Showing posts with label Windows PC. Show all posts
Showing posts with label Windows PC. Show all posts

Monday, April 3, 2017

Retro Games, Rotation, and the Gamer

- or -
 
A Question of Retro Games, 
Game Play Rotation Lists, 
& Modem Gamers


Well unless Angry Birds happens to be in his Game Play Rotation List that is!
The Most Dangerous Gamer (Comic)
by Nicole Wakelin on December 10, 2012
 

PREFACE


There has never been a better time to recover from lazy gamer syndrome or its counterpart - no-time-to-play-itus - than today.  Now.  Bear with me, all will become clear.  But first we begin the lesson... 
 
The Importance of Context

Contexts is wicked important.  So are ideas like “logic” or “expression” or even “thought” and “emotion” just to name a few.  One position on these matters can be found in the school of Epistemology -- which is the philosophical science and discipline under which we study and define how we know what we know - and the best was to both communicate and illustrate those points.

At its most basic of definitions “Epistemology” is defined as the study of the nature and scope of knowledge, as well as its justified belief and related systems that extend from there. Epistemology
analyzes the nature of knowledge -- and how it relates to similar notions such as truth, belief and justification -- and then defines those words and terms and their meaning in useful ways, so that we can thus carry on dialogue together.

The discipline also addresses our means of production of knowledge, and skepticism about different claims therein. I find this immensely appropriate and even poetic when I consider the alternate worlds that I have most recently existed in, and in particular that of the Japan and its northern-most island, Hokkaido, in the world of Hitman (2016), and the world that exists within the construct of the game “Thief” which was for all practical intentions, created in the late 1990s and refined in 2014 but depicts an industrial-age society on some alien world.

Sure, those are fictional worlds - or are they? I can tell you that at times they felt very real to me - and in particular the moral codes that appear to have usurped that of the courts and Common Law in them.

And the Darwinian approach to moral justification - something akin to Python Law rather than Common Law - when it comes to the significance of and importance for “getting even” or revenge - two themes that play significant roles in both of those manufactured worlds.

Despite the fact that humanity - let alone an individual citizen from one of the many different tribes that human call “nation-states” under which the species has been divided -- often and under conditions of grave danger seek that sort of satisfaction. I'm just saying.

To have meaningful exchanges about these - and other - topics we all need to agree on the basic foundation points like the actual meaning of phrases like “Retro Games,” or “Game Play Rotation List(s)” and even “Modern Gamer(s),” and what about “Preface?” That being so, for the record as I write this I am working from the following foundation points:

Retro Games = Any game that is older than the current season - but can be a very old game too.

Game Play Rotation List(s) = Any game title you play regularly but especially one you have yet to complete to your satisfaction.

Modern Gamer(s) = Me. You. Any gamer currently gaming even if they began their gaming career in the 1970s. As long as they are still gaming and doing it on modern hardware, they are a Modern Gamer.

Preface = The bits that come before the meat of the story.

See? That wasn't so difficult, now was it?

The Meat Part

Moore's law is an observation made by Gordon Moore back in the day that the number of transistors in a dense integrated circuit doubles approximately every two years. His observation turned out to be spot-on accurate, which is why they named it after him. It probably didn't hurt that Gordon Moore was also a co-founder of Fairchild Semiconductor and a little tech company called Intel.

The paper that Moore wrote and published in 1965 described the doubling - every year - in the number of components per integrated circuit, and projected that the rate of growth would continue for at least another decade - which turned out to be a very conservative time estimate, hindsight being 20/20 and all.

Borrowing from his experience I would like to introduce to you:

Boots-Faubert's Law

So yeah, this is the paper I am writing and publishing (well, article not so much as paper but still) that history will draw upon to phrase what will become known as Boots-Faubert's Law of Game Play Rotation - a simple law in gaming that dictates that the typical Game Play Rotation List for a gamer will double in size every 12 months as more games are added to the list thanks to two basic principles:

(1) The wizards at game studios continue to pump out games at a staggering rate, many of which are classified as “must-play” titles; and

(2) The average gamer will not have sufficient time in any given year to spend on completing these games, which will cause a backlog of incomplete games (and games they never got a chance to start playing in the first place) due to the lack of sufficient time to play them all.

The reasoning for this has to do with how big the video game industry has grown, and the fact that it continues to grow, with new studios appearing practically every day.

2014

A good example of this trend and its effect can be found in the year 2014. Bear in mind that a decade ago the typical gaming season - which runs from September through May - generally produced around six AAA titles in the “must-play” category, and so was certainly within reach of the typical gamer. Which was why we didn't really have Game Play Rotation Lists of the sort we have now back then.

Fast forward to 2014 however, and the situation has changed. Peruse this sampling of just the primary “must-play” titles for that year:
  1. 2014 FIFA World Cup Brazil
  2. Alien: Isolation
  3. Assassin's Creed Rogue
  4. Assassin's Creed Unity
  5. Batman: Arkham Origins Blackgate
  6. Borderlands: The Pre-Sequel!
  7. Bound by Flame
  8. Call of Duty: Advanced Warfare
  9. CastleStorm: Definitive Edition
  10. Castlevania: Lords of Shadow 2
  11. Chariot
  12. Child of Light
  13. Dark Souls II
  14. Defense Grid 2
  15. Destiny
  16. Diablo III: Ultimate Evil Edition
  17. Dragon Age: Inquisition
  18. Dragon Ball Z: Battle of Z
  19. EA Sports UFC
  20. The Elder Scrolls Online
  21. Elite: Dangerous
  22. Escape Dead Island
  23. The Evil Within
  24. Fable Anniversary
  25. Far Cry
  26. Fez
  27. FIFA 15
  28. Final Fantasy XIV: A Realm Reborn
  29. Forza Horizon 2
  30. Goat Simulator
  31. Grand Theft Auto Online
  32. Grand Theft Auto V
  33. Guacamelee! Super Turbo Championship Edition
  34. Halo: The Master Chief Collection
  35. Halo: Spartan Assault
  36. Hearthstone: Heroes of Warcraft
  37. How to Survive
  38. Infamous: First Light
  39. Infamous: Second Son
  40. The Last of Us: Left Behind
  41. LEGO Batman 3: Beyond Gotham
  42. LEGO: The Hobbit
  43. The LEGO Movie Videogame
  44. Lightning Returns: Final Fantasy XIII
  45. LittleBigPlanet 3
  46. Madden NFL 15
  47. Mario Kart 8
  48. Mario Golf: World Tour
  49. Metal Gear Solid V: Ground Zeroes
  50. Metro Redux
  51. Middle-earth: Shadow of Mordor
  52. Minecraft for X1 / PS4
  53. MLB 14: The Show
  54. NASCAR '14
  55. NBA 2K15
  56. Need for Speed Rivals: Complete Edition
  57. Persona 4 Arena Ultimax
  58. Pinball FX 2
  59. Plants vs. Zombies: Garden Warfare
  60. Pokémon Battle Trozei
  61. Pokémon Omega Ruby and Alpha Sapphire
  62. Risen 3: Titan Lords
  63. The Sims 4
  64. Skylanders: Trap Team
  65. Sleeping Dogs: Definitive Edition
  66. Sniper Elite III
  67. South Park: The Stick of Truth
  68. Sunset Overdrive
  69. Super Smash Bros. for Nintendo 3DS
  70. Terraria
  71. Thief
  72. Titanfall
  73. Tomb Raider: Definitive Edition
  74. Transformers: Rise of the Dark Spark
  75. Tropico 5
  76. Valiant Hearts: The Great War
  77. The Walking Dead
  78. Warriors Orochi 3 Ultimate
  79. Watch_Dogs
  80. The Wolf Among Us
  81. Wolfenstein: The New Order
  82. World of Tanks: Xbox 360 Edition
  83. World of Warcraft: Warlords of Draenor
  84. Worms Battlegrounds
  85. WWE 2K15
While not every gamer is going to like every genre - so there will be some selective removals depending on personal choice, the list above contains 85 games! And it does not help matters that some of those titles don't really include official endings - particularly the MMOs.

Sure I could have summarized that list - but then it would not have contained the gut-punching impact that the full list contains. And if you think that is a lot of games to be released in one year, consider the fact that that list only presents the AAA games - there are three times that number of lesser and niche titles released in 2014 as well.

This is why the average gamer's Game Play Rotation List is going to continue to grow with each passing season.

Another Problem

If you think that the paractical limits that usually apply - like only being able to afford X number of games in any given year - is helpful, consider this new problem: Microsoft has started GIVING games away for FREE to members of Xbox LIVE Gold.

Consider it - today when I checked the list of free Gold games - under the Game With Gold Program - I found the following titles:
Ryse: Son of Rome
Evolve Ultimate Edition
Darksiders

So there you have three more titles I want to play. I WANT to play mind you. But I guarantee you that I won't have the time to fully play them to my satisfaction, so as sure as Bob's Your Uncle those three titles will end up being added to my Game Play Rotation List.

What's the Solution, Kenneth?

I don't know about you lot, but the idea of my GPRL simply ballooning forever bothers me. There are loads of entertainment withering there just waiting for me to play!

Fortunately I have a solution. I say we set aside Sunday afternoon through early evening for ME time. Game Time. We dedicate ourselves to removing titles from our GPRLs by really digging into a game every Sunday. Set Sunday aside for gaming! Free the Games! YEAH!

Saturday, March 8, 2014

. . . My Firewall-Routers Column

While it is not one of my favorite Bill Murray films, 2003's Lost in Translation, which was written and directed by Sofia Coppola, looked upon the often strange results that take place when language is a barrier, and as odd as it may sound, I think it is fair to say that the disconnect that resulted in my most recent Digital Grind column appears to lose its way largely down to the message being lost in translation -- or at least in this case, lost in direction.

I take total blame for that - the column was submitted and was edited during the span of several days in which due to health issues I was not available for consultation - so it was not entirely clear what it was that I intended it to say.

The fact that it appears to suggest that I do not know what NAT is or how it works, and perhaps even more startling -- that I appear to believe that computers can communicate via the Internet without having an IP Address -- crop up due to editing that was absolutely necessary due to space limitations.

To address the issue I thought it might be helpful to provide the original column below, in its entirety, and after doing so I will be directing the readers who email about it and my mistakes to it, so that they can both see where it was I intended to go and, perhaps of more importance, benefit from the lesson I had hoped to share.

So here is the original Digital Grind Firewall-RouterColumn (any errors in spelling or grammar are my own):

A typical home network with a Firewall-Router uses a mixture of wired computers / server with WiFi devices like gaming consoles, iPads, Skype-capable wireless phones, and other computing and entertainment devices that use Network Address Translation (NAT) to permit many devices to access the Internet using just one IP Address from the ISP.

Digital Grind Firewall Column

While it has a number of related meanings, the phrase “security through obscurity” is most often used to describe a belief that a computer or network with nothing of interest on it is safe from intrusion because it should not interest an outsider.

That notion can appear to be quite sensible, but consider this: In modern terms the phrase is also a pejorative among computer and network security engineers, having the same definition but interpreted as a dangerous fallacy not to be relied upon under any circumstances.

The reason for that is very simple: there doesn't actually have to be anything of value on a network or a computer to make it a target; access alone is reason enough to justify an attack.

That basic truth is why we go to so much effort in protecting our computers; why we keep the OS and apps up-to-date with respect to security patches and bug-fixes, why we run anti-virus and malware suites, and why security awareness extends not just to software but also to hardware.

These steps, combined with safe Internet use as well as common sense precautions, represent standard proactive and responsible efforts for establishing and maintaining a safe computer system and environment, but there is still the matter of securing your network to be considered.

The Network Connection

Modern network architecture consists of a 'net connection using a modem (for DSL) or a router (for cable or fiber) connected to which are one or more computers, network appliances, and 'net-aware consumer electronics like network-ready TVs and DVRs.

Assigned a valid IP address by your Internet service provider, the modem or router functions as the gateway device allowing every system on your network to communicate with the Internet, and vice versa using a scheme called Network Address Translation, or NAT.

Without NAT every device on a network needs a valid IP Address to access the Internet. With NAT any number of computers or devices can be connected to the world beyond, requiring only a single valid IP Address.

In the time that it took me to write this, according to the security logs on my firewall it was scanned by ten different potential attackers.

The fact that they were not targeting me specifically offers very little comfort; they were scanning the block of IP Addresses owned by my ISP to see which customers are connecting without basic security protection.

This sort of approach works because the function of the modem/router is to pass traffic to and from the Internet, and it will do that without any consideration for whether that traffic is legitimate or hostile. It is only a matter of time then, before they locate a weakness in a system on the network and compromise it.

Once that happens, in addition to the most obvious targets like banking and credit information, they can also turn the resources of the network to a variety of purposes -- like hosting pirated software or porn, or using it as a launch-point for attacking other networks and computers.

The Firewall

While the mix of anti-malware and virus programs, keeping your systems patched and up-to-date, and taking care to surf responsibly are a good start, the foundation of your network security is found in a device called a firewall-router.

Named for the partition wall used in commercial buildings to prevent the spread of fire, a network firewall is a hardware device whose function is very much like the moat and gate of a castle. It sits between your network and the Internet, serving as a gatekeeper for all of the traffic passing between them.

It has two basic jobs to perform: the first is to ensure all of the traffic coming in is legitimate, while making your network invisible from the Internet side. The second is providing a level of convenient connectivity to you.

If the modem or router you received from your ISP is the only device between your network and the Internet, you need to buy and deploy one today. The good news is that you can do this yourself because the arcane has been engineered out of these devices.

Installing a firewall on your network requires no technical knowledge beyond the ability to follow basic directions, swap network cables, and use a web browser-- nearly anyone can install and configure one.

Healthy competition among manufactures has also resulted in something of a boon for consumers, because the current generation of firewall-router happens to be a feature-rich and interesting one. And they have never been as inexpensive as they are today.

Intended to replace other older devices on your network -- particularly WiFi routers and network-accessible storage devices -- they sport features like traffic shaping and offer a measure of control over your network and how it can be used that may surprise you.

Most include a minimum of four wired ports as well as WiFi service, USB ports, and the best standard encryption and speeds available, so deciding which firewall-router you need is down to determining what added features you want -- and then selecting from the models that provide them.

Security for Gamers

If you have gamers in the house -- and on your network -- D-Link makes a line of firewall-routers that are engineered specifically with them in mind. The DGL-5500 / AC1300 Gaming Router is designed to detect when gaming devices are used and optimize traffic in support of that activity.

Its tube-like form naturally blends into the background, while its Streamboost feature and advanced UPnP support manages the traffic on your network to ensure that your PC and Console gamers get the bandwidth priority that they need for lag-free play.

With full support for the 802.11a/b/c/g/n WiFi standards, the AC1300 offers concurrent dual-band connectivity at some of the highest speeds currently available, but more important it supports both the established WiFi standards as well as the newest.

Basic security features include WPA/WPA2 wireless encryption, an SPI firewall, and anti-spoof checking, while its robust parental controls offer an added measure of convenience. Parents can specify -- device by device -- when games can be played and when they cannot, and the parental controls even permit site blocking.

Security plus Storage

For network security that also offers network-accessible backup storage, Netgear's Centria N900 (WNDR4700) neatly fits the bill.

Touted as an “All-in-One” solution, the N900 functions as a WiFi Firewall-router, Media Server, and Automatic Back-up Server supporting 802.11 b/g/n WiFi standards as well as Wireless N Dual Band.

The N900 fits into the new range of firewall-routers called “Storage Routers” thanks to the hard drive slot concealed behind a door in the side and its ReadyShare timed back-up App. Consumers have the option of adding their own SATA2 hard drive in sizes up to 2TB (the WNDR4720 model comes with a 2TB drive pre-installed).

The N900 supports WPA/WPA2 encryption and provides backup services to a wide variety of WiFi equipped devices, including notebook computers, tablets, PCs and Macs, and your iPad or smart phones.

Security plus Media

With the Internet now into traditional entertainment media thanks to streaming movies and TV, the WD My Net N750 HD Dual-Band Router from Western Digital is a stand-out firewall-router for networks heavy on media.

The N750 offers full support for 802.11 a/b/g/n WiFi standards with speeds up to 750 Mbps. With its WPA/WPA2 encryption and SPI firewall, the low-profile form blends into any entertainment center, and includes four Gigabit wired ports for connecting game consoles, DVRs and other media devices.

Smart HD streaming allows you to watch videos with accelerated steaming via its FasTrack technology, which delivers HD streams to multiple devices at the same time with combined speeds of up to 750 Mbps.

Firewall Protection

Each of these routers feature easy to use web-based configuration interfaces, with basic setup instructions that anyone can follow to quickly and conveniently get them working with the hardware already on a network.

While they differ in terms of special network and entertainment focus, each supports the standard set of security features, offering a level of protection you should expect from what is, after all, the foundation of your broadband network security.

The criteria now used for selecting a model tends to focus on what extra features and services you most desire -- and to some degree how your network is used -- so in the final analysis with security through obscurity no longer an option (if it ever was), adding a firewall-router to your network is the best path to ensuring its protection now and in the future.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Final Notes

I apologize sincerely to my readers who may have found the path in the version that appeared in the paper a bit circuitous and I apologize to my editor for my failure to make clear the purpose and the direction that I intended to take.

From here on I will endeavor to prevent those mistakes from ever happening again.

Cheers!

Wednesday, January 1, 2014

. . . Secrets Inside of Secrets

This post was discovered hiding in the "Drafts" bin, having been started on 25 March 2013 and then never edited let alone finished since.  The long gap in time means I get to update this, so in place of the 2013 charity calender we get the 2014 calender...

There is a story behind this: Each New Year part of my New Year chores are to hang the new Ryan Air Charity Calender and then do a bit of New Year cleaning on my computers, Network-Accessible Storage systems, and the drawers of my desk.

The idea here is to start things off with as clean a slate as I can manage...

The annual charity calendar raises money for kid-centric causes!
By the way if the hanging of that calendar rubs you the wrong way, try to remember that the calendar is a project that is made with the enthusiastic participation of both the airline and the in-flight crews, specifically to benefit charity in the form of UK Teenage Cancer Trust.

The charity is the only licensed UK charity dedicated to improving the quality of life and survival chances for young people (aged 13 to 24) battling cancer.  Considering the dismal dole and post-hospital medical care system in the UK, those kids can really use the help.  

Last year's (2013) calendar benefited the TVN Foundation of Warsaw, Poland, who help children suffering from cystic fibrosis.  The 2014 calendar is limited to just 10K copies, and raises €100,000 which is used for precisely what they say it is used for - supporting young people battling cancer. It's all good in other words, so you should see if you can buy one today!

So with that in mind, and after dusting this one off and discovering it is worthy of completion (basically there are only two choices here - if the article is worthy of being completed and posted that is what happens, otherwise it is put out of its misery with mercy) here is the first revived posting from the Draft bin for 2014!

- = - = - = - = - = - = @@ = - = - = - = - = - = -
The first Easter Egg for a home video console game is in 1978's Video Whizball for Fairchild's Channel F

Draft Bin Article:  Secrets Inside of Secrets

The hidden objects found in video games are called "Easter Eggs" but the reason -- the origins -- of this label and practice are  surprisingly something of a mystery despite the relatively young age of the practice.

One version of the origins has the practice stemming from a contest called The Easter Egg Hunt -- because they are small and concealed -- the idea being that they are similar to the Easter Eggs from the traditional Easter Egg Hunt.

These hunts are festival-like events usually held out-of-doors, to celebrate the Easter holiday,  wherein adults hide brightly colored chicken eggs for children to find.  Usually the kid who finds the most eggs wins a prize.

Another version has it that the concept of the Easter Egg in video games reflects the elaborate jeweled eggs created by Russian jeweler Carl Fabergé for the rulers of Russia -- Tsars Alexander III and Nicholas II -- as Easter gifts for their wives and mothers.

In a spot near Bedford Point, Staunton Island, in GTA III,  just past the area where it is very obvious you are not supposed to be able to reach, when you are persistent (and you use a taller vehicle-type) in order to jump over the blocked area, you can in fact reach -- and read -- the sign above, for this GTA-traditional Easter Egg.

Crafted from gems, jewels, and precious metals, the "eggs" usually contained, hidden within, a scene or other artistic secret -- with some being cleverly crafted puzzle-like eggs that you had to know the secret of in order to open them!  

It is estimated that just 52 of these special eggs were ever made, and as there are very detailed records for each that include the materials that went into them, when they were made, and as they are after all pieces of high art, the names that were given to each  as well as who their current owners and their locations are -- with the exception of eight of the eggs which have gone missing!  

The eight missing eggs are:
  • Hen with Sapphire Pendant -- gifted by Alexander III to Maria Feodorovna, Easter 1886.
  • Cherub with Chariot -- gifted by Alexander III to Maria Feodorovna, Easter 1888.
  • Nécessaire -- gifted by Alexander III to Maria Feodorovna, Easter 1889.
  • Alexander III Portraits -- gifted by Nicholas II to his mother, Empress Maria Feodorovna, Easter 1896.
  • Mauve -- gifted by Nicholas II to his mother, Empress Maria Feodorovna, Easter 1897
  • Empire Nephrite -- gifted by Nicholas II to his mother, Empress Maria Feodorovna, Easter 1902.
  • Royal Danish -- gifted by Nicholas II to his mother, Empress Maria Feodorovna, Easter 1903.
  • Alexander III Commemorative -- gifted by Nicholas II to his mother, Empress Maria Feodorovna, Easter 1909.
Interestingly enough there are actually two theories about these eggs and how they connect to the origins of the Easter Egg in video games...  

The first hypothesis is that it is the hidden treasure inside each Fabergé Egg is the reason for its use to describe the hidden objects or messages inside video games.  

The Memory of Azov Egg -- made in 1891 for Tsar Alexander III of Russia. The surprise contained within is a miniature replica of the Imperial Russian Navy cruiser Pamiat Azova (Memory of Azov), executed in red and yellow gold and platinum with small diamonds for windows, set on a piece of aquamarine representing the water.

There may be some traction for this one because, in fact, each of the eggs created by Fabergé actually did have a hidden treasure inside of them!  We will take the hidden treasures inside the missing eight eggs for our example here:
  • Hen with Sapphire Pendant -- a clockwork hen laying an emerald egg inside.
  • Cherub with Chariot -- a jeweled and working clock is contained inside the egg.
  • Nécessaire -- 13-piece diamond-encrusted gold woman's manicure set inside the egg.
  • Alexander III Portraits -- six miniatures of Emperor Alexander III on an ivory background inside.
  • Mauve -- a heart shaped photo frame that opened as a three-leaf clover with each leaf containing three miniature portraits of Nicholas II, his wife, the Empress Alexandra Fyodorovna, and their first child, Grand Duchess Olga Nikolaevna. It was made of rose-cut diamonds, strawberry red, green and white enamel, pearls and watercolour on ivory inside the egg.
  • Empire Nephrite -- a miniature gold bust of Alexander III inside the egg.
  • Royal Danish -- miniature portraits of Christian IX of Denmark and his wife, Louise of Hesse-Kassel (the parents of the Dowager Empress Maria Feodorovna) inside the egg.
  • Alexander III Commemorative -- a miniature gold bust of Alexander III inside the egg.
The second hypothesis is the eggs themselves being treasures, but that seems a bit weak to me.

As far as I am concerned, the first hypothesis combined with the fact that back in the day when these were actually being made for the Tsars they were not called Fabergé Eggs -- a label that is relatively recent being more descriptive than identifying.

These artistic treasures were in fact commonly known both inside the Romanov family, by the Fabergé company, by its artists, and with all of the references to them found in correspondence about and relating to them, as "Easter Eggs" -- it simply makes a lot more sense.

Every now and then a developing studio will get so clever with an Easter Egg -- and in this case an Easter Egg that they actually wanted the players to find -- that none of the players actually manages to find it on their own, even when they already know it is there to be found! This was the case with the Warden's Secret Room in Batman: Arkham Asylum - which the stdio ended up having to explain to the players how to reach it!
The Easter Eggs in Your Game

It seems that the game publishers have wised up to the nefarious tricks of the code-monkeys who make their games for them -- in fact they appear to be more aware of the practice today than they were in years past.

That new awareness has, in some ways, altered the way that they do business.  

Specifically it has caused not just publishers but game development studios to add Easter Egg clauses into employment contracts for software engineers and coders that, while not really outright forbidding the insertion of Easter Egg content in the games that these code-slingers work on, definitely influences the type of Easter Eggs they toy with.

Most code-monkeys will tell you that it is a hell of a lot easier to ask forgiveness than it is to ask permission -- which may be why, in recent years, Easter Eggs follow the much safer path of either honoring other video games, or paying homage to real-world people.

It is fair to say, in other words, that we are a lot more likely to see officially sanctioned Easter Eggs like Conan O'Brien's cameo in Halo 4 -- and a lot less likely to see secret levels like the Hot Coffee level that caused major controversy in the ability of publisher 2K Games to obtain the rating levels they were seeking for Grand Theft Auto IV...



The Original Easter Egg as a Symbol of Creator Credit...

The first officially recognized Easter Egg is widely held to be the secret signature hidden in Atari's 1979 video game Adventure by its chief programmer, Warren Robinett, whose insertion of his signature into the game was nothing short of a rather brilliant hack.

Bearing in mind that in 1979 the home video game industry was in its pre-infancy stage, and the video game studio phase that is today as a strong element of the structure of video game production.

Because of this, and because games were created as what is today known as "work product" -- which is to say that the artists and code-slingers who actually created the games both did not own a piece of the game, or share in its profits.

  - - - - - - - = -= @@ = - =  - - - - - - -

  
Sometimes it is the very obvious that can trip you up when it comes to the discovery of Easter Eggs in video games - particularly when the Easter Egg is an object that you already know is there (or that it should be there) you just don't remember it! Such is the case with Jack's aeroplane in BioShock 2 (remember? The plane that he used to get to the city in the middle of the ocean from the first game?) Well here it is!

 - - - - - - - = -= @@ = - =  - - - - - - -

What is more surprising is the fact that programmers were rarely ever officially acknowledged either in the advertising, the packaging, or even in the game itself, which did not include a credits screen as we are used to today.

Because of that and, it seems, out of a desire to sign his work much like an artist would sign their painting, Robinett created an interesting hack that lead to a secret room that the player could only really encounter if they already knew that it existed.

This had the effect of allowing the player to witness the words “Created by Warren Robinett” inside of the castle as an unofficial credits screen.  In effect Robinett had done something that he was contractually forbidden to do: he had signed his work.

If you have an interest in historical accuracy you may be surprised to learn that while Robinett's hack of Atari's Adventure, though it is widely thought (and said) to be the first Easter Egg in video games, was not actually the first such Easter Egg; it was simply the first Easter Egg that became common knowledge.

For whatever reason -- but probably because they wanted to keep their job -- the story behind the video game programmer who created the actual first Easter Egg was not revealed until some time in 2004, when it was widely outed in mainstream media, including an article in Forbes Magazine.



The first Easter Egg for Home Video Game Console gaming...

Video Whizball -- a game for the Fairchild Channel F home video game console, was engineered and manufactured by technology company Fairchild Semiconductor.

The Fairchild Channel F -- a console from the second generation of home video game consoles which include Atari's 2600, Magnevox's Odyssey, and Mattel's Intellivision, has a number of “firsts” associated with it.

It was the first programmable ROM cartridge-based video game console, the first console to use a microprocessor, and now it is the first home video game console to have a game with an Easter Egg thrown into the mix.

There are some other little-known firsts that also apply to the Channel F, which was originally launched as the Fairchild Video Entertainment System, or VCS (the name was changed to Channel F just a year after it was launched due to Atari using the same name, Video Entertainment System, to describe its 2600 line and later 5200 line) as it was the first modern cartridge-based home video game console to break the $200 price tag.

The VCS/Channel F sold for just $169.95 compared to the $200 for Atari's 2600 and Magnevox's Odyssey, $270 for the Atari 5200, and $299 for Mattel's Intellivision. To put that in more meaningful terms, that $200 from 1978 is worth $740 in 2014 dollars -- $300 in 1978 dollars is worth over $1,100 in today's money, so those consoles were NOT cheap!

The video game called Video Whizball was the game for Cartridge 20 of the Fairchild Channel F console's game library, and the software engineer who was responsible for creating Video Whizball, programmer Bradley Reid-Selth.

Thanks to investigative reporting by a number of sources we now know that code-slinger Bradley Reid-Selth is the first author of a video game Easter Egg -- fully a year before Warren Robinett slid his graffiti-like gesture of defiance past Atari's quality control stormtroopers -- having placed his surname into Video Whizball.

In GTA: San Andreas at the very top and highest point on the Gant Bridge -- which is the very obvious large red suspension bridge connecting Juniper Hollow and Palisades in San Fierro to Tierra Robada and Bayside the sign above can be found as what has become a sort of traditional Easter Egg in the GTA series.
Actually seeing that first Easter Egg requires a rather convoluted set of steps:

First the player must play against the computer, and win or lose kill the computer's opponent and then get killed themselves. Once that basic per-requistie is met, the player then must wait until both players are off the screen and then start a new game.

At that stage the player needs to select “GAME 43” and then “SCORE 67” and pull UP to start, at which point the non-existent program 43/67 loads, and the player sees “REID-SELTH” appear in the center of the screen.

And there you have it -- the first Easter Egg for home video game console play!

The Video Game Easter Egg...

It appears that the placement of secret Easter Eggs inside video games has been something of a tradition in the industry going way back -- but that really makes sense considering the nature of human beings and their rather unique (as far as we know) sense of humor...  

But then again what if that noise that dolphins make is not a language in which they are attempting to communicate with us, but is in reality the dolphins...  Laughing... At us?  I mean for all we know they see us as being just these hilarious thingies!

Anyway when you stop to consider that almost every game has a handful Easter Eggs -- and that handful in each game are just the ones we actually know about mind you -- it seems like there could be far more than we are aware of.

While funny or even meaningful messages in games as Easter Eggs tend to stand out in the memory of the gaming community, what about Easter Eggs that have a practical value?  Need an example?  how about the secret rooms in the relatively recent reboot of the Castle Wolfenstein game series: Wolfenstein 3D (for Xbox LIVE Arcade) -- which take the form of hidden rooms.  



A lot of hidden rooms.

Inside these hidden rooms can be found resources, special weapons, extra life tokens, full-healing-potions, or even simply a very large amount of ammunition conveniently placed near the site of a boss battle.  Some gamers would not consider those an Easter Egg at all, but rather a hidden element of game play resources...  But we are not "some gamers" and we do consider them to be Easter Eggs ni that they are certainly unexpected!  

Making Easter Eggs out of a room crucial to the success in a battle strikes us as an excellent use of the whole Easter Egg concept -- when a player knows it exists that is -- we're just saying...

Conan and Andy appear as union-card-carrying guards in the Shutdown Mission of Halo 4...
They Call Him CoCo

Then there are Easter Eggs that pay homage to real people...

The cameo-type Easter Egg appearance of late night Talk Show Host and Ginger Gamer Conan O'Brien (and his best mate and colleague Andy Richter) as a pair of dedicated and professional space marine guards in the instant classic and Must Have Game Halo 4...  

How much would you care to bet that the invitation to Conan by 343 Industries was equal shares of someone on the development team wanting to meet and interact with Conan, and part a nod towards the fact that Conan happens to be a major Halo fan?

Before we get to the meat and potatoes of his Halo Cameo, some gamer-like background is in order here, with our first logical question being did you know that Conan is a gamer?

We'll forgive you if you had the impression that, far from not being a gamer of any skill, Conan is what is known in impolite circles as a Newb?  Or is he?

It is very easy to get that impression when you judge him by what appears to be the public (if sincere) face of his gaming -- thanks in no small part to the large number of game reviews he has "written" and published via the official website for his television talk show.  We refer specifically to its section called "Clueless Gamer" with Conan O'Brien...

Actually the segment is created with Conan playing the funny man, and his long-time web producer and video games consultant-stuntman Aaron Bleyaert as his straight man. It should be noted that Bleyaert was actually part of Conan's team back when Conan was the host of the Tonight Show, which in dog years is like freaking for-ev-er.

(L34RL'/ (0|\|4|\|  has a bit more skill than he is trying to conceal.

The setup for his role as a clueless gamer really doesn't work if the viewer pays too close attention to what is actually happening in the games being "reviewed" but, nevertheless,  the joke-within-a-joke manages to succeed thanks in part to its name -- Clueless Gamer -- and the posturing set up for the show segment.



It is therefore very easy at first to dismiss him and his game reviews,  particularly if you fail to see through the humor present like his review of Grand Theft Auto V in the video embedded above.

Conan is naturally going for the laugh and like the other "reviews" in the Clueless Gamer section of his show's website he gets the laughs...

The fact that these are not really game reviews at all is easy to forget because Conan is actually a very funny man -- but even when he is trying to be funny without meaning to do so he reveals his familiarity with the games and their controls in instances like his jacking a car and ending up in a fistfight, and the skillful manner in which he "wrecks" his car.

But in reality Conan is actually not only a skilled gamer, but an often serious gamer.  Unlike the vast majority of his peers in Hollywood, in place of a "media room" and in-home movie theater, Conan has a very large screen display hooked up to which is a collection of video game consoles (pretty much one of everything) that is complimented by a very large collection of games.

Which brings us to Conan's Cameo Easter Egg appearance in the Must Have Game Halo 4...

If you still need proof that Conan is a gamer and much better at it than he suggests in the Clueless Gamer bits consider the over-all attention that her gives gaming both elsewhere in his show and, perhaps more to the point, in his real life...
  • Conan routinely includes video games as fodder for his monologue.
  •  Entertainment gossip show TMZ is rumored to have a team of cyberstalkers tracking down Conan's characters in World of Warcraft -- they are just looking for any character with red hair who actually uses punctuation and a Brookline accent...  According to TMZ MC Harvey Levin that criteria would positively ID the late night talk show host...
  • Investigative Reporter Arianna Stassinopoulou-Huffington, reveals in her August 9, 2013 article for high quality Internet newspaper The Huffington Post that O'Brien not only knows which of the Atari 2600's buttons turn the device on and off, but which buttons on the retro games console are used to reset the game, as well as where game cartridges are actually inserted...
  • Conan admits to CNN's Anderson Cooper that his motivation behind extending the Clueless Gamer feature beyond its original three-episodes to a regular feature on his show after he learned that video game publishers would send him free copies of their newest games for him to review.  Conan's reaction to the game publisher's offer is reported to be: "Free games?  I'm in!"
  • Conan routinely attends real-world gaming events because he is a gamer #1 -- Blizzcon '13.
  • Conan routinely attends real-world gaming events because he is a gamer #2 -- E3 2013.
  • Conan O'Brien moonlighted as video game characters including starring role in the Vatican's  Gabriel Knight: Sins of the Father in December 1993 (see screenshot below-left).

“The online version of Grand Theft Auto launched yesterday. That's right; the fictional, crime-ridden government of Los Santos is now functioning better than America's real government.”

2 October 2013 - Conan

How Important are Easter Eggs?

In terms of you average video game, the Easter Eggs that are found within them are not so much important as they are fun.  Fun to find, fun to share, just plain fun...  But sometimes in other classes of program they can be critically important -- particularly when the Easter Egg is actually a game!

To leave you with some warm and fuzzy feelings about the topic of Easter Eggs -- and to make it even more worth your while to have read through what turned out to be a very very long post even though it was heavily edited and lots of the stuff between "This post was discovered..." and "How Important are..." I thought I would dish you some of the more useful Google Easter Eggs while thanking you for taking the time and making the effort to read this post!

Important Google Easter Eggs
That's right, the search engine Google has some important Easter Eggs you need to be aware of!  And here they are, in no apparent order (note that all that you need to do is type the following into the Google Search Box unless otherwise noted):
  • Play the classic old-school video game Atari Breakout! 
    Load your browser, open the Google Page, then select "Images" from the top-right-menu and type "Atari Breakout" in the search box without the quotes.  If you are at work, be sure to mute the speakers on your computer, because if you don't everyone in the office will know you are playing Breakout.  Fair warning!
  • You Bet Your Life!
    Open Google and enter "Conway's Game of Life" into the Search Box (without the quotes) and Google will begin displaying Conway's version of the game Life!  Just sit back and watch it all happen - or not!
  • You Want Bacon with That?
    Open Google and type in "Conan O'Brien Bacon Number" (without the quotes) to see where our favorite gaming ginger late night host stands in his distance from Kevin Bacon!  Note that you can do that with pretty much anyone in the IMDB - or at least that has been our experience!  Not only will it tell you their Bacon Number (as in how many degrees they are from Kevin Bacon) it will also illustrate the number in terms of the steps!
  • Care to have an Anagram of Anagram?
    Open Google and type the following into the Search Box: "Anagram" (without the quotes) and you will get an Anagram of Anagram in the "Did You Mean?" Offer Line!  If you find that amusing, go to one of the bazillion Anagram Servers on the Interwebs and type in your name to see what you get for Anagrams!  Chris Boots-Faubert gets a very nice selection but my favorite is "A Boob Stitch Surfer"
  • A Quick Anti-Boredom Barrel Roll Shot in the Arm
    Open Google and, in the Search Box, type in "Do a barrel roll" (without the quotes) and you will find something to be amused about!  Take that, boredom!
  • Did You Order a Festivus Pole?
    Searching for "Festivus" (without the quotes) places a Festivus pole in the left side of the window.
  • The Answer is...
    Load Google and type in "the answer to life, the universe, and everything" (without the quotes) into the Search Box and you get the answer.
  • Time Travel from your Computer
    Open Google and, in the Search Box type in "Google in 1998" (without the quotes).  You will instantly be teleported to the year 1998, as suddenly you will be searching the web via that year's Google!
  • Zerg Rush Destruction Game
    Did you know that in video games a "Zerg Rush" is defined as an overwhelming attack by a large number of enemy forces?  Well, it is!  And if you open Google and type in the words "Zerg Rush" into the Search Box (minus the quotes) the display for that search term will be attacked by an overwhelming number of enemy Google O's!  You must defend your search results by rapidly clicking the left-mouse-button on the foes, defeating them!  How well did you do?  You can compare your score with the world!

Enjoy your Google Easter Eggs - what the heck, enjoy all Easter Eggs, everywhere, including Easter Easter Eggs!

Ciao!

C