Feeds

iPhone gets a decent keyboard

But no Apple approval

Intelligent flash storage arrays

Developers have managed to hack together a Human Interface driver for the iPhone, allowing any Bluetooth keyboard to be used on jailbroken iPhones.

The software doesn't work in all applications, but does connect most applications to the kind of travel keyboard which is making laptops redundant, even if it can't do copy and paste just yet.

The iPhone's soft keyboard might be OK for a pair of thumbs, but touch typists prefer something physical to work with and Apple's failure to support Bluetooth human interface peripherals is hard to understand unless Cupertino is worried it might eat into laptop sales.

Certainly a Windows Phone device with a copy of SoftMaker's office package, and a decent keyboard, is very comparable to a netbook with the added advantage of being pocketable - it'll even underline spelling mistakes in red, which is surely what computers are for. But to do that one has to use a Windows Phone: a high price to pay.

But perhaps keyboards are a little too 20th Century for Mr. Jobs. We'd like to see an Apple-branded Twiddler II for connection to our iPhone 3, or something even more interesting. Unfortunately it's much more likely we'll just see official support for the Human Interface profile an update or two down the road, along with a pretty white folding keyboard bearing the Apple logo.

Until then, the functionality is limited to those prepared to jailbreak their iPhones. But it's another decent incentive to do so. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.