Feeds

Who ate all the iPies?

Apple's mid-life crisis in tablet form

Seven Steps to Software Security

Comment So, a portlier iPhone has emerged from Cupertino with typical fanfare and panache, but even the hardcore fans seem disappointed by what is essentially an iPhone with a mid-life crisis.

The waistband has expanded, but in every other respect the iPad remains almost identical to its original form with all the omissions in place - no multitasking, no Flash compatibility, not even widescreen video playback to enjoy on the media device that won't even play FarmVille. Apple's new baby has the look of a middle-aged man searching for meaning as the dreams of his youth are curtailed by life's responsibilities.

Not that the iPhone isn't where it wanted to be at this point - sales are stratospheric, and it's fair to say that Apple has redefined what users expect from a telephone, not to mention shaking up the whole industry and its value chain. But that's in the past, and yesterday fans were expecting something radical - what they got was an ageing guy in a new shirt sporting a different haircut.

Not that it's all Apple's fault - the company has responsibilities too. Responsibilities to developers who don't want to rewrite their applications, responsibilities to shareholders who want to maintain the customer lock-in that iTunes represents (which is why Flash can't be allowed). Apple wanted to reinvent the iPhone, but wasn't prepared to walk away from the responsibilities it had established; it's been obliged to play it safe, be grown-up.

So the iPhone gets a bit fatter and pulls up in a red sports car, but it's still an iPhone and does little an iPhone can't do. Just as when your boss suddenly changes haircut and starts dressing casually, he might look a bit different but inside the same weight of responsibility prevents him making any real changes. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.