Feeds

Clooney fingered for Steve Jobs role in Hollywood biopic

Former ER partners battle for sacred turtleneck

Seven Steps to Software Security

Hollywood heartthrob George Clooney has been named as a lead contender for the role of Steve Jobs in the inevitable cash-in movie, planned to start filming next year.

Although Jobs is barely cool inside his tastefully-designed final resting place, the race is on to find someone to sum up the hippy-turned-ruthless-tycoon. Clooney, who is currently recovering from back surgery from injuries sustained while filming Syriana, has been named by unnamed industry insiders as being in line for the role, as has former fellow ER costar Noah Wyle.

Wyle does have the advantage of having played Steve Jobs before, in the 1999 cult classic “Pirates of Silicon Valley”. According to an interview with Wyle in Fortune magazine, Jobs was less than impressed with the film as a whole, but was sufficiently inspired to invite Wyle to that year’s Macworld Expo and pretend to be him during the opening keynote.

Jobs then took Wyle out to dinner. “He took his napkin and started sketching out the schematics and he passed the napkin around the table,” he recounts. “The check soon came and we started to get up the leave – and the napkin just sat there on the table. I thought to myself, ‘I got to take that napkin’ and my hand was on it, but Steve called from the door and asked, ‘Noah, you want to share a cab with me?’ So I put the napkin down. I could have had an Edison original.”

Clooney may be a bit long in the tooth for the role – though he was born six years after Jobs – and indeed may not want it. Films such as The Social Network may do okay in the box office, but the days when Clooney would slip into a Batman suit for money are long gone. And although Wyle hasn’t exactly been a notable success since ER, he’s certainly closer in form to Jobs. ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.