Feeds

Ancient video of Steve Jobs launching the first Apple Mac found

Long-lost footage resurfaces after 30 years

3 Big data security analytics techniques

Long-lost footage of Steve Jobs launching the first Apple Macintosh in 1984 has been dug out of storage and shown in full for the first time in 30 years.

The video shows the Apple godhead addressing the Boston Computer Club just days after his famous speech to shareholders at Cupertino.

Time magazine journalist Harry McCracken tracked down Glenn Koenig, a Boston-based video-maker who had stored the footage on a defunct format called U-matic. Koenig knew that Dan Bricklin, co-inventor of VisiCalc, the first spreadsheet programme for the Apple II, and Jonathan Rotenberg, president of the computer club, had also shot their own films.

The Computer History Museum collected together the footage, which has now been premiered on the Time website.

Rotenberg said the video shows a more "intimate" product launch than the one given to shareholders at Cupertino, which was so busy that some people turned away.

It’s about the users, which is what you don’t get at the shareholder meeting," he said.

“This one was Steve really selling,” added Bricklin. “This is the Steve that we’ve now known for many years announcing other products. This is that Steve, giving the talk he’s given so many times that he knows it cold. It really makes a difference.”

“You get to see Steve when Steve became the Steve Jobs. Seeing him smiling up there is the way a lot of us would like to remember him.”

The dimly-lit video has an eerie quality about it, with Jobs' face falling into shadow at times.

Essentially, it's based on the same script as his famous Cupertino speech, although Jobs doesn't bother reciting Bob Dylan lyrics at the beginning, perhaps reckoning they'd be lost on the audience. He instead launches in with a broadside against IBM, which he accused of a brazen lack of innovation.

There's also a Q&A at the end, which is gatecrashed by Steve 'Woz' Wozniak, who flew in to take questions. In this Q&A, Jobs was asked if he was going to just abandon all the people who had bought the Apple II. His answer is a telling prediction of Apple's future strategy of endless updates and the brutal culling of old tech – like the 30 pin iPhone plug, for instance.

"The big question is actually when we are going to sell of more of these?" he replied, patting the new Macintosh. ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.