Feeds

Jobs biopic to focus on first Mac, NeXT, iPod

Aaron Sorkin says plot will show Saint Steve backstage before three big launches

Top three mobile application threats

Writer Aaron Sorkin has revealed his planned structure for a Steve Jobs biopic, which he currently imagines will involve three acts, each depicting the serial entrepreneur backstage before an epochal launch.

Speaking at an event hosted by The Daily Beast, Sorkin said he’s attracted to a Jobs project because “there’s no point writing about people who aren’t flawed.”

Jobs, Sorkin, was “atypical, and a genius, and extremely difficult” and so fits the bill nicely. The writer said he is “meeting with all the people in Steve’s life” in preparation to write the script, and found “he made all of them cry, but made all of them better and what they are doing.”

The author than said, after pausing to mutter that he hopes the studio doesn’t kill him, that “this entire movie is going to be three scenes” and that each will play out in real time. “A half hour for the audience is the same as a half hour for the character on the screen. And each of these three scenes is going to take place before a product launch.”

The three scenes will take place at the launch of the first Mac, Jobs’ in-exile NeXT computer, and the first iPod.

Sorkin aims to end the movie with the text of Apple’s “Here's to the crazy ones” TV commercial.

“If I can earn that ending then I will have written the movie I want to write,” Sorkin said. ®

SANS - Survey on application security programs

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.