This Month In

Total Page:16

File Type:pdf, Size:1020Kb

This Month In This month in Features PCUG News & Services 8 Quake World 6 Membership Notes Andrew Clayton prepares us to be fragged Mike Burke with information for new members 12 Grolier Multimedia 27 Group Notices A review by Alan Tebb ACT Alive, Quiz Night and The Stuffers 15 Gloria’s Gaddings 28 Software Library News Gloria Robbins’ travels Phil Trudinger reviews a selection of software 16 CD ROM Column 36 The Internet Project Nick Thomson reviews recent CDs Iain Gould reports 20 Take Control 38 Internet Project Application John Saxon goes a step further Get connected with TIP 22 Corel Ventura 7 39 Member Services Ted Monaghan looks at DTP software Details of services available to members only 34 Qool URLs 39 Notice of Special Meeitng Jim Hume selects the best of the web Change is in the wind 40 What’s News? 42 Special Interest Groups Jim Hume keeps up with the latest Where the real action is 43 Training News Profile Low cost training for members 2 Editorial Information 44 Vendor Discounts How to contribute to Sixteen Bits Membership has its privileges 3 Contact Information 46 Members’ Ads How to contact us Check here first for bargains 4 Editorial 46 PCUG Membership Darrell Burkey The official membership form 4 President’s Letter 47 Help Directory Ann Byrne Stuck? Call the experts 5 Letters 48 Calendar From our readers... What’s on next month Advertiser & Product Information Inside Front Panther Publishing 7 InterACT Technology Group 9 Bettowynd, Sustance Pty Ltd, L&S Associates 11 Hi Micro, AB&T Systems 13 Software Shop, Creative Impulse 15 Spirit Networks 44 Vendor Discount Scheme Inside Back Aspect Computing Back Cover The Logical Approach SIXTEEN BITS January 1997 1 EditorialEditorial InformationInformation Managing Editor SIXTEEN BITS (ISSN 8017-0991) Darrell Burkey is published monthly by the Deadlines For [email protected] PC Users Group (ACT) Inc March ‘97 Issue PO Box 42 Online Editor Belconnen ACT 2616 Ken Livingston Articles and Member Ads Australia [email protected] Friday 28 February 1997 We welcome submissions of articles from members Commercial Advertising Manager Commercial Ads of the Group. If you are interested in writing please Ken Livingston (06) 282 2536 (bh) contact the Managing Editor and ask for a copy of (06) 253 4922 fax Friday 7 March 1997 our ‘SIXTEEN BITS - Guidelines for Authors’ (also [email protected] available on the BBS in General file area (1) as AUTHORS.TXT). Editorial Team Correspondence and material for review or Mike Burke, Andrew Clayton, publication should be forwarded, preferably as a Jim Hume, Val Thomson, Emil Joseph plain text file with separate PCX/BMP graphic files, Advertising in by the deadline specified, to the Editor as follows: Cover Design SIXTEEN BITS • By email to [email protected] Russell Kerrison • By BBS file - upload to the Articles for Technical Editor SIXTEEN BITS is a unique and powerful 16Bits file area (30) of the PCUG Bulletin Karl Auer medium for reaching the thoughtful decision Board on (06) 253 4933 makers in the ACT area. Our circulation exceeds • By BBS mail - leave a message in the PCUG Production 3500 copies each month, with multiple Editor message area Petra Dwyer and the Stuffing Team • By fax to (06) 253 4922 (100 words or less) readership exceeding 4800. Many copies are • By mail to above address (100 words or less) retained by members for future reference. The Anonymous contributions will not be published, Contributors for this issue advertising deadline is normally the first Friday though name and address can be withheld from Paul Balnaves, Mike Burke, Andrew Clayton, of the month of publication. publication on request. Disks are not returned Iain Gould, Jim Hume, Ted Monaghan, Advertising options include unless requested by the author. Nick Thomson,Val Thomson, Alan Tebb, • Cover ads © Copyright 1996, by the PC Users Group (ACT) Phil Trudinger • Display ads Inc. All rights reserved. Permission for reproduction in whole or in part must be obtained from the • Special inserts Managing Editor and is generally given, provided • One-off mailing lists the author also agrees and credit is given to Authors and Advertisers please note SIXTEEN BITS and the author(s) of the reproduced Regular advertisers receive discount vouchers to pay for any future advertising with SIXTEEN material. All other reproduction without prior Articles from SIXTEEN BITS are also permission of the PC Users Group (ACT) Inc is BITS (subject to account being in order). Every published on the ‘net as Sixteen Bits Online at prohibited. 12th consecutive ad placed is free. Please contact http://www.pcug.org.au/pcug/16bits/ and Members of the PC Users Group (ACT) Inc receive the Advertising Manager, Ken Livingston, on extracts are read on Radio 1RPH (1125AM) SIXTEEN BITS each month. Registered by (06) 282 2536 for further information. Australia Post, Print Post Publication No. Thursdays 10.45am & 9.45pm. PP226480/00009. Material published on the Web and broadcast Disclaimer: on radio is subject to copyright law and Although it is editorial policy to check all material in Sixteen Bits SIXTEEN BITS for accuracy, usefulness and suitability, reproduction in any form without permission is produced with the no warranty either express or implied is offered for any of the editor and the author is prohibited. If products and support of losses due to the use of the material in the journal. Unless however you, as an author, object to publication specifically stated otherwise, the experiences and of your material on the Internet or on radio for opinions expressed in any column or article are those any reason, you must contact the Editor to Adobe of the author and do not represent an official position request that your articles be omitted from the of, or endorsement by, the PC Users Group (ACT) Inc. The PC Users Group (ACT) Inc is not liable for online version. inaccuracy in any advertisement and does not accept Corel responsibility for any claims made by advertisers. It is the buyer’s responsibility to investigate the claims made Corporation by advertisers. Any material considered misleading or inappropriate will be withheld at editorial discretion. Names of hardware, software and other products offered on a commercial basis may be registered names and trademarks of the vendors concerned. SIXTEEN BITS uses such names only in an editorial fashion and to the benefit of the trademark owners, with no intent of infringement of the trademark. 2 February 1997 SIXTEEN BITS PCUG Committee How To Make Contact President Ann Byrne 282 2536 *Postal address [email protected] PO Box 42 Vice President Mike Gellard 258 2361 [email protected] Belconnen ACT 2616 Secretary Hugh Bambrick 249 7667 (For ALL correspondence) & Public Officer [email protected] J PC Users Group Centre Treasurer Hugh Alston [email protected] Northpoint Plaza, Belconnen Training Officer Paul Balnaves 241 4671 Open Mon, Wed and Fri 10am-2pm [email protected] Saturdays and Sundays 9am-5pm Network Craig Gibson (closed long weekends) Administrator [email protected] BBS Sysop Michael Phillips 281 1980 The PCUG Centre is the venue for PCUG training, some Special Interest [email protected] Group meetings and other activities. There is no charge for using the General Committee Alan Mikkelsen 278 3164 Centre for PCUG activities. Contact Petra Dwyer at the PCUG Centre on [email protected] (06) 253 4911for bookings. General Committee Emil Joseph 249 6389 ( PCUG Main Phone number [email protected] (06) 253 4911 General Committee David Schwabe 254 9086 [email protected] (Answering machine when Centre unattended) General Committee Ken Livingston 282 2536 [email protected] 2 Fax number (06) 253 4922 General Committee Rod Farr 286 1597 [email protected] ,Email General Committee Iain Gould 295 0956 [email protected] [email protected] (or use addresses at left) General Committee Darrell Burkey 258 3786 [email protected] ,The INTERNET Project Immediate Karl Auer 248 6607 (06) 206 6200 [email protected] Past President [email protected] World Wide Web page PCUG Committee email to: [email protected] http://www.pcug.org.au/pcug/ Other Contacts : Bulletin Board Service (BBS) Executive Secretary Petra Dwyer 258 2099 [email protected] (06) 253 4933 (5 lines 28800 baud) Fidonet address 3:620/243 Membership Mike Burke Secretary [email protected] (BBS Sysop voice number The phone numbers listed above are home numbers unless otherwise (06) 253 4966 (6.00pm - 9.00pm) specified. Please restrict calls to between 7.30pm and 9.00pm. New Members Information Night Main Meeting 7.30pm first Monday of the month PC Users Group Centre, Northpoint Main meetings are held 7.00pm for 7.30pm, usually on the last Monday Plaza Belconnen. of every month at Manning Clark Theatre 1, Crisp Building Australian National University. SIXTEEN BITS February 1997 3 Editor’s Desk Top Darrell Burkey, Managing Editor One of the things I like best about being a point to ask questions and listen. Even to use the program as a plug-in application the Editor of Sixteen Bits is that I get a chance so, those of us involved in projects still and then deliver pages to you one at a time to read the articles first. If you find that need as much feedback as we can get. Do rather than requiring you to download an interesting, the editorial team is always you find what we are printing interesting entire file before viewing it. We’ve run in looking for help and Petra’s merry band of and useful? What are your favourite things to a bit of a brick wall support-wise so it stuffers are next in line to see the magazine, about the journal? What don’t you like? may take use some time to get it working hint hint.
Recommended publications
  • Die Kulturelle Aneignung Des Spielraums. Vom Virtuosen Spielen
    Alexander Knorr Die kulturelle Aneignung des Spielraums Vom virtuosen Spielen zum Modifizieren und zurück Ausgangspunkt Obgleich der digital divide immer noch verhindert, dass Computerspiele zu ge- nuin globalen Gütern werden, wie es etwa der Verbrennungsmotor, die Ka- laschnikow, Hollywoodikonen, Aspirin und Coca Cola längst sind, sprengt ihre sich nach wie vor beschleunigende Verbreitung deutlich geografische, natio- nale, soziale und kulturelle Schranken. In den durch die Internetinfrastruktur ermöglichten konzeptuellen Kommunikations- und Interaktionsräumen sind Spieler- und Spielkulturen wesentlich verortet, welche weiten Teilen des öf- fentlichen Diskurses fremd und unverständlich erscheinen, insofern sie über- haupt bekannt sind. Durch eine von ethnologischen Methoden und Konzepten getragene, lang andauernde und nachhaltige Annäherung ¯1 an transnational zusammengesetzte Spielergemeinschaften werden die kulturell informierten Handlungen ihrer Mitglieder sichtbar und verstehbar. Es erschließen sich so- ziale Welten geteilter Werte, Normen, Vorstellungen, Ideen, Ästhetiken und Praktiken – Kulturen eben, die wesentlich komplexer, reichhaltiger und viel- schichtiger sind, als der oberflächliche Zaungast es sich vorzustellen vermag. Der vorliegende Artikel konzentriert sich auf ein, im Umfeld prototypischer First-Person-Shooter – genau dem Genre, das im öffentlichen Diskurs beson- ders unter Beschuss steht – entstandenes Phänomen: Die äußerst performativ orientierte Kultur des trickjumping. Nach einer Einführung in das ethnologische
    [Show full text]
  • 06523078 Galih Hendro Martono.Pdf (8.658Mb)
    PANDUAN MIGRASI DARI WINDOWS KE UBUNTU TUGAS AKHIR Diajukan Sebagai Salah Satu Syarat Untuk Memperoleh Geiar Sarjana Teknik Informatika ^\\\N<£V\V >> ^. ^v- Vi-Ol3V< Disusun Oleh : Nama : Galih Hendro Martono No. Mahasiswa : 06523078 JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNOLOGI INDUSTRl UNIVERSITAS ISLAM INDONESIA 2010 LEMBAR PENGESAHAN PEMBIMBING PANDUAN MIGRASI DARI WINDOWS KE UBUNTU LAPORAN TUGAS AKHIR Disusun Oleh : Nama : Galih Hendro Martono No. Mahasiswa : 06523078 Yogyakarta, 12 April 2010 Telah DitejHha Dan Disctujui Dengan Baik Oleh Dosen Pembimbing -0 (Zainudki Zukhri, ST., M.I.T.) ^y( LEMBAR PERNYATAAN KEASLIAN TUGAS AKIilR Sa\a sane bertanda langan di bawah ini, Nama : Galih Hendro Martono No- Mahasiswa : 06523078 Menyatakan bahwu seluruh komponen dan isi dalam laporan 7'ugas Akhir ini adalah hasi! karya sendiri. Apahiia dikemudian hari terbukti bahwa ada beberapa bagian dari karya ini adalah bukan hassl karya saya sendiri, maka sava siap menanggung resiko dan konsckuensi apapun. Demikian pennalaan ini sa\a buaL semoga dapa! dipergunakan sebauaimana mesthna. Yogvakarta, 12 April 2010 ((ialih Hendro Martono) LEMBAR PENGESAHAN PENGUJI PANDUAN MIGRASI DARI WINDOWS KE UBUNTU TUGASAKHIR Disusun Oleh : Nama Galih Hendro Martono No. MahaMSwa 0f>52.'iU78 Telah Dipertahankan di Depan Sidang Penguji Sebagai Salah Satti Syarat t'nUik Memperoleh r>ekii Sarjana leknik 'nlormaUka Fakutlss Teknologi fiuiii3iri Universitas Islam Indonesia- Yogvakai .'/ April 2010 Tim Penguji Zainuditi Zukhri. ST., M.i.T Ketua Yudi Prayudi S.SUM.Kom Anggota Irving Vitra Paputungan,JO^ M.Sc Anggota lengelahui, "" ,&'$5fcysan Teknik liInformatika 'Islam Indonesia i*YGGYA^F' +\ ^^AlKfevudi. S-Si.. M. Kom, IV CO iU 'T 'P ''• H- rt 2 r1 > -z o •v PI c^ --(- -^ ,: »••* £ ii fc JV t 03 L—* ** r^ > ' ^ (T a- !—• "J — ., U > ~J- i-J- T-,' * -" iv U> MOTTO "liada 1'ufian sefainflffaft dan Jiabi 'Muhamadadafafi Vtusan-Tiya" "(BerdoaCzfi ^epada%u niscaya a^anjl^u ^a6u0ian (QS.
    [Show full text]
  • 00 Initial Pages.Qxd
    Fast Track to Freeware By Team Digit Almost everything we speak about here, we’ve provided on our CD/DVD for this month. Credits The People Behind This Book EDITORIAL Deepak Ajwani Editor Robert Sovereign-Smith Writer, Copy Editor Ram Mohan Rao Copy Editor Nimish Chandiramani Writer, Copy Editor Karmanya Aggarwal Writer Abey John Writer Srikanth R Writer Prakash Ballakoor Writer DESIGN AND LAYOUT Shivshankar Pillai, Vijay Padaya Layout Designers Sivalal S Layout and Cover Design Harsho Mohan Chattoraj Illustrator © Jasubhai Digital Media Published by Maulik Jasubhai on behalf of Jasubhai Digital Media. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior written permission of the publisher. March 2007 Free with Digit. Not to be sold separately. If you have paid separately for this book, please e-mail the editor at [email protected] along with details of location of purchase, for appropriate action. Introduction No Strings Attached his little guide is indispensable, even though we’re saying it Tourselves! We simply must, because what we’ve put together here is a collection of freeware in all the categories of computer usage that matter, from an office suite to prank software you can use on a friend. It’s all there. Some amongst us have gone bad and prefer to pirate stuff, which we don’t like. We like our software either paid or free—and interestingly, there’s free stuff for almost everything you’d need to accomplish. Covered here are system tools, which affect every aspect of your computer; multimedia tools to play and manipulate your media files; software you’d use when connected to the Internet; applica- tions for your mobile phone; tools to increase your productivity, whether at work or at home; desktop enhancements and such; and developer tools.
    [Show full text]
  • The Tweakguides Tweaking Companion Download Page, Or to the Main Tweakguides Page Without Seeking Written Permission
    WWW.TWEAKGUIDES.COM [Version 3.00 ‐ January 2006] T HE T WEAKG UIDES T WEAKING C OMPANION TABLE OF CONTENTS Table Table of Contents ........................................................................................................................................................... 2 of Copyright & Credits..................................................................................................................................................... 10 Contents Introduction................................................................................................................................................................... 11 Using this Guide .......................................................................................................................................................... 12 Basic Requirements ........................................................................................................................................................................................... 12 Different Versions of Windows ......................................................................................................................................................................... 12 Why is the Guide So Long? .............................................................................................................................................................................. 12 Recommended Software ..................................................................................................................................................................................
    [Show full text]
  • [Amok] S/N: 1299275 a Smaller Note 99 2.08 Firstname
    LETRA A A Real Validator 1.01 Name: ubique.daemon [AmoK] s/n: 1299275 A Smaller Note 99 2.08 FirstName: ViKiNG LastName: Crackz Company: private Street: ViKiNG Zip: 11111 City: Crackz Code: 19147950 Order: 97234397 A.I.D 2.1 s/n: AD6778-A2G0 A.I.D. 2.0.2 s/n: AD6778-A2G0T A+ Math 1.0 Name: (Anything) s/n: 8826829 A+ MathMAT 1.0.0 Name: TEAM ElilA s/n: 8826829 A-1 Image Screen Saver 4.1 s/n: B5K7ij49p2 A1 Text Finder 4.02 s/n: PCSLT3248034 ABCPager 1.6.4 Name: Sara s/n: 1DQDSSSSSSSS ABCPager Plus 5.0.5 Name: Sara s/n: M5N5SSSSSSSS Ability Office 2000 2.0.007 Name: Ben Hooks s/n: 12878044-01034-40997 Ability Office 2000 2.0.005 Name:Nemesis] Organization:TNT s/n: 15155445-37898- 08511 Ablaze Quick Viewer 1.6 Name: Hazard s/n: 81261184XXXXXXX Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Absolute Fast Taskbar 1.01 Name: (Anything) s/n: nxpwvy Absolute Security 3.6 Name: Evil Ernie 2K [SCB] s/n: GMKKRAPZBJRRXQP Absolute Security Pro 3.3 Name: C0ke2000 s/n: GPBKTCNKYZKWQPJ Absolute Security Standard 3.4 Name: Hazard 2000 s/n: ECHVNZQRCYEHHBB or Name: PhatAzz [e!] s/n: RBFXPLUMBPGDFYW Absolute Security Standard 3.5 Name: embla of phrozen crew s/n: LTPDTDMAEHNKNTR AbsoluteFTP 1.0 beta 6 Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 Final Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: Never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 RC 11 Name: _RudeBoy_ Company: Phrozen Crew s/n: 02-01-
    [Show full text]
  • Introduction to Reconfigurable Computing
    Introduction to Reconfigurable Computing Introduction to Reconfigurable Computing Architectures, Algorithms, and Applications by Christophe Bobda University of Kaiserslautern, Germany A C.I.P. Catalogue record for this book is available from the Library of Congress. ISBN 978-1-4020-6088-5 (HB) ISBN 978-1-4020-6100-4 (e-book) Published by Springer, P.O. Box 17, 3300 AA Dordrecht, The Netherlands. www.springer.com Printed on acid-free paper All Rights Reserved c 2007 Springer No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. To Lewin, Jan and Huguette for being so patient Foreword "Christophe Bobda’s book is an all-embracing introduction to the fundamentals of the entire discipline of Reconfigurable Computing, also seen with the eyes of a software developer and including a taxonomy of application areas. Reconfigurable Computing is a disruptive innovation currently going to com- plete the most important breakthrough after introduction of the von Neumann paradigm. On software to FPGA migrations a dazzling array of publications from a wide variety application areas reports speed-up factors between 1 and 4 orders of magnitude and promises to reduce the electricity bill by at least an order of magnitude. Facing the tcyberinfrastructure’s growing electricity con- sumption (predicted to reach 35–50% of the total electricity production by the year 2020 in the USA) also this energy aspect is a strategic issue.
    [Show full text]
  • Multiplayer Online Games Insecurity
    Multiplayer Online Games Insecurity [Re]Vuln Luigi Auriemma & Donato Ferrante Who? Donato Ferrante @dntbug Luigi Auriemma @luigi_auriemma ReVuln Ltd. – revuln.com – twitter.com/revuln – [email protected] 2 Who? ReVuln Ltd. – revuln.com – twitter.com/revuln – [email protected] 3 Agenda . Introduction Introduction on Multiplayer Games Security . Why games? . Possible scenarios . The market Finding Vulnerabilities . Game vulnerabilities . Welcome to the real world . What about the future? . Conclusion Considerations ReVuln Ltd. 4 Introduction . Games are an underestimated field for security . Number of online players: . 1,3,6,10,55,66,120,153,171,190,300,351,595,630,666,820,3003,5995,8778.. Number of online games . 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987.. Think about games as possible attack vectors and players as possible targets… . You have thousands of attack vectors and millions of possible victims . Excellent and stealthy attack vector . Oh! Many games require Admin privs to run . Often because of anti-cheating solutions.. Thanks anti-cheating! :] ReVuln Ltd. 5 Why games? ReVuln Ltd. 6 Why games? . Two main entities/targets: Players Companies . Each of these targets has a different “attacker subset” . Mostly defined by interests.. ReVuln Ltd. 7 Why games? . Two main entities/targets: 1) Players 2) Companies Who wants to attack your game? Your roommate… Script Kiddies.. Rest of the world… He told you to stop wasting bandwidth! ReVuln Ltd. 8 Why games? . Two main entities/targets: 1) Players 2) Companies Who wants to attack your company? Script Kiddies.. Your competitors.. Others… They are everywhere ReVuln Ltd. 9 Why games? .
    [Show full text]
  • Bibliotekarstudentens Nettleksikon Om Litteratur Og Medier
    Bibliotekarstudentens nettleksikon om litteratur og medier Av Helge Ridderstrøm (førsteamanuensis ved OsloMet – storbyuniversitetet) Sist oppdatert 09.12.20 Mod (_dataspill) Forkortelse for “spillmodifikasjon” (“game modification”). Reglene, grafikken og/eller lyden i et dataspill forandres, altså modifiseres (Genvo 2002 s. 62). Aktiviteten kalles “modding”. En “ombygging” av et dataspill, vanligvis utført av fans og spredt over Internett. Mods gir ofte spillkarakteren flere nivåer og nye oppdrag å utfolde seg på og utføre. “In our understanding, the act of making mods is a practice that alters some game elements, and it comprises including something new in its structure or mechanics (add-ons), improving the game aesthetics, or even including new game levels and game contents.” (Oliveira m.fl. 2014) “In gaming, modification (mod) refers to the process of editing or changing the structure, syntax or code of a game. Modification is performed to change the operations of a game in par with the requirements, environment, or end result or experience. Modification is performed to allow a gamer to play a game different from its original released version. It is generally performed by end users or developers, and the modded version is considered as an unofficial version of the game. Typically, when a modification is applied to a game, the user or gamer can have better weapons, more game money, different background textures, stronger character health and any other characteristics specific to a game. Modification can be partial or total, or it may be used only to fix some bugs.” (https://www. techopedia.com/definition/3841/modification-mod; lesedato 08.11.16) “Modding, in the videogame world, is adding, altering, or purging content on a videogame, especially on the pc.
    [Show full text]
  • Shooter-Spiele
    Kein anderes Computerspiel-Genre wird in der Öffentlichkeit so kontrovers diskutiert wie Shooter-Spiele. In der politischen und pädagogischen Rhetorik ist seit einiger Zeit sogar von ›Killerspielen‹ die Rede. Dieser Band will einen Beitrag zum Verständnis dieser umstrittenen Spielformen leisten. Dabei geht es den hier versammelten Aufsätzen nicht allein um die Frage der möglichen ›Wirkungen‹ gewalthaltiger Spiele wie etwa Doom, Quake, Half-Life, GTA oder Counterstrike. Es geht darüber hinaus auch um die wissenschaftliche Analyse konkreter Spielformen, um Einsichten in die Ästhetik populärer Spiele sowie um die Frage nach den Diskursen, Aus- drucksformen und sozialen Gemeinschaften, die Shooter als Phänomene Shooter. Eine Multidisziplinäre Einführung Eine Multidisziplinäre Shooter. der zeitgenössischen audiovisuellen Kultur kennzeichnen. Damit gibt der Band einen Einblick in die Vielfalt aktueller Ansätze der Computerspiel- forschung und macht dadurch die Konturen eines noch jungen Forschungs- Matthias Bopp / Rolf F. Nohr / Serjoscha Wiemer (Hg.) feldes anschaulich. Berücksichtigt werden beispielsweise, pädagogische, psychologische, kunst- und kulturwissenschaftliche, enthnologische, dis- Shooter kursanalytische und medientheoretische Zugangsweisen. Eine Multidisziplinäre Einführung Bopp / Nohr / Wiemer Bopp / Nohr / Medien' Welten LIT Matthias Bopp / Serjoscha Wiemer / Rolf F. Nohr Shooter Shooter_Endversion.indd 1 05.05.2009 13:14:39 Medien ’ Welten Braunschweiger Schriften zur Medienkultur, herausgegeben von Rolf F. Nohr Band 12 Lit Verlag Münster/Hamburg/Berlin/London Lit Shooter_Endversion.indd 2 05.05.2009 13:14:55 Matthias Bopp / Serjoscha Wiemer / Rolf F. Nohr (Hg.) Shooter. Eine multidisziplinäre Einführung Lit Shooter_Endversion.indd 3 05.05.2009 13:14:55 Bucheinbandgestaltung: Tonia Wiatrowski / Rolf F. Nohr unter Verwendung einer Werbe- anzeige des Spiels Keeney´s Anti-Aircraft Machine Gun © J.H.
    [Show full text]
  • A Task-Based Study of Literacy Ecologies for Digital Composing
    Working in Patches, Groups, and Spaces: A Task-Based Study of Literacy Ecologies for Digital Composing Dissertation Presented in partial fulfillment of the requirements for the degree doctor of philosophy in the Graduate School of The Ohio State University By Julia Ann Voss, B.A., M.A. Graduate Program in English The Ohio State University 2013 Dissertation Committee: Beverly J. Moss, Advisor Harvey J. Graff Cynthia L. Selfe i Copyright by Julia Voss 2013 i Abstract Digital literacy learning has become a fundamental, mainstream concern for teachers and researchers because of the increasingly central roles played by writing in digital environments and multimodal composing in twenty-first century literacy and literacy instruction. Digital composing draws on many of the processes that apply to print composing (planning, drafting, revising, et cetera), but its medium makes additional technical and rhetorical demands on composers which print-based models of the composing process do not fully address. This study describes a process-based approach to group digital composing tasks that accounts for access to digital literacy resources, methods for sharing task responsibilities between group members, and workspaces for digital composing. The material resources (including hardware, software, and physical/virtual workspaces) and intellectual resources (the functional literacy skills to operate these material resources and the rhetorical sensibilities concerning design, mode, and audience according to which composers create digital texts) digital composing relies on recommend approaching digital composing tasks in terms of component parts, while situating these components within complex literacy ecologies. The case studies of student and faculty digital composing groups featured in this study focus on how groups approached and worked through their tasks.
    [Show full text]
  • Error:The Highly Unreliable Times
    Error:The Highly Unreliable Times This Week Updated 07/15/07 Version 0.0.0.14 Issue 3 Contact Us, Home, About Us, our Radio Show YOUR ADD HERE! The People or companies who wrote these articles can be found by clicking on the Title of the article if you have an Internet connection. Computer Rescue 1-208-750-5628 From The Editor Justin Breithaupt LEADING STORY PAYPAL WON'T PROTECT YOU! I am putting this story out because many of you don't know what you are getting into by using Paypal. Most people think they are protected by Paypal from Fraud no matter what. Here is a quote from Paypal's user agreement. “11.3 Qualification Requirements. In order to qualify for coverage under the Seller Protection Policy, you must meet the following requirements: a. You must have a Verified Business or Verified Premier Account at the time of the transaction, b. The transaction must be between a US, UK or Canadian buyer and a US, UK or Canadian seller, c. The payment must be listed as "Seller Protection Policy Eligible" on the "Transaction Details" page, or cleared by PayPal through Payment Review, d. You must accept a single payment from one PayPal Account for the purchase, e. You must not charge a surcharge for accepting PayPal, f. You must ship the purchased item to the address listed on the "Transaction Details" page, and that address must be identified as a Confirmed Address, g. You must ship the item to the buyer within 7 Days of receiving payment, h.
    [Show full text]
  • Computer Game Modding, Intermediality and Participatory Culture
    Computer Game Modding, Intermediality and Participatory Culture Olli Sotamaa University of Tampere, Finland [email protected] Introduction Artistic freedom. Do what you want. But just make sure that the money ain't gone. The Jam, All Mod Cons The lines by Paul Weller captured a moment in time in the late 70’s but interestingly they also reveal something of the dynamics of 21st century mod scene. And today, I’m not talking about kids wearing smart suits and riding fancy scooters but gamer-made modifications of computer games that are celebrated as a new medium for artistic innovation and simultaneously successfully used as a marketing strategy for new retail titles. The ways modding1 phenomenon links together media production and consumption clearly go beyond the simple oppositions of co- optation and resistance. In a larger scale a growing number of literature has lately identified the need for a closer integration of studies of media production and consumption. In obtaining a profound picture of the meanings attached to artefacts and media texts neither processes of production nor forms of consumption should be privileged. (du Gay et. al. 1997, Deacon 2003) In case of contemporary digital media defined as “interactive” and “multilinear”, all this sounds somewhat obvious. Take virtual worlds or mobile communication, active users and user communities constantly construct new ways of interpreting, using and manipulating the media environment. In context of computer games the involvement of the player becomes a fundamental feature: the result of the game is not determined beforehand but it is highly dependent on the skills and creativity of the player.
    [Show full text]