Feeds

Think twice about iPhone development

Inside the mobile matrix, part 3

New hybrid storage solutions

All signs, then, indicate not just the popularity of the iPhone, but also keenness among developers to experiment with the device and a hunger among end users for iPhone applications.

iPhone hang ups

It's not all good news, though. The huge amount of uncertainty that surrounds the iPhone and Apple's attempt to rigidly control the environment are facts that should cause any developer to think twice before committing.

From mighty SAP to the tiniest software vendor, all have had their wings clipped running native applications on the iPhone or been forced to needlessly re-work applications to make them run in the Safari browser.

Staff from other ISVs - REAL Software and Opera - have spoken about support for the iPhone (REAL Basic and the Opera browser for the iPhone, respectively), but - officially at least - the companies are making no public commitments to the device.

For those who did the unthinkable and pressed ahead regardless, Apple rather helpfully released a firmware update that appeared to have been engineered to specifically render hacked phones useless turning them into iBricks.

The struggle continues. Developers appear to have maintained the upper hand as they have consistently been capable of improving upon their original efforts thereby restoring functionality of bricked phones. They have also done so regularly and with such increasing rapidity that they are very nearly current with the releases of phone firmware upgrades.

Betting one's time, money and business on outwitting Apple won't be to everyone's tastes, however.

If you can get past that, arguably the biggest unknown is the planned iPhone SDK itself and how much power and flexibility it provides. If it turns out to be too structured (hampering creativity) or the terms too restrictive (hampering financial gain) it is highly likely developers that have already met with success doing it their own way will continue to operate without Apple.

This, of course, sets the scene for more friction with Apple and the potential emergence of an unofficial iPhone development community, which is unsupported by Apple and that constantly has its firmware reset.

Additionally, if the SDK is restrictive, then it makes it much more likely the people currently using the applications these developers have created will stand by the programmers that have done right by them so far.

Secure remote control for conventional and virtual desktops

Next page: Dots, connected

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.