Wozniak Talks Technology, Apple History And More At ASIS 2013

Apple co-founder Steve Wozniak talked about how technology changed his life and is affecting the world today in a keynote address at ASIS 2013 in Chicago on Wednesday.

"Technology is what helps us become more productive," he said. "Technology is what helps us become more productive and it's making our lives better."

And the role of technology has also changed security.

"Security used to be very physical. But that's no longer the case. It's not physical tools that people are using to break security," Wozniak said. "We need a new mindset."

Both sides of the IT security puzzle now feature the smartest people instead of the strongest or most physically adept.

He then explained some of his early life and how he spent his high school and college days playing variuospranks, and more importantly learning how systems work. After getting into computers in high school, Wozniak didn't have money to build computers, but designed them on paper.

"I wouldn't be here if I wasn't clever on how I would use technology," he said.

One especially interesting anecdote for security professionals came when Wozniak relayed the story on how he snuck into a Stanford computer center on Sundays to use the equipment and read from the library.

"When you have the brightest people in the world, they usually leave at least one door unlocked," he said.

After getting hired to design to the iPhone 5s of its day – the HP Scientific Calculator – Wozniak met Steve Jobs and the pair quickly became best friends.

And as part of the Homebrew Computer Club, Wozniak realized how the computer could play such a large part of society.

"The social revolution was based on the technology revolution, and more specifically a good and inexpensive computer," he said.

Both Wozniak and Jobs put in $300 to start Apple Computer and began to sell the famous Apple I. After a bit, the pair had a bank account with more than $10,000. Things only got better from there.

After helping to design the famous Breakout game for Atari, the duo helped create the Apple II and realized the power of software as well.

"The first spreadsheet program showed that personal computers could do more than a mainframe," Wozniak said.

Finally, the now philanthropist and educator ended his talk wondering how we can keep information private, but yet secure.

About the Author

Brent Dirks is senior editor for Security Today and Campus Security Today magazines.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3