Feeds

Apple emasculates the iPhone

Hackers asked to restore iEunuch's dignity

Build a business case: developing custom apps

Comment Within hours of last week's iPhone debut, hackers were dissecting it. Their goal: unlock capabilities Apple preferred customers not have. As a result, it's now possible to activate the device without entering into a two-year contract, and it's only a matter of time until you can run third-party apps.

Alas, one of the iPhone's biggest shortcomings seems to have gone completely unnoticed by hackers, which means we're most likely stuck with it. That's a shame.

We're talking about the inability to manually manage music on an iPhone by connecting it to a computer, highlighting a band, album or song within iTunes and moving it to the iPhone icon. Apple, the company that practically invented the drag-and-drop, has consciously eliminated the feature from the iPhone. This decision effectively neuters the device because it removes capabilities that played a huge role in making the iPod the gee-whiz device that set the standard for portable music players.

If you want to load the new albums by Wilco or the White Stripes (both highly recommended, by the way), you'll have to create a playlist in iTunes first and then sync it with your iPhone. If you later decide you want to remove one of those albums from the device, you'll have to remove it from the iTunes playlist and sync again.

This is precisely the kind of tortured user interface that the overly smug Mac Guy lampoons in Apple's ubiquitous advertisements. It's awkward, creates extra steps, and makes it next to impossible to use more than one computer to load music onto the iPhone, since you need identical playlists on all the machines.

Even worse, this change means it's impossible to plug an iPhone into a computer and play its contents through iTunes. That's a pity. One of the unsung glories of an iPod is its ability to function as a highly portable jukebox at parties, nightclubs or other gatherings. Just connect it to your favorite PC or Mac, fire up iTunes (or better yet, Winamp if you're on a PC) and suddenly you have hundreds of new tunes to spice up that tired party shuffle that's been droning on for the past hour.

This feature is one of the iPod's few social skills, and is an important counterweight for a device that is otherwise remarkable for wrapping its users in their own solitary bubble.

The iPod pictured below has manual music management enabled. When it is connected to a computer, its songs appear in iTunes in black, meaning tunes can be clicked on and played.

Screenshot of iTunes with library showing contents of iPod music as black entries that can be played with the click of a mouse.
Locked and Loaded: The iPod makes it easy to load and play music on your computer

Compare that with the iPhone, pictured below. There is no way to enable manual management. As a result, entries in the music library are gray, designating there is no way for iTunes to play them.

Screenshot of iTunes with library showing contents of iPhone music as gray
Locked down: Thanks, Apple

The iPod's ability to play music through a computer allows users to come together and play new tunes for friends in a way that is perfectly legal and highly contagious. Being able to play iPod contents through iTunes guarantees that transitions from one contributor to another are seamless, and it provides all the eye candy and other benefits that come from being connected to a fully functioning computer.

The elimination of manual management is all the more striking given that the iPhone has a recessed headphone jack. That means even those who opt to plug their device into a PA using the mini port (at best, an inferior method for sharing music at parties) won't be able to do so without a special adapter.

So far, Apple's propaganda chiefs, always wont to drink their own Kool-Aid, seem oblivious to this shortcoming, going so far as to proclaim the iPhone "the best iPod we've ever created" in an online tutorial. Apple designers are considering adding the functionality into the iPhone, according to rumors on online discussion boards, but don't hold your breath.

That means the tinkering of a band of determined hackers may be our best hope in turning around this sad state of affairs. Thanks a lot DRM-warrior, Steve. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
PwC says US biz lagging in Internet of Things
Grass is greener in Asia, say the sensors
Ofcom sees RISE OF THE MACHINE-to-machine cell comms
Study spots 9% growth in IoT m2m mobile data connections
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.