Abandonware 110, 115, 116, 120 Ableism 256 Academic Pedagogy 317 a Clockwork Orange 151, 152 Activist Games 253 Adaptive 3

Total Page:16

File Type:pdf, Size:1020Kb

Abandonware 110, 115, 116, 120 Ableism 256 Academic Pedagogy 317 a Clockwork Orange 151, 152 Activist Games 253 Adaptive 3 371 Index A Atari Games v. Nintendo 112, 113 Attention Deficit Hyperactivity Disorder abandonware 110, 115, 116, 120 (ADHD) 193, 194, 199, 201, 206 ableism 256 Attention, Relevance, Confidence/Challenge, academic pedagogy 317 and Satisfaction/Success (ARCS) 211, A Clockwork Orange 151, 152 220, 222, 231 activist games 253 avatar 98, 100, 101, 102, 103, 104, 107, 185, adaptive 36, 37, 38, 40, 41, 43, 45, 46, 50, 52 186 Adaptive Educational Interactive Narrative Ayiti: The Cost of Life 267, 268 System (AEINS) 208, 210, 212, 213, 214, 215, 218, 219, 220, 221, 222, 223, B 224, 225, 226, 227, 228, 229, 230 add-on 110, 119 BAT ILE 211 aesthetic distance 142, 143, 145, 146, 147, Batman 197 148, 149, 150, 155, 156 bio-ethical debate 276 ageism 256 bio-ethics 275 alternative play 128, 129 BioShock 39, 50, 54, 76, 79, 81 ambiguity 83, 89, 90, 93, 95 BioWare 72, 78, 79, 82 America’s Army 83 Black & White 41, 54 Animal Crossing 203 Blade Runner 40, 52 anti-oppression 253, 254, 255, 256, 257, 258, Blizzard v. BnetD 114 259, 267, 268, 269, 270, 271 Blizzard v. Glider 119 anti-oppression theory 259 Blizzard v. MDY 113 anti-oppressive approach 254 Boom Blox 148 anti-oppressive ethics 255, 257 Brain Age 200, 201 anti-oppressive games 267, 269, 271 brain-training games 200 anti-oppressive principles 253, 254, 255, 257, British Board of Film Classification (BBFC) 258 142 anti-oppressive self-reflection 257 Bully 161, 165 anti-racism 255 C antiwar game 83, 84, 85, 86, 87, 89, 90, 91, 92, 93, 94, 95 Calculations x 20 200 antiwar rhetoric 83, 84, 86, 89, 90 Call of Duty 84, 85 Artificial Insemination 286 Cannon Fodder 83, 88, 89, 97 Assisted Reproductive Technology (ART) 275, case study 19, 25 276, 277, 279, 285, 286, 288, 289 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Index Centre ontarien de prévention des agressions D (COPA) 263 character education 208, 209, 210, 211, 214, damage per second (DPS) 118 215, 229, 231, 232 Dance Dance Revolution 153 Chrono Trigger 22 Darfur is Dying 259, 260, 261, 269, 270, 274 citizen science 122 decision-making skills 193, 194, 195, 197, citizenship 1, 2, 12 198, 200, 204, 205 civic content 292, 294, 296, 301, 302, 304, decision points 57, 59, 66 305, 306 democratic skills 291, 301, 302, 304, 306 civic engagement 291, 292, 293, 295, 296, design 312, 313, 315, 316, 317, 320, 322, 325, 297, 298, 301, 302, 304, 305, 306, 307, 328, 329, 330, 331, 332, 333 308, 310 design bias 36 civic gaming 297 designer 312, 316, 317, 329 civic-minded educational online simulations design principles 1, 2 291 digital game 36, 37, 38, 42, 43, 49, 51, 52, 234, civic-minded game design 291, 292 239, 241, 242, 249, 250, 251, 258, 259, civic-minded simulations 292 270 Civilization 295 digital game-based learning 239 Civilization IV: Colonization 234, 239, 240, digital gaming 234, 239, 249 241, 245, 247, 249 digital literacy 293 classism 256 digital media 267, 295, 296, 308 Club Penguin 179, 180, 188, 189 digital medium 249 cognitive development 235, 251 Digital Millennium Copyright Act (DMCA) cognitive learning 291, 308 110, 113, 114, 115, 126 cognitive psychology 234, 235 digital play 194, 195 cognitive science 293 digital technologies 193, 194, 195, 199, 200, collaborative 3, 12 204 computer games 235, 251 dilemma 19, 23, 26, 27, 28, 29, 30, 31, 35 computer literacy 293 Diner Dash 2, 166, 269, 274 confidence factor (CF) 217 Diplomacy 1, 2, 6, 7, 16, 234, 239, 240, 241, conscientious game 83 242, 244, 245, 246, 247, 249 contemporary videogames 314, 315, 317 diversity 264, 265, 266, 269 controller 110, 121, 124, 142, 143, 144, 145, doctor 275, 277, 278, 280, 282, 283, 285, 286, 146, 147, 148, 149, 150, 151, 153, 155, 288 156 documentary games 253 Conundrum 210 domain model 214, 215, 217, 222 copyright 110, 113, 116, 119, 125, 126, 127 Dragon Age 1, 2, 3, 4, 5, 161, 184 critical design 128, 130, 131, 134, 140 Dragon Age: Origins 78, 82 critical gameplay 128, 129, 130, 131, 133, 134, Drop Zone 4 83, 87, 89, 97 137, 138, 139, 140 Dungeons & Dragons 42, 52 critical thinking skills 194 E curricula 312, 331 curricular content 291, 306 educational games 210, 211, 221, 228, 231 cybernetic 142, 144, 147, 148, 149, 150, 153, educational online simulations 291, 292, 293 154, 155, 156 educational simulation games 291 cyborg 142, 155, 157 educational videogames 294 372 Index egg donors 275 EVOKE 266, 274 ELECT BILAT 210 Execution 44, 52, 54, 55 Electronic Frontier Foundation (EFF) 114 executive function 194, 196, 203, 204, 206 embodiment 142, 144, 146, 147, 148, 149, executive-functioning 193, 194, 198, 199, 200, 150, 151, 152, 155, 156, 157 203, 205 empathy 1, 11 executive functioning skills 194, 195, 197, emulator 110, 111, 116 199, 200, 202, 203, 204 Entertainment Software Rating Board (ESRB) eXistenZ 154, 156, 158 142 ethical ambiguities 291, 292, 294, 308 F ethical conflicts 292, 293, 298, 305, 308 Fable 41, 50, 51, 54, 72, 73, 82, 99, 100, 161, ethical decision 275, 276, 277, 279, 280, 281, 167 282, 283, 284, 287, 288 Fable II 59, 61, 66, 69, 70 ethical decision-making 193 Facebook 10, 11 ethical development 235, 238, 241, 245, 248 Fahrenheit 40, 52 ethical dilemma 3, 4, 18, 19, 30, 35, 72, 73, 74, Fair Labor Organization (FLA) 299, 300, 301, 75, 76, 77, 78, 79, 80, 81 302, 304, 309 ethical exploration 36, 37, 38, 40, 42, 44, 45, fair use 110, 113, 115, 123 46, 47, 48, 49, 51, 275, 276, 280 Fallout 41, 52 ethical game 36, 37, 38, 39, 40, 41, 42, 43, 44, Fallout 3 2, 4, 33, 34, 60, 61, 62, 63, 64, 66, 45, 46, 47, 48, 49, 50, 52 69, 70, 71 ethical implications 253, 271 Farmville 1, 2, 11 ethical issues 275, 276, 277, 279 FearNot! 210, 230 ethically contentious game 312 fertility 275, 276, 277, 279, 283, 284, 285, ethical principles 72, 73, 76 286, 287, 288, 289 ethical reasoning 19, 20, 21, 24, 26, 30, 33, fertility doctor 275 238 fertility medicine 275, 276, 277, 279, 283, 288 ethical reflection 19, 21, 23, 32 fiction 312, 315, 317, 331 ethical simulation 277, 289 fictionalization 315, 317, 329 ethical struggles 312, 317, 321, 325, 328 Fieldrunners 197 ethical subjectivity 317, 329 Final Fantasy VII 31, 34, 35 ethical system 72, 73, 76 Fire Emblem 20, 29, 33, 34, 35 ethical training 276, 277 first-person shooter (FPS) 84 ethical training and simulation 277 first sale doctrine 110, 113, 114, 121 ethics 19, 20, 21, 22, 24, 26, 29, 31, 33, 35, 72, First Wind (FW) 292, 299, 300, 301, 302, 304, 73, 79, 98, 102, 107, 108, 128, 129, 131, 305, 306, 308, 309 133, 134, 135, 136, 137, 140, 141, 142, framework 19, 20, 21, 22, 24, 29, 30 143, 144, 145, 146, 149, 150, 151, 152, Frasca 98, 99, 100, 101, 102, 103, 106, 108 153, 154, 158, 159, 160, 161, 162, 167, 170, 171, 173, 174, 176, 177, 253, 255, G 257, 258, 259, 263, 272, 275, 276, 286, Galactic Civilizations 41, 55 287, 289, 290, 291, 292, 293, 297, 304, game 312, 313, 314, 315, 316, 317, 318, 319, 306, 312, 316, 317, 324 321, 322, 323, 325, 326, 327, 328, 329, ethics simulation 275, 276, 289 330, 331, 332, 333 EverQuest 169 game-based learning 193, 199, 207, 239 evil points 57, 58, 59, 60, 61, 62, 63, 64, 65, game creation 253, 255, 258, 259, 264, 269 66, 67, 69, 70 373 Index game design 110, 118, 125, 126, 128, 129, 131, Guitar Hero 121, 144, 153, 157 132, 133, 134, 135, 136, 138, 140, 141, 184, 189, 253, 255, 258, 261, 264, 265, H 266, 267, 270, 271, 273, 291, 292, 293, Hamlet on the Holodeck 143 294, 295, 304, 305, 306, 307, 308, 312, Han Solo problem 59, 60, 69, 70 315, 317, 322, 325, 328, 329, 330 Harvest Moon 203 game dynamics 312, 315, 322, 323, 331 Haze 89, 96 game interaction 247 heterosexism 256 game-linked learning 200 Hit the Bitch 254, 272 game mechanic 83, 128, 129, 132, 136, 139 Homo Ludens 129 gameplay 128, 129, 130, 131, 132, 133, 134, hospitality 159, 160, 162, 164, 165, 167, 170, 135, 137, 138, 139, 140, 141, 159, 160, 171, 172, 173 169, 170, 171, 172, 173, 254, 255, 267, human-computer interaction (HCI) 180 291, 292, 293, 294, 295, 296, 297, 298, humane intervention 312, 314 300, 301, 302, 303, 304, 305, 306, 307, humanitarian crisis 259 308, 313, 314, 315, 316, 317, 318, 319, Hurricane Katrina: Tempest in Crescent City 323, 326, 327, 328 267, 268, 274 gameplay mechanics 132, 135, 137, 140 hybrid identity 316 game principles 317 hybrid roles 316, 317 games and simulations 292, 294 game setting 312 I game simulations 291, 292 identity 312, 315, 316, 329, 331, 333 game studies 291, 292, 294, 304, 308, 310 immersion 36, 44, 53, 312, 317, 321 game world 275, 278, 283, 284, 286 immersive learning 293 gaming technologies 312, 328, 331 inFAMOUS 41, 53 gay, lesbian, bisexual, transgender and queer inherent interest 72, 74, 76, 78 community (LGBTQ) 161, 163 inhumane conditions 312, 314, 330 Gee 98, 101, 105, 108 in real-life (irl) 181, 183, 185, 186, 187 gender 159, 161, 162, 164, 166, 168, 171, 173, IN-TALE 210 174, 175, 177 intellectual property 110, 113, 115, 117, 118, gender differences 234 120, 124, 126 genetic origins 283 intelligent tutoring 208, 210, 212, 213, 232 genre 98, 99, 101, 103, 104, 107, 108 intelligent tutor system (ITS) 212, 232 gestational carriers 275, 279 intentions 57, 58, 64, 65, 66, 69 Giant Tank 92 Interactive Communications and Simulations Global Kids 259, 266, 267, 268, 270, 273 (ICS) 298 goal 87, 88, 92 interactive narrative 208, 210, 213, 214, 233 God of War 98, 99, 100, 101, 102, 103, 105, interactivity 312, 317 106, 107, 108 interface 142, 144, 147, 148, 149, 150, 151, Gonzalo Frasca 91 152, 154, 157, 158 good points 57, 58, 59, 60, 61, 62, 63, 64, 65, International
Recommended publications
  • Iamshocked Bertozzi Edits
    “I Am Shocked, Shocked!”: Breaking taboos in digital gameplay Elena Bertozzi University of Wisconsin Whitewater [email protected] Abstract This paper examines some examples of what the media have described as outrageous, dangerous or otherwise troubling content in videogames. The author suggests that allowing players to engage in taboo behavior within games such as Grand Theft Auto, Manhunt, and Dead or Alive Xtreme Beach Volleyball actually reinforces pro-social cultural norms. All cultures establish norms and also provide occasional opportunities for transgression of these norms. The author argues that breaking the rules, and understanding that rules are being broken, is necessary to test and reinforce the boundaries of acceptable behavior. Games provide players with arenas within which such transgressions can take place safely. Current videogames, however, provide these transgressive opportunities primarily for white males. Author Keywords Computer games, video games, taboos, transgression, gender, race, deviance Introduction The 1999 film Fight Club depicts a world where men can separate themselves from the meaningless, feminized, sanitized world of Western civilization and beat each other bloody with their bare hands. Films in the horror genre routinely explore a gamut of violence, perversion, and extreme anti-social behavior. Although extremely violent and troubling films are common, the public’s response to video game content is quite different. Video games are blamed for inciting school shootings (Anderson, 2004), destroying the fabric of society, and permanently harming the psyches of those who play them (Slevin, 2004). The city of Los Angeles and the State of Nevada have gone so far as to file lawsuits against video game companies (Jenkins, 2006; Sinclair, 2006).
    [Show full text]
  • Establishing a Need for a Protocol for the Interoperability of Heterogeneous Iot Home Devices
    Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2018 Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices Jenna Bayto Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Computer Engineering Commons Recommended Citation Bayto, Jenna, "Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices" (2018). Electronic Theses and Dissertations. 1742. https://digitalcommons.georgiasouthern.edu/etd/1742 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. ESTABLISHING A NEED FOR A PROTOCOL FOR THE INTEROPERABILITY OF HETEROGENEOUS IOT HOME DEVICES by JENNA BAYTO (Under the Direction of Christopher Kadlec) ABSTRACT The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home. INDEX WORDS: Internet of
    [Show full text]
  • Orphan Works, Abandonware and the Missing Market for Copyrighted Goods
    Orphan Works, Abandonware and the Missing Market for Copyrighted Goods Dennis W. K. Khong University of Strathclyde, United Kingdom Paper prepared for the 1st Annual Conference of the Asian Law and Economics Society, Seoul, Korea, 24–25 June 2005. 1 Introduction Of late, the issue of orphan works and abandonware is gaining attention in the legal circle. Following the case of Eldred v. Ashcroft,1 a new case is pending appeal in the United States raising the issue of orphan works.2 The Library of Congress (2005) recently issued a notice of inquiry on orphan works. In the US Congress, a bill3 has been put forward to remedy the problem of abandoned copyrighted works in the light of the Sonny Bono Copyright Term Extension Act of 1998. All these activities indicate that the problem of orphan works and abandonware is a legitimate subject of enquiry, not less by using the tools of economic analysis. It is this endeavour that this paper will try to undertake. In this paper, the use of the term ‘copyright owner’ is meant to denote the owner and his assigns and licensees, such as publishers, unless the context requires otherwise. Examples of the law are United Kingdom’s unless stated otherwise. 1. 537 U.S. 186 (2003). 2. Brewster Kahle et al. v. John Ashcroft, 72 U.S.P.Q.2D (BNA) 1888; US Dist. Lexis 24090 (N.D. Cal. 2004). 3. Congress, House, Public Domain Enhancement Act of 2003, 108th Cong., 1st sess., H.R. 2601. 1 Part I 2 The Problem Copyright law confers an exclusive right to the owner of a copyrighted work to control, inter alia, the copying and issuing of copies of his work.4 Through this exclusive right, copyright owners5 may earn profit by granting a license or sale of a copy subject to payment of a fee.
    [Show full text]
  • Broken Technologies
    Broken Technologies 2 The Angel of Machines: from Buch der Erfindungen Gewerbe und Industrien,or Book of Inven- tions,Vol.6,1887, F.Reuleaux, Editor. From Moon, Francis C. The Machines of Leonardo da Vinci and Franz Reuleaux. Kinematics of Machines from the Renaissance to the 20th Century. Springer, 2007. FrontPage: © Maria Flores Crossa 3 Broken Technologies The Humanist as Engineer Fernando Flores Morador Lund University 2011- revised 2015 4 Department of History of Ideas and Science University of Lund Broken Technologies. The Humanist as Engineer. Ver 3.0 Biskopsgatan 7, 223 62 Lund © Fernando Flores Morador, 2009, Third Edition Cover: Maria Flores Crossa Tryck: Media – Tryck, Lunds Universitet, 2011-revised 2015 ISBN: 978-91-633-9692-2 5 Contents Contents ....................................................................................................................................... 5 List of figures .................................................................................................................................. 7 List of Tables.................................................................................................................................. 9 Foreword .................................................................................................................................. 11 First Edition (Ver. 1.0) ................................................................................................................ 11 Second edition (Ver. 1.1) ...........................................................................................................
    [Show full text]
  • Entertainment Software Rating Board - Wikipedia, the Free Encyclopedia Visited on 10/04/2016 Not Logged in Talk Contributions Create Account Log In
    Entertainment Software Rating Board - Wikipedia, the free encyclopedia Visited on 10/04/2016 Not logged in Talk Contributions Create account Log in Article Talk Read Edit View history Entertainment Software Rating Board From Wikipedia, the free encyclopedia Main page Contents "ESRB" redirects here. For the European financial agency, see European Systemic Risk Featured content Board. Current events "Mature content" redirects here. For other uses, see Pornography. Random article The Entertainment Software Rating Board Donate to Wikipedia Entertainment Software Rating Wikipedia store (ESRB) is a self-regulatory organization that Board assigns age and content ratings, enforces Interaction industry-adopted advertising guidelines, and Help About Wikipedia ensures responsible online privacy principles for Community portal computer and video games in the United States, Recent changes nearly all of Canada, and Mexico. The ESRB was Contact page established in 1994 by the Entertainment Software 2006 – present logo Tools Association (formerly the Interactive Digital What links here Software Association), in response to criticism of Type Non-profit, self-regulatory Related changes violent content found in video games such as Industry Organization and rating system Upload file Night Trap, Mortal Kombat, and other controversial Predecessor 3DO Rating System Special pages Recreational Software Advisory video games with excessively violent or sexual Permanent link Council content. Videogame Rating Council Page information September 16, 1994; 22 years Wikidata
    [Show full text]
  • Weaponizing Vulnerabilities in Security Scanners
    Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners Andrea Valenza Gabriele Costa University of Genova IMT School for Advanced Studies Lucca [email protected] [email protected] Alessandro Armando University of Genova [email protected] Abstract A naive scanning system might extract the value of the Server nginx/1.17.0 The first step of every attack is reconnaissance, i.e., to ac- field (namely, the string in the above quire information about the target. A common belief is that example) and include it in the HTML report. This implicitly there is almost no risk in scanning a target from a remote allows the scan target to access the scan author’s browser and location. In this paper we falsify this belief by showing that inject malicious payloads. scanners are exposed to the same risks as their targets. Our In this paper we investigate this attack scenario. We start methodology is based on a novel attacker model where the by defining an attacker model that precisely characterizes scan author becomes the victim of a counter-strike. We devel- the threats informally introduced above. To the best of our oped a working prototype, called RevOK, and we applied it to knowledge, this is the first time that such an attacker model is 78 scanning systems. Out of them, 36 were found vulnerable defined in literature. Inspired by the attacker model, we de- to XSS. Remarkably, RevOK also found a severe vulnerability fine an effective methodology to discover cross-site scripting in Metasploit Pro, a mainstream penetration testing tool.
    [Show full text]
  • Sustainable Open Source Software Development
    Self-Sustaining Open Source Software Development — or — Programmer or Prostitute? Peter Gutmann University of Auckland Preamble This is not a popularity contest • Open source diatribe – “We will bury you” • GPL rant – Blah blah copyleft blah blah a’om bomb blah blah • Linux advocacy/Microsoft bashing Tell it like it is, even if it’s not what people want to hear OSS: What’s Hot and What’s Not Hot Not Networking User interface Filesystems Office applications Device drivers Documentation Microsoft rules the desktop because they can pay people to do the boring stuff • OSS, by its very nature, can’t do this • Most users only experience the boring stuff OSS: What’s Hot and What’s Not (ctd) OSS is successful in servers because tweaking networking and filesystem code is cool • OSS developers will cherry-pick the interesting parts of the work Everyone wants to be a code god • Less interest in being a documentation god or i18n god or online help god Least likely to ever appear as a competitive OSS project: MYOB, Quicken, generic accounts-receivable packages • Totally unsexy, must be modified yearly, customized for every different jurisdiction, requires legal expertise to write the rule base, negotiation with governments to support features like on- line return submission, … Sustaining an OSS Project Sponsored by your employer • Usually only works for large companies (IBM, AT&T) • Needs to match your company’s needs • Can’t compete with their commercial offerings Charge for support • Only works in a few niche areas • Most companies don’t see this
    [Show full text]
  • Open Source Gis
    Tweet This GEOSPATIAL FACT SHEET: Fact Sheet OPEN SOURCE GIS www.urisa.org January 2019 WHAT TO KNOW ABOUT OPEN SOURCE GIS: Open source software has a license that includes user rights: the software may be freely used, modified, and shared. The Open Source Initiative (OSI) reviews and approves open source licenses. OSI maintains the canonical definition of open source and a comprehensive catalog of approved licenses. Software is not open source because it is available online without payment. The open source designation is determined exclusively by the license. In addition to the Open Source Initiative, it is important to note the work of the Free Software Foundation (FSF), the originators of the first free software licenses. Started in 1985 by Richard Stallman, the FSF both creates and reviews licenses and publishes software. Open source licenses differ from proprietary licenses not only in the balance of rights and responsibilities they convey, but also in that they are not product-specific. The various approved licenses have names, and are seen across any number of projects and products. Frequently Asked Questions Page 2: Who makes open source software, and why? Page 2: Is open source limited to software? What about data, documentation, etc.? Page 2: Is there support for open source software? Page 3: What is different about open source software? Page 3: Are there certifications for open source GIS? Page 4: What open source GIS software is available? Page 5: Is there training for open source software? Page 5: Are there conferences and user groups for open source GIS? Page 5: Are there security issues specific to open source software? Page 6: Can I mix open source and proprietary GIS? Page 6: Are data interoperable between open source and proprietary GIS? Page 6: Who uses open source GIS? Page 7: Where can I find more information about user groups for open source GIS? Page 7: Resources HOW DO I GET STARTED WITH OPEN SOURCE SOFTWARE? Try a tutorial for a single package.
    [Show full text]
  • Integrating Simulated Physics and Device Virtualization in Control System Testbeds
    Chapter 11 INTEGRATING SIMULATED PHYSICS AND DEVICE VIRTUALIZATION IN CONTROL SYSTEM TESTBEDS Owen Redwood, Jason Reynolds and Mike Burmester Abstract Malware and forensic analyses of embedded cyber-physical systems are tedious, manual processes that testbeds are commonly not designed to support. Additionally, attesting the physics impact of embedded cyber- physical system malware has no formal methodologies and is currently an art. This chapter describes a novel testbed design methodology that integrates virtualized embedded industrial control systems and physics simulators, thereby supporting malware and forensic analyses of em- bedded cyber-physical systems without risks. Unlike existing hardware- based testbeds, the resulting soft industrial control system testbeds are portable, distributable and expandable by design. However, embed- ded system virtualization is non-trivial, especially at the firmware level, and solutions vary widely depending on the embedded system architec- tures and operating systems. This chapter discusses how the proposed methodology overcomes the challenges to virtualizing embedded systems and explores the benefits via a proof-of-concept implementation involv- ing a Siemens MJ-XL variable step voltage regulator control panel. Keywords: Cyber-physical systems, control systems, testbeds, virtualization 1. Introduction Cyber-physical systems are computational systems that monitor and control physical systems; they encompass control systems, sensor-based systems, au- tonomous systems, robotic systems as well as higher-level supervisory, control and human-in-the-loop systems. These complex, specialized and diverse sys- tems exist at the core of industrial control systems, critical infrastructure assets, operational technology networks and other utility networks. Hardware-based cyber-physical system testbeds often are expensive to design and maintain, especially in the case of critical infrastructure assets.
    [Show full text]
  • Civilization 3 Full Free Download Pc Abandonware Civilization
    civilization 3 full free download pc abandonware Civilization. Games developed for Windows 3.x can't run on recent Windows systems. Video. Additional info. "I clearly remember the first time I played Civilization. It was, perhaps, the first time I played a 4X game (eXplore, eXpand, eXploit, eXterminate). It took me a fair amount of time to learn the mechanics, understand the pace of the game, the gameplay and to finally beat the computer AI. Civilization marked the birth of a new genre that spawned sequels, blatant copies, and lots of other 4X strategy games and I think I can talk for every turn-based strategy fan out there when I say: thank god for that." - Abandonware DOS. 1992 - Computer Games of the Year, Electronic Games Arcade Awards (MS-DOS). 1992 - Best Entertainment Program, CODiE Awards. 1992 - Best Strategy Program, CODiE Awards. 1992 - Best Consumer Program, CODiE Awards. 1991 - , Gamespot Greatest PC Games of all Time. Selected for All-TIME 100 video games TIME.com. Input : keyboard, mouse, joystick. Distributed on : 3,5 floppy disk, 5,25 floppy disk, cd-rom. Also published for : Amiga, Atari ST, Mac, PC-98, PlayStation, SNES. Abandonware DOS views : 36876. Links. Comments. Collector's corner: The original manual included the famous tech tree on paper called "Civilization Advances Chart". Sid Meier's Civilization 3 Download (2001 Strategy Game) For over 20 years, master game designer Sid Meier has produced a steady stream of titles shaping the landscape of the gaming world, and now Sid Meier's Civilization III gives you the opportunity to shape a virtual world as you see fit.
    [Show full text]
  • Violent Video Games and Morality: a Meta-Ethical Approach
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Nottingham Trent Institutional Repository (IRep) Pre-print version of the paper accepted for publication in Ethics and Information Technology Violent video games and morality: A meta-ethical approach Garry Young This paper considers what it is about violent video games that leads one reasonably minded person to declare “That is immoral” while another denies it. Three interpretations of video game content are discussed: reductionist, narrow, and broad. It is argued that a broad interpretation is required for a moral objection to be justified. It is further argued that understanding the meaning of moral utterances – like “x is immoral” – is important to an understanding of why there is a lack of moral consensus when it comes to the content of violent video games. Constructive ecumenical expressivism is presented as a means of explaining what it is that we are doing when we make moral pronouncements and why, when it comes to video game content, differing moral attitudes abound. Constructive ecumenical expressivism is also presented as a means of illuminating what would be required for moral consensus to be achieved. Keywords: Constructive ecumenical expressivism; moral consensus; constructive sentimentalism; symbolic taboo activity; prohibited offline taboo activity Introduction When playing a single-player video game, and with reference to something within that game, suppose I were to make the following claim: “That is immoral”. Within the context
    [Show full text]
  • Free Software for Scientific Computing
    Scientific computing software Free software and scientific computing A review of scientific computing free software An example and some concluding remarks Free software for scientific computing F. Varas Departamento de Matemática Aplicada II Universidad de Vigo, Spain Sevilla Numérica Seville, 13-17 June 2011 F. Varas Free software for scientific computing Scientific computing software Free software and scientific computing A review of scientific computing free software An example and some concluding remarks Acknowledgments to the Organizing Commmittee especially T. Chacón and M. Gómez and to the other promoters of this series of meetings S. Meddahi and J. Sayas F. Varas Free software for scientific computing Scientific computing software Free software and scientific computing A review of scientific computing free software An example and some concluding remarks ... and disclaimers I’m not an expert in scientific computing decidely I’m neither Pep Mulet nor Manolo Castro! My main interest is in the numerical simulation of industrial problems and not in numerical analysis itself This presentation reflects my own experience and can then exhibit a biased focus in some aspects F. Varas Free software for scientific computing Scientific computing software Free software and scientific computing A review of scientific computing free software An example and some concluding remarks Outline 1 Scientific computing software From numerical analysis to numerical software Quality of scientific computing software Scientific computing software development 2 Free software and scientific computing What is free software? Free software and scientific computing 3 A review of scientific computing free software Linear Algebra CAD, meshing and visualization PDE solvers 4 An example and some concluding remarks An industrial problem Some concluding remarks F.
    [Show full text]