Entertainment Software Association
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Bootstomp: on the Security of Bootloaders in Mobile Devices
BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna, UC Santa Barbara https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna fnredini, machiry, dipanjan, yanick, antoniob, edg, yans, chris, [email protected] University of California, Santa Barbara Abstract by proposing simple mitigation steps that can be im- plemented by manufacturers to safeguard the bootloader Modern mobile bootloaders play an important role in and OS from all of the discovered attacks, using already- both the function and the security of the device. They deployed hardware features. help ensure the Chain of Trust (CoT), where each stage of the boot process verifies the integrity and origin of 1 Introduction the following stage before executing it. This process, in theory, should be immune even to attackers gaining With the critical importance of the integrity of today’s full control over the operating system, and should pre- mobile and embedded devices, vendors have imple- vent persistent compromise of a device’s CoT. However, mented a string of inter-dependent mechanisms aimed at not only do these bootloaders necessarily need to take removing the possibility of persistent compromise from untrusted input from an attacker in control of the OS in the device. -
What Motivates the Authors of Video Game Walkthroughs and Faqs? a Study of Six Gamefaqs Contributors Michael Hughes Trinity University, [email protected]
Trinity University Digital Commons @ Trinity Library Faculty Research Coates Library 1-1-2018 What Motivates the Authors of Video Game Walkthroughs and FAQs? A Study of Six GameFAQs Contributors Michael Hughes Trinity University, [email protected] Follow this and additional works at: https://digitalcommons.trinity.edu/lib_faculty Part of the Library and Information Science Commons Repository Citation Hughes, M.J. (2018). What motivates the authors of video game walkthroughs and FAQs? A study of six GameFAQs contributors. First Monday, 23(1), 1-13. doi: 10.5210/fm.v23i1.7925 This Article is brought to you for free and open access by the Coates Library at Digital Commons @ Trinity. It has been accepted for inclusion in Library Faculty Research by an authorized administrator of Digital Commons @ Trinity. For more information, please contact [email protected]. First Monday, Volume 23, Number 1 - 1 January 2018 Walkthroughs, also known as FAQs or strategy guides, are player-authored documents that provide step-by-step instructions on how to play and what to do in order to finish a given video game. Exegetical in their length and detail, walkthroughs require hours of exacting labor to complete. Yet authors are rarely compensated for work that markedly differs from other kinds of fan creativity. To understand their motivations, I interviewed six veteran GameFAQs authors, then inductively analyzed the transcripts. Open coding surfaced five themes attributable to each participant. Together, these themes constitute a shifting mix of motivations, including altruism, community belonging, self-expression, and recognition — primarily in the form of feedback and appreciation but also from compensation. -
Computer Game Mods, Modders, Modding, and the Mod Scene
Computer Game Mods, Modders, Modding, and the Mod Scene Walt Scacchi Institute for Software Research and Center for Computer Games and Virtual Worlds University of California, Irvine 92697-3455 USA March 2010 Abstract Computer games have increasingly been the focus of user-led innovations in the form of game mods. This paper examines how different kinds of socio-technical affordances serve to organize the actions of the people who develop and share their game mods. The affordances examined include customization and tailoring mechanisms, software and content copyright licenses, game software infrastructure and development tools, career contingencies and organizational practices of mod teams, and social worlds intersecting the mod scene. Numerous examples will be used to ground this review and highlight how such affordances can organize, facilitate or constrain what can be done. Overall, this study helps to provide a deeper understanding of how a web of associated affordances collectively serve to govern what mods get made, how modding practices emerge and flourish, and how modders and the game industry serve each others' interests, though not always in equivocal terms. Introduction Computer game mods are a leading form of user-led innovation in game design and game play experience. But modded games are not standalone systems, as they require the user to have an originally acquired or authorized copy of the unmodded game. Thus, there are questions of not only who creates what and who owns such modified games, but also whether or how the practice of game modding is controlled or governed by external parties to ultimately exploit the efforts of game modders. -
List of Notable Handheld Game Consoles (Source
List of notable handheld game consoles (source: http://en.wikipedia.org/wiki/Handheld_game_console#List_of_notable_handheld_game_consoles) * Milton Bradley Microvision (1979) * Epoch Game Pocket Computer - (1984) - Japanese only; not a success * Nintendo Game Boy (1989) - First internationally successful handheld game console * Atari Lynx (1989) - First backlit/color screen, first hardware capable of accelerated 3d drawing * NEC TurboExpress (1990, Japan; 1991, North America) - Played huCard (TurboGrafx-16/PC Engine) games, first console/handheld intercompatibility * Sega Game Gear (1991) - Architecturally similar to Sega Master System, notable accessory firsts include a TV tuner * Watara Supervision (1992) - first handheld with TV-OUT support; although the Super Game Boy was only a compatibility layer for the preceding game boy. * Sega Mega Jet (1992) - no screen, made for Japan Air Lines (first handheld without a screen) * Mega Duck/Cougar Boy (1993) - 4 level grayscale 2,7" LCD - Stereo sound - rare, sold in Europe and Brazil * Nintendo Virtual Boy (1994) - Monochromatic (red only) 3D goggle set, only semi-portable; first 3D portable * Sega Nomad (1995) - Played normal Sega Genesis cartridges, albeit at lower resolution * Neo Geo Pocket (1996) - Unrelated to Neo Geo consoles or arcade systems save for name * Game Boy Pocket (1996) - Slimmer redesign of Game Boy * Game Boy Pocket Light (1997) - Japanese only backlit version of the Game Boy Pocket * Tiger game.com (1997) - First touch screen, first Internet support (with use of sold-separately -
NVIDIA Launches Tegra X1 Mobile Super Chip
NVIDIA Launches Tegra X1 Mobile Super Chip Maxwell GPU Architecture Delivers First Teraflops Mobile Processor, Powering Deep Learning and Computer Vision Applications NVIDIA today unveiled Tegra® X1, its next-generation mobile super chip with over one teraflops of processing power – delivering capabilities that open the door to unprecedented graphics and sophisticated deep learning and computer vision applications. Tegra X1 is built on the same NVIDIA Maxwell™ GPU architecture rolled out only months ago for the world's top-performing gaming graphics card, the GeForce® GTX 980. The 256-core Tegra X1 provides twice the performance of its predecessor, the Tegra K1, which is based on the previous-generation Kepler™ architecture and debuted at last year's Consumer Electronics Show. Tegra processors are built for embedded products, mobile devices, autonomous machines and automotive applications. Tegra X1 will begin appearing in the first half of the year. It will be featured in the newly announced NVIDIA DRIVE™ car computers. DRIVE PX is an auto-pilot computing platform that can process video from up to 12 onboard cameras to run capabilities providing Surround-Vision, for a seamless 360-degree view around the car, and Auto-Valet, for true self-parking. DRIVE CX is a complete cockpit platform designed to power the advanced graphics required across the increasing number of screens used for digital clusters, infotainment, head-up displays, virtual mirrors and rear-seat entertainment. "We see a future of autonomous cars, robots and drones that see and learn, with seeming intelligence that is hard to imagine," said Jen-Hsun Huang, CEO and co-founder, NVIDIA. -
Last Line of Defence Cyber Security of Industrial Control Sys- Tems
Last line of defence Cyber security of industrial control sys- tems M. Luchs Delft University of Technology LASTLINEOFDEFENCE CYBER SECURITY OF INDUSTRIAL CONTROL SYSTEMS by M. Luchs in partial fulfillment of the requirements for the degree of Master of Science in Offshore and Dredging Engineering at the Delft University of Technology, to be defended publicly on Wednesday October 26th, 2016 at 14:00 PM. Supervisor: dr. ir. C. Doerr Thesis committee: Prof. dr. C. van Rhee, TU Delft dr. ir. S. A. Miedema, TU Delft Ir. F.van der Heijden, Heerema Fabrication Group An electronic version of this thesis is available at http://repository.tudelft.nl/. PREFACE Before you lies the thesis "Last line of defence: Cyber security of industrial control systems". This work in- vestigates the state of cyber security within the offshore and dredging industry, the result of which has led to the proposal of a novel intrusion detection system for industrial control systems. It is written to complete the graduation requirements of the MSc program Offshore and Dredging Engineering at the Delft University of Technology. The project has been undertaken in collaboration with Heerema Fabrication Group whom where looking to increase their awareness on cyber security. Investigating the state of cyber security within the offshore and dredging industry has led to the research question, which was formulated together with my supervisor from the TU-Delft, Christian Doerr. The work has proven challenging at times, in part because the subject is fairly unexplored terrain, and also my missing of a background in cyber security and computer networks. Nonethe- less it has provided me with many avenues for growth and learning, especially since both the TU-Delft as HFG provided me the option to freely explore and thus gain insights broader then in one area of focus alone. -
MINDSTORMS EV3 User Guide
User Guide TABLE OF CONTENTS Introduction + Welcome ...................................................................................................................... 3 + How to Use This Guide .................................................................................... 4 + Help ................................................................................................................................. 5 EV3 Technology + Overview ..................................................................................................................... 6 + EV3 Brick ..................................................................................................................... 7 Overview ...................................................................................................................... 7 Installing Batteries ............................................................................................... 10 Turning On the EV3 Brick ................................................................................ 11 + EV3 Motors ................................................................................................................. 12 Large Motor ............................................................................................................... 12 Medium Motor ......................................................................................................... 12 + EV3 Sensors ............................................................................................................ -
Co-Optimizing Performance and Memory Footprint Via Integrated CPU/GPU Memory Management, an Implementation on Autonomous Driving Platform
Co-Optimizing Performance and Memory Footprint Via Integrated CPU/GPU Memory Management, an Implementation on Autonomous Driving Platform Soroush Bateni*, Zhendong Wang*, Yuankun Zhu, Yang Hu, and Cong Liu The University of Texas at Dallas Abstract—Cutting-edge embedded system applications, such as launches the OpenVINO toolkit for the edge-based deep self-driving cars and unmanned drone software, are reliant on learning inference on its integrated HD GPUs [4]. integrated CPU/GPU platforms for their DNNs-driven workload, Despite the advantages in SWaP features presented by the such as perception and other highly parallel components. In this work, we set out to explore the hidden performance im- integrated CPU/GPU architecture, our community still lacks plication of GPU memory management methods of integrated an in-depth understanding of the architectural and system CPU/GPU architecture. Through a series of experiments on behaviors of integrated GPU when emerging autonomous and micro-benchmarks and real-world workloads, we find that the edge intelligence workloads are executed, particularly in multi- performance under different memory management methods may tasking fashion. Specifically, in this paper we set out to explore vary according to application characteristics. Based on this observation, we develop a performance model that can predict the performance implications exposed by various GPU memory system overhead for each memory management method based management (MM) methods of the integrated CPU/GPU on application characteristics. Guided by the performance model, architecture. The reason we focus on the performance impacts we further propose a runtime scheduler. By conducting per-task of GPU MM methods are two-fold. -
Toolchains Instructor: Prabal Dutta Date: October 2, 2012
EECS 373: Design of Microprocessor-Based Systems Fall 2012 Lecture 3: Toolchains Instructor: Prabal Dutta Date: October 2, 2012 Note: Unless otherwise specified, these notes assume: (i) an ARM Cortex-M3 processor operating in little endian mode; (ii) the ARM EABI application binary interface; and (iii) the GNU GCC toolchain. Toolchains A complete software toolchain includes programs to convert source code into binary machine code, link together separately assembled/compiled code modules, disassemble the binaries, and convert their formats. Binary program file (.bin) Assembly Object Executable files (.s) files (.o) image file objcopy ld (linker) as objdump (assembler) Memory layout Disassembled Linker code (.lst) script (.ld) Figure 0.1: Assembler Toolchain. A typical GNU (GNU's Not Unix) assembler toolchain includes several programs that interact as shown in Figure 0.1 and perform the following functions: • as is the assembler and it converts human-readable assembly language programs into binary machine language code. It typically takes as input .s assembly files and outputs .o object files. • ld is the linker and it is used to combine multiple object files by resolving their external symbol references and relocating their data sections, and outputting a single executable file. It typically takes as input .o object files and .ld linker scripts and outputs .out executable files. • objcopy is a translation utility that copies and converts the contents of an object file from one format (e.g. .out) another (e.g. .bin). • objdump is a disassembler but it can also display various other information about object files. It is often used to disassemble binary files (e.g. -
A Comparative Analysis of Mobile Operating Systems Rina
International Journal of Computer Sciences and Engineering Open Access Research Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693 A Comparative Analysis of mobile Operating Systems Rina Dept of IT, GGDSD College, Chandigarh ,India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 09/Dec/2018, Published: 31/Dec/2018 Abstract: The paper is based on the review of several research studies carried out on different mobile operating systems. A mobile operating system (or mobile OS) is an operating system for phones, tablets, smart watches, or other mobile devices which acts as an interface between users and mobiles. The use of mobile devices in our life is ever increasing. Nowadays everyone is using mobile phones from a lay man to businessmen to fulfill their basic requirements of life. We cannot even imagine our life without mobile phones. Therefore, it becomes very difficult for the mobile industries to provide best features and easy to use interface to its customer. Due to rapid advancement of the technology, the mobile industry is also continuously growing. The paper attempts to give a comparative study of operating systems used in mobile phones on the basis of their features, user interface and many more factors. Keywords: Mobile Operating system, iOS, Android, Smartphone, Windows. I. INTRUDUCTION concludes research work with future use of mobile technology. Mobile operating system is the interface between user and mobile phones to communicate and it provides many more II. HISTORY features which is essential to run mobile devices. It manages all the resources to be used in an efficient way and provides The term smart phone was first described by the company a user friendly interface to the users. -
Gamepark GP2X Owner's Manual
GP2X User Guide Version 1.2 Authored by: Guyfawkes Last Updated: December 26, 2005 Homepage: http://www.emuholic.com/ Contents Basic Usage Page 3 – GP2X Information Page 6 – Setting up your GP2X Page 8 – Using the GP2X for the first time Page 11 – Managing files on the GP2X Page 12 – Installing and loading software Page 15 – Viewing Images Page 17 – Playing Music Page 19 – Viewing Movies Page 21 – Reading E-Books Page 23 – Using Explorer Page 25 – Using the Settings menu Page 28 – Troubleshooting Page 29 – Useful information Advanced Usage Page 30 – Installing software updates and firmware flashing Page 32 – Customising the menu graphics Page 33 – Developing for the GP2X introduction Page 34 – Credits, Thanks and other stuff 2 GP2X Information Product Name: * GP2X-F100 General * Main Processor: MagicEyes MP2520F * CPU: ARM920T - 200 MHz * CoProcessor: ARM940T - 200 MHz * Dimension 143.6mm* 82.9mm*34mm * Mass (w/o batteries): 161g/5.68oz (GP32 NLU: 163g/5.74oz) * RAM: 64Mb * Internal Storage: 64Mb NAND Flash Memory * External Storage: SD Card * Connections: EXTension port, USB 2.0, DC in (3v), Headphone jack. * O/S: Linux * Batteries: 2 x AA * Display: 3.5" TFT LCD * Resolution: 320*240 (QVGA) * TV Output: up to 720*480 with separate S-Video cable. Video * Video Codec support: MPEG 1, 2, 3, 4, DivX 3.11, 4.x, 5.x and higher, XviD, WMV (7, 8, 9 Series by 'After Support') * Extension support: AVI, MPG, MPEG * Audio Formats: MP3, OGG, WMA (by 'After Support') * Resolution: MAX 720*480 * Frame Rate: Max 30 fps * Bit Rate: Video Max: 2500Kbps, -
The Effects of Latency on Player Performance and Experience in A
The Effects of Latency on Player Performance and Experience in a Cloud Gaming System Robert Dabrowski, Christian Manuel, Robert Smieja May 7, 2014 An Interactive Qualifying Project Report: submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Approved by: Professor Mark Claypool, Advisor Professor David Finkel, Advisor This report represents the work of three WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its web site without editorial or peer review. Abstract Due to the increasing popularity of thin client systems for gaming, it is important to un- derstand the effects of different network conditions on users. This paper describes our experiments to determine the effects of latency on player performance and quality of expe- rience (QoE). For our experiments, we collected player scores and subjective ratings from users as they played short game sessions with different amounts of additional latency. We found that QoE ratings and player scores decrease linearly as latency is added. For ev- ery 100 ms of added latency, players reduced their QoE ratings by 14% on average. This information may provide insight to game designers and network engineers on how latency affects the users, allowing them to optimize their systems while understanding the effects on their clients. This experiment design should also prove useful to thin client researchers looking to conduct user studies while controlling not only latency, but also other network conditions like packet loss. Contents 1 Introduction 1 2 Background Research 4 2.1 Thin Client Technology .