Feeds

Google exempts self from Apple rules

Some developers are more equal than others

Top 5 reasons to deploy VMware with Tegile

Google has admitted using forbidden APIs to get its iPhone application working, but despite that admission the application remains available on iTunes in apparent breach of the store rules.

Apple provides documentation on the APIs (Application Programming Interfaces) that developers are allowed to use, and restricts access to others for reasons they are under no obligation to reveal. The specific API used by Google Mobile Search gives access to the proximity sensor that the app uses to detect when the handset is lifted against the face - and thus when it should start recognising speech.

Illegitimate use of the API was suspected by other developers, and was confirmed to C-Net yesterday.

Officially such applications shouldn't be allowed in the iTunes store, but it seems the rules don't apply to everyone as Google Mobile Search remains available.

Apple has already been pretty arbitrary about how it applies the rules on listing applications - such as blocking MailWrangler on the grounds that it would confuse users, then allowing BdEmailer, apparently because the latter application is a write-only email app and therefore won't confuse anyone. Other applications have been removed on even more indiscernible grounds, such as featuring a picture of a knife.

But while those rules have been arbitrary and largely unknown, they have so far been applied equally to all - even Google was forced to wait while its app went through the approval process. Now, however, it seems that if you're Google then not all the rules apply to you. ®

Intelligent flash storage arrays

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.