The State of Play
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Incommensurate Wor(L)Ds: Epistemic Rhetoric and Faceted Classification Of
Incommensurate Wor(l)ds: Epistemic Rhetoric and Faceted Classification of Communication Mechanics in Virtual Worlds by Sarah Smith-Robbins A Dissertation Submitted to the Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Dissertation Advisor: Dr. Rai Peterson Ball State University Muncie, IN March 28, 2011 Table of Contents Table of Contents ..................................................................................................................................... ii List of Tables ........................................................................................................................................... vi List of Figures ......................................................................................................................................... vii Abstract .................................................................................................................................................. ix Acknowledgements ................................................................................................................................. xi Chapter 1: Incommensurate Terms, Incommensurate Practices ............................................................... 1 Purpose of the Study ................................................................................................................................... 3 Significance of the Study ............................................................................................................................ -
(12) United States Patent (10) Patent No.: US 7,945,856 B2 Leahy Et Al
US007945856B2 (12) United States Patent (10) Patent No.: US 7,945,856 B2 Leahy et al. (45) Date of Patent: May 17, 2011 (54) SYSTEMAND METHOD FOR ENABLING (56) References Cited USERS TO INTERACT IN A VIRTUAL SPACE U.S. PATENT DOCUMENTS (75) Inventors: Dave Leahy, Oakland, CA (US); Judith 4.414,621 A 11/1983 Bown et al. Challinger, Santa Cruz, CA (US); B. 4,441,162 A 4, 1984 Lillie 4493,021 A 1/1985 Agrawal et al. Thomas Adler, San Francisco, CA (US); 4,503,499 A 3, 1985 Mason et al. S. Mitra Ardon, San Francisco, CA 4,531,184 A 7/1985 Wigan et al. (US) 4,551,720 A 11/1985 Levin 4,555,781 A 1 1/1985 Baldry et al. (73) Assignee: Worlds.com, Inc., Brookline, MA (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this FOREIGN PATENT DOCUMENTS patent is extended or adjusted under 35 CA 2242626 C 10, 2002 U.S.C. 154(b) by 0 days. (Continued) (21) Appl. No.: 12/353,218 OTHER PUBLICATIONS Andrew Reese et al., Kesami Air Warrior, http://www. (22) Filed: Jan. 13, 2009 atarimagazines.com/startv3n2/kesamiwarrior.html, Jan. 12, 2009. (Under 37 CFR 1.47) (Continued) (65) Prior Publication Data Primary Examiner — Kevin M Nguyen US 2009/0228.809 A1 Sep. 10, 2009 (74) Attorney, Agent, or Firm — Anatoly S. Weiser, Esq.; Acuity Law Group Related U.S. Application Data (57) ABSTRACT (63) Continuation of application No. 1 1/591.878, filed on The present invention provides a highly scalable architecture Nov. -
Cyber-Synchronicity: the Concurrence of the Virtual
Cyber-Synchronicity: The Concurrence of the Virtual and the Material via Text-Based Virtual Reality A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Jeffrey S. Smith March 2010 © 2010 Jeffrey S. Smith. All Rights Reserved. This dissertation titled Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality by JEFFREY S. SMITH has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Joseph W. Slade III Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT SMITH, JEFFREY S., Ph.D., March 2010, Mass Communication Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality (384 pp.) Director of Dissertation: Joseph W. Slade III This dissertation investigates the experiences of participants in a text-based virtual reality known as a Multi-User Domain, or MUD. Through in-depth electronic interviews, staff members and players of Aurealan Realms MUD were queried regarding the impact of their participation in the MUD on their perceived sense of self, community, and culture. Second, the interviews were subjected to a qualitative thematic analysis through which the nature of the participant’s phenomenological lived experience is explored with a specific eye toward any significant over or interconnection between each participant’s virtual and material experiences. An extended analysis of the experiences of respondents, combined with supporting material from other academic investigators, provides a map with which to chart the synchronous and synonymous relationship between a participant’s perceived sense of material identity, community, and culture, and her perceived sense of virtual identity, community, and culture. -
Faculty Research Working Papers Series
Faculty Research Working Papers Series Napster's Second Life? - The Regulatory Challenges of Virtual Worlds Viktor Mayer-Schönberger and John Crowley September 2005 RWP05-052 The views expressed in the KSG Faculty Research Working Paper Series are those of the author(s) and do not necessarily reflect those of the John F. Kennedy School of Government or Harvard University. Copyright belongs to the author(s). Papers may be downloaded for personal use only. Napster’s Second Life? The Regulatory Challenges of Virtual Worlds+ Viktor Mayer-Schönberger* & John Crowley‡ Imagine a world with millions of people communicating and transacting. Imagine a world just like ours except that is it made entirely of bits, not atoms. Ten years ago, John Perry Barlow imagined such a radical world – cyberspace.1 He saw people interacting without the constraints of national rules. They would be independent from regulatory fiat and unbound by the mandates of Washington, Paris, London, Berlin or Beijing. His vision relied on information traveling a global network at lightning speed, with content living off server farms in nations with little regulation, weak enforcement, or both. In this world of global regulatory arbitrage2, organizations could relocate their servers to jurisdictional safe havens overnight. 3 They might pop up in exotic places like Aruba4 or + We thank Urs Gasser, Raph Koster, David Lazer, Beth Noveck, Cory Ondrejka, and John Palfrey, who have read the manuscript and provided most valuable feedback. We gratefully acknowledge the research assistance of Malte Ziewitz. * Associate Professor of Public Policy, John F. Kennedy School of Government, Harvard University. ‡ Technologist and freelance consultant for the John F. -
Austin Games Conference 2005
Why are we here? 28 th october 2005 Austin games conference profesSor Richard A. Bartle University of esSEx introduction • It is a truth universally acknowledged… • that I’ve called this talk “why are we here?” – I include as “we” those who would have been here if they hadn’t been out ”Networking” until 2:30am this morning • I do mean the question quite literally: why are any of us in this location right now ? • This is actually a meaningful question… 1 Deep and meaningful Put another way • Point of fact: you are All goinG to DIE • Given this information, why are you here ? In this converted balLroOm ? • Why aren’t you in – paris? – China? – Darfur? – Bed? – World of warcraft ? • Hmm, I guess some of you are in there… 2 Short answer • Well, you’re here because you’re mMorpg developers and this is a mmorpg developers’ conference – officially, “networked game development” conference… • [aside: I’m gonna call them virtual worlds , not mMorpgs ] – I’m not giving up on my book’s title yet , dammit! • But this leads to another question: Another question • Why are you [mmorpg] virtual world developers? • Why aren’t you – regular game developers? – Novelists? – Truck drivers? – Nuclear power station software engineers? – Lawyers? – level 80 on runescape with 2 blue masks, 2 green masks, 2 santa hats and a red party hat ? • “Because it would cost me $5,100 on ebay” (44 bids, 13 hours to go, and simbatamer realLy wants it) 3 hackers • Notice the subtitle answers • Some posSible answers: – You’re a vw developer Purely by acCident – You wanted a -
Download the Pdf
Why? are all that play games. Immature is the people, someone is going to commit same as youth. Young! Our young boys suicide.” Because it’s out there. We should talk are being exposed to age-inappropriate Hello fellow Escapists, I have some about it. If we don’t talk about it, it’s material! Indeed, The Escapist picks out this exciting news. Our clan just grew one more likely to go places that’s not observation as worthy of highlighting in larger. Russ Pitts, previously of Gamers healthy. If we try to sweep it under the Can you blame them? I sure can’t. What a larger font alongside the article. But with Jobs, has joined our editorial team bed, it will be hidden in the darkest, needs to happen, before games can did he really mean this? as Associate Editor for Acquisitions. dirtiest crevices of the internet that are comfortably be seen as accepted We’re all pretty excited to have him, and not always safe. So, let’s bring it out in entertainment for people over the age of It seems rather more likely that this is look forward to incorporating his ideas the open – we’re all adults here. 18, is not just that developers need to two observations combined. 20% is one into The Escapist. Everyone please make games appealing to adults (which “out of five people” in the country. And: welcome Russ! What? Adults play games? They’re not many are), but the media needs to with a sample that large “someone is just child’s toys? Yes, that is correct. -
The New Third Place: Massively Multiplayer Online Gaming in American Youth Culture
Tidskrift för lärarutbildning och forskning Nr 3/2005 Årgång 12 FAKULTETSNÄMNDEN FÖR LÄRARUTBILDNING THE FACULTY BOARD FOR TEACHER EDUCATION Tidskrift för lärarutbildning och forskning nr 3 2005 årgång 12 Tidskrift för lärarutbildning och forskning (fd Lärarutbildning och forskning i Umeå) ges ut av Fakultetsnämnden för lärarutbildning vid Umeå universitet. Syftet med tidskriften är att skapa ett forum för lärarutbildare och andra didaktiskt intresserade, att ge information och bidra till debatt om frågor som gäller lärarutbildning och forskning. I detta avseende är tidskriften att betrakta som en direkt fortsättning på tidskriften Lärarutbildning och forskning i Umeå. Tidskriften välkomnar även manuskript från personer utanför Umeå universitet. Tidskrift för lärarutbildning och forskning beräknas utkomma med fyra nummer per år. Ansvarig utgivare: Dekanus Björn Åstrand Redaktör: Fil.dr Gun-Marie Frånberg, 090/786 62 05, e-post: [email protected] Bildredaktör: Doktorand Eva Skåreus e-post: [email protected] Redaktionskommitté: Docent Håkan Andersson, Pedagogiska institutionen Professor Åsa Bergenheim, Pedagogiskt arbete Docent Per-Olof Erixon, Institutionen för estetiska ämnen Professor Johan Lithner, Matematiska institutionen Doktorand Eva Skåreus, Institutionen för estetiska ämnen Universitetsadjunkt Ingela Valfridsson, Institutionen för moderna språk Professor Gaby Weiner, Pedagogiskt arbete Redaktionens adress: Tidskrift för lärarutbildning och forskning, Gun-Marie Frånberg, Värdegrundscentrum, Umeå universitet, 901 87 UMEÅ. Grafisk formgivning: Eva Skåreus och Tomas Sigurdsson, Institutionen för estetiska ämnen Illustratör: Eva Skåreus Original: Print & Media, Umeå universitet Tryckeri: Danagårds grafiska, 2005:2001107 Tekniska upplysningar till författarna: Tidskrift för lärarutbildning och forskning framställs och redigeras ur allmänt förekommande Mac- och PC-program. Sänd in manuskript på diskett eller som e-postbilaga. -
UCLA Electronic Theses and Dissertations
UCLA UCLA Electronic Theses and Dissertations Title Transcoded Identities: Identification in Games and Play Permalink https://escholarship.org/uc/item/0394m0xb Author Juliano, Linzi Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Transcoded Identities: Identification in Games and Play A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Theater and Performance Studies By Linzi Michel Juliano 2015 © Copyright by Linzi Michel Juliano 2015 ABSTRACT OF THE DISSERTATION Transcoded Identities: Identification in Games and Play By Linzi Michel Juliano Doctor of Philosophy in Theater and Performance Studies University of California, Los Angeles, 2015 Professor Sue-Ellen Case, Chair This work foregrounds how technologies create and emerge from sociocultural, economic and political discourses. My use of transcode, a term introduced by the semiotician A.J. Greimas and carried into the digital realm by Lev Manovich, refers to how cultural elements such as assumptions, biases, priorities emerge within programming code and software. It demonstrates how cultural norms persist across different mediums and posits that, in many ways, the capacity to be flexible defines cultural ideologies. At the software level, programming languages work like performative speech: grammar which produces effects. When cast as speech, coming from a body (or bodies) instead of hardware, information structures can be perceived as acting within regimes of corporeality; when cast as software, information structures demonstrate and advertise the capabilities of hardware. Although often aligned with veracity and stability in its proximity to (computer) science, software is not culturally neutral. -
GENDER SWAPPING on the INTERNET Amy S. Bruckman Presented at the Internet Society, San Fransisco, CA, August 1993
GENDER SWAPPING ON THE INTERNET Amy S. Bruckman Presented at The Internet Society, San Fransisco, CA, August 1993. ABSTRACT In text-based virtual reality environments on the Internet called MUDs, it is possible to pretend to be the opposite gender. In these virtual worlds, the way gender structures basic human interaction is often noticed and reflected upon. This paper introduces MUDs, and then presents a community discussion about gender issues that MUDs inspired. Gender swapping is one example of ways in which network technology can impact not just work practice but also culture and values. I. GENDER SWAPPING ON THE INTERNET On the television show Saturday Night Live, a series of skits concerned a character named Pat, who has no apparent gender. The audience is tempted with the promise of clues. In one episode, Pat gets his or her hair cut. A sign in the salon says that men's haircuts are $7, and women's haircuts are $9. The audience waits in suspense: when Pat goes to pay, his or her true gender will be revealed. The humor of the series lies in the fact that those hopes are constantly foiled; in this instance, Pat leaves $10 and says to keep the change. Gender is so fundamental to human interactions, that the idea of a person without gender is absurd. The audience thinks that surely some clue must reveal Pat's gender, but none ever does. Many who have never seen Saturday Night Live know about Pat.(2) The character has become a kind of cultural icon. Pat's popularity is revealing. -
Telecommunications Seminar 2007
Why peoPlE play MmorPgs Indiana University 11 th April 2007 Prof. Richard A. Bartle University of esSex introduction • This talk concerns massively multiplayer online role-playing games – Mmorpgs to the players • Or mmogs, mmos, pws, muds, mugs, mu*s, … – Virtual worlds to academics • Or synthetic worlds, virtual environments, … • My aim here is to explain Why people play them – Because, hey, then we get better ones! • Get comfy, it’s a long journey… 1 What are vws? • Virtual worlds are places • being places, they have a number of place- like features – You can visit them – Other people can also visit them – At the same time • They are, however, not real • This seems like a major disadvantage – How do you visit somewhere that isn’t real? Answer: • You use an avatar – Or, more technically speaking, a character 2 About avatars • Far from its being a disadvantage , people often like using an avatar Furthermore… • Some people prefer it to reality 3 Leisure time • People play these for several hours a day – Day after day • Month after month – Year after year… • I have players for my own game that are still there after 19 years • Surveys have consistently shown that The average time a player spends in a virtual world is around 20 hours a wEek – They often invest a lot of time in it oFfline , too • So where did these games come from? World of warcraft • world of warcraft , blizzard, 2004: 4 everquest • Everquest , sony online entertainment, 1999 connection • Everquest ruled until Wow came along – 480,000 subscriptions at its peak • Wow is modeLled -
No One Knows You Are a Dog: Identity and Reputation in Virtual Worlds5
computer law & security report 24 (2008) 366–374 available at www.sciencedirect.com www.compseconline.com/publications/prodclaw.htm Internet Law No one knows you are a dog: Identity and reputation 5 in virtual worlds Angel Adrian Attorney-at-Law, Louisiana, United States Solicitor, England and Wales, United Kingdom abstract ‘‘Virtual world’’ identities are becoming indistinguishable from ‘‘real’’ identities, just as ‘‘e-commerce’’ became indistinguishable from ‘‘commerce’’. Control over online avatar identities has begun to have many real-world consequences. We can use the graphical, networked screen to create vibrant, visual representations of personal identity (i.e., the av- atar) separate from and independent of our offline characteristics while simultaneously creating context-specific reputations in online communities separate from and indepen- dent of our social identity in real space. This article will explore the notions of identity and reputation both of the online user and his/her alter ego avatar. ª 2008 Angel Adrian. Published by Elsevier Ltd. All rights reserved. 1. Introduction from ‘‘real’’ identities, just as ‘‘e-commerce’’ became indistin- guishable from ‘‘commerce.’’ Control over online avatar iden- E-commerce is the buying and selling of goods and services tities has begun to have many real-world consequences. We over the Internet. Virtual worlds, such as Second Life, are thriv- can use the graphical, networked screen to create vibrant, vi- ing meccas of e-commerce because they have invented sual representations of personal identity (i.e., the avatar) sep- a much more appealing way to use the Internet: through an arate from and independent of our offline characteristics avatar (Morningstar and Randall Farmer, 1991).1 This avatar while simultaneously creating context-specific reputations can be completely customized and is designed mainly for so- in online communities separate from and independent of cial interaction (Lastowka and Hunter, 2004). -
Mud Connector
Archive-name: mudlist.doc /_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/ /_/_/_/_/ THE /_/_/_/_/ /_/_/ MUD CONNECTOR /_/_/ /_/_/_/_/ MUD LIST /_/_/_/_/ /_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/ o=======================================================================o The Mud Connector is (c) copyright (1994 - 96) by Andrew Cowan, an associate of GlobalMedia Design Inc. This mudlist may be reprinted as long as 1) it appears in its entirety, you may not strip out bits and pieces 2) the entire header appears with the list intact. Many thanks go out to the mud administrators who helped to make this list possible, without them there is little chance this list would exist! o=======================================================================o This list is presented strictly in alphabetical order. Each mud listing contains: The mud name, The code base used, the telnet address of the mud (unless circumstances prevent this), the homepage url (if a homepage exists) and a description submitted by a member of the mud's administration or a person approved to make the submission. All listings derived from the Mud Connector WWW site http://www.mudconnect.com/ You can contact the Mud Connector staff at [email protected]. [NOTE: This list was computer-generated, Please report bugs/typos] o=======================================================================o Last Updated: June 8th, 1997 TOTAL MUDS LISTED: 808 o=======================================================================o o=======================================================================o Muds Beginning With: A o=======================================================================o Mud : Aacena: The Fatal Promise Code Base : Envy 2.0 Telnet : mud.usacomputers.com 6969 [204.215.32.27] WWW : None Description : Aacena: The Fatal Promise: Come here if you like: Clan Wars, PKilling, Role Playing, Friendly but Fair Imms, in depth quests, Colour, Multiclassing*, Original Areas*, Tweaked up code, and MORE! *On the way in The Fatal Promise is a small mud but is growing in size and player base.