Joni Tolonen
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mckinsey Quarterly 2015 Number 4.Pdf
2015 Number 4 Copyright © 2015 McKinsey & Company. All rights reserved. Published since 1964 by McKinsey & Company, 55 East 52nd Street, New York, New York 10022. Cover illustration by Vasava McKinsey Quarterly meets the Forest Stewardship Council (FSC) chain-of- custody standards. The paper used in the Quarterly is certified as being produced in an environ- mentally responsible, socially beneficial, and economi- cally viable way. Printed in the United States of America. 2015 Number 4 This Quarter It’s almost a truism these days to say that modern corporations must be agile. The pace of industry disruption arising from the digital revolution, combined with nimble, new competitors—including many from emerging markets—have raised the cost of complacency and rigidity. But what does it mean to achieve agility? This issue’s cover package tries to answer that question, starting with intriguing new McKinsey research. Using data from McKinsey’s Organizational Health Index, Michael Bazigos, Aaron De Smet, and Chris Gagnon show how organizations that combine speed with stability are far likelier to be healthy than companies that simply move fast. The utility sector is a striking example of one industry that needs to combine flexibility and stability. Although digital competitors, new data-based business models, and renewable-energy sources are changing the landscape in certain markets, the industry’s sprawl- ing base of heavy assets remains core to its future. Sven Heiligtag and his colleagues Dominik Luczak and Eckart Windhagen describe how a number of leading utilities are trying to straddle these two worlds, suggesting some lessons for companies in other sectors. -
Core Techniques and Algorithms in Game Programming
Core Techniques and Algorithms in Game Programming Core Techniques and Algorithms in Game Programming To even try to keep pace with the rapid evolution of game development, you need a strong foundation in core programming techniques-not a hefty volume on one narrow topic or one that devotes itself to API- specific implementations. Finally, there's a guide that delivers! As a professor at the Spanish university that offered that country's first master's degree in video game creation, author Daniel Sanchez-Crespo recognizes that there's a core programming curriculum every game designer should be well versed in-and he's outlined it in these pages! By focusing on time-tested coding techniques-and providing code samples that use C++, and the OpenGL and DirectX APIs-Daniel has produced a guide whose shelf life will extend long beyond the latest industry trend. Code design, data structures, design patterns, AI, scripting engines, 3D pipelines, texture mapping, and more: They're all covered here-in clear, coherent fashion and with a focus on the essentials that will have you referring back to this volume for years to come. Table of Contents Introduction What You Will Learn What You Need to Know How This Book Is Organized Conventions Chapter 1. A Chronology of Game Programming Phase I: Before Spacewar Phase II: Spacewar to Atari Phase III: Game Consoles and Personal Computers Phase IV: Shakedown and Consolidation Phase V: The Advent of the Game Engine Phase VI: The Handheld Revolution Phase VII: The Cellular Phenomenon Phase VIII: Multiplayer Games In Closing Chapter 2. -
Quake Manual
The Story QUAKE Background: You get the phone call at 4 a.m. By 5:30 you're in the secret installation. The commander explains tersely, "It's about the Slipgate device. Once we perfect these, we'll be able to use them to transport people and cargo from one place to another instantly. "An enemy codenamed Quake, is using his own slipgates to insert death squads inside our bases to kill, steal, and kidnap. "The hell of it is we have no idea where he's from. Our top scientists think Quake's not from Earth, but another dimension. They say Quake's preparing to unleash his real army, whatever that is. "You're our best man. This is Operation Counterstrike and you're in charge. Find Quake, and stop him ... or it ... You have full authority to requisition anything you need. If the eggheads are right, all our lives are expendable." Prelude to Destruction: While scouting the neighborhood, you hear shots back at the base. Damn, that Quake bastard works fast! He heard about Operation Counterstrike, and hit first. Racing back, you see the place is overrun. You are almost certainly the only survivor. Operation Counterstrike is over. Except for you. You know that the heart of the installation holds a slipgate. Since Quake's killers came through, it is still set to his dimension. You can use it to get loose in his hometown. Maybe you can get to the asshole personally. You pump a round into your shotgun, and get moving. System Requirements General Quake System Requirements IBM PC and Compatible Computers Pentium 75 MHz processor or better (absolutely must have a Math Co-Processor!) VGA Compatible Display or better Windows 95 Operation: 16MB RAM minimum, 24MB+ recommended CD-ROM drive required Hard Drive Space Needed: 80 MB Specialized Requirements For WinQuake (WINQUAKE.EXE): Windows 95/98/ME/NT/2000 For GLQuake (GLQUAKE.EXE): Windows 95/98/ME/NT/2000 Open GL Compatible Video Card GLQUAKE supports most 100% fully OpenGL compliant 3D accelerator cards. -
High-Performance Play: the Making of Machinima
High-Performance Play: The Making of Machinima Henry Lowood Stanford University <DRAFT. Do not cite or distribute. To appear in: Videogames and Art: Intersections and Interactions, Andy Clarke and Grethe Mitchell (eds.), Intellect Books (UK), 2005. Please contact author, [email protected], for permission.> Abstract: Machinima is the making of animated movies in real time through the use of computer game technology. The projects that launched machinima embedded gameplay in practices of performance, spectatorship, subversion, modification, and community. This article is concerned primarily with the earliest machinima projects. In this phase, DOOM and especially Quake movie makers created practices of game performance and high-performance technology that yielded a new medium for linear storytelling and artistic expression. My aim is not to answer the question, “are games art?”, but to suggest that game-based performance practices will influence work in artistic and narrative media. Biography: Henry Lowood is Curator for History of Science & Technology Collections at Stanford University and co-Principal Investigator for the How They Got Game Project in the Stanford Humanities Laboratory. A historian of science and technology, he teaches Stanford’s annual course on the history of computer game design. With the collaboration of the Internet Archive and the Academy of Machinima Arts and Sciences, he is currently working on a project to develop The Machinima Archive, a permanent repository to document the history of Machinima moviemaking. A body of research on the social and cultural impacts of interactive entertainment is gradually replacing the dismissal of computer games and videogames as mindless amusement for young boys. There are many good reasons for taking computer games1 seriously. -
ABSTRACT LOHMEYER, EDWIN LLOYD. Unstable Aesthetics
ABSTRACT LOHMEYER, EDWIN LLOYD. Unstable Aesthetics: The Game Engine and Art Modifications (Under the direction of Dr. Andrew Johnston). This dissertation examines episodes in the history of video game modding between 1995 and 2010, situated around the introduction of the game engine as a software framework for developing three-dimensional gamespaces. These modifications made to existing software and hardware were an aesthetic practice used by programmers and artists to explore the relationship between abstraction, the materiality of game systems, and our phenomenal engagement with digital media. The contemporary artists that I highlight—JODI, Cory Arcangel, Orhan Kipcak, Julian Oliver, and Tom Betts—gravitated toward modding because it allowed them to unveil the technical processes of the engine underneath layers of the game’s familiar interface, in turn, recalibrating conventional play into sensual experiences of difference, uncertainty, and the new. From an engagement with abstract forms, they employed modding techniques to articulate new modes of aesthetic participation through an affective encounter with altered game systems. Furthermore, they used abstraction, the very strangeness of the mod’s formal elements, to reveal our habitual interactions with video games by destabilizing conventional gamespaces through sensory modalities of apperception and proprioception. In considering the imbrication of technics and aesthetics in game engines, this work aims to resituate modding practices within a dynamic and more inclusive understanding -
Investigating Steganography in Source Engine Based Video Games
A NEW VILLAIN: INVESTIGATING STEGANOGRAPHY IN SOURCE ENGINE BASED VIDEO GAMES Christopher Hale Lei Chen Qingzhong Liu Department of Computer Science Department of Computer Science Department of Computer Science Sam Houston State University Sam Houston State University Sam Houston State University Huntsville, Texas Huntsville, Texas Huntsville, Texas [email protected] [email protected] [email protected] Abstract—In an ever expanding field such as computer and individuals and security professionals. This paper outlines digital forensics, new threats to data privacy and legality are several of these threats and how they can be used to transmit presented daily. As such, new methods for hiding and securing illegal data and conduct potentially illegal activities. It also data need to be created. Using steganography to hide data within demonstrates how investigators can respond to these threats in video game files presents a solution to this problem. In response order to combat this emerging phenomenon in computer to this new method of data obfuscation, investigators need methods to recover specific data as it may be used to perform crime. illegal activities. This paper demonstrates the widespread impact This paper is organized as follows. In Section II we of this activity and shows how this problem is present in the real introduce the Source Engine, one of the most popular game world. Our research also details methods to perform both of these tasks: hiding and recovery data from video game files that engines, Steam, a powerful game integration and management utilize the Source gaming engine. tool, and Hammer, an excellent tool for creating virtual environment in video games. -
Desarrollo De Un Prototipo De Videojuego
UNIVERSIDAD DE EXTREMADURA Escuela Politécnica Máster en Ingeniería Informática Trabajo de Fin de Máster Desarrollo de un Prototipo de Videojuego Ricardo Franco Martín Noviembre, 2016 UNIVERSIDAD DE EXTREMADURA Escuela Politécnica Máster en Ingeniería Informática Trabajo de Fin de Máster Desarrollo de un Prototipo de Videojuego Autor: Ricardo Franco Martín Fdo: Directores: Pablo García Rodriguez y Rober Morales Chaparro Fdo: Tribunal Calicador Presidente: Fdo: Secretario: Fdo: Vocal: Fdo: Dedicado a mi familia i ii Agradecimientos Quisiera agradecer a varias personas el apoyo y ayuda que me han prestado en la realización de este Trabajo de Fin de Máster. En primer lugar, agradecer a mi director Pablo García Rodríguez por per- mitirme realizar este proyecto y recibirme con los brazos abiertos cada vez que he necesitado su ayuda. También quiero agradecer a mi codirector Rober Morales Chaparro por conar en mí y proporcionarme una de las fases profesional y educativa más importantes de mi vida. Por último, agradecer a mi familia y amigos, que sin su apoyo, no habría llegado tan lejos. En especial, darle las gracias a mi hermano José Carlos Franco Martín que ha realizado y proporcionado algunos recursos artísticos para el proyecto. ½Muchas gracias a todos! iii iv Resumen Este Trabajo de Fin de Máster (en adelante TFM) trata sobre todo el proceso de investigación, conguración de un entorno de trabajo y desarrollo de un prototipo de videojuego. Analizaremos la tecnología actual y repasaremos algunas de las herramien- tas más relevantes utilizadas en el proceso de desarrollo de un videojuego. Seguidamente, trataremos de desarrollar un videojuego. Para ello, a partir de una idea de juego, diseñaremos las mecánicas y construiremos un prototipo funcional que pueda ser jugado y que reeje las principales características planteadas en la idea inicial, con el objetivo de comprobar si el juego es viable, si es divertido y si interesa desarrollar el juego completo. -
Security Now! #835 - 09-07-21 TPM V1.2 Vs 2.0
Security Now! #835 - 09-07-21 TPM v1.2 vs 2.0 This week on Security Now! This week we look at a way of protecting ourselves from Razor-mouse-like local elevation of privilege attacks. We reexamine the meaning of the phrase “Internet Anonymity” following the ProtonMail revelation. We revisit Apple's now delayed CSAM plans. We look at some new troubles for BlueTooth and at a popular and persistently unpatched residential security system which can be trivially disarmed by bad guys. We share some interesting closing the loop feedback and a new Sci-Fi discovery. Then we take a long and careful look at the details and differences between version 1.2 and 2.0 of the Trusted Platform Module specification to discover just what it is that Microsoft wants to insist is available for Windows 11. Security News The Razor mouse & keyboard Two weeks back we covered the industry's discovery that the tongue-in-cheek phrase “Plug And Pray” was more apropos than we imagined, with the news that plugging a Razor mouse or keyboard into any PC could be used to trivially and locally bypass that system's possibly carefully crafted user privilege restrictions to give the operator full system level rights. The worry was that since this was such a simple mistake to make it must certainly have also been made elsewhere. And, indeed, since that initial discovery additional similar instances are being discovered. The good news is that Will Dormann at CERT's Coordination Center has found a registry key that governs Windows' ability to autonomously download and run any of those not-explicitly-asked- for-and-executed Plug and Play peripheral installation packages. -
List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services. -
Google Adquiere Motorola Mobility * Las Tablets PC Y Su Alcance * Synergy 1.3.1 * Circuito Impreso Al Instante * Proyecto GIMP-Es
Google adquiere Motorola Mobility * Las Tablets PC y su alcance * Synergy 1.3.1 * Circuito impreso al instante * Proyecto GIMP-Es El vocero . 5 Premio Concurso 24 Aniversario de Joven Club Editorial Por Ernesto Rodríguez Joven Club, vivió el verano 2011 junto a ti 6 Aniversario 24 de los Joven Club La mirada de TINO . Cumple TINO 4 años de Los usuarios no comprueba los enlaces antes de abrirlos existencia en este septiembre, el sueño que vió 7 Un fallo en Facebook permite apropiarse de páginas creadas la luz en el 2007 es hoy toda una realidad con- Google adquiere Motorola Mobility vertida en proeza. Esfuerzo, tesón y duro bre- gar ha acompañado cada día a esta Revista que El escritorio . ha sabido crecerse en sí misma y superar obs- 8 Las Tablets PC y su alcance táculos y dificultades propias del diario de cur- 11 Propuesta de herramientas libre para el diseño de sitios Web sar. Un colectivo de colaboración joven, entu- 14 Joven Club, Infocomunidad y las TIC siasta y emprendedor –bajo la magistral con- 18 Un vistazo a la Informática forense ducción de Raymond- ha sabido mantener y El laboratorio . desarrollar este proyecto, fruto del trabajo y la profesionalidad de quienes convergen en él. 24 PlayOnLinux TINO acumula innegables resultados en estos 25 KMPlayer 2.9.2.1200 años. Más de 350 000 visitas, un volumen apre- 26 Synergy 1.3.1 ciable de descargas y suscripciones, servicios 27 imgSeek 0.8.6 estos que ha ido incorporando, pero por enci- El entrevistado . ma de todo está el agradecimiento de muchos 28 Hilda Arribas Robaina por su existencia, por sus consejos, su oportu- na información, su diálogo fácil y directo, su uti- El taller . -
The Cat and the Coup Madrid Yellow Umbrella Killbox Unmanned This War of Mine Dead-In-Iraq Performance) Perfect Woman Dys4ia
Meinungsbilder: Making Opinions: Computerspiele als Computer Games as Kommentare realer Commentary on politischer Ereignisse Actual Political Events The Cat and the Coup Madrid Yellow Umbrella Militärisches: Military Matters: Computerspiele als Reflexion Computer Games as Reflections des Bündnisses von Krieg on the Alliance between War und Unterhaltungsindustrie and Entertainment Industries Killbox Unmanned This War of Mine dead-in-iraq �Performance) Multiperspektivität: Multiple Perspectives: Computerspiele als Computer Games Hinterfragungen stereotyper Questioning Stereotypical Geschlechterrollen Gender Roles Perfect Woman Dys4ia Coming Out Simulator Medienkritik: Media Critique: Computerspiele Computer Games als Instrumente as Instruments der Selbstreflexion of Self-Reflection Phone Story TouchTone Orwell Migrationsgeschichten: Migration Stories: Computerspiele als Computer Games and Grenzgänger Border Lines Papers, Please 1378�km� Escape from Woomera Machtspiele: Mapping Power: Computerspiele als Computer Games as Beobachter von Observers of Agency Selbst wirksamkeit and Powerlessness und Ohnmacht Sunset Democracy 3 The Westport Independent * USA The Cat and 2011 2011 Computerspiel / Computer game, the Coup* PC ▲ Cat and the Coup, March 20, iranian parliament nationalizes oil industry © Peter Brinson and Kurosh ValaNejad, 2011 DE EN Ein Fall zurück durch die Zeit: In The Cat and the Coup wer- Plummeting backwards through time, in The Cat and the 132 den die Spielenden zum Schoßtier der Politik und erleben Coup players turn into the pets of politics and experience Weltgeschichte aus der Perspektive eines Vierbeiners. Als world history from a four-legged perspective. As a cat, Katze lösen sie verschiedene Puzzles, die nach und nach they solve various puzzles that gradually, in a tale told in in einer rückwärts erzählten Geschichte erst den Tod von reverse order, document first the death of Dr. -
Valve Corporation Here
Game Maker Without a Rule Book BELLEVUE, Wash. THIS is no Xbox 360 or PlayStation 3. Every way I look, the scene shifts, the battle unfolds. I have a crazy contraption strapped to my head: a boxy set of goggles that looks like a 22nd-century version of a View-Master. It immerses me in a virtual world. I whirl one way and see zombies preparing to snack on my flesh. I turn another and wonder what fresh hell awaits. Behold the future of video games. Or at least the future as envi- sioned by a bunch of gamers, programmers, tinkers and dreamers at the Valve Corporation here. This is the uncorporate company that brought us the Half-Life series, the hugely influential first- person shooter game. The Valve guys aren’t done yet. Founded 16 years ago by a couple of refugees from Microsoft, Valve makes games that wild-eyed fans play until their thumbs hurt and dawn jabs through the cur- tains. But what really makes Valve stand out is its foresight on technology. A decade ago, long before every media executive figured out that downloading was the future, Valve started an online service, Steam. It has since become for games what iTunes is to music — a huge online distributor, in its case one with more than 40 million active users and that, by some estimates, accounts for about 70 percent of the PC games bought and downloaded from the Web. Through Steam, Valve effectively collects a toll on other compa- nies’ online game sales, in addition to making money from selling its own products.