Podcasting What Geeks Really Want To Hear

7 Comments »

  1. Received via e-mail from Aethon:

    Hi,

    I was listening to Geek Muse 56 and you mentioned the term “second part developer”. Collectively you guys expressed a little confusion about whether it even was a real term. Well it sort of is. It is used in the video game industry to designate a company that develops with exclusivity to a specific console by either partial ownership or contract. This is regarded as being different from say a “division” of the first party company. A common example of such a second party (at least historically) is Rare Ltd. They used to be a second party developer for Nintendo making games such as Battletoads, Goldeneye, and even Donkey Kong Country. In 2002 the founders sold their 51% to Microsoft ending their second party status for Nintendo.

    I’ve never heard it outside of the video game industry, but thought this bit of information would interest you.

    Keep up the good work with the podcast.

    Comment by Nem W Schlecht — June 16, 2007 @ 01:03

  2. Thanks for the clarification, Aethon! I have a friend who works for E.A. – I’ll shoot him an e-mail and ask about this.

    Comment by Nem W Schlecht — June 16, 2007 @ 01:04

  3. Any bets on how quickly the iPhone will be hacked like the Apple TV?

    Comment by Brian G. — June 26, 2007 @ 05:31

  4. [QUOTE]Any bets on how quickly the iPhone will be hacked like the Apple TV?[/QUOTE]

    Friday 29th June approx 7pm ;)

    Comment by stevenfullman — June 28, 2007 @ 02:19

  5. I’m sure that there will be reports of hacking the iPhone before the weekend is over. I’m also sure that at some point, someone will get Linux running on it.

    Comment by jkamp — June 28, 2007 @ 04:35

  6. Well, not quite a hack, but the ‘root’ and ‘mobile’ user passwords (in /etc/passwd) have been cracked. There’s no way to ‘ssh’ or use a Terminal on the iPhone (yet!), but just keep ‘alpine’ (and maybe ‘dottie’) written on a Post-It note in a drawer for future reference.

    If there is a remote (Bluetooth?) way of hacking the iPhone, then this is not good news.

    Comment by Nem W Schlecht — July 2, 2007 @ 15:43

  7. And we have full shell access on the iPhone:

    http://hackint0sh.org/forum/showthread.php?t=1408

    Comment by Nem W Schlecht — July 6, 2007 @ 23:57

RSS feed for comments on this post.

Leave a comment

You must be logged in to post a comment.

24 queries. 0.767 seconds.