If you’re a weirdo like me you have about three or four operating systems running on your desk at any time, but your command-line roots run up against the limitations of Windows10‘s built-in terminals constantly. There has got to be a better way!
Well I’m glad you asked, because there is a better way! Once you’ve got your Windows Subsystem for Linux all set up through Microsoft’s app store or other means it’ll finally be time to run those beautiful Bash terminals in tabs and maybe you’d like to have those bash terminals cooperating in the same window as your cmd.exe and PowerShell terminals. The answer to that all is ConEmu and it’s really just a very powerful, open-source, front-end for all of your terminals. Or consoles, because it’s ConEmu and not TerEmu.
Katamari Damacy is almost unplayable today. You can’t buy it online through any platforms or services.
The 2004 PlayStation 2 original game is out-of-print. The Xbox 360 sequel isn’t backwards compatible on the Xbox One. No Katamari has ever been available forWindows or any other desktop computing platform.
Mobile versions of the real Katamari existed on the iPhone, but aren’t available anymore. The only Katamari games that you can download on an iPhone today are free-to-play explorations of other game formulas like the modern clicker game or the endless runner. Those seem to exist solely to siphon off our shared nostalgia.
Katamari Damacy is just a great example of the difficulty in preserving original games in their original format. Hooking up a PlayStation 2, 3, or Xbox 360 is the only way to experience it today without walking in the harsh desert of emulator country and I haven’t even begun to explain why anyone who hasn’t played some version of Katamari would care about it.
It’s a game where you roll a big-ass ball around, it’s extremely weird, the ball collects things in a fictional version of our world and the things all have a kind of low-poly aesthetic. The ball is called a Katamari and it is being pushed by the Prince of the Cosmos under orders from his father, the King of the Cosmos. As you collect things the ball grows larger and larger until it’s finally going to roll up entire continents and at some point the level ends and the King is either satisfied with your work as the Prince or you can repeat the level. Some levels had annoying goals, it wasn’t perfect, but Katamari Damacy is missed by everyone who loved it. I still listen to some of the soundtrack with my family because it’s fun music that is approachable even to people who haven’t played a Katamari game.
I’m eternally grateful to whatever print magazine or 1UP.com show that told me about the original, because I wasn’t hooked into anywhere else that was talking about it when it was released in 2004.
All that said, this remaster of the original Katamari Damacy will finally be available on December 7th, 2018. Katamari Damacy ReRoll (it’s strangely an all-caps REROLL in the press release) on the Nintendo Switch as well as Steam for Windows. I don’t have a firm price available yet. ReRoll will also have new motion controls on the Switch. Very curious to see how well this game caps off our year of remasters and remakes as Katamari takes one more roll through the ephemerality pipeline.
That sounds like a morning breakfast show, doesn’t it? Well, Windows Today isn’t a thing, but Puyo Puyo Tetris is out for Windows via Steam, today, it’s $20. I played a short bit and it felt just as good as it does on the Switch, which reviewed well as we discussed previously. It is very odd to have a lot of visual novel cutscenes that take forever to tell their story inbetween levels of the single-player campaign, but those are easily skipped if you’re not interested in anime characters screaming at each other about how their worlds have been ripped asunder to bring Puyo Puyo and Tetris together.
It can be pretty frustrating to find out that something you want to fix is difficult or impossible to repair. Glued-on screens cover batteries that are all custom fit inside small cases that prevent curious people from learning how things work and fixing problems with their devices. Iconoclasts from Joakim Sandberg takes that a step further, it’s a world where a mechanic, Robin, finds that her profession is outlawed. Your mission is to get Robin and her friends together to fix things in what looks like a bit of a metroidvania side-scrolling action-adventure with a Metal Slug-y vibe to the art.
Iconoclasts is a fine game, offering both satisfyingly sharp platforming and shooting, and some really smart puzzles. It’s enormous too, packed with secret areas and other stuff to discover. And although I found the humour a little glib and childish at times, it tells its heartfelt story well. A lot of Metroidvania games go for a bleak, downbeat atmosphere, but Iconoclasts is infectiously vibrant and sunny, even if the story does occasionally venture into dark territory.
There are two big computer vulnerabilities that were announced recently, Spectre and Meltdown attacks. These are significant because they affect almost every desktop, laptop, smartphone, tablet, and game console. Almost anything with a processor can be exploited to give attackers passwords and whatever other private information is on a device.
The attacks work because of the way that computer processors attempt to speculatively work ahead of their current point in executing a computer program. My understanding is that even code executed in your web browser could execute these attacks.
The workarounds that operating systems are implementing may slow these devices down because the attacks utilize performance features of the processors, but the performance effects of the mitigation might not be noticeable outside of specific workloads.
These aren’t normal software vulnerabilities, where a patch fixes the problem and everyone can move on. These vulnerabilities are in the fundamentals of how the microprocessor operates.
It shouldn’t be surprising that microprocessor designers have been building insecure hardware for 20 years. What’s surprising is that it took 20 years to discover it. In their rush to make computers faster, they weren’t thinking about security. They didn’t have the expertise to find these vulnerabilities. And those who did were too busy finding normal software vulnerabilities to examine microprocessors. Security researchers are starting to look more closely at these systems, so expect to hear about more vulnerabilities along these lines.