Feeds

Jobs jumps in to free private APIs

Video streaming on iPhone opens appgates

Remote control for virtualized desktops

Steve Jobs personally intervened to approve a video streaming application for the iPhone, leading to approval for other applications that also make use of private APIs.

P2P video-streaming application Knocking Video was rejected by Apple on the grounds that it uses an undocumented "private" API to scrape the screen, which is then streamed to another iPhone, but the author petitioned Steve Jobs himself and got the application approved in what appears to be a change of policy on private APIs.

Many existing iPhone applications make use of private APIs, as Brian Meehan, lead developer on Knocking Video, pointed out to Mr Jobs in his petitioning email, but that was before Apple introduced automated scanning that catches references to private APIs even if they're never called by the application.

Apple doesn't want developers using private APIs so it remains free to change them when it feels inclined. But that didn't stop Mr Meehan, who explained to Ars Technica that he thought Knocking Video was worth fighting for.

It seems that his persistence, along with Jobs' largesse, is paying dividends for other developers too, OGP Consult found out on Monday:

"During our review of your application we found it is using a private API, which is in violation of the iPhone Developer Program License Agreement section 3.3.1... While your application has not been rejected, it would be appropriate to resolve this issue in your next update."

So somewhere inside Cupertino is a list of developers who'll have to be tipped the wink if changes are made to the private APIs used, but that's going to upset those developers who got their applications rejected for the same reason - assuming Apple's inconsistent policies haven't turned them off iPhone development completely. ®

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.