Feeds

After six months, Steve Jobs speaks

One million reasons why 'The iPhone is winning'

Build a business case: developing custom apps

Apple CEO Steve Jobs took his first small step towards retaking the reins in Cupertino on Monday morning, issuing a short statement in a press release announcing that sales of the company's new iPhone 3GS* (Reg review link) have topped one million since its release last Friday.

Jobs has been conspicuously absent from any Apple statements and events since he announced back in January that he would take a medical leave due to "health-related issues" that were "more complex than I originally thought."

At that time, Jobs said that his medical leave of absence would last "until the end of June" - a story that Cupertino has stuck to, presumably attempting to allay concern among not only stockholders and Apple aficionados, but also the US Securities and Exchange Commission.

And today, a mere weekend after it was revealed that he had received a liver transplant in April, Jobs broke his silence in a short statement in an Apple press release trumpeting the fact that the company had sold over "one million iPhone 3GS models through Sunday, June 21."

The contribution by Apple's co-founder and CEO was classic Jobsian competitiveness and confidence:

"Customers are voting and the iPhone is winning," said Steve Jobs, Apple’s CEO. "With over 50,000 applications available from Apple’s revolutionary App Store, iPhone momentum is stronger than ever."

The end of June is drawing nigh - and, it appears, so is Steve Jobs's reemergence as Apple's prime spokesperson and reality-distortion-field wielder. ®

Bootnote

* Copy-editing types will notice that the iPhone 3GS has lost a space in its name. In marketing materials on Apple's website, it has been referred to as the iPhone 3G S, but now it's the 3GS. We're only speculating, of course, but this attention to minute detail has all the hallmarks of Jobsian influence.

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
Ancient pager tech SMS: It works, it's fab, but wow, get a load of that incoming SPAM
Networks' main issue: they don't know how it works, says expert
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.