Feeds

Steve Jobs spotted not hating Eric Schmidt

Meets ex for coffee

The essential guide to IT transformation

The on-again, off-again relationship of Steve Jobs and Eric Schmidt may be back on again.

According to a Friday afternoon post on Gizmodo, the Apple and Google CEOs were spotted at a Palo Alto, California coffee shop - out front on the sidewalk, mind you - chatting over coffee. The site's tipster even snapped photos, it would appear:

Steve Jobs and Eric Schmidt chatting over coffee in Palo Alto

Gizmodo's tipster caught this convivial scene of talkative Steve and attentive Eric.

According to the tipster, Jobs did most of the talking - with one snippet of overhead conversation being the Cupertinian saying: "They're going to see it all eventually, so who cares how they get it?"

We'll leave it to your imagination what the unknown antecedent to "they" might be. Users? The Federal Communications Commission? Steve and Eric's wives?

And what is "it"? Some secret Apple/Google pact? Inappropriate content banned from the iTunes App Store? Sub-rosa political communications with Sarah Palin and/or the US Tea Party movement?

Whatever that cryptic comment might mean, the entire tête-à-tête seems bizarre in the extreme. Two love-'em-or-hate-'em billionaire tech gods, in broad daylight, sipping what one can only presume to be caffè lattes at a sidewalk table outside a coffee shop - which, by the way, Gizmodo identified as being owned by former Google chef Charlie Ayers.

Why was the notoriously private Jobs baring his all-too-familiar face for the world to see at all, let alone in the company of a man he allegedly can't stand? The oh-so-recognizable Jobs would attract attention if he were wrapped in a burnoose in a nargileh parlor in northern Yemen. And according to CNBC's Silicon Valley bureau chief Jim Goldman, multiple sources have told him that "Steve Jobs simply hates Eric Schmidt".

We can only assume this sighting was no accident. Jobs and Schmidt wanted to be seen together and to have reports of their parley leak out to the public at large.

And now it has. The real question isn't who are "they" and what is "it", but instead: Why do Steve and Eric want us to know they're in conversation? ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Judge nixes HP deal for director amnesty after $8.8bn Autonomy snafu
Lawyers will have to earn their keep the hard way, says court
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.