Since the launch of the Destiny of Velious, there have been nearly 250 posts by Developers, Producers, and Animators on the EQ2 Team. While we appreciate this degree of feedback (it’s refreshing after the tight-lipped Velious Beta), it has been challenging to keep with it all, much less compose it into news stories that have context and are useful for our readers. No doubt if you are already familiar with the EQ2 Dev Tracker, you check it out on occasion. I personally follow the EQ2 Dev Tracker at EQ2Flames because it’s easy to read, however the comments and feedback...
Day: February 25, 2011
Tom “ttobey” Tobey is asking for feedback on what emotes players would like to see added to the game. Head over to the official forums and let him know your ideas. Pretend I got sitting working… What 5 emotes would you want to see? Roleplaying type emotes I mean…. After seeing a few suggestions, he added the following: i thinking more on the lines of /sit /sleep etc… /read is a good one.
From EverQuest2.com: The U.S. servers will come down on February 25, 2011, at 7am PDT for a hotfix. The expected downtime is 2 hours. UK worlds will be updated at 5:00 AM London Time on February 25, 2011, with an estimated downtime will be 2 hours. Here are the notes: GENERAL Depth of Field, SSAO and Sunshafts should be working correctly now. Fixed a crash bug.
Public Quests provide different kinds of rewards than we’ve seen in the past. Right now there are 2 Public Quests: Storm Gorge which is Southeast of Thurgadin and the Ring War which is Northeast of Thurgadin. There are plans to add several more Public Quests as we heard about in Beta (possibly the Sleeper!).
From SmokeJumper on the EQ2 Forums: Hey, folks, I just wanted to post and let you know that a bunch of accounts (less than 100) got a temporary suspension tonight. Why? Because some of them were invited to Beta and then found a way to shortcut the gryphon quest series, which takes a minimum of five days to complete, and were able to do it in minutes. They then told others how to do it and the rest followed along, duplicating the exploit.