Mobile menu toggle

Leander Kahney - page 68

Inside The Other Steve’s Brain

By

cult_logo_featured_image_missing_default1920x1080

stevesbrain-thumb-480x.jpg

My old colleague Rob Beschizza, who recently abandoned Wired.com for BoingBoing Gadgets, has a brilliant parody of my new book, Inside Steve’s Brain. The treacherous bastard writes:

“It’s hard to believe that one man revolutionized the operating system business in the 2000s, converting Windows’ extraordinary market dominance into the reviled seven-year ditch that is Vista, and squandering billions on confused advances into ill-understood peripheral markets like video gaming and music hardware

…. Wired.com’s Leander Kahney cuts through the salt-ringed tide marks that surround him to unearth secrets to his unbelievable results. It reveals the real Steve.”

LINK.

Apple Fourth Biggest PC Maker in U.S.

By

post-1921-image-1b4736bad8abb7c3b78136f0cfa125fd-jpg

Apple has pushed past Toshiba to become the fourth largest PC maker in the U.S., according to new numbers from research firm Gartner.

Apple earned 6.6 percent of the PC market in Q1 2008, and saw 32.5 percent year-on-year growth in unit shipments, Gartner said. Overall, the PC market grew 3 percent year-on-year, Gartner said.

Apple trails Dell (31.4 percent market share), Hewlett-Packard (25 percent) and Acer (9.1 percent). While Dell grew 15 percent year-on-year during the quarter, Acer slipped 18.3 percent, Gartner said.

Acer is only 2.5 percentage points ahead of Apple, and Apple is positioned to regain the number-three slot, which it hasn’t held since the mid-nineties.

Worldwide, Apple failed to make the top 5 (HP, Dell, Acer, Lenovo, Toshiba).

California Woman Uses Remote Control Software To Track Stolen MacBook

By

post-1919-image-b5a284088d660b6baf85c4c186abde1a-jpg

A Santa Cruz woman is using Leopard’s Back to My Mac remote control software to track a thief who stole her laptop.

The woman, named Joey, had her MacBook and iPhone stolen from her truck. The thief didn’t wipe the MacBook, and Joey was able to log on remotely every time the crook connected to the internet using Back To My Mac. Built-into OS X, Back To My Mac allows administrators to take full control of machines over the Net.

Joey was able to remove sensitive data; copy and delete files; and then spy on the thief using the MacBook’s built-in iSight camera.

The crook spends a lot of time in cafes using free WiFi to search file sharing networks for software, music and movies.

As the crook surfed the Net, Joey was able to compile a full profile for police, including his Gmail account, home IP address, mother’s maiden name, and even snap clear pictures showing the detail of his tattoos.

Santa Cruz police are reportedly issuing a warrant to arrest the thief.

Joey was documenting the entire process on a LiveJournal account, which has been taken offline, likely to prevent the crook from getting wind of his impending arrest.

Via Roughly Drafted.

Stoned Switcher Star Ellen Feiss’ Movie To Debut Online

By

post-1913-image-6ea2a0b80f738c3e32dced103f977d46-jpg

The first movie starring stoner legend Ellen Feiss, the break-out star of Apple’s “Switch ads,” will air online on Monday, April 21. But don’t get too excited: it looks like a turkey.

Bed & Breakfast, an indie movie shot in France, will air at 9:30PM ET / 6:30 PM PT on TheDigitalLifestyle.tv, a 24-hour Apple-related Web TV channel.

Feiss stars as the girlfriend of an American guy lured to a castle owned by a former college roommate, or something. The movie was shot in 2006 and seems to have promptly disappeared. There’s no indication whether it’s a comedy, a drama or a slasher flick.

It looks like a film school project; it “twists the apparent perception of things to reveal the reality that lurks behind,” according to this archived web site for the film.

Feiss shot to fame in 2002 after slurring her words in an Apple Switch ad detailing how her dad’s PC ate her homework. The ad became an online sensation, and was parodied widely. Feiss was invited on late night TV and was offered roles in moveis and TV shows, but shunned Hollywood — until now.

Here’s a still of Feiss from the movie:

ellen_feiss_bandb.jpg

Gizmodo Crowdsources Psystar Investigation: Miami Company Looks Really Dodgy

By

post-1912-image-0480168a6c7d144290f90b3227815acb-jpg

Trying to find out if would-be Mac clone maker Psystart in legit or not, Gizmodo readers went to the two addresses identified by the Guardian’s Charles Arthur (see below). As Arthur predicted, one address is a single-story home, and the other address is a warehouse, but it’s home to a completely different company.

The Gizmodo reader, Michael, snapped some pictures and talked to the warehouse manager, who has never heard of Psystar.

In addition, another Giz reader, Robert, pulled records from Florida’s corporate filing office and found that Psystar’s two principles, Rodolfo and Roberto Pedraza, are officers or agents of “a whole crapload of companies,” according to Giz. Only one of these companies is active: Floridatek.

“These guys are obviously clowns,” says Robert.

medium_2418323585_878d8cb74d_o.jpg

Mac Trounces PC in Pop Mechanics Head-to-Head

By

post-1911-image-78314f345325fd478abd1d16497c8b18-jpg

A PC-versus-Mac shootout by Popular Mechanics scores the Mac way ahead in both price and performance. PopMech compared desktops and laptops, and not only did the Macs run rings around their Windows counterparts, they were cheaper to boot. The conclusion:

Our biggest surprise, however, was that PCs were not the relative bargains we expected them to be. The Asus M51sr costs the same as a MacBook, while the Gateway One actually costs $300 more than an iMac. That means for the price of the Gateway you could buy an iMac, boost its hard drive to match the Gateway’s, purchase a copy of Vista to boot–and still save $100.

My, how times have changed. A few years ago, the conventional wisdom was the opposite: PCs were cheaper and faster.

Somehow though, I don’t think conventional wisdom will change. Macs will always be regarded as premium computers — thanks to their fab design and quality fit and finish — even if that’s not actually true.

Hackintosh Vendor Psystar Looks Suspiciously Fly-By-Night

By

post-1909-image-1937156da47d6dd253d08ad856a91767-jpg

Charles Arthur at The Guardian has been poking around into the history of Psystar, the Miami company selling the Open Computer, a cheapo Mac clone.

What Arthur found – or rather didn’t find — is extremely suspicious. No one answers the phone, and before this week, the company has left zero record of itself on the Web — Zero. No customer testimonials, no press releases, news stories or posts and comments on forums.

Also, the company changed it’s address on Tuesday while Arthur was writing his post. It moved from what looks like a suburban location to a more industrial one.

Writes Arthur: “But forgive me for being a bit sceptical, but isn’t it far, far more important whether the company has been around, has a reputation, and is going to deliver a machine? Isn’t it?”

.

Apple Will Likely Invoke DMCA Against Psytar’s Cheapo Hackintosh

By

post-1906-image-cfa22d8c8b5134fe86cf421a2a38d989-jpg

The Miami company selling a generic PC that runs Mac OS X says it will fight Apple in the courts — but it’s reasoning seems flawed.

Psystar says it has ported OS X to run on a $400 machine called the OpenMac — in violation of the OS X’s shrinkwrap license, which restricts the software from being installed on any non-Apple branded machine.

But a spokesman for Psystar told InformationWeek that Apple’s shrinkwrap license for OS X violates U.S. antitrust law.

“What if Microsoft said you could only install Windows on Dell computers?” said the spokesman, identified only as Robert.

He continued: “What if Honda said that, after you buy their car, you could only drive it on the roads they said you could?”

But the spokesman seems to be confusing monopoly with abuse of monopoly. Having a monopoly is not illegal — abusing that monopoly is.

And although there’s no definitive court ruling on the enforceability of shrinkwrap EULA licenses (End-User License Agreements), Apple will likely sue under the more sweeping Digital Millennium Copyright Act (DMCA), which criminalizes the circumvention of copyright controls.

Apple has encrypted core segments of OS X — including portions of the Finder and Dock — in an overt anti-piracy effort, according to eWeek. Security researcher Bruce Schneier, said companies are using the DMCA as an anti-piracy measure, but also to prevent reverse engineering. Any attempt to break the encrypted code is in violation of the DMCA.

Psystar’s OpenMac claims to be a 2.2GHz Intel Core 2 Duo machine with 2GB of RAM, a 250GB hard drive, integrated Intel graphics, a DVD burner and four USB Ports. Most of the components can be upgraded.

Dell’s Laptop Replacement Service Includes Free Pubes

By

post-1905-image-23dc3ba6f01595416533a4f0c5066945-jpg

Photo: Kevin Dean

Here’s a great story from the Consumerist about Dell’s hairy customer service. Guy sends his Dell laptop to Texas for replacement, the new machines comes back with pubes in the keyboard!

When I opened up the new laptop, I saw the screen was scratched and dirty, and the keyboard was covered in debris. Wait, not debris….what is that? HAIRS!? Not just any hairs – these could only be described as pubes. I hate to be so crude, but pubes are pubes. Not the incidental curly hair, but rather mini-tufts between the keys. My only guess is that Ron Jeremy was the previous owner.

Now that’s service.

Amazing Apple IIGS Original Hardware Laptop

By

post-1903-image-1823090e4926af221d7d4fc871aae631-jpg

Hacker Benjamin Heckendorn, better known as Ben Heck, has shoehorned the motherboard of an Apple IIGS into his own custom-made laptop case.

The Apple IIGS Original Hardware Laptop has a 15-inch color screen, built-in CompactFlash as a pseudo hard drive and stereo speakers.

The amazing piece of engineer has a glowing blue logo that flashes yellow when the disk is busy. Heck even made his own keys for the board, laser-etching each key.

It seems like it must be in danger of bursting into flames at any moment, but Heck says it puts off no more heat than a pocket calculator.

Released in September 1986, the IIGS was a powerful computer for its time, with advanced color graphics and stereo sound — the GS standing for “Graphics” and Sound.”

Heck says the hack was requested by an unnamed party. My money’s on Woz.

Heck has lot more pictures and video on his site.

.IIgs_5.jpg

Miami Company Offers Low-Cost Mac Knock-Off — Apple Lawsuit Sure to Follow

By

post-1897-image-a2af5b3baa2667c461bb8de0288c9a53-jpg

A company called Psystar is advertising a $399 pseudo-Mac called the “OpenMac,” which it claims is made from standard PC parts and is compatible with OS X Leopard.

Based in Miami, Florida, Psystar is courting a legal smackdown from Apple, which ended its official “clone” program in 1997 after Steve Jobs returned to run the company. Intended to grow the Mac platform, the clones instead took market share from Apple, seriously impacting its botttom-line.

Which is why Apple will likely pounce on Psystar: the Mac is Apple’s most profitable line, and the last thing Apple wants is a company producing low-cost knockoffs.

Apple will likely center on the use of Leopard: The operating system’s software license forbids it being installed on non-Apple hardware.

Psystar’s butt-ugly OpenMac claims to be a 2.2GHz Intel Core 2 Duo machine with 2GB of RAM, a 250GB hard drive, integrated Intel graphics, a DVD burner and four USB Ports. Most of the components can be upgraded with better graphics or bigger hard drives. Psystar says:

Macworld Reviews Inside Steve’s Brain

By

post-1894-image-ca9b1c165dea9a97f8670026caad0f1b-jpg

In more good news, the first review of Inside Steve’s Brain — my new book about Steve Jobs — has been published by Macworld.com. Even better, reviewer Dan Pourhadi likes it.

In his new book, Inside Steve’s Brain (Portfolio, 2008), however, Leander Kahney attempts to go beyond the obvious by offering a detailed, concept-oriented, blow-by-blow look at Apple CEO and what makes him tick–his history, his ideas, his ideals, his reasoning, his behavior, his relationships, even his footwear choices.

Kahney’s the right person for the job, too: He has an extensive history covering Apple and Steve Jobs since the early 1990’s, has written two previous books on the company, and has been running Wired’s Cult of Mac blog for ages.

Macworld is a tough audience, so I’m especially glad they liked it. The book is out next week.

Wired.com Nominated For Webby in Prestigious “News” Category

By

post-1892-image-9d371b0786d096a8caa6cfda5a4ffd55-jpg

From the department of “I’m-going-to-crow-about-it-because-no-one-else-will,” Wired.com has been nominated for a 2008 Webby award in the prestigious News category.

We’re up against BBC News, NYTimes.com, CNN.com and Discovery News.

As the day-to-day editor of the site, it makes me enormously proud to be rated against such formidable competition. The Webbys are known as the “Oscars of the Internet.”

All told, Wired.com has been nominated for six Webbys this year: Wired.com for best news site, best copywriting and best home page, Danger Room for political blog, Game|Life for games-related website and Compiler for software website. Epicenter and Gadget Lab were also designated “Honorees” in the business and culture categories, respectively.

By comparison, the BBC is up for four Webbys. The nominations come on the heels of Wired.com winning Best Classic Website at South By Southwest a few weeks ago. We’re on a roll.

(Full disclosure: Wired magazine — our sister print publication — is a media sponsor of the awards.)

New Firmware For MacBooks and iMac: What It Does Is Universal Mystery

By

post-1888-image-0f9fe6e74c6deb200beb1e9a6bbeb596-jpg

Apple has released new firmware updates for several machines, but offered no meaningful explanation of what the update does. Apple’s note is maddeningly cryptic:

This update fixes several issues to improve the stability of [MacBook Air. Macbook, MacBook Pro, iMac] computers

The updates have sparked consternation in the Mac web world. At sites like the MacRumors forums, more than 200 commentators are asking, “What does it do?”

The updates are for:

MacBook

MacBook Pro

MacBook Air

iMac

Apple also released an update for the Aluminum Keyboard, but this one at least includes a meaningful description of the changes:

This firmware update addresses an issue with the aluminum Apple Keyboard and the aluminum Apple Wireless Keyboard where a key may repeat unexpectedly while typing.

Proof That The Newton Still Lives

By

post-1885-image-d175b2300088a00e8138894eb3a685db-jpg

Even in the day and age of the iPhone, the Newton community is still updating software for the old brick.

Programmer Simon Bell has released version 2.1 of Newton Connection, which allows a Newton to be backed up to a Mac running OS X.

The new version adds a small feature — a screenshot function — but I’m just delighted that the Newton community is still active.

icon.gif

Free Copies of Cult of Mac and Cult of iPod on FileSharing Networks

By

post-1845-image-c632ce8a9ed2914df92b76d30f035e75-jpg

200803191334.jpg

Wired’s Editor in Chief Chris Anderson says the future of business is free, and so my publisher and I are giving away free copies of my books.

Bill Pollock of No Starch Press has seeded full electronic versions of my coffeetable books — Cult of Mac and Cult of iPod — to Bittorrent via Pirate Bay.

We want to see if giving away copies of the books will have any effect on sales.

“I’ve been in publishing for just over 20 years and my training has not been to give books away,” writes Pollock on the No Starch blog. “But I think there’s something to this and logic tells me that if we increase the visibility of our titles, we’ll sell more books.”

We came up with the idea after reading about the amazing success to bestselling author Paulo Coelho, who seeds his own books to file-sharing networks and then promotes them on his blog. Coelho claims great success with “pirating” his own books, saying it has had a slow but dramatic effect on sales.

Of course, Coelho is an internationally acclaimed author with a high profile, which may account for his success more than giving away free books. But still, it’s an experiment worth trying.

As Pollock says on his blog: “I think that publishers (music and book) are spending too much time circling the wagons and not enough time thinking of ways that they can use technology to advantage. Certainly, our move here is a bit unusual, but someone has to take the plunge. May as well be us.”

Here’s the torrent for Cult of Mac.

And the torrent for Cult of iPod.

If you download the books, remember to keep your torrent client open so that others can also download the files.

Please let me know what you think of the experiment and the books. Send mail to: [email protected]

iPods in Space!

By

post-1821-image-142be012c9c7a6b3a9bffab6bbb90ab7-jpg

Look closely at the driver’s side window on Space Shuttle Endeavour. What’s that white thing floating around the cabin in zero G?

ipodinspace.jpg

Look closer…

spaceipod_closeup.jpg

It looks like an iPod Classic!

It was spotted in this high-res photo of the Endeavour, by eagle-eyed TUAW reader Walker. The Space Shuttle is presently docked with the International Space Station.

According to TUAW, space-bound iPods have to have their lithium batteries replaced with specially certified alkaline ones. And iPods aren;t allowed inside the ISS, since they aren’t certified as safe on the space station.

Give Us Your Data! Take Our Cult of Mac Reader Survey

By

post-1816-image-95e42c3d710f0342f9fda2f36421a995-jpg

UPDATE: The survey has concluded. Thanks to everyone who took part.We’d like to ask you — the readers — for a favor.We’re trying to get a better idea of who you are and what you like to do — more than your thoughtfully-written comments can tell us.So, we’ve crafted a little questionnaire. Click here to take our Cult of Mac reader survey. We’ve kept it as painless as possible. It’s just two pages and it takes about a minute or so to complete. Everything is totally anonymous.Most of it is the standard reader survey stuff (did we mention it’s fast and anonymous?), but when you’re done, we’ll have a better understanding of each other. And really, isn’t that reason enough?

Japanese Youths Prefer iPods to Cars

By

post-1814-image-6eae5c7b042991a13641c6df1b0fe11d-jpg

Auto sales are collapsing in Japan, especially among young people who view the car as a climate-destroying anachronism, according to a fascinating report in the Wall Street Journal.

“Young people can borrow their parents’ car, and I think they’d rather spend money on PCs or iPods than cars,” says the student with shaggy hair who is in no rush to get a driver’s license.

Sales of cars in Japan have dropped to the lowest level in a decade. Only 25 percent of Japanese in their 20s want a car, down from about 50 percent in 2000, according to a recent survey cited by the Journal.

Disdain for the car is a growing phenomenon worldwide, the Journal notes.

iPhone SDK Event on March 6

By

cult_logo_featured_image_missing_default1920x1080

iphone-roadmap

iphone-roadmap.jpg

Apple has sent invites to the press for an “iPhone Software roadmap” event on March 6 at Apple’s Cupertino Campus, according to Engadget.

“Please join us to learn about the iPhone software roadmap, including the iPhone SDK and some exciting new enterprise features,” the invite says.

Let’s hope one of those “exciting new enterprise features” is corporate email. For me, that’s the biggest hole.

Conspicuous by its absence is any mention of the SDK’s introduction date.

Confirmed: iPhone Security Better, But Still Not Perfect

By

post-1791-image-cba1d64117ed0385454d74c6ee102a9a-jpg

Picture: Kitra Cahana/The New York Times

I’ve confirmed that the iPhone no longer runs software applications as “root” — but the iPhone is still insecure, a security expert says.

As reported on Wired.com, the iPhone used to run all software applications as “root” until recently, a flawed architecture that could give hackers complete control of the device. If hackers found a hole in any application, they could take over other functions, using the iPhone to make calls, take pictures or read and send email.

But last month Apple released a firmware update, version 1.1.3, that put most of the major applications in a new account called “mobile.”

While this is better than running all applications in root, it still lumps the applications together, which doesn’t much improve things: The same vulnerability still exits. If any one application is compromised, they are all vulnerable — and the iPhone can still be taken over, says Charlie Miller, principal analyst of software security at Independent Security Evaluators.

Dr. Miller was one of the first security experts to document the iPhone’s flawed architecture.

In a response to an email query sent yesterday, Dr. Miller writes:

Actually, the important apps have not been running as root at least since 1.1.3. See below. This is obviously better than running everything as root.

However, now they seem to run everything unimportant as the user “mobile”.

This doesn’t really solve their security problems because, for example, someone gaining access through a web server attack will still be able to access emails, dial the phone, etc. (At least it appears this way, I haven’t verified this).

A better approach would have been one like the folks at Google took with their Android SDK.

There, every application runs as a separate user in their own directory.

Therefore, each application cannot access the data of another application without the system having explicitly been told to allow it.

In the above example, an attacker who gains access to an Android phone through the web browser could only access things the web browser deals with, such as bookmarks.

They would not have access to mail contacts, saved messages, SMS messages, etc. (at least without doing a second type of attack).

Hope that helps.

Charlie

# uname -a
Darwin Charlie Miller’s iPhone 9.0.0d1 Darwin Kernel Version 9.0.0d1: Wed Dec 12 00:16:00 PST 2007; root:xnu-933.0.0.211.obj~2/RELEASE_ARM_S5L8900XRB iPhone1,1 unknown # ps aux
USER PID %CPU %MEM VSZ RSS TT STAT STARTED TIME COMMAND
mobile 62 2.8 20.3 325440 24080 ?? Ss 9:36AM 1:15.31 /System/Library/CoreServices/SpringBoard.app/SpringBoard
root 1 0.0 0.4 272956 444 ?? Ss 8:56AM 0:01.06 /sbin/launchd
mobile 12 0.0 1.4 286128 1604 ?? Ss 8:56AM 0:00.37 /usr/sbin/BTServer
root 13 0.0 1.3 282168 1556 ?? Ss 8:56AM 0:03.43 /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter
root 16 0.0 1.3 275864 1516 ?? Ss 8:56AM 0:15.53 /usr/sbin/configd
root 17 0.0 0.5 273404 592 ?? Ss 8:56AM 0:00.09 /usr/libexec/crashreporterd
mobile 18 0.0 1.4 284764 1632 ?? Ss 8:56AM 0:00.86 /System/Library/Frameworks/IAP.framework/Support/iapd
root 19 0.0 0.7 273732 880 ?? Ss 8:56AM 0:01.69 /usr/sbin/mDNSResponder -launchd
root 20 0.0 1.1 284208 1296 ?? Ss 8:56AM 0:01.25 /usr/libexec/lockdownd
root 21 0.0 0.4 274000 432 ?? Ss 8:56AM 0:07.57 /usr/sbin/syslogd
root 22 0.0 0.2 264644 276 ?? Ss 8:56AM 0:00.66 /usr/sbin/update
mobile 23 0.0 0.7 273576 792 ?? Ss 8:56AM 0:00.12 /usr/libexec/ptpd -t usb
mobile 24 0.0 1.7 290148 2072 ?? Ss 8:56AM 0:03.31 /usr/sbin/mediaserverd
root 26 0.0 0.4 273456 428 ?? Ss 8:56AM 0:01.14 /usr/sbin/notifyd
mobile 64 0.0 2.0 309600 2340 ?? S 9:36AM 0:00.93 /Applications/MobilePhone.app/MobilePhone –launchedFromSB –firstLaunch —
mobile 65 0.0 2.5 309112 2940 ?? S 9:36AM 0:02.78 /Applications/MobileMail.app/MobileMail –launchedFromSB –firstLaunch –su
root 81 0.0 7.8 315532 9324 ?? S 9:43AM 0:37.71 /Applications/Installer.app/Installer –launchedFromSB
mobile 82 0.0 12.7 321948 15036 ?? S 9:45AM 0:21.86 /Applications/MobileSafari.app/MobileSafari –launchedFromSB
root 97 0.0 0.6 273276 764 ?? S 9:54AM 0:00.81 /usr/sbin/sshd -i
root 98 0.0 1.0 274168 1164 p0 Ss 9:54AM 0:00.14 -sh
root 100 0.0 0.3 272876 332 p0 R+ 9:54AM 0:00.01 ps aux

Why was the iPhone architected like this, I asked Dr. Miller? His reply: “I think they did it that way because it was the easiest and quickest way to do it. They had a deadline, they had a great product and they wanted to get it out the door and start making money. Clearly, by not running things as root, they are going back and trying to make the things more secure now that the phones are out and in use. However, adding security after the fact if much more difficult (and expensive) then designing it in from the start.”

iPhone Update — Do Apps Still Run in Root? (Updated)

By

post-1789-image-f8efd2c02218c2e110ec246432f64193-jpg

Picture by axb500

Update: As reader Mike kindly points out in the comments, apps running in root was fixed in the 1.1.3 update. According to Cre.ations.net:
– All applications now run as the user ‘mobile’ instead of as root.
– Preferences are now stored in /var/mobile rather than in /var/root.
Update 2: As Wired.com reporter Kim Zetter points out, this hasn’t been confirmed by anyone except the Cre.ations.net blogger. All other mentions cite Cre.ations.net as the source.
If today’s iPhone’s firmware update is in preparation for an iPhone SDK, the big question is whether Apple fixed the iPhone’s flawed security model.
Do apps still run in root?

iPhone 1.1.4 Update is 165-MBytes of “Bug Fixes”

By

post-1787-image-03e7bbeb0e2303b522b6c96cfc2d8c66-jpg

Apple on Tuesday released a 1.1.4 firmware update for the iPhone and iPod touch.

Available through iTunes, the update is a beefy 165-MByte download, but incredibly, adds no significant new features.

According to iLounge, which examined the update closely and quizzed Apple about it, it’s nothing but bug fixes.

The update is probably laying the groundwork for the iPhone SDK, which Apple promised to release this month.

The 1.1.4 update presents no problem to jailbroken iPhones, TUAW reports — which will be a moot point if sanctioned applications will be released shortly. Who wants to hack their iPhone to load applications if there’s a nice SDK a way to load them through iTunes?

iTunes Number Two Music Retailer in U.S.

By

post-1785-image-f84e44570da6381f8eedcd1c728f097e-jpg

Apple’s iTunes music store has overtaken Best Buy to become the number-two music retailer in the U.S. behind Wal-Mart, according to market researcher NPD Group.

Apple’s growth is likely to continue. Sales of CDs are plummeting while digital downloads grew about 50 percent last year, NPD said.

Most tellingly, nearly 50 percent of U.S. teens didn’t buy any CDs during the year, NPD says.

“Teens are continuing to check out on the CD,” NPD analyst Russ Crupnick told the Associated Press .