Language Selection

English French German Italian Portuguese Spanish

Gamers turn cities into a battleground

Filed under
Gaming

Matt has been abandoned on Tower Bridge, London, with nothing except his clothes and a mobile phone. A woman dressed in black walks past, and Matt receives a text message to follow her. He doesn't know who she is, or where she is going. All he knows is that he must follow her if he is to find Uncle Roy.

Matt is playing Uncle Roy All Around You, where for one day he is the main character in an elaborate experimental fantasy game played out across the streets of London. He also happens to be a pioneer of a new social phenomenon, urban gaming. If you thought the computer games of the 21st century are only ever played by couch potatoes addicted to the new generation of Xbox, Nintendo or PlayStation consoles, you'd be mistaken. For urban gamers are harnessing the power of global positioning systems (GPS), high-resolution screens and cameras and the latest mobile phones to play games across our towns and cities, where they become spies, vampire slayers, celebrities and even Pac-Man.

Urban gaming started in the 1990s with the advent of "geocaching", where GPS is used to pinpoint exact locations. Players buried "treasure" then posted the longitude and latitude coordinates online, allowing others to hunt for the prize. Such treasure hunts have become extremely popular and are played by hundreds of thousands of people worldwide, with prizes buried in ever more exotic locations, even underwater.

"The limitations of physical space makes playing the game exciting," says Michele Chang, a technology ethnographer with Intel in Portland, Oregon. There is also a social element, says Chang. Last year, as a social experiment to see how people behave with real-world games, she created Digital Street Game, which ran for six months in New York. The aim was to acquire territory by performing stunts dictated by the game at public locations around the city, such as playing hopscotch at a crossroads while holding a hot-dog. "People are more reserved than you would imagine," says Chang. Some players took to performing their stunt on rooftops to avoid being seen, she says, while others relished being ostentatious - like players of Pac-Manhattan, in which New Yorkers dress up as the video game icon Pac-Man and flee other gamers dressed up as ghosts.

While many of the first real-world games involved using separate GPS receivers and handheld computers, mobile phones and PDAs that integrate such technology are catching up. "I think we are going to see more and more games that blend with our real lives."

Uncle Roy All Around You is one such game, developed by interactive technology researcher Steve Benford at the University of Nottingham, UK.

Another phone-based game is a variant of the classic arcade game Tron. Two or more players, who may never have met, speed through a city leaving a virtual trail behind them that is plotted on their mobile phone screens. There is one rule: you can't cross your own trail or that of the other player.

Soon you may even be able to play games using phones without GPS hardware. One being played by 30,000 people in Sweden, Russia, Ireland, Finland and now China is called BotFighters. Produced by It's Alive, BotFighters is a variant on Dungeons and Dragons role-playing games.

The company has even bigger plans, developing a game that exploits a digital camera already built into the console. Virtual creatures live at specific GPS coordinates, and when a player views the location through the camera they will see the real world with a three-dimensional animated digital creature laid over the scene.

Game designers face the challenge of how to preclude "cyber-stalking", and protect the safety of the public and players, especially children, who might wander into unsafe situations or places. But ultimately, urban games may encourage a generation of console geeks to get off the sofa. "I have literally run around a park interacting with virtual creatures," says Hilton. "I'm going to have to get seriously fit if I want to develop one game I'm working on."

Full Story.

More in Tux Machines

Welcome To The (Ubuntu) Bionic Age: Nautilus, a LTS and desktop icons

If you are following closely the news of various tech websites, one of the latest hot topic in the community was about Nautilus removing desktop icons. Let’s try to clarify some points to ensure the various discussions around it have enough background information and not reacting on emotions only as it could be seen lately. You will have both downstream (mine) and upstream (Carlos) perspectives here. Read more

Programming: Perl, JavaScript, Ick, PowerFake, pylint-django, nbdkit filters

  • An Open Letter to the Perl Community

    Some consider Perl 6 to be a sister language to Perl 5. Personally, I consider Perl 6 more of a genetically engineered daughter language with the best genes from many parents. A daughter with a difficult childhood, in which she alienated many, who is now getting out of puberty into early adulthood. But I digress.

  • Long Live Perl 5!

    While not mentioned in the original Letter, a frequent theme in the comments was that Perl 6 should be renamed, as the name is inaccurate or is damaging.

    This is the topic on which I wrote more than once and those who have been following closely know that, yes, many (but by no means all) in the Perl 6 community acknowledge the name is detrimental to both Perl 6 and Perl 5 projects.

    This is why with a nod of approval from Larry we're moving to create an alias to Perl 6 name during 6.d language release, to be available for marketing in areas where "Perl 6" is not a desirable name.

  • JavaScript Trends for 2018
    Trying to bet on how many new JavaScript frameworks will be released each month, is, the best software engineer’s game in the past 5 years.
  • Ick: a continuous integration system
    TL;DR: Ick is a continuous integration or CI system. See http://ick.liw.fi/ for more information.
  • Introducing PowerFake for C++
    PowerFake is a new mini-framework/tool to make it possible to fake/mock free functions and static & non-virtual member functions in C++. It requires no change to the code under test, but it might need some structural changes, like moving some parts of the code to a different .cpp file; or making inline functions non-inline when built for testing. It is useful for writing unit tests and faking/mocking functions which should not/cannot be run during a test case. Some say that such a feature is useful for existing code, but should not be needed for a code which is written testable from the beginning. But, personally I don’t agree that it is always appropriate to inject such dependencies using virtual interfaces or templates. Currently, it is not supposed to become a mocking framework on its own. I hope that I can integrate PowerFake into at least one existing C++ mocking framework. Therefore, currently it doesn’t provide anything beyond faking existing functions.
  • Introducing pylint-django 0.8.0
    Since my previous post was about writing pylint plugins I figured I'd let you know that I've released pylint-django version 0.8.0 over the weekend. This release merges all pull requests which were pending till now so make sure to read the change log.
  • nbdkit filters
    nbdkit is our toolkit for creating Network Block Device (NBD) servers from “unusual” data sources. nbdkit was already configurable by writing simple plugins in several programming languages. Last week Eric Blake and I added a nice new feature: You can now modify existing plugins by placing “filters” in front of them.

Moving to Linux from dated Windows machines

Every day, while working in the marketing department at ONLYOFFICE, I see Linux users discussing our office productivity software on the internet. Our products are popular among Linux users, which made me curious about using Linux as an everyday work tool. My old Windows XP-powered computer was an obstacle to performance, so I started reading about Linux systems (particularly Ubuntu) and decided to try it out as an experiment. Two of my colleagues joined me. Read more

Security: TPM, Yubikey, Holes, Bricking and Uber

  • Trusted Computing
    The Trusted Platform Module on your computer's motherboard could lead to better security for your Linux system. The security of any operating system (OS) layer depends on the security of every layer below it. If the CPU can't be trusted to execute code correctly, there's no way to run secure software on that CPU. If the bootloader has been tampered with, you cannot trust the kernel that the bootloader boots. Secure Boot allows the firmware to validate a bootloader before executing it, but if the firmware itself has been backdoored, you have no way to verify that Secure Boot functioned correctly.
  • Locking the screen when removing a Yubikey

    I have my Yubikey on my key ring, so whenever I leave my computer, I have to remove the Yubikey. So why not lock the screen automatically?

  • Corporate cultural issues hold back secure software development

    The study of over 1,200 IT leaders, conducted by analysts Freeform Dynamics for software company CA Technologies, finds 58 percent of respondents cite existing culture and lack of skills as hurdles to being able to embed security within processes.

  • Stop installing our buggy Spectre CPU firmware fixes, Intel says
  • Uber shrugs off flaw that lets hackers bypass two-factor authentication

    Security researcher Karan Saini found the bug in Uber's two-factor authentication process, which has yet to be rolled out widely to Uber users. The flaw relates to the way an account is authenticated when users log in, meaning hackers [sic] with someone's username and password can drift pass the 2FA with ease.