Feeds

Apple design bloke Ive finally honoured properly - with Blue Peter badge

Yeah not you, Scott Forstall

High performance access to file storage

The Apple products he designs have high-cost premium components, but Jony Ive fondly remembers making a paintbrush holder out of an old detergent bottle after watching a Blue Peter episode during his childhood in Essex.

Sir Jony told Blue Peter presenter Barney Harwood in a show to be aired this Saturday that he "remembered vividly" making a "fantastic paintbrush holder" by slicing off the top of the bottle, inverting it and sticking it inside.

The young Ive was entranced by the way that the inverted lid held the brushes in place and ALSO stopped water coming out if you knocked it over.

"I remember that really clearly" he says on the show.

"I like the way that there were products that you thought were no longer useful but then reusing them. It was fantastic," Ive said of the Blue Peter DIY sessions that famously include sticking together old boxes and toilet rolls.

Ive also approved of a British tot's design pitch for a school bag/pencil case/lunchbox all in one: little Sarah demoed her product idea for a bag that came with a GPS enabled wrist navigator that could trace the location of the bag at any time.

Ive praised the bag's water bottle and quick release pencil case straps but steered clear of referring to the GPS tracking watch [too close to Apple's own watch plans perhaps…? Watch this space.] Only about 1,000 gold Blue Peter badges have been presented; those lucky few include the Queen and Harry Potter millionaire JK Rowling, and fellow Chingford dweller David Beckham who went to the same primary school as Ive.

Sir Jony seemed genuinely pleased to get a gold Blue Peter badge - the highest accolade in the Blue Peter badge rankings. He presented Blue Peter with a CNC-milled aluminium plaque of the Blue Peter crest.

Increasingly the creative force behind Apple, after the ouster of software VP Scott Forstall, Ive has spread his power base into software and UI design as well as hardware. Sadly it seems as though the Blue Peter episode will not delve into Apple politics or the extent of his growing influence.

The full gadget-themed show will be shown Saturday. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
Jeff Bezos reveals Amazon's brutal scale in annual letter
Bit-flipping retail mogul seems hybrid of Ford and Rockefeller
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.