to assume that Apple’s intention was to acquire AuthenTec fingerprint technology that it planned on incorporating in its new eWallet also called â€Å"Passbook† (Bell, 2012). The Passbook was the long awaited application running on iOS 6 and was meant to serve as storage for tickets, loyalty cards and other packages; this device was to be a digital wallet that could also offer digital payments (Brian, 2012). It is also safe to assume that Apple’s idea was to incorporate a security feature that could verify payments and ensure that was not accessible to an authorized user in case it fell on wrong hands. On the other hand, prior to the acquisition deal, on May 8th 2012, AuthenTec had announced the introduction of the smart sensor; a security feature designed specifically NFC mobile. This was a 192 pixel by 8 pixel sensor that comprised of identifying finger prints alongside other sophisticated features such as the One Time Password (OTP) generator (Bell, 2012). In other words, this product was ideal in securing the Apple’s eWallet Passbook an innovation that came in time and they had to seize the opportunity. In addition, this sensor that was 1.3 mm could be assimilated in more than one application including a Home button. Apple was tactful in its negotiations as it had to meet specific deadlines. If it could finalize the deal fast enough, then it could have used the new technology in one of it’s yet to be released products. In fact there were secret reports of Apple launching it next generation iPhone later in September of 2012 and thereafter, the a 7.85-inch iPad. It makes sense to assume that this would give Apple a little under 90 days to embed this new technology in its products. Moreover, it is important to note that this could also have been relevant in the Apple’s computer line-up since there had been numerous fingerprint sensors given by AuthenTec for desktop computers for a long time (Neurotechnology, 2013). There was a possibility of this technology could make its debut in Apple’s Mac lineup. Nonetheless, the question was, it was this technology was developed for Apple, why was there the rush to settle the dealAnd is this not an indication that the technology was to be u sed before the end of the year 2012Well, if Apple needed a product, then it could have span out such technology from the iOS6 operating system which was to hit the market later on the same year. It is only possible and true that Apple had a perfect timing for the technology for use in one of its products due for release sooner. After consultations with its board alongside its investors, and following exploration of its ability to pursue acquisition deals with other electronic firms, AuthenTec put an offer of $9 for every share to Apple for continuity of the negotiations. However, Apple made a final bid of no more than $8.00 for each share, and consequently, in less than a month the two parties resolved to finalize the deal (Bell, 2012). This was not to be the end of this transaction as once again AuthenTec put a halt to it claiming that it had undertaken its due diligence and pending this resolution, it was not willing to proceed with the deal (Brian, 2012). This was not because it wanted to drop the deal, but rather the company had shifted its focus to licensure issue in regard to the new technology. Starting June 1 to 3rd of July 2012, the two firms embarked on developing the technology as needed by Apple and went on to thin out their differences in regard to acceptable commercial agreement terms (Cheng, 2012). This was revelation of how aggressively Apple was pursuing the technology for integration in its products. This was further strengthened by AuthenTec’s announcement that it had successfully completed and resolved its due diligence issues and that it had brought back the deal on the negotiation table (Ogg, 2012). July of 2012 saw the two companies iron out the issues that allowed AuthenTec to make the technology available to Apple while at the same time maintain an open bid for other interested companies (Brian, 2012). However, Apple insisted that development of the technology was to be on schedule regardless of the status of the deal and on the 19th of July both companies agreed on the contentious issues on the IP agreement and made an agreement (Brian, 2012). The Deal From the beginning, Apple had the intention of licensing the new technology from AuthenTec and utilize it in one of its yet to be released products. It was said that Apple was to officially release a new iPhone and talk of the 7.85-inch iPad were gaining pace (Slivka, 2012). As Ross et al.(2007) explain, one of the main disadvantages of a merger especially of such a nature, must be approved by AuthenTec stockholders, this has to be a two thirds approval. Having mentioned that, the fact that AuthenTec had submitted its proxy papers, its shareholder were yet to vote on the deal in question. This was certain to proceed regardless and in case AuthenTec wanted out for a bigger offer, it probably needed to have paid Apple $ 10 million. It did not matter whether the deal was complete or not, the new finger print technology was sure to end up in one of Apple’s products. In addition, in all the negotiations, Apple maintained that the development of the new technology was to continue n o matter whether it agreed with AuthenTec or not or even acquired the company. There were many negotiations between these companies, one that also involved other parties including Alston Bird and Piper Jaffray, and by the 26th of the same month, a deal was brokered and Apple agreed on $8 on each share alongside 20 million for the technology as well as $115 million for licensure of the technology (Brian, 2012). The following day on the 27th of July, announced a deal after it filed an 8-K with the Securities and Exchange Commission (SEC). Apple is did not waste time to incorporate the finger print sensor feature in its devices (Apple Inc, 2013). AuthenTec has been known to specialize in development of security hardware and software and it is possible that these could have found their way into the Apple’s devices including the desktop computers. However, these details are not easily available, but Apple’s aggressiveness in using such technology is a point of speculation that this is possible. Conclusion Apple Inc acquired AuthenTec in July of 2012 after intense negotiations. The deal that was worth $ 356 million dollars is said to be the biggest Apple has ever made. This paper has delved into the issue surrounding this merger. The paper asserts that the motivation behind this merger was the AuthenTec’s finger print sensor that Apple aggressively wanted to acquire. The sensor had a chip that could be incorporated in computers and more so a perfect fit for Apples products that run on a narrow platform that is compatible with component parts of universal unit volumes. However, the company wanted this negotiations as quiete as possible it appeared to value its privacy on this one, the tech firm did nothing as far as press releases on the deal. In addition, the new technology was useful to Apple as it could be relevant in the Apple’s computer line-up since there had been numerous fingerprint sensors provided by AuthenTec for PC computers for a long time. It makes sense to a ssume that Apple had the intention of licensing the finger print sensor from AuthenTec and utilize it in one of it’s products most likely the the 7.85-inch iPad, a talk that has gained pace. A close examination of the merger between these two companies reveal the fact that it was fuelled by Apples desire to utilize the new technology. Bibliography Apple Inc, 2013. iPhone 5s: About Touch ID security. [Online] Apple Inc Available at: http://support.apple.com/kb/ht5949 [Accessed 17 December 2013]. Bell, K., 2012. Apple’s Purchase Of AuthenTec Could Mean Future iOS Devices Will Unlock With Your Fingerprint. [Online] Available at: http://www.cultofmac.com/184996/ [Accessed 17 December 2013]. Brian, M., 2012. Why Apple really bought AuthenTec: It wanted â€Å"new technology† for upcoming products, and quickly. [Online] Available at: http://thenextweb.com/apple/2012/08/16/the-real-reason-apple-acquired-authentec-because-needed-new-technology-quickly-products/#!p3ghF [Accessed 17 December 2013]. Cheng, J., 2012. Apple wanted AuthenTec’s â€Å"new technology† ASAP for future products. [Online] Available at: http://arstechnica.com/apple/2012/08/apple-wanted-authentecs-new-technology-asap-for-future-products/ [Accessed 17 December 2013]. Davidoff, S.M., 2012. Apple’s Quiet Deal for AuthenTec. The New York Times , 1 August. Jovanovic, Boyan Rousseau, P., 2002. The Q-theory of mergers. American Economic Review , 92, pp.198-204. Neurotechnology, 2013. AuthenTec AF-S2 (FingerLoc). [Online] Available at: http://www.neurotechnology.com/fingerprint-scanner-authentec-fingerloc-af-s2.html [Accessed 17 December 2013]. Ogg, E., 2012. Pre-merger, Apple, AuthenTec were working on new tech together. [Online] Gigaom Available at: http://gigaom.com/2012/08/16/pre-merger-apple-authentec-were-working-on-new-tech-together/ [Accessed 17 December 2013]. Purcher, J., 2012. Apple Invents Biometric Features for e-Commerce Security. [Online] Available at: http://www.patentlyapple.com/patently-apple/2012/10/apple-invents-biometric-features-for-e-commerce-security.html [Accessed 16 December 2013]. Purcher, J., 2013. Apple’s Acquired Fingerprint Sensor Patent from AuthenTec Comes to Light. [Online] Available at: http://www.patentlyapple.com/patently-apple/2013/07/apples-acquired-fingerprint-sensor-patent-from-authentec-comes-to-light.html [Accessed 16 December 2013]. Ross, S., Westerfield, R., Jordan, B. Roberts, G., 2007. Fundamentals of Corporate Finance. McGraw-Hill Ryerson Higher Education. Slivka, E., 2012. Why Apple’s 7.85-Inch ‘iPad Mini’ Isn’t a 7-Inch Tablet. [Online] Available at: http://www.macrumors.com/2012/07/10/why-apples-7-85-inch-ipad-mini-isnt-a-7-inch-tablet/ [Accessed 17 December 2013]. Wohlsen, M., 2013. Apple’s Reputation for Innovation Is Now Its Greatest Liability. [Online] Available at: http://www.wired.com/business/2013/09/apple-annoucements/ [Accessed 17 December 2013]. How to cite The Apple, Authentec Merger, Essay examples