Feeds

Salmon Days: Episode 2

Sick children, healthy comedy

  • alert
  • submit to reddit

Seven Steps to Software Security

OK so it took us longer than planned: but at last, another episode of Salmon Days, our pay-per-view-live action comedy streaming epic.

You can check it out at www.salmondays.tv.

There's a few changes too:

One: the reverse SMS billing option is junked, unless you're a Vodafone customer (in which you can use M-Pay). This is for money, rather than technical reasons. The yield is too low, we're told (This is a euphemism for too many middlemen with snouts in the trough). It means that all of you who registered for episode 1 from non-Vodafone accounts will have to reregister. It's a pain, sorry.

Which means our PPV option for most is PayPal (yes, we know it sucks etc. etc.). It costs 50p if you're in the UK, or one US dollar - which makes sense to us, but not necessarily if you are American.

Two: the Salmon Day writers have moved on from the original loosely-inspired-by-BOFH concept to a beast entirely of their own creation. Some of you noted that the BOFH in episode one had little to do with The Bastard Operator as envisioned by comedy genius Simon Travaglia. We'd like to film BOFH episodes at some point - but that requires money. Which we don't have, right now.

Three: Salmon Days Episode 2 is the first of a series of five, linking together to tell a half-hour story.

Four: The website has been upgraded from the frankly shoddy "page not found" gag into a proper site which will have new text features and columns every week, plenty of short downloadable mpegs, and a full archive of past episodes and video material - all of which you can see for free - plus the new Pay Per View episode every month.

Five The Salmon Days crew want to flog a limited edition DVD of the whole half-hour to subscribers sometime in May or June. We'll probably do some merchandising too.

Six: There is no six. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.