Open Source Software for Real-Time Solutions by Charles Curley compares Cygnus's eCOS to RTLinux, both designed for the embedded system market. Is there a place for both?
Web Client Programming Using Perl by Robb Hill describes how to monitor your own web site using Linux and Perl, in particular the LWP modules. He supplies scripts for creating an HTTP ping utility, paging using the Skytel web site and paging for SNPP servers. Use these scripts and keep cooking with Linux.
Java Servlets by Doug Welzel is an introduction to writing and running Java servlets on Linux. Servlets are Java programs which extend the functionality of the server and can be used to replace CGI scripts.
Bisel Bank by Pablo Trincavelli is a “Linux Means Business” article describing how a bank in Argentina uses Linux for testing database and web applications.
Perl in a Nutshell by Jan Rooijackers is a book review describing the contents, what is good and bad about it and why you might want to buy it. Perl is one of the most popular scripting languages in use today and the “nutshell” books are one of O'Reilly's most popular series. Don't miss this one.
Java 2 Software Development Kit by Harry J. Foxwell is all about the latest version of the Java SDK from Sun. Mr. Foxwell is a System Engineer for Sun and knows his subject well.
LIMP: Large Image Manipulation Project by Valient Gough tells us about designing a new library for processing large images using a minimal amount of memory. In this project, he uses C++, the Qt library and plug-in types for a number of interfaces. LIMP is being used for scientific image-processing needs, particularly aerial and satellite images.
Some rogues are better off in dungeons. If you too are better off in a dungeon (or if your friends just think so), have a look at some of these classic console character-based role-playing games available for Linux. Have you ever wanted to be an @? Well, now you can, and as an @, you can guide yourself through hundreds of layers of algorithmically generated dungeons, encountering crazy creatures, mysterious treasures, problematic nymphs and even the notorious Kobolds, who burst when you strike them! What ever am I talking about?
Rogue was the creature that started it all. Written nearly 20 years ago, it was designed to run on “dumb terminals”, machines which were connected to mainframes but had no special powers of their own (such as graphics, for example). The intent was to produce a character-based adventure game, using the curses library, which would produce a new adventure every single time instead of reiterating the same plot over and over. This approach worked and produced a game which could surprise even its creators. Thus began a new genre of computer game, and generations of dungeon-crawlers were spawned.
Hack was one of the first Rogue-like games, and it introduced a new component—pets. You got to have a dog or cat wander about with you in the dungeon, and this animal was good company. Many items and new features were added, and the game became popularized in various formats across several platforms. As a child, I heard stories of a mysterious game called Hack which was supposedly a miraculous, ingenious game, vast and complex, like nothing I had seen before. In those days, stories soared into legends (like the rumor that Bard's Tale IV had been created but required a Cray supercomputer) and when I finally got around to Hack on the Amiga, it was already in another incarnation.
NetHack, the direct descendant of Hack, is the most famous of the Rogue-inspired games. It is extraordinarily complex, offering all sorts of classes, weapons, scrolls, magical rings, potions, creatures, locations and plots. The idea is that once you have outspent yourself (and your parents), you're better off seeking your fortunes underground by retrieving the Amulet of Yendor (well, so says http://www.gnu.org/; the game text has a different interpretation). Hence, you can become a Valkyrie (or a Wizard, Samurai, Rogue, Priest, Knight, Healer, Elf, Caveman, Barbarian, Archeologist or Tourist) and go out questing. There are dozens of levels which become immensely complicated, and the game draws on strategic thinking, cleverness and long-term strategy. NetHack is now available in two graphical versions, one based on Qt (QtNetHack) and one based on gtk (GnomeHack). These graphics are excellent and I recommend taking a look. This is a deep game (smile) which takes some time to get used to, but it's good fun and since it is a classic, it is a good way to expose yourself to hacker culture.
Moria is a Tolkien-inspired descendant of Rogue, written in 1983 for VAX machines and ported to UNIX in 1987. The point is to kill the Balrog. Dungeon levels are quite large, taking up several screens, as opposed to the single-screen dungeon levels found elsewhere. Hence, it is quite a bit larger than the original Rogue. Also, it features a town level, in case you want to come up for air. You can choose from numerous races and classes—if, for example, you've always wished to be a Hobbit (or believed you were one), now's your chance.
Angband is another Tolkien-inspired game (well, what isn't?) which was derived from Moria in 1990. The idea is to descend into a very deep dungeon and kill Morgoth, the Dark Enemy of Middle-Earth. The atmosphere is more serious than that of NetHack, so if the persistent humor and silliness of NetHack end up spoiling the fun for you, Angband is a good alternative. A developmental, multi-player version is also available.
ADOM, Ancient Domains of Mystery, is yet one more Rogue-like game which differs a bit from the others and offers much more in some areas. It has many different character classes, and the magical characters are especially interesting. A commercial version is planned, as well as a real paper-and-pen RPG (role playing game). ADOM is still version 0.9.9, but seems to have a large following especially among teenagers and players under age 10. It is being actively developed—the author doesn't seem to have run out of energy so far.
CrossFire is a different kind of game from the rest of these dungeon crawlers. The Linux Game Tome (http://happypenguin.org/) describes it as a cross between NetHack and Gauntlet, and that's actually fairly accurate. The game is graphical, multi-player (!) and immense. With over 150 different monsters, about 3000 maps, 19 character classes, about 65 different weapons, dozens of armours, helmets, shields and clothings, and 18 levels of magic available to wizards (with roughly 85 spells at last count), CrossFire is a whole different world in which you and your friends can live. Any number of people can have clients (even available for Java and Win32), but the server has to run on a UNIX-based system such as Linux. If you're tired of being an @ and want to be an animated graphic again, here's where you can do it!
Doc Searls is Senior Editor of Linux Journal
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Android Browser Security--What You Haven't Been Told
- Readers' Choice Awards 2013
- Epiq Solutions' Sidekiq M.2
- The Many Paths to a Solution
- Nativ Disc
- Downloading an Entire Web Site with wget
- Returning Values from Bash Functions
- Securing the Programmer
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide