Feeds

Arcade emulator MAME slips under Apple radar

Grab it before Cupertino notices

Build a business case: developing custom apps

The popular arcade emulator MAME is now available in the iTunes store, for free, but don't expect it to stay there for long as Apple has never tolerated this kind of thing before.

MAME emulates the hardware of old arcade consoles, only needing the requisite ROMs to be able to play thousands of games - from Centipede to Joust to Arkanoid and everything in between. But iMAME doesn't come with those games, it's just an emulator, and therein lies the problem.

Emulators are allowed on iOS these days, but only if they're bundled with the software they're intended to run: Apple has become more relaxed about the code it permits on its OS, but remains in absolute control of the distribution mechanism. A small proportion of users might jailbreak their devices, and thus be able to install unauthorised apps, but the vast majority will stick to iTunes, and paying Apple's 30 per cent on every transaction.

But that's not the only problem for iMAME. Many of the games it runs remain under copyright of their developers, and while the ROM files are tiny (by today's standards) and easily passed around the internet, they are still illegal to distribute. Some games have been released into the public domain, but the majority (and the more popular titles) remain privately owned.

In America one may take a copy of a game ROM, assuming one owns an original chip ripped from an arcade machine, under their fair use allowance, but elsewhere installing a pirate ROM is no different from copying any other software.

There's also the matter of how one installs a ROM onto an iDevice that lacks an easily addressable file system. There are legitimate tools available for such things (Gizmodo suggests using PhoneView), so any existing MAME file will work if one happened to have them lying around on an old hard drive.

Of course, if you're the kind of person who has old arcade ROMs littering your gaff, and spends his days playing 20-year-old computer games, then you've probably already jailbroken your iPhone and had iMAME running for a while now. For everyone else there's a window of opportunity which should be grabbed even if you've not got any ROMs - you never know when the need, and opportunity, to play Mr Do will strike. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.