Language Selection

English French German Italian Portuguese Spanish

What Does Linux and Role Playing Games Have in Common?

As a recently revived Game Master/DM going back to my RPG roots in Advanced Dungeons & Dragons, 1st Edition after about a 20 year absence, I find that computer technology has impacted Role Playing Games far beyond being able to play online.

People have been working over the years to "free gaming". Yes, Free in the same terms as open Source software that we use today. Both "free beer" and "Free-dom".

Linux has an Open Source License in the GPL and RPG's have the Open Game License. Due to the proprietariness of many of the original artwork and story content of the gaming modules of games like Advanced Dungeons & Dragons and other game systems, it has become very difficult to access new "modules" or published adventures in which to continue playing the game people have become so fervent over.

Thus, the Open Game License was created to allow "near beer" versions of traditional games systems that allow fans and groups to legally "side step" those proprietary concerns of the original games and still continue to publish and make available new content for game systems that are no longer sold or are out of print but still under copyright.

It's a legal tightrope walk to be sure. Avid fans and supporters work very hard to stick to the rules in order to keep their favorite games alive. The good news...it's working.

Open licenses have far trancended the software universe and continue to have meaningful impact on very diverse areas of social life. I'm not entirely sure that table top RPg's could not only continue to exist but actually are experiencing growth in the ranks, without Open licensing.

The fight for "open-ness" is a good fight and goes way beyond making access of software and media accessible to the masses. Stiking a victory for open licenses in one arena is a victory for open licences in other arenas as well.

More in Tux Machines

35 Open Source Tools for the Internet of Things

In a nutshell, IoT is about using smart devices to collect data that is transmitted via the Internet to other devices. It's closely related to machine-to-machine (M2M) technology. While the concept had been around for some time, the term "Internet of Things" was first used in 1999 by Kevin Ashton, who was a Procter & Gamble employee at the time. Read more

IoT tinkerers get new Linux hub & open platforms

Cloud Media, the maker of entertainment box Popcorn Hour, launched a project on Kickstarter, Inc. that will add to the growing number of smart hubs for people to connect and control smart devices. Called the STACK Box, it features a Cavium ARM11 core processor, 256MB DDR3 RAM, 512MB flash, SD slot, 802.11n WiFi, Bluetooth LE 4.0, Z-Wave, standard 10/100 Ethernet port, optional X10 wired communication, 5 USB 2.0 ports, RS-232 port, 2 optocoupler I/O, Xbee Bus, Raspberry Pi-compatible 26-pin bus and runs Linus Kernel 3.10. IT also features optional wireless communications for Dust Networks and Insteon with RF433/315, EnOcean, ZigBee, XBee, DCLink, RFID, IR coming soon. Read more

Citrix and Google partner to bring native enterprise features to Chromebooks

Chromebooks are making inroads into the education sector, and a push is coming for the enterprise with new native Chrome capabilities from Citrix. Google and Citrix have announced Citrix Receiver for Chrome, a native app for the Chromebook which has direct access to the system resources, including printing, audio, and video. To provide the security needed for the enterprise, the new Citrix app assigns a unique Receiver ID to each device for monitoring, seamless Clipboard integration across remote and local applications, end user experience monitoring with HDX Insight, and direct SSL connections. Read more

Is Open Source an Open Invitation to Hack Webmail Encryption?

While the open source approach to software development has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles. Such worries are ill-founded, though. One concern about opening up security code to anyone is that anyone will include the NSA, which has a habit of discovering vulnerabilities and sitting on them so it can exploit them at a later time. Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP, the encryption scheme Yahoo and Google will be using for their webmail. Read more