Feeds

Baby Shakergate: Apple officially sorry

'Deeply offensive' content banned, all world's woes vanish

Internet Security Threat Report 2014

In a statement Apple has apologised for allowing Baby Shaker into the iTunes store, on the basis that "deeply offensive" content shouldn't be allowed.

The short statement, sent to every news outlet except El Reg, reads: "This application was deeply offensive and should not have been approved for distribution on the App Store." So now we know that such content will hereafter not be allowed on iTunes.

We've already pointed out that levels of offence are largely subjective, but Apple has now appointed itself arbitrator of what is just in poor taste and what is actually "deeply offensive". We look forward to the Internet Watch Foundation referring to Cupertino when faced with difficult decisions about such things.

Apple has pulled applications for being too violent, featuring drawings of bouncing breasts, interfering with network operators' business models, and now for being "deeply offensive" - all on the basis of a hidden rulebook that, it seems, is based on the amount of negative publicity each decision generates. ®

Beginner's guide to SSL certificates

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.