Feeds

Steve Jobs' 'private Apple spaceship' seeks public love

Can Cupertino locals swallow biz baron's glass doughnut?

High performance access to file storage

Apple's head bean counter has asked his company's neighbours to back plans for a new 2.8 million sq ft glass doughnut office in Cupertino, California.

Chief financial officer Peter Oppenheimer sent out leaflets to locals last week asking them to support the fruity tech titan's planning application for a new gaff - called Campus 2 - a futuristic erection designed by British architect Norman Foster with the personal input of Apple co-founder Steve Jobs.

"It's a little like a spaceship landed," Jobs reportedly told Cupertino City Council officials late last June despite being gravely ill at the time.

Oppenheimer urges citizens to lobby the council on Apple's behalf, or to let the Foxconn-rebrander use their names in its bid.

Proposed new HQ for Apple, credit Cupertino Council

The Glass Doughnut's apricot woods and restaurants will not be available to locals

Apple's neighbours will benefit from improved sidewalks and bike lanes if the 175-acre development goes ahead, the CFO argued, adding that 120 acres of the site - currently old HP offices - would be converted into parkland and woods. A change that could only be good for the area, he said:

What's currently a sea of asphalt will be transformed into nearly 120 acres of green space

Still, it will be green space that the locals won't be allowed into.

Oppenheimer's pitch included a description of the lush new facilities that would be created at Campus 2, according to Reuters. He listed wooded pathways, restaurants, and fitness centres, though clarified that these would not be available to non-Applers. The building will not replace Apple's sprawling headquarters at 1 Infinite Loop in Cupertino.

Critics of Campus 2 say that the 12,000 to 13,000 employees who will work at the office will cause road jams and put pressure on local services. Cupertino Council will assess the planning application on the environmental impact it will have - which will include the traffic, noise and air quality issues arising from the development. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.