May 9Th Essential That One of These New Includes Showers on Two Floors, Enigmas [Oct 30] Devices Could for Use by Staff and Students, but Be Captured for Study

Total Page:16

File Type:pdf, Size:1020Kb

May 9Th Essential That One of These New Includes Showers on Two Floors, Enigmas [Oct 30] Devices Could for Use by Staff and Students, but Be Captured for Study in the Atlantic and sensors were in daily use. Mediterranean. It became Incidentally, the building May 9th essential that one of these new includes showers on two floors, Enigmas [Oct 30] devices could for use by staff and students, but be captured for study. it's unclear if location awareness extended into those areas. Enigma Captured A heavily altered version of May 9, 1941 today's events were filmed as The success of the Active Badge the movie “U-571” in 2000. In system can be judged by its Bletchley Park already particular, British sailors were appearance in an “Alex” cartoon possessed an Enigma machine replaced by members of the US in the UK newspaper, The Daily [Feb 23] given to them by Polish Navy played by sturdy Matthew Telegraph, on April 27, 1995 Intelligence before the war [Aug McConaughey and stirling Bill (online at 16]. However, to actually Paxton. UK Prime Minister Tony https://www.cl.cam.ac.uk/resea decrypt a message on the device Blair called the film an “affront”. rch/dtg/attarchive/cartoon.htm required the correct settings for l). A German WWII U-Boat the machine’s three rotors. commander was asked for his Hopper is a keen pilot, having On this day, the British opinion of the film's logged over 5,000 hours, destroyers HMS Bulldog, HMS authenticity. His response: including a round-the-world Broadway, and HMS Aubrietia “They got one thing right in the flight. His farm near Cambridge captured a German U-110 movie. There were U-Boats in includes an airstrip for his six- submarine just south of Iceland, the North Atlantic during the seater Cessna light aircraft. on what was later to be called Second World War.” Operation Primrose. They recovered a naval Enigma machine, its cipher keys, and Day of Illiaction code books. Andrew Hopper May 9, 1970 Born: 9 May 1953; The ILLIAC IV [Sept 7] was one Warsaw, Poland of the first attempts to build a UK citizen since 1964 massively parallel computer. From the mid 1970's, Hopper The University of Illinois signed worked with Maurice Wilkes a contract with DARPA [Feb 7] [June 26] and Roger Needham in 1964, and the machine's [Feb 9] on the Cambridge Ring construction was subcontracted and its successor the Cambridge to Burroughs [Feb 18]. Fast Ring (CFR) (which does not Unfortunately, after the imply that the first was slow). university’s ties with the HMS Bulldog, April 1944. Hopper helped set up Orbis Department of Defense (i.e. IWMCollections IWM Photo No.: Ltd. In 1978 to commercialize DARPA) became known, FL 1817. the Cambridge Ring work, and protests began. On Jan. 6, 1970, Orbis merged with Acorn the student newspaper The Daily The seizure was kept secret, and Computers [Dec 5] in 1979. Now Illini claimed that the computer the Germans continued to use at Acorn, Hopper designed some would be used to design nuclear their current codes, thinking of the chips for the BBC Micro weapons. that the submarine had been [Dec 1] and helped develop the The Kent State shootings in May sunk. company's ARM project [April triggered anti-war protests 26]. The materials were taken to across many US university Bletchley, where they allowed U- In the early 1990's, he worked campuses [May 4]. At the boat messages to be decrypted on location technologies that University of Illinois, students for several weeks until the keys became the Active Badge joined a May 9 nationwide expired. Merchant ship losses system. A badge transmits a student strike by declaring a dropped by over two-thirds in unique infra-red signal every ten “Day of Illiaction”. According to July 1941, and remained low seconds which is picked up by a “Smash Illiac IV” flyer, local until Nov. networked sensors. This events would include It also meant that Bletchley information can be employed by workshops, talks, teach-ins, and became familiar with the style a variety of location-aware “free music all day”, but no and formatting of Naval applications, often grouped smashing of the computer. messages, which helped in under the exciting heading of Indeed, it would have been breaking the new keys. sentient computing. difficult since its was still being constructed at Burroughs. Unfortunately, this became a lot The largest Active Badge system harder in 1942 when the was deployed in the Cambridge Matters became even more Germans added a fourth rotor to University Computer Lab, where heated after the August 24 the Enigma machines on vessels over 200 badges and 300 bombing of the Army 1 Mathematics Research Center at Computing [May 17], and later Larry Ewing did the first the University of Wisconsin- reprinted in “The Best of drawing of Tux, as a submission Madison. The building was Creative Computing, Vol. 1”. It for a Linux logo contest. Three scarcely damaged, but a physics was ported to many other such competitions took place. researcher was killed and three languages and platforms, and and Tux won none of them. As a others injured. graphical versions soon consequence, Tux is formally the appeared. Linux mascot, not the logo. As the delivery date for the machine grew nearer in Jan. The Wumpus makes several 1971, the Director of the ILLIAC appearances in the card game IV project, Dan Slotnick [Nov 12] “Magic: The Gathering”, is a Shakespearian decided that the university guest star in NetHack [July 28], couldn’t guarantee its safety. It and occupies an entire chapter Monkey Business was agreed to have it sent to the of “Land of Lisp [April 15]” by NASA Ames Research Center Conrad Barski. May 9, 2003 instead, which being a US Navy The “infinite monkey theorem” base was protected by marines. states that an infinite number of For more May protests, see [May Tux the Penguin monkeys typing on an infinite 4], [May 19]. number of typewriters, will eventually produce the works of May 9, 1996 Shakespeare. Linus Torvalds [Dec 28] adopted Hunting the Tux the penguin as a mascot for The theorem is sometimes Linux, taking inspiration from a attributed to Thomas Huxley, an Wumpus penguin drawing in the style of a English biologist, known as “Creature Comforts” character. “Darwin’s Bulldog” because of May 9-13, 1973 “Creature Comforts” is a stop- his spirited advocacy of Charles Darwin’s theory of evolution. “Hunt the Wumpus” was an motion clay animation comedy early game involving the search TV series, where zoo animals are Huxley supposedly proposed the for a mysterious monster (the interviewed. The show was theorem during a debate over Wumpus) lurking deep inside a created by Nick Park and Darwin’s “On the Origin of network of rooms. When a Aardman Animations. Species” with the Anglican player gets near to it, the Torvalds chose a penguin Bishop of Oxford, Samuel message “I smell a Wumpus” is because he was bitten by one (of Wilberforce, held at Oxford on printed. the species Eudyptula minor), June 30, 1860. The veracity of this account sadly suffers from It was written in BASIC by during a visit to the National Zoo the fact that the typewriter had Gregory Yob in response to the and Aquarium in Canberra, yet to be invented (a patent for many grid-based hunting games probably in 1993. the Sholes and Glidden “Type- he'd seen. Yob wanted to play a Writer” was granted on [June map-based game instead. 23] 1868). He dropped the game off with Nevertheless, researchers from the People’s Computer Company Plymouth University’s MediaLab (PCC [Oct 00]), expecting it to decided to test the theorem. For appear in a future newsletter, some reason, rather than and a few weeks later attended typewriters, and an infinite the Synergy Conference at number, they chose six Celebes Stanford; he remembers: crested macaques (named Elmo, “PCC had a few terminals Gum, Heather, Holly, Mistletoe running in a conference room and Rowan) at Paignton zoo in and I dropped by. To my vast Devon, one computer, and a time surprise, all of the terminals limit of a month. were running Wumpus and Eudyptula minor at Canberra The results were somewhat scraps of paper on the floor with Zoo. Photo by Stephen Dann. disappointing: the macaques scrawled numbers and lines CC BY-SA 2.0. produced just five pages of text testified that much dedicated between them, primarily Wumpus-hunting was in consisting of the letter “s”. progress. I had spawned a hit The mascot's name, Tux, was Indeed, the monkeys were computer game!!!” suggested by James Hughes as a observed to be much more Although the game was derivative of Torvalds’ UniX, as interested in urinating and mentioned in the Sept. 1973 well as being short for tuxedo, defecating over the keyboard. issue of the PCC newsletter, the the attire favored by most Director of the university’s code was first published in the penguins. Institute of Digital Arts and Oct. 1975 issue of Creative Technology (i-DAT), Mike 2 Phillips, denied the project was a disaster and claimed they had learnt “an awful lot”. He also explained that “It wasn’t actually an experiment as such, it was more like a little performance.” The macaques’ typed work was later published in a limited edition entitled “Notes Towards The Complete Works of Shakespeare”. The experiment was part of the wider Vivaria Project, which aims to install computers in zoos across Europe to study the differences between animal and artificial life. It was helped by a generous grant of £2,000 from the UK Arts Council. 3 .
Recommended publications
  • Here Is Tt,E a Glow-Globe in Here, Too, but It Is the Only Source of Light
    Edi+or" " , Bob Albrec.ht­ BooI<. Reviews"" Art, , , , , , Jane wood Denl"lis AlliSOn . C3i /I Holden Pr-oclv<:.ti on, ,r-b.m Scarvi e Li II io.n Quirke Bob ,v'Iullen Do.vld Ka.ufrYIG\Yl Dave De lisle Alber.,. Bradley' f'Ib.ry Jo Albrecht c 0000000 o ~ 0 o 0 • 0 o 0 o 0 Q~ PCC is publisnee\ 5 +imes • Grovp. svb5C.r,'phOn~(al/ 000 (ana sometimes more) dvrinq rl'lQilec +0 ~me add~ss): g -the 5c.hool tear. SubscriptionS 2-~ $4 00 eo.cJ, ! ~ be9in with 't-he fi~t 'Issve in 10-"" $ 3..so ea.c.h ~ o The .fall. /00 or-more $3°Oeach (; Q 0 tJ • Get bG\c.k issues while °8 o If you are an elementqt"Y 0 They IG\st ~+ the toIJowi""j Q or seconc:Ja.rY 9Chool stvcJ6,t low low pnc.es; e • you can00 subScribe to pee. vol I Nos 1-5 12 co 2 C!) for $3 , Send ~h,. check, or p 'U (/) rnoney order, No ~~G\se. orders, Vol Ir fVoI<:> I~!S qoo . e Use your $0,+)£ /ADDRESS' PlEQse eNO b - 5p!!cio.l arl',SSle (() o seno vs some eVidence tha1- you Or ml)( up InclividuQI Issues: () (I are G\ stu~",+, z.-~ 80 ~ ea.ch Cl) o 10-""'} '"70 t ectc. h 0 , Sit"lCJle. svb5c.ription\,. are. • /00 +' bO ea.cJ., . ! e $5 .far' 5 'ISSueS, (~ out- W lei \'k +0 '" o Side VSA-)urface MOIil,' ov .;t0v I e weG\r our Q A .. I cover, [)n,.qon shirts a.-e A ~ "'12 -air mai n(MJ G\vailable at $3$0 eod, '" 0 (Calif, res; dt'nts (Add While 0 sale~ ~')t, g with green prj "ti "va ' S.l'I D ""eo D LG LJ 0 ~OOo@c00000QctcD00(!) 00000000<0 0 0e~ooo OO(l)OOOO~OOO SEND cHECk' OR MONel ORDER 'R>: ~~~ Po 60)( 310 • MENLO PARI<.
    [Show full text]
  • Unix Programmer's Manual
    There is no warranty of merchantability nor any warranty of fitness for a particu!ar purpose nor any other warranty, either expressed or imp!ied, a’s to the accuracy of the enclosed m~=:crials or a~ Io ~helr ,~.ui~::~::.j!it’/ for ~ny p~rficu~ar pur~.~o~e. ~".-~--, ....-.re: " n~ I T~ ~hone Laaorator es 8ssumg$ no rO, p::::nS,-,,.:~:y ~or their use by the recipient. Furln=,, [: ’ La:::.c:,:e?o:,os ~:’urnes no ob~ja~tjon ~o furnish 6ny a~o,~,,..n~e at ~ny k:nd v,,hetsoever, or to furnish any additional jnformstjcn or documenta’tjon. UNIX PROGRAMMER’S MANUAL F~ifth ~ K. Thompson D. M. Ritchie June, 1974 Copyright:.©d972, 1973, 1974 Bell Telephone:Laboratories, Incorporated Copyright © 1972, 1973, 1974 Bell Telephone Laboratories, Incorporated This manual was set by a Graphic Systems photo- typesetter driven by the troff formatting program operating under the UNIX system. The text of the manual was prepared using the ed text editor. PREFACE to the Fifth Edition . The number of UNIX installations is now above 50, and many more are expected. None of these has exactly the same complement of hardware or software. Therefore, at any particular installa- tion, it is quite possible that this manual will give inappropriate information. The authors are grateful to L. L. Cherry, L. A. Dimino, R. C. Haight, S. C. Johnson, B. W. Ker- nighan, M. E. Lesk, and E. N. Pinson for their contributions to the system software, and to L. E. McMahon for software and for his contributions to this manual.
    [Show full text]
  • Subterranean Space As Videogame Place | Electronic Book Review
    electronic home about policies and submissions log in tags book share: facebook google+ pinterest twitter review writing under constraint first person technocapitalism writing (post)feminism electropoetics internet nation end construction critical ecologies webarts image + narrative music/sound/noise critical ecologies fictions present search Vibrant Wreckage: Salvation and New View full-screen This essay appears in these Materialism in Moby-Dick and Ambient gatherings: Parking Lot by Dale Enggass Cave Gave Game: Subterranean Space as 2018-05-29 Videogame Place Digital and Natural Ecologies by Dennis Jerz and David Thomas A Strange Metapaper on Computing 2015-10-06 Natural Language by Manuel Portela and Ana Marques daJerz and Thomas identify our fascination with Silva natural cave spaces, and then chart that 2018-05-07 fascination as it descends into digital realms, all in order to illustrate the importance of “the cave” as a metaphor for how we interact with our environment. Beyond Ecological Crisis: Niklas Luhmann’s Theory of Social Systems by Hannes Bergthaller 2018-04-01 Note: This essay is a part of a “gathering” on the topic of digital and natural ecologies. Thirteen Ways of Looking at ElectronicIn the popular conception of game development, fantastic videogame spaces Literature, or, A Print Essai on Tone in Electronic Literature, 1.0 are whimsically spun from the intangible thread of computer code. Like by Mario Aquilina and Ivan Callus literary authors, videogame developers take on the roles of dreamers of new 2018-02-04 places and inventors of new worlds. This popular notion remains at odds with the relatively small number of formal game spaces typically found in Thinking With the Planet: a Review of Tvideogames.he In his chapter “Space in the Video Game” Mark J.P.
    [Show full text]
  • Setting up a Portable Intellivision Development Environment on Your Android Phone
    Portable Intellivision Development Environment for Phones December 27, 2019 Setting up a Portable Intellivision Development Environment on Your Android Phone Written by Michael Hayes [email protected] Date of Last Modification: December 27, 2019 (Note: don’t let the length of this document intimidate you. It’s designed to be easy-to- follow, not concise. Also, this is something you will only have to do once.) Introduction You have a portable Android phone and a physical keyboard connected to it. You now have some experience developing in IntyBASIC. You would like to do future development using only your phone and keyboard, so you can develop anywhere you’re at in the cracks of time in your busy schedule. You may not know a darn thing about Linux and can’t be bothered to “root” your phone. This document is for you. Disclaimer I feel it is imperative to put this on the first page: Neither I nor Midnight Blue International, LLC are responsible for anything bad that happens to you or your phone for the use of any of the information in this text. Neither I nor Midnight Blue International, LLC are responsible if you get fired from your job because you got caught writing games on company time. Neither I nor Midnight Blue International, LLC are responsible if your Life Partner walks out on you because you’re too busy making games anymore. Standard data rates apply with your mobile carrier, blah blah blah. You will need: • A phone with Android 7 or higher and about 550M internal storage space.
    [Show full text]
  • Games of Empire Electronic Mediations Katherine Hayles, Mark Poster, and Samuel Weber, Series Editors
    Games of Empire Electronic Mediations Katherine Hayles, Mark Poster, and Samuel Weber, Series Editors 29 Games of Empire: Global Capitalism and Video Games Nick Dyer- Witheford and Greig de Peuter 28 Tactical Media Rita Raley 27 Reticulations: Jean-Luc Nancy and the Networks of the Political Philip Armstrong 26 Digital Baroque: New Media Art and Cinematic Folds Timothy Murray 25 Ex- foliations: Reading Machines and the Upgrade Path Terry Harpold 24 Digitize This Book! The Politics of New Media, or Why We Need Open Access Now Gary Hall 23 Digitizing Race: Visual Cultures of the Internet Lisa Nakamura 22 Small Tech: The Culture of Digital Tools Byron Hawk, David M. Rieder, and Ollie Oviedo, Editors 21 The Exploit: A Theory of Networks Alexander R. Galloway and Eugene Thacker 20 Database Aesthetics: Art in the Age of Information Overfl ow Victoria Vesna, Editor 19 Cyberspaces of Everyday Life Mark Nunes 18 Gaming: Essays on Algorithmic Culture Alexander R. Galloway 17 Avatars of Story Marie-Laure Ryan 16 Wireless Writing in the Age of Marconi Timothy C. Campbell 15 Electronic Monuments Gregory L. Ulmer 14 Lara Croft: Cyber Heroine Astrid Deuber- Mankowsky 13 The Souls of Cyberfolk: Posthumanism as Vernacular Theory Thomas Foster 12 Déjà Vu: Aberrations of Cultural Memory Peter Krapp 11 Biomedia Eugene Thacker 10 Avatar Bodies: A Tantra for Posthumanism Ann Weinstone 9 Connected, or What It Means to Live in the Network Society Steven Shaviro 8 Cognitive Fictions Joseph Tabbi 7 Cybering Democracy: Public Space and the Internet Diana Saco 6 Writings Vilém Flusser 5 Bodies in Technology Don Ihde 4 Cyberculture Pierre Lévy 3 What’s the Matter with the Internet? Mark Poster 2 High Techne¯: Art and Technology from the Machine Aesthetic to the Posthuman R.
    [Show full text]
  • Video Game History & Genres
    Video Game History & Genres A Brief History of Video Game httpp//://www. games pot.com /games pot /features /video /hov /i ndex.html 456340-1 Fa ll 2009 9/14/2009 Kyoung Shin Park Multimedia Engineering Dankook University 2 Before the Games: 1889-1970 Before the Games: 1889-1970 1889 1951 FjiFusajiro YhiblihhYamauchi establishes the MfkMarufuku Company to RlhBRalph Baer, an engiineer w ith Lora l, a company tha t deve lops an d manufacture and distribute Hanafuda (flower cards), Japanese manufactures complex military airborne electronics, is instructed playing cards. 1951 – Changes name to The Nintendo Playing Card to "build the best TV set in the world." Baer suggests they add Company. "Nintendo" means "leave luck to heaven." some kind of interactive game to the TV set to distinguish it from other companies' TVs, but management ignores the idea. 1954 Former US Korean War veteran David Rosen starts Service Games to export coin-op machines to Japan. In the 1960s, Rosen made his own coin-oppgerated games, so he p urchases a Tok yjyo jukebox and slot-machine company. 1947 The name SEGA, short for "SErvice GAmes," is stamped on the games . Akio Morita and Masaru Ibuka establish Tokyo Telecommunications Engineering Company. Licensed transistor from Bell Labs in 1952. The transistor radio is a success in Japan, and Ibuka and Morita begggin looking at marketing gp their products in the United States and Europe. Sony was born (from Latin word sonus (sound)). 3 4 Before the Games: 1889-1970 Before the Games: 1889-1970 1958 1962 BkhNtilLbhiitBrookhaven National Lab physicist WillWilly HiHigi in bo tham NlNolan Bus hne ll enrolls in engi ineer ing sc hoo l at t he Un ivers ity o f invents interactive table-tennis-like game on an Utah, where he is first exposed to Russell's Spacewar.
    [Show full text]
  • Stephen M. Cabrinety Collection in the History of Microcomputing, Ca
    http://oac.cdlib.org/findaid/ark:/13030/kt529018f2 No online items Guide to the Stephen M. Cabrinety Collection in the History of Microcomputing, ca. 1975-1995 Processed by Stephan Potchatek; machine-readable finding aid created by Steven Mandeville-Gamble Department of Special Collections Green Library Stanford University Libraries Stanford, CA 94305-6004 Phone: (650) 725-1022 Email: [email protected] URL: http://library.stanford.edu/spc © 2001 The Board of Trustees of Stanford University. All rights reserved. Special Collections M0997 1 Guide to the Stephen M. Cabrinety Collection in the History of Microcomputing, ca. 1975-1995 Collection number: M0997 Department of Special Collections and University Archives Stanford University Libraries Stanford, California Contact Information Department of Special Collections Green Library Stanford University Libraries Stanford, CA 94305-6004 Phone: (650) 725-1022 Email: [email protected] URL: http://library.stanford.edu/spc Processed by: Stephan Potchatek Date Completed: 2000 Encoded by: Steven Mandeville-Gamble © 2001 The Board of Trustees of Stanford University. All rights reserved. Descriptive Summary Title: Stephen M. Cabrinety Collection in the History of Microcomputing, Date (inclusive): ca. 1975-1995 Collection number: Special Collections M0997 Creator: Cabrinety, Stephen M. Extent: 815.5 linear ft. Repository: Stanford University. Libraries. Dept. of Special Collections and University Archives. Language: English. Access Access restricted; this collection is stored off-site in commercial storage from which material is not routinely paged. Access to the collection will remain restricted until such time as the collection can be moved to Stanford-owned facilities. Any exemption from this rule requires the written permission of the Head of Special Collections.
    [Show full text]
  • The Multiplayer Game: User Identity and the Meaning Of
    THE MULTIPLAYER GAME: USER IDENTITY AND THE MEANING OF HOME VIDEO GAMES IN THE UNITED STATES, 1972-1994 by Kevin Donald Impellizeri A dissertation submitted to the Faculty of the University of Delaware in partial fulfilment of the requirements for the degree of Doctor of Philosophy in History Fall 2019 Copyright 2019 Kevin Donald Impellizeri All Rights Reserved THE MULTIPLAYER GAME: USER IDENTITY AND THE MEANING OF HOME VIDEO GAMES IN THE UNITED STATES, 1972-1994 by Kevin Donald Impellizeri Approved: ______________________________________________________ Alison M. Parker, Ph.D. Chair of the Department of History Approved: ______________________________________________________ John A. Pelesko, Ph.D. Dean of the College of Arts and Sciences Approved: ______________________________________________________ Douglas J. Doren, Ph.D. Interim Vice Provost for Graduate and Professional Education and Dean of the Graduate College I certify that I have read this dissertation and that in my opinion it meets the academic and professional standard required by the University as a dissertation for the degree of Doctor of Philosophy. Signed: ______________________________________________________ Katherine C. Grier, Ph.D. Professor in charge of dissertation. I certify that I have read this dissertation and that in my opinion it meets the academic and professional standard required by the University as a dissertation for the degree of Doctor of Philosophy. Signed: ______________________________________________________ Arwen P. Mohun, Ph.D. Member of dissertation committee I certify that I have read this dissertation and that in my opinion it meets the academic and professional standard required by the University as a dissertation for the degree of Doctor of Philosophy. Signed: ______________________________________________________ Jonathan Russ, Ph.D.
    [Show full text]
  • The Inform Designer's Manual
    Chapter VIII: The Craft of Adventure Designing is a craft as much as an art. Standards of workmanship, of ``finish'', are valued and appreciated by players, and the craft of the adventure game has developed as it has been handed down. The embryonic `Zork' (Tim Anderson, Marc Blank, Bruce Daniels, Dave Lebling, 1977) ± shambolic, improvised, frequently unfair ± was thrown together in a fortnight of spare time. `Trinity' (Brian Moriarty, 1986), plotted in synopsis in 1984, required thirteen months to design and test. `Spellbreaker' (Dave Lebling, 1985) is a case in point. A first-rate game, it advanced the state of the art by allowing the player to name items. It brought a trilogy to a satisfying conclusion, while standing on its own merits. A dense game, with more content per location than ever before, it had a structure which succeeded both in being inexplicable at first yet inevitable later. With sly references to string theory and to Aristophanes' The Frogs, it was cleverer than it looked. But it was also difficult and, at first, bewildering, with the rewards some way off. What kept players at it were the ``cyclopean blocks of stone'', the ``voice of honey and ashes'', the characters who would unexpectedly say things like ``You insult me, you insult even my dog!''. Polished, spare text is almost always more effective than a discursive ramble, and many of the room descriptions in `Spellbreaker' are nicely judged: Packed Earth This is a small room crudely constructed of packed earth, mud, and sod. Crudely framed openings of wood tied with leather thongs lead off in each of the four cardinal directions, and a muddy hole leads down.
    [Show full text]
  • Advertising in Computer Games
    ADVERTISING IN COMPUTER GAMES by Ilya Vedrashko B.A. Business Administration, American University in Bulgaria, 2000 Submitted to the Department of Comparative Media Studies in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies at the Massachusetts Institute of Technology September 2006 Signature of author …………………………………………………………………………. Dept. of Comparative Media Studies, August 11, 2006 Certified by…………………………………………………………………………………. Prof. William Uricchio Accepted by……………………………………………………………………………….... Prof. William Uricchio © 2006 Ilya Vedrashko. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. 1 ADVERTISING IN COMPUTER GAMES by Ilya Vedrashko Submitted to the Department of Comparative Media Studies in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies at the Massachusetts Institute of Technology Abstract This paper suggests advertisers should experiment with in-game advertising to gain skills that could become vital in the near future. It compiles, arranges and analyzes the existing body of academic and industry knowledge on advertising and product placement in computer game environments. The medium’s characteristics are compared to other channels’ in terms of their attractiveness to marketers, and the business environment is analyzed to offer recommendations on the relative advantages of in-game advertising. The paper also contains a brief historical review of in-game advertising, and descriptions of currently available and emerging advertising formats. Keywords Advertising, marketing, branding, product placement, branded entertainment, networks, computer games, video games, virtual worlds.
    [Show full text]
  • Malloy, Judy. "A Way Is Open: Allusion, Authoring System, Identity, And
    Malloy, Judy. "A Way Is Open: Allusion, Authoring System, Identity, and Audience in Early Text- Based Electronic Literature." Electronic Literature as Digital Humanities: Contexts, Forms, & Practices. By James O’Sullivan. New York,: Bloomsbury Academic, 2021. 335–364. Bloomsbury Collections. Web. 1 Oct. 2021. <http://dx.doi.org/10.5040/9781501363474.ch-031>. Downloaded from Bloomsbury Collections, www.bloomsburycollections.com, 1 October 2021, 21:06 UTC. Copyright © Volume Editor’s Part of the Work © Dene Grigar and James O’Sullivan and Each chapter © of Contributors 2021. You may share this work for non-commercial purposes only, provided you give attribution to the copyright holder and the publisher, and provide a link to the Creative Commons licence. 31 A Way Is Open: Allusion, Authoring System, Identity, and Audience in Early Text-Based Electronic Literature Judy Malloy In tenth-century Northern France, Archdeacon Wibold created Ludus Regularis, an algorithm-authored game of dice in which clergy gambled for virtues (Pulskamp and Otero 2014). Centuries later, Wibold’s dice-won virtues (chastity, mercy, obedience, fear, foresight, discretion, and piety, etc.) are parroted in the words that poet Emmett Williams selects for his algorithmically authored IBM (virgins, yes, easy, fear, death, naked, etc.). Subsequently, in the 1970s at MIT, where Wibold ‘s Ludus Regularis was probably known to mathematicians and students of chance (Kendall 1956: 2), the virtues of Ludus Regularis were replaced by treasures, as the authors of Zork, led players through the perilous Great Underground Empire in a quest to acquire nineteen treasures (Anderson et al. 1977–9). Beginning with Wibold’s Ludus Regularis, this artist’s chapter explores early text- based electronic literature and its precursors through the lens of textual, intertextual, and algorithmic allusions—whether intentional or zeitgeist inspired.
    [Show full text]
  • Periodical Guide for Computerists ·
    PERIODICAL GUIDE FOR COMPUTERISTS · An Index of Magazine Articles for Computer Hobbyists 1975 - 1976 Revised PERIODICAL GUIDE FOR COMPUTERISTS 1975 - 1976 TABLE OF CONTENTS MAGAZINE AND ABBREVIATION LIST-----2 MICROCOMPUTERS AMATEUR RADI0----------------------3 GENERAL-------------------------30 ANALOG HARDWARE AND CIRCUITS-------3 FUNDAMENTALS AND DESIGN---------30 APPLICATIONS, GENERAL--------------4 SELECTION GUIDE-----------------32 ART--------------------------------4 ALTAIR 8800 &680---------------32 BAR CODES--------------------------5 DYNA MICR0----------------------32 BIORYTHMS--------------------------5 ELF (COSMAC)--------------------32 BIOFEEDBACK------------------------5 IMSAI---------------------------32 BOOKS AND PUBLICATIONS-------------5 KIM-----------------------------33 BUSINESS AND ACCOUNTING------------6 MARK-8--------------------------33 CALCULATORS------------------------6 SPHERE--------------------------33 CALCULATOR PROGRAMS----------------7 SWTPC---------------------------33 CLUBS AND ORGANIZATIONS------------8 OTHER MICROCOMPUTERS------------33 CLOCKS-----------------------------8 MICROPROCESSORS CONSTRUCTION-----------------------8 GENERAL-------------------------33 CONVERSION, CODE-------------------9 FUNDAMENTALS--------------------34 CONVERSION, NUMBER BASE------------9 SELECTION GUIDES----------------34 DEBUG------------------------------9 6502----------------------------34 DEFINITIONS------------------------10 6800----------------------------34 DIGITAL HARDWARE AND CIRCUITS------10 8008----------------------------35
    [Show full text]