Feeds

Apple emasculates the iPhone

Hackers asked to restore iEunuch's dignity

Intelligent flash storage arrays

Comment Within hours of last week's iPhone debut, hackers were dissecting it. Their goal: unlock capabilities Apple preferred customers not have. As a result, it's now possible to activate the device without entering into a two-year contract, and it's only a matter of time until you can run third-party apps.

Alas, one of the iPhone's biggest shortcomings seems to have gone completely unnoticed by hackers, which means we're most likely stuck with it. That's a shame.

We're talking about the inability to manually manage music on an iPhone by connecting it to a computer, highlighting a band, album or song within iTunes and moving it to the iPhone icon. Apple, the company that practically invented the drag-and-drop, has consciously eliminated the feature from the iPhone. This decision effectively neuters the device because it removes capabilities that played a huge role in making the iPod the gee-whiz device that set the standard for portable music players.

If you want to load the new albums by Wilco or the White Stripes (both highly recommended, by the way), you'll have to create a playlist in iTunes first and then sync it with your iPhone. If you later decide you want to remove one of those albums from the device, you'll have to remove it from the iTunes playlist and sync again.

This is precisely the kind of tortured user interface that the overly smug Mac Guy lampoons in Apple's ubiquitous advertisements. It's awkward, creates extra steps, and makes it next to impossible to use more than one computer to load music onto the iPhone, since you need identical playlists on all the machines.

Even worse, this change means it's impossible to plug an iPhone into a computer and play its contents through iTunes. That's a pity. One of the unsung glories of an iPod is its ability to function as a highly portable jukebox at parties, nightclubs or other gatherings. Just connect it to your favorite PC or Mac, fire up iTunes (or better yet, Winamp if you're on a PC) and suddenly you have hundreds of new tunes to spice up that tired party shuffle that's been droning on for the past hour.

This feature is one of the iPod's few social skills, and is an important counterweight for a device that is otherwise remarkable for wrapping its users in their own solitary bubble.

The iPod pictured below has manual music management enabled. When it is connected to a computer, its songs appear in iTunes in black, meaning tunes can be clicked on and played.

Screenshot of iTunes with library showing contents of iPod music as black entries that can be played with the click of a mouse.
Locked and Loaded: The iPod makes it easy to load and play music on your computer

Compare that with the iPhone, pictured below. There is no way to enable manual management. As a result, entries in the music library are gray, designating there is no way for iTunes to play them.

Screenshot of iTunes with library showing contents of iPhone music as gray
Locked down: Thanks, Apple

The iPod's ability to play music through a computer allows users to come together and play new tunes for friends in a way that is perfectly legal and highly contagious. Being able to play iPod contents through iTunes guarantees that transitions from one contributor to another are seamless, and it provides all the eye candy and other benefits that come from being connected to a fully functioning computer.

The elimination of manual management is all the more striking given that the iPhone has a recessed headphone jack. That means even those who opt to plug their device into a PA using the mini port (at best, an inferior method for sharing music at parties) won't be able to do so without a special adapter.

So far, Apple's propaganda chiefs, always wont to drink their own Kool-Aid, seem oblivious to this shortcoming, going so far as to proclaim the iPhone "the best iPod we've ever created" in an online tutorial. Apple designers are considering adding the functionality into the iPhone, according to rumors on online discussion boards, but don't hold your breath.

That means the tinkering of a band of determined hackers may be our best hope in turning around this sad state of affairs. Thanks a lot DRM-warrior, Steve. ®

Security for virtualized datacentres

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
Consumers agree to give up first-born child for free Wi-Fi – survey
This Herod network's ace – but crap reception in bullrushes
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
New EU digi-commish struggles with concepts of net neutrality
Oettinger all about the infrastructure – but not big on substance
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.