Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ready: A Commodore 64 Retrospective

Buy
Ready: A Commodore 64 Retrospective, 9789812873408 (9812873406), Springer, 2014

How did the Commodore 64 conquer the hearts of millions and become a platform people still actively develop for even today? What made it so special?

This book will appeal to both those who like tinkering with old technology as a hobby and nostalgic readers who simply want to enjoy a trip down memory lane. It discusses in a concise but rigorous format the different areas of home gaming and personal computing where the C64 managed to innovate and push forward existing boundaries.

Starting from Jack Tramiel's vision of designing computers "for the masses, not the classes," the book introduces the 6510, VIC-II and SID chips that made the C64 unique. It briefly discusses its Basic programming language and then proceeds to illustrate not only many of the games that are still so fondly remembered but also the first generation of game engines that made game development more approachable − among other topics that are often neglected but are necessary to provide a comprehensive overview of how far reaching theC64 influence was.

Written in a straightforward and accessible style, readers will relive the dawn of modern technology and gain a better understanding of the legacy that was built, bit by bit, in those pioneering days by computers that had only a tiny fraction of the power modern machines have and, yet, were used to create the technological world we are now living in.

With a foreword by Michael Tomczyk

(HTML tags aren't allowed.)

Temporal Data & the Relational Model (The Morgan Kaufmann Series in Data Management Systems)
Temporal Data & the Relational Model (The Morgan Kaufmann Series in Data Management Systems)
Temporal database systems are systems that provide special support for storing, querying, and updating historical and/or future data. Current DBMSs provide essentially no temporal features at all, but this situation is likely to change soon for a variety of reasons; in fact, temporal databases are virtually certain to become important sooner rather...
China’s Domestic and International Migration Development (International Talent Development in China)
China’s Domestic and International Migration Development (International Talent Development in China)
This book offers the most comprehensive, up-to-date assessment of China’s domestic and international migration. Restructuring economic development requires large numbers of educated and skilled talents, but this effort comes at a time when the size of China’s domestic workforce is shrinking. In response, both national and regional...
The Fifth Vital Sign: Master Your Cycles & Optimize Your Fertility
The Fifth Vital Sign: Master Your Cycles & Optimize Your Fertility

MENSTRUATION ISN'T JUST ABOUT HAVING BABIES

Your menstrual cycle is a vital sign, just like your pulse, temperature, respiration rate, and blood pressure. And it provides you with essential information about your health.The Fifth Vital Sign: Master Your Cycles and Optimize Your Fertility
...

Special Edition Using WordPerfect Office X3
Special Edition Using WordPerfect Office X3
Special Edition Using WordPerfect Office X3 is crammed full of tips, tricks, and practical examples that you won't find anywhere else! Covering all of the applications within WordPerfect Office Standard including WordPerfect, Quattro Pro, and Presentations, this is an all-inclusive reference for every...
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Stormy development of electronic computation techniques (computer systems and software), observed during the last decades, has made possible automation of data processing in many important human activity areas, such as science, technology, economics and labor organization. In a broadly understood technology area, this development led to separation...
CYA: Securing Exchange Server 2003 & Outlook Web Access
CYA: Securing Exchange Server 2003 & Outlook Web Access
Coverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy