Bygone Battles

Total Page:16

File Type:pdf, Size:1020Kb

Bygone Battles LINUX USER Retro-Gaming Emulating Legacy Game Platforms Bygone Battles Do you miss your trusty Sinclair Spectrum? Do you long for the Commodore you know only in your history books? Old platforms come alive using the tools of the retro-gamers. BY IAN POINTER efore the computer industry set- tled on the IBM PC, there were Bmany different types of computers with exotic-sounding names like Enter- prise, Oric, Dragon, Electron, Spectrum, and Amiga. Although these machines are no longer with us, most of these legacy systems sill have ardent fans that keep their memory alive. These fans prefer the simplicity of the older era – when pro- grams had to fit inside tiny quantities of memory and programmers had to use Gavin Banns,Gavin www.visipix.com every trick they could imagine to get the most out of a computer – to the fast processors and gigabytes storage of today. These enthusiasts are more common than you might think; the coming of the Internet has allowed people from all across the world to reminisce about the past, and for the last eight years, a Clas- can even use Linux to develop new pro- found at http://www.libsdl.org. It is sic Gaming Expo (http://www.cgexpo. grams for these old computers. probably best to download the source com) has been held in America, with and build it manually, so you can be sure exhibitions from big arcade firms like Sinclair Spectrum it doesn’t use older graphics systems like Midway and Konami, plus lectures from The Spectrum, released in 1982, was the svgalib. hardware geniuses such as Steve Woz- most popular home computer in the UK, Fuse emulates all the major revisions niak, co-founder of Apple. and it is fondly remembered for its of the Spectrum, including the American While purists will be satisfied with strange rubber keyboard. Despite its lim- Timex versions plus some of the Russian nothing less than the real machines, ited color and sound abilities, it built up clones. It also has a method of recording in many cases this is not practical or pos- an impressive software library, compris- applications you are using for later play- sible, and so the enthusiasts started ing thousands of games and other types back, so you can send proof that you writing programs called emulators, of applications. It went through multiple have completed Jet Set Willy to all your which allow old computers to be simu- revisions, starting with the humble origi- friends. The interface is a little esoteric; lated on today’s hardware. These nal with 16 Kilobytes of RAM, to a the menu system within the emulator is programs often go beyond the original’s version with a 3” inch disk drive, a custom built and accessed via the func- capabilities, for example allowing the proper keyboard, an improved sound tion keys. This makes reading the state of the computer to be saved for chip, and 128 Kilobytes of RAM. The accompanying documentation almost later use (useful when playing games), Spectrum also flourished in the Soviet essential, although for most cases, press- or providing the ability to communicate Union; the plans for the machine were ing F1, ‘F’ for File, and ‘O’ to load a with other copies of the emulator over smuggled across the Iron Curtain, lead- Spectrum image file will be enough to the Internet. ing to the production of many illegal get by. This article will explain where to clones. World of Spectrum [1] is a repository obtain some of the more popular Linux- Fuse is a Spectrum emulator for Linux for Sinclair information, and it contains based emulators (starting with the early that can be found at http://fuse- scans of magazines and copies of the 8-bit systems then moving on to 16-bit emulator.sourceforge.net. Like all the manuals, as well as thousands of games computers and consoles),where to get emulators in this article, it works best and other software. Five games that are software to run on them, and how you with the SDL libraries, which can be worth seeking out are: 3D Deathchase, 78 December 2004 www.linux-magazine.com Retro-Gaming LINUX USER Jet Set Willy (seen in Figure 1), Dan Dare into the 16-bit era. It was popular with III, Robocop, and Chaos. filmmakers due to a hardware add-on called the Video Toaster, which allowed Commodore 64 the Amiga to mix digital effects with While the Spectrum was the computer of video, and was used to generate some of the UK and Russia, in the rest of the the special effects for TV series such as world the Commodore 64 was the most SeaQuest DSV and Babylon 5. popular 8-bit system. For its time, it had There were many different versions of wonderful graphics, a proper keyboard, the Amiga, from the original Amiga 1000 and a sound chip that still sounds in 1985, the more common Amiga 500 impressive today. Over ten thousand model, and even ending up as the applications were released for it during insides of a CD-ROM based console, the its lifespan, and the addition of a disk unsuccessful CD-32. The Amiga is some- drive meant that it had more ambitious thing of a survivor, with a committed Figure 2: Impossible Mission on VICE. applications than the Spectrum, for user base that has stuck by it as it was example GEOS, a primitive GUI window- passed from company to compnay fol- EUAE is rather complex to use; it has ing system. lowing the collapse of Commodore in the standard GTK library for its user There are several C64 emulators for 1994. The Amiga is now owned by the interface, but because there are so many Linux, but the most comprehensive is Amiga Corporation, which is trying to different varieties of Amiga, each of VICE (http://www.viceteam.org). Not market the technology for use in mobile which can have different amounts of only does VICE emulate the C64, but it devices. hard drives, disk drives, and even types also includes emulators to run the PET, A Linux emulator called Unix Amiga of memory, the emulator has an over- VIC-20, C-16, the Plus/4, and the C128 Emulator (UAE) has existed for several whelming amount of options available. machines as well, which is almost every years, but for the past year, development However, for most games, the standard Commodore machine up until the has focussed on the Windows port, Win- options will suffice. release of the Amiga. UAE, and the original version has been Like the ROM, most Amiga games are VICE can record snapshots for later neglected. Richard Drummond forked not freely available, but certain compa- playback, and it also allows the video the orignal codebase, and maintains nies have given permission for their and audio streams to be recorded in what he calls Experimental UAE at games to be distributed at no charge. You MPEG form, as long as the ffmpeg library http://www.rcdrummond.net/uae, which will find several at the Amiga In A Box is present. The user interface is rather incorporates many of the recent addi- website [4]. Another good resource is confusing; menus are accessed via hold- tions to WinUAE. Aminet [5], which contains a vast array ing the left or right mouse buttons, and Unfortunately, you can’t just down- of public domain/shareware/GPL games you must select the item before releasing load the emulator and expect it to work and utilities. Commercial games you the button. straightaway. The Amiga stored part of should try and seek out are Sensible Soc- There are also some installation its operating system on a ROM chip cer (shown in Figure 3), Midwinter, issues; I built VICE from source and used known as Kickstart, and EUAE requires a Cannon Fodder, Formula 1 Grand Prix, make install as usual, but when running copy of this ROM. While the Spectrum and Gravity Power. the emulator, I found I couldn’t type any- and C64 ROM images have been released thing on the C64 screen. It turned out for free distribution, the Amiga ROM is Atari ST that I needed to set a keymap file indi- the property of Amiga Corporation and is Atari’s answer to the Amiga was the ST, vidually via the right-mouse button still protected by copyright laws. You a similar machine in some respects as it menu. Apart from those glitches, VICE is can, however, buy a copy of the Kickstart used the same CPU, but it lacked the a very good emulator. ROMs from the Amiga Forever website Amiga’s custom-built sound and graph- For C64 games, C64.com [2] is a good [3], at the price of $29.99. ics chips. However, a dedicated MIDI resource. It isn’t as thorough as World of interface on the machine made the ST Spectrum, but it contains most of the the system of choice of musicians best games available for the system. The around the world. Like the Amiga, it site has downloads available as tape and went through several revisions, eventu- disk images. From this archive, five rec- ally metamorphosing into the Atari ommended games are: International Falcon, an ill-fated machine that would Karate +, Little Computer People, Wiz- be the last Atari computer. ball, California Games, and Impossible Hatari, found at http://hatari. Mission (shown in Figure 2). sourceforge.net, is an ST emulator for Linux. It is in the beginning stages of Commodore Amiga development, but although it isn’t com- The Amiga furthered Commodore’s rep- plete, it is advanced enough to run many utation for making impressive computers Figure 1: Jet Set Willy running on FUSE.
Recommended publications
  • How Do Fixes Become Bugs?
    How Do Fixes Become Bugs? A Comprehensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating Systems Zuoning Yin‡, Ding Yuan‡, Yuanyuan Zhou†, Shankar Pasupathy∗, Lakshmi Bairavasundaram∗ ‡Department of Computer Science, Univ. of Illinois at Urbana-Champaign, Urbana, IL 61801, USA {zyin2, dyuan3}@cs.uiuc.edu †Department of Computer Science and Engineering, Univ. of California, San Diego, La Jolla , CA 92093, USA [email protected] ∗NetApp Inc., Sunnyvale, CA 94089, USA {pshankar, lakshmib}@netapp.com ABSTRACT Keywords: Incorrect fixes, software bugs, bug fixing, hu- Software bugs affect system reliability. When a bug is ex- man factor, testing posed in the field, developers need to fix them. Unfor- tunately, the bug-fixing process can also introduce errors, 1. INTRODUCTION which leads to buggy patches that further aggravate the damage to end users and erode software vendors’ reputa- 1.1 Motivation tion. As a man-made artifact, software suffers from various er- This paper presents a comprehensive characteristic study rors, referred to as software bugs, which cause crashes, hangs on incorrect bug-fixes from large operating system code bases or incorrect results and significantly threaten not only the including Linux, OpenSolaris, FreeBSD and also a mature reliability but also the security of computer systems. Bugs commercial OS developed and evolved over the last 12 years, are detected either during testing before release or in the investigating not only the mistake patterns during bug-fixing field by customers post-release. Once a bug is discovered, but also the possible human reasons in the development pro- developers usually need to fix it.
    [Show full text]
  • Cryptomator Documentation Release 1.5.0
    Cryptomator Documentation Release 1.5.0 Cryptobot Sep 15, 2021 Desktop 1 Setup 3 1.1 Windows...............................................3 1.2 macOS................................................3 1.3 Linux.................................................3 2 Getting Started 5 3 Adding Vaults 7 3.1 Create a New Vault..........................................8 3.2 Open an Existing Vault........................................ 13 4 Accessing Vaults 15 4.1 Unlocking a Vault.......................................... 16 4.2 Working with the Unlocked Vault.................................. 17 4.3 Locking a vault............................................ 18 5 Password And Recovery Key 21 5.1 Change Password........................................... 21 5.2 Show Recovery Key......................................... 22 5.3 Reset Password............................................ 23 6 Vault Mounting 27 6.1 General Adapter Selection...................................... 27 6.2 Options applicable to all Systems and Adapters........................... 27 6.3 WebDAV-specific options...................................... 28 6.4 Dokany-specific options....................................... 28 6.5 FUSE-specific options........................................ 28 7 Vault Management 29 7.1 Remove Vaults............................................ 29 7.2 Reorder Vaults............................................ 29 7.3 Vault Options............................................. 29 8 Setup 33 8.1 Google PlayStore..........................................
    [Show full text]
  • Cinemaware for Blackberry
    Fort Worth Dallas publishers got their start on the Cinemaware Amiga. The high-quality production Originally founded in 1985, of games from the likes of Team 17, Cinemaware became an innovative for Blackberry Ocean, EA, Factor 5, Lucas Arts, force in interactive entertainment April 2013 April Bitmap Brothers and Cinemaware, to across multiple platforms of Special BlackBerry Z10 launch price name just a few, coupled with the computers, consoles and mobile break from $ 2.99 to $.99 for a state-of-the-art hardware made an devices. With its titles rooted in limited time unbeatable combination. Today classic movie genres and renowned Amiga, Inc. is working with these for their Hollywood-caliber Cinemaware® and Amiga are publishers to make many of these production values. bringing their famous titles to amazing games available to play once BlackBerry again. Cinemaware titles delivered immersive storytelling and MIAMI, Florida/SEATTLE, Calling all classic Amiga game innovative gameplay. The company Washington, USA. — March 14, 2013 developers and publishers… If you rocketed to the top of the gaming Amiga, Inc. and Cinemaware (the hold the publishing rights to a world with its inaugural 1986 release, company which originally introduced commercial Amiga game or Defender of the Crown®, which was cinematic storytelling into games) are application, or know somebody that followed up by several other working together to bring the entire does, then we are seeking to get in dazzling titles including S.D.I.™, The Cinemaware catalog of Amiga games touch with you. Amiga are bringing King of Chicago™, Sinbad and the to the latest BlackBerry® devices.
    [Show full text]
  • Cinemaware-Regcard
    HERE'S YOUR CHANCE TO WIN A NEW CINEMAWARE OR SPOTLIGHT PRODUCT EUERY MONTH OF THE YEAR!!! That's right. When you send in a Registration Card, you're automatically eligible for our monthly drawing. The prize? Any product from the current Cinemaware or Spotlight line (no restrictions). And tt you don't win this month, maybe you'll win the next, or the next, because you're eligible forever (barring some natural disaster, of course). And when you buy other Cinemaware or Spotlight products and return those Registration Cards, your chances of winning increase! Plus, you'll receive updates on new products, other giveaways, special promotions, and more! Don't miss out! Fill out both sides of the Registration Card and send it back now! REGISTRATION CARD Product Title _____________________ Your Name ______________________ Street Address _____________________ City, State, Zip _____________________ Home Phone L)_____ _ Business Phone(_) _______ 1 How do you rate the product ? Excellent Good Satisfactory Poor 2 How do you rate the instructions? Excellent Good Satisfactory Poor 3 Please explain why you rated the product and instructions this way: 4 How many other Cinemaware/Spotlight products do you own? ____ 5 Describe the person who uses this program (circle all that apply) : Male Female Married Si~le Under 12 12-18 19-25 2&37 38-54 55+ 6 What influenced your decision to buy this product (circle all that apply)? Review Magazine ad Newspaper ad Product Packaging Salesclerk Friend or relative Promotion Other ------ 7 Computer system product will be used on (circle only one): Commodore 64/128 Atari ST Apple llGS Am iga Macintosh II Macintosh Plus/SE IBM PC/XT/AT Other __________ EUERY CINEMRWRRE OR SPOTLIGHT GRME BRINGS YOU CLOSER TO R FREE GIFT! We recognize the value of loyal customers.
    [Show full text]
  • Grazie Commodore ! !
    MUSICA PER I VOSTRI OCCHI 24" Salone Internazionale della Musica e High Fidelity International Video and Consumer Electronics Show Fiera Milano 20/24 Settembre 1 990 ALTA FEDELTÀ CAR AMRM SYSTEMS ELETTRONICA DI CONSUMO HI-FI CAR HOME VIDEO PERSONAL COMPUTER STRUMENTI MUSICALI TV VIDEOREGISTRAZIONE Ingressi: Piazza Carlo Magno - Via Gattamelata dr Orario: 9.00/18.00 - Pad. 7-12-1 3-14-14A/B-15 @W8 Aperto al pubblico: 20-2 1-22-23 settembre Rassegna delle 4P"?ii*Festab per i giovani videocassette registrate Giornata professionale: lunedì 24 settembre musicisti Segreteria Generale SIM-HIoFI-IVES: Via Domenichino, 1 1 - 20 149 Milano - Tel. (02)48 1 554 1 - Telex 3 1 3627 - Fax (02)4980330 Som Editoriale Posta I lettori ci scrivono ... Trends Novita da tutto il mondo Art Gallery Artisti con Amiga Speciale Grafica Arti vive Spazio MIDI Programma Editor/Li brarian per MT32 AmigaAwenture 27 Politica commerciale. .. Novità Commodore 57 2.0: Il futuro di Amiga Public Domain 28 The last Amiga PCopy 2.0 & Mostra 1 .O1 Grazie Commodore ! ! Grafica 3-Demon un unti, font, template e altro ON DISK 33 Manifestazioni 10 fantastici programmi e.. Le pagine di Transactor per Amiga 35 Fiere AMO1 - Un creatore di isole ABACUS alla Grande Fiera d'Aprile Il generatore di parser Bison/Yacc Linguaggio Assembly (Parte IV) Font Calligrapher Programmazione Facile 33 Un gioco tutto nostro (Parte I) Videogiochi 76 In copertina il nuovo Amiga 3000 3 Daniel Raker-Harberi 13ce Manino Sangiorgio Brian W Kernighan Arihur Nairnan AUTOCAD IL MANUALE Dennis M Ritchie WORDSTAR
    [Show full text]
  • Openbsd Gaming Resource
    OPENBSD GAMING RESOURCE A continually updated resource for playing video games on OpenBSD. Mr. Satterly Updated August 7, 2021 P11U17A3B8 III Title: OpenBSD Gaming Resource Author: Mr. Satterly Publisher: Mr. Satterly Date: Updated August 7, 2021 Copyright: Creative Commons Zero 1.0 Universal Email: [email protected] Website: https://MrSatterly.com/ Contents 1 Introduction1 2 Ways to play the games2 2.1 Base system........................ 2 2.2 Ports/Editors........................ 3 2.3 Ports/Emulators...................... 3 Arcade emulation..................... 4 Computer emulation................... 4 Game console emulation................. 4 Operating system emulation .............. 7 2.4 Ports/Games........................ 8 Game engines....................... 8 Interactive fiction..................... 9 2.5 Ports/Math......................... 10 2.6 Ports/Net.......................... 10 2.7 Ports/Shells ........................ 12 2.8 Ports/WWW ........................ 12 3 Notable games 14 3.1 Free games ........................ 14 A-I.............................. 14 J-R.............................. 22 S-Z.............................. 26 3.2 Non-free games...................... 31 4 Getting the games 33 4.1 Games............................ 33 5 Former ways to play games 37 6 What next? 38 Appendices 39 A Clones, models, and variants 39 Index 51 IV 1 Introduction I use this document to help organize my thoughts, files, and links on how to play games on OpenBSD. It helps me to remember what I have gone through while finding new games. The biggest reason to read or at least skim this document is because how can you search for something you do not know exists? I will show you ways to play games, what free and non-free games are available, and give links to help you get started on downloading them.
    [Show full text]
  • How Do Fixes Become Bugs?
    How Do Fixes Become Bugs? A Comprehensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating Systems Zuoning Yin‡, Ding Yuan‡, Yuanyuan Zhou†, Shankar Pasupathy∗, Lakshmi Bairavasundaram∗ ‡Department of Computer Science, Univ. of Illinois at Urbana-Champaign, Urbana, IL 61801, USA {zyin2, dyuan3}@cs.uiuc.edu †Department of Computer Science and Engineering, Univ. of California, San Diego, La Jolla , CA 92093, USA [email protected] ∗NetApp Inc., Sunnyvale, CA 94089, USA {pshankar, lakshmib}@netapp.com ABSTRACT Keywords: Incorrect fixes, software bugs, bug fixing, hu- Software bugs affect system reliability. When a bug is ex- man factor, testing posed in the field, developers need to fix them. Unfor- tunately, the bug-fixing process can also introduce errors, 1. INTRODUCTION which leads to buggy patches that further aggravate the damage to end users and erode software vendors’ reputa- 1.1 Motivation tion. As a man-made artifact, software suffers from various er- This paper presents a comprehensive characteristic study rors, referred to as software bugs, which cause crashes, hangs on incorrect bug-fixes from large operating system code bases or incorrect results and significantly threaten not only the including Linux, OpenSolaris, FreeBSD and also a mature reliability but also the security of computer systems. Bugs commercial OS developed and evolved over the last 12 years, are detected either during testing before release or in the investigating not only the mistake patterns during bug-fixing field by customers post-release. Once a bug is discovered, but also the possible human reasons in the development pro- developers usually need to fix it.
    [Show full text]
  • To FUSE Or Not to FUSE? Analysis and Performance Characterization of the FUSE User-Space File System Framework
    To FUSE or not to FUSE? Analysis and Performance Characterization of the FUSE User-Space File System Framework A Thesis Presented by Bharath Kumar Reddy Vangoor to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science Stony Brook University Technical Report FSL-16-02 December 2016 Copyright by Bharath Kumar Reddy Vangoor 2016 Stony Brook University The Graduate School Bharath Kumar Reddy Vangoor We, the thesis committee for the above candidate for the Master of Science degree, hereby recommend acceptance of this thesis. Signature: Dr. Erez Zadok, Thesis Advisor Professor, Computer Science Signature: Dr. Mike Ferdman, Thesis Committee Chair Assistant Professor, Computer Science Signature: Dr. Vasily Tarasov IBM Research – Almaden This thesis is accepted by the Graduate School Charles Taber Dean of the Graduate School ii Abstract of the Thesis To FUSE or not to FUSE? Analysis and Performance Characterization of the FUSE User-Space File System Framework by Bharath Kumar Reddy Vangoor Master of Science in Computer Science Stony Brook University December 2016 Traditionally, file systems were implemented as part of operating systems kernels, which provide a limited set of tools and facilities to a programmer. As complexity of file systems grew, many new file systems began being developed in user space. Low performance is considered the main disadvan- tage of user-space file systems but the extent of this problem has never been explored systematically. As a result, the topic of user-space file systems remains rather controversial: while some consider user-space file systems a “toy” not to be used in production, others develop full-fledged production file systems in user space.
    [Show full text]
  • Compute! the Choice of Home PC Enthusiasts Since
    MIBROMIBRO COCOM 64 WEST 36th STREET, NEW YORK CITY, N.Y. 10018 ORDERSORDERS ONLYONLY | "800"45 I "9780 N.Y.N'Y* RESIDENTSRESIDENTS (111)<212) 695·711)695-7133 1 , sconCOrTl LEADING EDGE ~ i r-,_, MODEL D MODEL DlD2 25 PC PACKAGE 25 PC. PACKAGE ~~Oiii ~ 15 Pc. PACKAGE 15 PC. PACKAGE - ' ;;;;;;~~!. 18MIBM XT COMPATIBLECOMPATIBLE-!> IBMIBM AT COMPAneLPCOMPATIBLE- COMMODORE 64 COMMODORE 64 PACKAGE INCLUDES: Model 0 CPU & Keyboard *12" PACKAGE INCLUDES Modal 02 CPJ S Keyboard *12" 25 PC. DREAM OUTFIT 25 PC PROFESSIONAL OUTFIT Computer MonitorDiskettes *Wod «10 Processor •Spread Computer Monitor *H) Diskettes •Word Processor 'Spread Sheet *Dau Base <- jt £% A Sheet •Data Base S Q Q Q OUTFITOUTFIT INCINCLUDES:l UOES: CommodoreCommodore 6464 KeyboaJdKeyboard OUTFITOUTFIT INClUDES: CormJOdoreCommodore INCIUDES: 6464 Keyboard -*J5411541 Disc Drive •Commodore Printer -■ 15411541 Disc Drive Disc -•CommodoieCommodore Printer D,sc Drive - Commodore Pr in ter UME PACKAGE AVAILABLE WITHl SAME PACKAGE AVAILABLE WITHl •12" Monochrome Manitoi •13" Color Monitor DUAL DiUVE (f4S 10 MEGABYTE HARD DRIVE SIO4I -12" MOllOchrome ManitOI' S298 - 13" ~oIor MOIIItOI color system s«4e ■10 Diskettes $298 10 Diskettes $348 ID MEGABYTE HARD DRIVI I IMS 01) Olskelles . 1) Olskelles 10 MEGABYTE HARD DRIVI (741 40 MEGABYTE HARD DRIVE SUM CZ(:t COrTlrTlcommodore-O-d- ro-r-e~=~ EPSON iii COMMODORErnMMnnnDE COMMODORE COLT COMMODORE PC-40 EQUITY II EQUITY J86386 i 'w;:=-..' 1525 pc.PC. PACKAGE PC-40 25 PC. PACKAGE 25 PC PACKAGE IBM XT 1525 PC. PACKAGE 1$ pc. PACKAGE', -'-'i~~!::! r.. -r.;a IBM AT COMPATIBLE IBM AT " COMPATIBLE IBM AT ~ '_ IBM AT COMPATIBLE~ OUTFIT IINCLUDES:NCLUDES: Commodore Col!Colt 'Dual Drive COMPATIBLECOMPATIBLE*(II) PACKAGE INCINCLUDES:LUOES: E~'yEqmly IIII +4 CPU && KlytIoardKeyboard .
    [Show full text]
  • Aboard the Impulse Train: an Analysis of the Two- Channel Title Music Routine in Manic Miner Kenneth B
    All aboard the impulse train: an analysis of the two- channel title music routine in Manic Miner Kenneth B. McAlpine This is the author's accepted manuscript. The final publication is available at Springer via http://dx.doi.org/10.1007/s40869-015-0012-x All Aboard the Impulse Train: An analysis of the two-channel title music routine in Manic Miner Dr Kenneth B. McAlpine University of Abertay Dundee Abstract The ZX Spectrum launched in the UK in April 1982, and almost single- handedly kick-started the British computer games industry. Launched to compete with technologically-superior rivals from Acorn and Commodore, the Spectrum had price and popularity on its side and became a runaway success. One area, however, where the Spectrum betrayed its price-point was its sound hardware, providing just a single channel of 1-bit sound playback, and the first-generation of Spectrum titles did little to challenge the machine’s hardware. Programmers soon realised, however, that with clever machine coding, the Spectrum’s speaker could be encouraged to do more than it was ever designed to. This creativity, borne from constraint, represents a very real example of technology, or rather limited technology, as a driver for creativity, and, since the solutions were not without cost, they imparted a characteristic sound that, in turn, came to define the aesthetic of ZX Spectrum music. At the time, there was little interest in the formal study of either the technologies that support computer games or the social and cultural phenomena that surround them. This retrospective study aims to address that by deconstructing and analysing a key turning point in the musical life of the ZX Spectrum.
    [Show full text]
  • The Android Platform Security Model∗
    The Android Platform Security Model∗ RENÉ MAYRHOFER, Google and Johannes Kepler University Linz JEFFREY VANDER STOEP, Google CHAD BRUBAKER, Google NICK KRALEVICH, Google Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This paper aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model. CCS Concepts: • Security and privacy → Software and application security; Domain-specific security and privacy architectures; Operating systems security; • Human-centered computing → Ubiquitous and mobile devices. Additional Key Words and Phrases: Android, security, operating system, informal model 1 INTRODUCTION Android is, at the time of this writing, the most widely deployed end-user operating system.
    [Show full text]
  • Improving Software Quality with Programming Patterns Tung Thanh Nguyen Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2013 Improving software quality with programming patterns Tung Thanh Nguyen Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Engineering Commons Recommended Citation Nguyen, Tung Thanh, "Improving software quality with programming patterns" (2013). Graduate Theses and Dissertations. 13576. https://lib.dr.iastate.edu/etd/13576 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Improving software quality with programming patterns by Tung Thanh Nguyen A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Computer Engineering Program of Study Committee: Tien N. Nguyen, Major Professor Suraj C. Kothari Manimaran Govindarasu Akhilesh Tyagi Samik Basu Iowa State University Ames, Iowa 2013 Copyright ⃝c Tung Thanh Nguyen, 2013. All rights reserved. ii TABLE OF CONTENTS LIST OF TABLES . vi LIST OF FIGURES . vii ACKNOWLEDGEMENTS . ix ABSTRACT . xi CHAPTER 1. INTRODUCTION . 1 1.1 Software Quality Problem . 1 1.2 Reuse Practice and Reuse-related Bugs . 3 1.3 Programming Patterns . 8 1.3.1 GROUM: Graph-based object usage model . 10 1.3.2 SLAMC: Statistical semantic language model for source code . 14 1.4 Related Publications and Dissertation Outline . 16 1.4.1 Related publications .
    [Show full text]