Feeds

Apple ends Palm Pre's iTunes charade

'Falsely pretending' devices disabled

Beginner's guide to SSL certificates

Updated Apple released an update to its iTunes music-management app on Wednesday that prevents Palm's Pre smartphone from appearing to be an iPod when connected to a Mac or PC.

An Apple spokesman told The Reg that "iTunes 8.2.1 is a free software update that provides a number of important bug fixes. It also disables devices falsely pretending to be iPods, including the Palm Pre."

He added that "As we've said before, newer versions of iTunes software may no longer provide syncing functionality with unsupported digital media players."

Palm did not immediately respond to requests for comment.

"Falsely pretending" may sound a bit harsh, but it's accurate. When you plug a Pre into your Mac or PC running a version of iTunes earlier than 8.2.1, it communicates with iTunes exactly as if it were an iPod - even to the point of an iPod graphic appearing in the iTunes Summary tab.

Without access through iTunes, loading music onto the Pre is still a simple matter - you merely connect your Pre to your computer as a USB drive, drag your tunes onto it, and the Pre's Music app finds them and displays them in its listing, ready for playback.

Nevertheless, disabling iTunes support does strike a blow against the Pre's ease-of-use, especially for unsophisticated users for whom connecting a USB drive is akin to rocket science.

It was never clear whether the Pre's access to iTunes was worked out in an agreement between Palm and Apple. Now it appears that Palm was acting on its own.

And Apple has chosen not to reward their resourcefulness. ®

Update

A Palm spokeswoman has provided us with the following comment: "Palm's media sync works with iTunes 8.2. If Apple chooses to disable media sync in iTunes, it will be a direct blow to users who will be deprived of a seamless synchronization experience. However, people will have options. They can stay with the iTunes version that works to sync their music on their Pre, they can transfer the music via USB, and there are other third-party applications we can consider."

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.