Mamedev MAME Documentation

Total Page:16

File Type:pdf, Size:1020Kb

Mamedev MAME Documentation MAME Documentation Release 0.227 MAMEdev Team Apr 11, 2021 CONTENTS 1 What is MAME 3 1.1 I. Purpose ................................................. 3 1.2 II. Cost .................................................. 4 1.3 III. Software Image Files ......................................... 4 1.4 IV. Derivative Works ........................................... 4 1.5 V. Official Contact Information ..................................... 4 2 Health Warnings 5 2.1 Epilepsy Warning ............................................ 5 3 Getting MAME prepared 7 3.1 An Introduction to MAME ........................................ 7 3.2 Purpose of MAME ............................................ 7 3.3 Systems Emulated by MAME ...................................... 7 3.4 Supported OS ............................................... 8 3.5 System Requirements .......................................... 8 3.6 Installing MAME ............................................. 9 3.7 Compiling MAME ............................................ 9 4 Basic MAME Usage and Configuration 21 4.1 Using MAME .............................................. 21 4.2 Default Keyboard Controls ........................................ 22 4.3 MAME Menus .............................................. 32 4.4 Frontends ................................................. 33 4.5 About ROMs and Sets .......................................... 33 4.6 Common Issues and Questions (FAQ) .................................. 36 5 MAME Commandline Usage and OS-Specific Configuration 43 5.1 Universal Commandline Options .................................... 43 5.2 Windows-Specific Commandline Options ................................ 94 5.3 SDL-Specific Commandline Options .................................. 95 5.4 Commandline Index ........................................... 96 6 Advanced configuration 107 6.1 Multiple Configuration Files ....................................... 107 6.2 MAME Path Handling .......................................... 109 6.3 Shifter Toggle Disable .......................................... 110 6.4 BGFX Effects for (nearly) Everyone ................................... 111 6.5 HLSL Effects for Windows ....................................... 114 6.6 GLSL Effects for *nix, OS X, and Windows .............................. 122 6.7 Stable Controller IDs ........................................... 124 i 6.8 Linux Lightguns ............................................. 126 7 MAME Debugger 129 7.1 General Debugger Commands ...................................... 129 7.2 Memory Debugger Commands ..................................... 137 7.3 Execution Debugger Commands ..................................... 141 7.4 Breakpoint Debugger Commands .................................... 149 7.5 Watchpoint Debugger Commands .................................... 152 7.6 Registerpoints Debugger Commands .................................. 155 7.7 Code Annotation Debugger Commands ................................. 158 7.8 Cheat Debugger Commands ....................................... 160 7.9 Image Debugger Commands ....................................... 166 7.10 Debugger Expressions Guide ...................................... 167 8 MAME External Tools 169 8.1 Imgtool - A generic image manipulation tool for MAME . 169 8.2 Using Imgtool .............................................. 169 8.3 Imgtool Subcommands .......................................... 170 8.4 Imgtool Filters .............................................. 171 8.5 Imgtool Format Info ........................................... 172 8.6 Castool - A generic cassette image manipulation tool for MAME . 194 8.7 Using Castool .............................................. 194 8.8 Castool Formats ............................................. 194 8.9 Floptool - A generic floppy image manipulation tool for MAME . 199 8.10 Using Floptool .............................................. 199 8.11 Floptool Formats ............................................. 199 8.12 Other tools included with MAME .................................... 202 8.13 Developer-focused tools included with MAME ............................. 202 9 Technical Specifications 205 9.1 MAME Naming Conventions ...................................... 205 9.2 MAME Layout Files ........................................... 207 9.3 MAME Layout Scripting ......................................... 227 9.4 Object Finders .............................................. 237 9.5 The device_memory_interface ...................................... 253 9.6 The device_rom_interface ........................................ 256 9.7 The device_disasm_interface and the disassemblers . 258 9.8 Emulated system memory and address spaces management . 261 9.9 The new floppy subsystem ........................................ 273 9.10 The new SCSI subsystem ........................................ 283 9.11 Scripting MAME via Lua ........................................ 286 9.12 MAME Lua Class Reference ....................................... 290 9.13 The new 6502 family implementation .................................. 333 10 MAME and security concerns 343 11 The MAME License 345 12 Contribute 347 ii MAME Documentation, Release 0.227 Note: This documentation is a work in progress. You can track the status of these topics through MAME's issue tracker. Learn how you can contribute on GitHub. CONTENTS 1 MAME Documentation, Release 0.227 2 CONTENTS CHAPTER ONE WHAT IS MAME MAME is a multi-purpose emulation framework. MAME's purpose is to preserve decades of software history. As electronic technology continues to rush forward, MAME prevents this important "vintage" software from being lost and forgotten. This is achieved by documenting the hardware and how it functions. The source code to MAME serves as this documentation. The fact that the software is usable serves primarily to validate the accuracy of the documentation (how else can you prove that you have recreated the hardware faithfully?). Over time, MAME (originally stood for Multiple Arcade Machine Emulator) absorbed the sister-project MESS (Multi Emulator Super System), so MAME now documents a wide variety of (mostly vintage) computers, video game consoles and calculators, in addition to the arcade video games that were its initial focus. MAME® Copyright © 1997-2021 by Nicola Salmoria and the MAME team MAME is a registered trademark owned by Gregory Ember 1.1 I. Purpose MAME's main purpose is to be a reference to the inner workings of the emulated machines. This is done both for educational purposes and for preservation purposes, in order to prevent historical software from disappearing forever once the hardware it runs on stops working. Of course, in order to preserve the software and demonstrate that the emulated behavior matches the original, one must also be able to actually use the software. This is considered a nice side effect, and is not MAME's primary focus. It is not our intention to infringe on any copyrights or patents on the original games. All of MAME's source code is either our own or freely available. To operate, the emulator requires images of the original ROMs, CDs, hard disks or other media from the machines, which must be provided by the user. No portions of the original game code are included in the executable. 3 MAME Documentation, Release 0.227 1.2 II. Cost MAME is free. Its source code is free. The project as whole is distributed under the GNU General Public License, version 2 or later (GPL-2.0+), but most of code (including core functionality) is also available under the 3-clause BSD license (BSD-3-clause). 1.3 III. Software Image Files ROM, CD, hard disk and other media images are all copyrighted material. They cannot be distributed without the explicit permission of the copyright holder(s). They are not "abandonware", nor has any of the software supported by MAME passed out of copyright. MAME is not intended to be used as a tool for mass copyright infringement. Therefore, it is strongly against the authors' wishes to sell, advertise, or link to resources that provide illegal copies of ROM, CD, hard disk or other media images. 1.4 IV. Derivative Works Because the name MAME is trademarked, you must abide by the rules set out for trademark usage if you wish to use "MAME" as part of the name your derivative work. In general, this means you must request permission, which requires that you follow the guidelines above. The version number of any derivative work should reflect the version number of the MAME release from which it was was derived. 1.5 V. Official Contact Information For questions regarding the MAME license, trademark, or other usage, go to http://www.mamedev.org/ 4 Chapter 1. What is MAME CHAPTER TWO HEALTH WARNINGS 2.1 Epilepsy Warning A very small percentage of individuals may experience epileptic seizures when exposed to certain light patterns or flashing lights. Exposure to certain patterns or backgrounds on a television screen or computer monitor, or while playing video games may induce an epileptic seizure in these individuals. Certain conditions may induce previously undetected epileptic symptoms even in persons who have no history of prior seizures or epilepsy. These conditions can include emulation accuracy or inaccuracy, computer performance at the time of running MAME, video card drivers, your monitor, and a lot of other factors. If you, or anyone in your family, has an epileptic condition, consult your physician prior to using MAME. If you experience any of the following while using MAME, IMMEDIATELY discontinue
Recommended publications
  • Cryptomator Documentation Release 1.5.0
    Cryptomator Documentation Release 1.5.0 Cryptobot Sep 15, 2021 Desktop 1 Setup 3 1.1 Windows...............................................3 1.2 macOS................................................3 1.3 Linux.................................................3 2 Getting Started 5 3 Adding Vaults 7 3.1 Create a New Vault..........................................8 3.2 Open an Existing Vault........................................ 13 4 Accessing Vaults 15 4.1 Unlocking a Vault.......................................... 16 4.2 Working with the Unlocked Vault.................................. 17 4.3 Locking a vault............................................ 18 5 Password And Recovery Key 21 5.1 Change Password........................................... 21 5.2 Show Recovery Key......................................... 22 5.3 Reset Password............................................ 23 6 Vault Mounting 27 6.1 General Adapter Selection...................................... 27 6.2 Options applicable to all Systems and Adapters........................... 27 6.3 WebDAV-specific options...................................... 28 6.4 Dokany-specific options....................................... 28 6.5 FUSE-specific options........................................ 28 7 Vault Management 29 7.1 Remove Vaults............................................ 29 7.2 Reorder Vaults............................................ 29 7.3 Vault Options............................................. 29 8 Setup 33 8.1 Google PlayStore..........................................
    [Show full text]
  • Ti® Macintosh® SE/30
    n 11acll1tosh®SE/30 Owner's Guide - ti®Macintosh ®SE /30 Owner's Guide - - - - - - ti APPLE COMPUTER, INC. This manual and lhe software described in it are copyrighted, with all rights reserved. Under the copyright laws, lhis manual or the software may not be copied, in whole or part, without written consent of Apple, except in lhe normal use of the software or to make a backup copy of the software. The same proprietary and copyright notices must be affLxed to any permitted copies as were affiXed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) may be sold, given, or loaned to another person. Under the law, copying includes translating into another language or format. You may use the software on any computer owned by you, but extra copies cannot be made for this purpose. © Apple Computer, Inc., 1988 Linotronic is a registered trademark of 20525 Mariani Avenue Linotype Co. Cupertino, CA 95014 (408) 996-1010 Microsoft and MS-DOS are registered trademarks of Microsoft Corporation. Apple, the Apple logo, AppleCare, NuBus is a trademark of Texas Applelink, AppleTalk. A/UX, Instruments. HyperCard , Im:~geW rit e r , LaserWriter, MacApp, Macintosh, OS/2 is a trademark of International and SANE arc registered trademarks Business Machines Corporation. of Apple Computer, Inc. POSTSCRI PT is a registered trademark, APDA, AppleCD SC, Apple Desktop and Illustrator is a trademark, of Bus, AppleFax, EtherTalk, FDHD, Adobe Systems Incorporated. Finder, LocalTalk, and MPW are UNIX is a registered trademark of trademarks of Apple Computer, Inc.
    [Show full text]
  • The Infuze Bundle Contents
    The inFUZE Bundle Contents Introduction! 4 Quick Reference! 5 Banner! 6 Introduction And Usage! 6 Code Description! 6 Benchmarks! 9 Introduction And Usage! 9 Code Description! 10 Chessica! 11 Introduction And Usage! 11 Circles! 11 Introduction And Usage! 11 Lines! 12 Introduction And Usage! 12 Code Description! 12 Luna! 14 Introduction And Usage! 14 Life! 14 Introduction And Usage! 14 Beep! 15 Introduction And Usage! 15 How To Play the Flute! 15 How To Play Tunes! 15 How Beep Works! 16 How pitch> works.! 17 How the Audio Hardware Works.! 18 Brikky! 19 Introduction And Usage! 19 TJoy! 20 Introduction And Usage! 20 Slides! 21 Introduction And Usage! 21 Producing and loading FIGgy Images! 21 How does The SlideShow Work?! 22 MiniRace! 22 Introduction And Usage! 23 How MiniRace Works! 23 Joggle! 25 Introduction And Usage! 25 How Joggle Works! 25 Mazes! 27 Introduction And Usage! 27 How It Works! 27 Mini Oxo ! 28 Introduction And Usage! 28 Strategy! 28 Full Screen Oxo! 29 Introduction And Usage! 30 Graphics! 30 Strategy! 31 FigTris! 32 Introduction And Usage! 33 Snake! 34 Introduction And Usage! 34 Locals! 34 Introduction And Usage! 34 Explanation! 34 Turtles and TurtleCrypt! 37 Introduction And Usage! 38 How To Use The Turtle Graphics! 38 Blitz! 40 Introduction And Usage! 40 Zoo! 40 Introduction And Usage! 41 Inside The Program! 42 GDem! 46 Introduction And Usage! 46 Inside GDem! 46 Nyan Race! 48 Introduction And Usage! 48 Primes! 49 Introduction And Usage! 49 Cal! 50 Introduction And Usage! 50 Technical Details! 51 Multiple Languages! 51 Debugger!
    [Show full text]
  • Newagearcade.Com 5000 in One Arcade Game List!
    Newagearcade.com 5,000 In One arcade game list! 1. AAE|Armor Attack 2. AAE|Asteroids Deluxe 3. AAE|Asteroids 4. AAE|Barrier 5. AAE|Boxing Bugs 6. AAE|Black Widow 7. AAE|Battle Zone 8. AAE|Demon 9. AAE|Eliminator 10. AAE|Gravitar 11. AAE|Lunar Lander 12. AAE|Lunar Battle 13. AAE|Meteorites 14. AAE|Major Havoc 15. AAE|Omega Race 16. AAE|Quantum 17. AAE|Red Baron 18. AAE|Ripoff 19. AAE|Solar Quest 20. AAE|Space Duel 21. AAE|Space Wars 22. AAE|Space Fury 23. AAE|Speed Freak 24. AAE|Star Castle 25. AAE|Star Hawk 26. AAE|Star Trek 27. AAE|Star Wars 28. AAE|Sundance 29. AAE|Tac/Scan 30. AAE|Tailgunner 31. AAE|Tempest 32. AAE|Warrior 33. AAE|Vector Breakout 34. AAE|Vortex 35. AAE|War of the Worlds 36. AAE|Zektor 37. Classic Arcades|'88 Games 38. Classic Arcades|1 on 1 Government (Japan) 39. Classic Arcades|10-Yard Fight (World, set 1) 40. Classic Arcades|1000 Miglia: Great 1000 Miles Rally (94/07/18) 41. Classic Arcades|18 Holes Pro Golf (set 1) 42. Classic Arcades|1941: Counter Attack (World 900227) 43. Classic Arcades|1942 (Revision B) 44. Classic Arcades|1943 Kai: Midway Kaisen (Japan) 45. Classic Arcades|1943: The Battle of Midway (Euro) 46. Classic Arcades|1944: The Loop Master (USA 000620) 47. Classic Arcades|1945k III 48. Classic Arcades|19XX: The War Against Destiny (USA 951207) 49. Classic Arcades|2 On 2 Open Ice Challenge (rev 1.21) 50. Classic Arcades|2020 Super Baseball (set 1) 51.
    [Show full text]
  • To FUSE Or Not to FUSE? Analysis and Performance Characterization of the FUSE User-Space File System Framework
    To FUSE or not to FUSE? Analysis and Performance Characterization of the FUSE User-Space File System Framework A Thesis Presented by Bharath Kumar Reddy Vangoor to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science Stony Brook University Technical Report FSL-16-02 December 2016 Copyright by Bharath Kumar Reddy Vangoor 2016 Stony Brook University The Graduate School Bharath Kumar Reddy Vangoor We, the thesis committee for the above candidate for the Master of Science degree, hereby recommend acceptance of this thesis. Signature: Dr. Erez Zadok, Thesis Advisor Professor, Computer Science Signature: Dr. Mike Ferdman, Thesis Committee Chair Assistant Professor, Computer Science Signature: Dr. Vasily Tarasov IBM Research – Almaden This thesis is accepted by the Graduate School Charles Taber Dean of the Graduate School ii Abstract of the Thesis To FUSE or not to FUSE? Analysis and Performance Characterization of the FUSE User-Space File System Framework by Bharath Kumar Reddy Vangoor Master of Science in Computer Science Stony Brook University December 2016 Traditionally, file systems were implemented as part of operating systems kernels, which provide a limited set of tools and facilities to a programmer. As complexity of file systems grew, many new file systems began being developed in user space. Low performance is considered the main disadvan- tage of user-space file systems but the extent of this problem has never been explored systematically. As a result, the topic of user-space file systems remains rather controversial: while some consider user-space file systems a “toy” not to be used in production, others develop full-fledged production file systems in user space.
    [Show full text]
  • TEACHING FORTH I FORTH As a Teaching Language
    VOLUME IV, NUMBER 6 $2.50 INSIDE: TEACHING FORTH I FORTH as a Teaching Language ........... Albert S. Woodhull, Ph.D ........ 5 . Teaching FORTH on a VAX ............... Vernor Vinge ................. 8 FEATURES: Algebraic Expression Evaluation in FORTH ... Michael Stolowitz ............. 14 DEPARTMENTS: Letters ........................................................... 3 Standards Corner ...................... Robert 1. Smith ............... 12 . A Techniques Tutorial; Meta Compiling I ..... Henry Laxen ................. 19 L New Products/Reviews ............................................... 22 . Technotes ......................................................... 25 FIGChapter News .................................................. 29 J 1 4 i I i I I i i TEACHING FORTH : j i L 8080/280 FIG-FORTH for CP/M & CDOS systems FULL-SCREEN EDITOR for DISK & MEMORY $50 saves you keying the FIG FORTH model and many published FIG FORTH screens onto diskette and debugging them. You receive TWO diskettes (see below for formats available). The first disk is readable by Digital Research CP/M or Cromemco CDOS and contains 8080 source I keyed from the published listings of the FORTH INTEREST GROUP (FIG) plus a translated, enhanced version in ZILOG 280 mnemonics. This disk also contains executable FORTH.COM files for Z80 & 8080 processors and a special one for Cromemco 3102 terminals. The 2nd disk contains FORTH readable screens including an extensive FULL-SCREEN EDITOR FOR DISK & MEMORY. This editor is a powerful FORTH software development tool featuring
    [Show full text]
  • EFM) for Greater Storage Density, and Cross-Interleave Reed-Solomon Code (CIRS) for Error Correction
    OpticalOptical StorageStorage TechnologyTechnology The Compact Disc HistoryHistory ofof thethe CompactCompact DiscDisc CD-V 光碟片 Video CD DVD-RAM 000000100001000000010000000000100004.7GB DVD A-E CD-MO Land Pit Land Pit Land CD-ROM 接物鏡 瞄準鏡 雷射二極體 光柵 CD-R DVD-RAM 2.6GB CD-I CD-RW CD-DA 偏光板 Photo CD 1981 1983 1985 1987 1989 1991 1993 1995 1997 1999 FamilyFamily ofof thethe CompactCompact DiscDisc Compact Disc Family CD-Audio CD-ROM CD-Recordable (Red Book) (Yellow Book) (Orange Book) CD-i CD-ROM XA CD-MO CD-WO CD-RW (Green Book) (Yellow Book) (Part I) (Part II) (Part III) MODE 2 CD-i Bridge Enhanced Music CD (Blue Book) Video CD Photo CD (White Book) CompactCompact DiscDisc OverviewOverview z An audio disc stores a stereo signal comprised of two 16- bit data words sampled at 44.1 KHz; thus 1.41 million bits per second of audio data are output from the player. z Error correction, synchronization, and modulation are required, which triple the number of bits stored on a disc. z The channel bit rate, the rate at which data is read from the disc, is 4.3218 Mbps. z A disc containing an hour of music holds about 15.5 billion channel bits. z Apart from modulation and error correction overhead, a CD-DA disc holds a maximum of 6.3 billion bits, or 783 million bytes of user information. CompactCompact DiscDisc OverviewOverview z Information is contained in pits impressed into the disc’s plastic substrate. 00000100010000000100000000010000 Land Pit Land Pit Land CompactCompact DiscDisc OverviewOverview z Pits are encoded with eight-to-fourteen modulation (EFM) for greater storage density, and Cross-Interleave Reed-Solomon code (CIRS) for error correction.
    [Show full text]
  • The Android Platform Security Model∗
    The Android Platform Security Model∗ RENÉ MAYRHOFER, Google and Johannes Kepler University Linz JEFFREY VANDER STOEP, Google CHAD BRUBAKER, Google NICK KRALEVICH, Google Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This paper aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model. CCS Concepts: • Security and privacy → Software and application security; Domain-specific security and privacy architectures; Operating systems security; • Human-centered computing → Ubiquitous and mobile devices. Additional Key Words and Phrases: Android, security, operating system, informal model 1 INTRODUCTION Android is, at the time of this writing, the most widely deployed end-user operating system.
    [Show full text]
  • Pandora Box 3D Arcade 4018 in 1 Wifi Version GAMELIST No
    Pandora Box 3D Arcade 4018 in 1 Wifi Version GAMELIST No. Game Name 1 Tekken 6 2 Tekken 5 3 Mortal Kombat 4 Soul Eater 5 Weekly 6 WWE All Stars 7 Monster Hunter 3 8 Kidou Senshi Gundam 9 Naruto Shippuuden Naltimate Impact 10 METAL SLUG XX 11 BLAZBLUE 12 Pro Evolution Soccer 2012 13 Basketball NBA 06 14 Ridge Racer 2 15 INITIAL D 16 WipeOut 17 Hitman Reborn 18 Magical Girl 19 Shin Sangoku Musou 5 20 Guilty Gear XX Accent Core Plus 21 Fate/Unlimited Code 22 Soulcalibur Broken Destiny 23 Power Stone Collection 24 Fighting Evolution 25 Street Fighter Alpha 3 Max 26 Dragon Ball Z 27 Bleach 28 Pac Man World 3 29 Mega Man X Maverick Hunter 30 LocoRoco 31 Luxor: Pharaoh's Challenge 32 Numpla 10000-Mon 33 7 wonders 34 Numblast 35 Gran Turismo 36 Sengoku Blade 3 (Japanese version) 37 Ranch Story Boys and Girls (Japanese Version) 38 World Superbike Championship 07 (US Version) 39 GPX VS (Japanese version) 40 Super Bubble Dragon (European Version) 41 Strike 1945 PLUS (US version) 42 Element Monster TD (Chinese Version) 43 Ranch Story Honey Village (Chinese Version) 44 Tianxiang Tieqiao (Chinese version) 45 Energy gemstone (European version) 46 Turtledove (Chinese version) 47 Cartoon hero VS Capcom 2 (American version) 48 Death or Life 2 (American Version) 49 VR Soldier Group 3 (European version) 50 Street Fighter Alpha 3 51 Street Fighter EX 52 Bloody Roar 2 53 Tekken 3 54 Tekken 2 55 Tekken 56 Mortal Kombat 4 57 Mortal Kombat 3 58 Mortal Kombat 2 59 The overlord continent 60 Oda Nobunaga 61 Super kitten 62 The battle of steel benevolence 63 Mech
    [Show full text]
  • Deathsmiles Product Introduction
    Deathsmiles Strategy Guide More Than First Expected It is fairly easy to write off a game which has infinite continues and only eight stages as a short game, but to do so would be to completely miss the most important es- sence of Deathsmiles. Tailored for both the core and casual gamer alike, the real incentive of Deathsmiles is to set as high a score as possible in order to work your way up the online rankings board. It sounds easy, but as you will find out, there is far more complexity and chal- lenge than at first sight. This booklet features some basic tips on how to get those high scores in Arcade and Xbox 360 modes, and provides an insight into the challenges ahead. This isn’t your usual shmup where you just hold down the fire button and hope to avoid the bullets. When used in conjunction with the scoring tips section in the game manual, this should provide you with the basis to achieving a higher rank. But knowing what to do is one thing - let’s see how you get on in practice. For those feeling a little bit more ambitious, why not try the fabled ‘one credit com- plete’ - no continues! ————————————————————————— Special thanks go to the following for their advice, strategies and general helpfulness in compiling this information: Will Freeman Jon Rodgers (CAVE) Harry Cole Massive thanks goes to EOJ, curator and administrator of CAVE-STG forum, who’s exceptionally detailed strategy guide is replicated in this document. 2 Making the Future More Fun One of the last shooter and greatest shooter developers for the arcade, CAVE has built a loyal user base thanks to its combi- nation of unique visuals, rewarding score systems and at times, nail-biting difficulty.
    [Show full text]
  • Jeux Video Games MILLON
    V MILLON JEUDI 13 JUIN À 18H - SALLE V jeux video games #1 jeux video games EXPERT : CAMILLE COSTE JEUDI 13 JUIN À 18H - SALLE V V MILLON jeux video games JEUDI 13 JUIN 2013 À 18H EN SALLE V V EXPOSITIONS PUBLIQUES : CONTACT ÉTUDE : SALLE V V - 3 RUE ROSSINI Alexis JACQUEMARD Mercredi 12 juin de 11h à 18h [email protected] Anastasia HIRT [email protected] EXPERT : 5 avenue d’Eylau Camille COSTE 75116 Paris (+33)0 6 48 16 42 09 Tél. : (+33)01 47 27 95 34 [email protected] Fax : (+33)01 47 27 70 89 Integralite des lots reproduits sur notre site www.millon-associes.com exemplaire : / 1 500 Millon & Associés. SVV Agrément n°2002 - 379. Habilités à diriger les ventes : Alexandre Millon, Claude Robert. une première européenne : l’univers du jeux vidéo Des salles d’arcade aux magasins de quartier, des magasins à notre Créant parfois la polémique, restant discret la plupart du temps, salon, de notre salon à notre vitrine et récemment, de nos vitrines le jeu vidéo est plus qu’un simple amusement ; il porte d’ailleurs aux musées tel que le Museum of Modern Art (MoMA) de New York bien mal son triste nom, et devrait probablement être renommé City… “Expérience vidéo interactive“. Réduire à “jeu” le travail d’un scénariste voulant faire passer un message par le biais de ce support Qu’on se le dise, le jeu vidéo est bien aujourd’hui l’une des cultures serait comme réduire le cinéma aux « blockbusters » américains. populaires les plus en vogue, et doit être enfin reconnu comme notre C’est un vaste milieu, qui raconte beaucoup, et qui n’a pas fini de 10ème art pour son univers qui intègre le joueur (parfois spectateur) crier haut et fort ce qu’il a dans le cœur.
    [Show full text]
  • Technology and Obsolescence in America Copyright © 2006 by Giles Slade All Rights Reserved Printed in the United States of America
    Made to Break GILES SLADE Harvard University Press Cambridge, Massachusetts I London, England Made To Break Technology and Obsolescence in America Copyright © 2006 by Giles Slade All rights reserved Printed in the United States of America First Harvard University Press paperback edition, 2007 Library of Congress Cataloging-in-Publication Data Slade, Giles. Made to break : technology and obsolescence in America I Giles Slade. p. cm. ISBN-13 978-0-674-02203-4 (cloth: alk. paper) ISBN-10 0-674-02203-3 (cloth: alk. paper) ISBN-13 978-0-674-02572-1 (pbk.) ISBN-10 0-674-02572-5 (pbk.) 1. Technological innovations-United States. I. Title. T173.8.S595 2006 609.73-dc22 2005036315 Introduction 1 1 Repetitive Consumption 9 2 The Annual Model Change 29 3 Hard Times 57 4 Radio, Radio 83 5 The War and Postwar Progress 115 6 The Fifties and Sixties 151 7 Chips 187 8 Weaponizing Planned Obsolescence 227 9 Cell Phones and E-Waste 261 Notes 283 Acknowledgments 313 Index 316 America, I do not call your name without hope -PABLO NERUDA To scrutinize the trivial can be to discover the monumental. Almost any object can serve to unveil the mysteries of engineering and its relation to art, business, and all other aspects of our culture. HENRY PETROSKI, THE PENCIL: A HISTORY (1989) For no better reason than that a century of advertising has condi­ tioned us to want more, better, and fa ster from any consumer good we purchase, in 2004 about 315 million working PCs were retired in North America. Of these, as many as 10 percent would be refurbished and reused, but most would go straight to the trash heap.
    [Show full text]