Feeds

Steve Jobs chops student hack down to size

'Leave us alone' - sent from my iPhone

Secure remote control for conventional and virtual desktops

Steve Jobs may not be a ninja, but when an over-enthusiastic journalism student had the temerity to email him to complain about Apple's less than helpful press office last week, he quickly chopped her down to size.

The Guardian splendidly reports that Chelsea Isaacs, a journalism student at Long Island University was tasked with writing a piece about an iPad program at the campus.

Being young and eager and conscientious she thought she would check in with the firm's press department. She got no reply to her message, nor to the five subsequent messages she sent - even though she said she was on a deadline.

At a loss for what to do she found Jobs' email on the web and asked if he could help out, as the story was "vital to my academic grade as a journalist".

As well as referring to the hypocrisy of "ignoring student needs when they represent a company that does so much for our schools, the Media Relations reps are apparently, also failing to responsibly handle the inquiries of professional journalists on deadlines." This she suggested could cost professional journalists their jobs. Well, not at the Reg. Or it transpires, The Guardian.

Within an hour, Chelsea had her answer from the man himself: "Our goals do not include helping you get a good grade. Sorry."

Oh, that was sent from "my iPhone".

Chelsea replied once again mentioning her grade, and foolishly, castigating Jobs over a "lack of common courtesy". She clearly didn't realise that a sorry from Apple is about as good as it gets.

Jobs - or his phone ghost - replied that he was only interested in helping people who have a problem.

To which Chelsea replied that she did have a problem, and could he get the PRs to reply. Cos she's on a deadline.

Jobs then administered the coup de grace:

"Please leave us alone."

The Guardian adds that it too has had no reply from Apple when raising Chelsea's case, adding that her experience is hardly unique. Too true - we're still waiting for the definitive answer on whether Jobs is indeed a ninja.

Still, should Ms Isaacs be found incapacitated with her college project and a copy of The Guardian pinned to her chest with a throwing death star, we feel we'll at least have an indirect answer to our most recent questions. ®

Internet Security Threat Report 2014

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.