Skip to main content

Steve Jobs biographer: Jobs refused surgery



Steve Jobs biographer: Jobs refused surgery



Steve Jobs bio book cover(Credit: Courtesy of Albert Watson)
"60 Minutes" has posted a preview teaser from its interview with Walter Isaacson, the biographer whose book about the life of the late Apple co-founder Steve Jobs hits store shelves next week. In the interview, Isaacson says that Jobs initially refused to have surgery until urged by friends and family.
In the clip, which is embedded below, Steve Kroft of "60 Minutes" gets Isaacson to discuss Jobs' handling of a tumor, which Isaacson says Jobs attempted to treat with alternative medicine versus having it surgically removed.
"You know, I've asked him about that," Isaacson told Kroft. "He said 'I didn't want my body to be opened, I didn't want to be violated in that way,' he's regretful about it," Isaacson remembers.
Isaacson then told Kroft that Jobs' wife tried to urge Jobs to get the surgery, followed shortly thereafter by "everybody" else, which Jobs then did nine months after the diagnosis.
"Why would such a smart man do such a stupid thing?" Kroft then asks Isaacson, to which he says "I think that [Jobs] kind of felt that if you ignore something, if you don't want something to exist, you can have magical thinking, it had worked for him in the past. He regretted it."
The interview is the first to feature Isaacson talking about his time with Jobs. The much-anticipated biography includes two years' worth of interviews with Jobs, family members, and colleagues. Its release was pushed up to October 24 following the death of Jobs earlier this month.
Other tidbits from the "60 Minutes" interview, according to CBS, include:
• Jobs noting that he had met his biological father ahead of knowing that the two were related.
• Jobs pledging to not let money, including Apple's successful stock offering, change him.
• Jobs putting the odds at 50-50 on whether there is a God.


The interview airs this Sunday at 7 p.m. ET/PT, the night before the book goes on sale.

Disclosure: Simon & Schuster is owned by CBS. CNET News is published by CBS Interactive, a unit of CBS.

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...