Language Selection

English French German Italian Portuguese Spanish

Interview With Frictional Games – Amnesia

Filed under
Interviews
Gaming

Frictional Games the developers of the horror Penumbra series recently revealed the title of their next project – Amnesia : The Dark Descent which I wrote about earlier. For this special event I interviewed the developers about their next title.

2. What can you tell us about the upcoming game Amnesia and how would you compare it to the Penumbra series gameplay/engine wise ?

Thomas: One could say that Amnesia is a sort of progression from Penumbra. Many of the core gameplay elements have been taken from Penumbra and then refined in Amnesia. This is stuff like the physical interaction system, the way which we design our levels, and so on. Anyone who has played Penumbra will feel right at home when starting Amnesia. What really makes Amnesia different from Penumbra gameplay wise (apart from story and settings) is were our focus have been this time. These are the main areas:

1) To make the player the protagonist. What this means is that the player should to the extent possible be in the shoes of the character he/she is playing as. We will not have any sort of cut scenes, there will be very little text feedback (like descriptions) and the player should be in control from start to finish with no time jumps or anything like that. We feel that this will increase the immersion and emotions experienced during gameplay.

2) Much more effort has been put on the graphics

Rest Here




More in Tux Machines

Fedora Magazine: Five common mistakes when using automation

As automation expands to cover more aspects of IT, more administrators are learning automation skills and applying them to ease their workload. Automation can ease the burden of repetitive tasks and add a level of conformity to infrastructure. But when IT workers deploy automation, there are common mistakes that can wreak havoc on infrastructures large and small. Five common mistakes are typically seen in automation deployments. Read more

Security Leftovers

  • Reproducible Builds: Supporter spotlight: Jan Nieuwenhuizen on Bootstrappable Builds, GNU Mes and GNU Guix

    The Reproducible Builds project relies on several projects, supporters and sponsors for financial support, but they are also valued as ambassadors who spread the word about our project and the work that we do. This is the fourth instalment in a series featuring the projects, companies and individuals who support the Reproducible Builds project. We started this series by featuring the Civil Infrastructure Platform project and followed this up with a post about the Ford Foundation as well as a recent ones about ARDC and the Google Open Source Security Team (GOSST). Today, however, we will be talking with Jan Nieuwenhuizen about Bootstrappable Builds, GNU Mes and GNU Guix.

  • CISA Issues Emergency Directive and Releases Advisory Related to VMware Vulnerabilities [Ed: Proprietary software is a threat to national security]

    CISA has issued Emergency Directive (ED) 22-03 and released a Cybersecurity Advisory (CSA) in response to active and expected exploitation of multiple vulnerabilities in the following VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, vRealize Suite Lifecycle Manager.

  • Software Supply Chain: A Risky Time for Dependencies [Ed: This is a proprietary software problem too and it's not a new problem; the FUD patterns are newer and driven by special interests]

    The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surface and sometimes allow hackers to bypass robust security layers you’ve added to your infrastructure.

Shows and Videos: FLOSS Weekly, Linux Out Loud, Bringing Windows Best Feature To Linux, and More

  • FLOSS Weekly 681: Yes, UCAN - James Walker, Fission.codes and UCAN

    User Controlled Authorization Networks (UCANs) are just one of the many new and useful approaches to decentralization that James Walker, of fission.codes, shares with Doc Searls and Dan Lynch. If you want a detailed dose of pure optimism about Web3 working for you and me, this is the episode for you on FLOSS Weekly.

  • 14: Back Stage Pass - Linux Out Loud - TuxDigital

    This week, Linux Out Loud chats about what it is like for us to be content creators on the Tux Digital Network. Welcome to episode 14 of Linux Out Loud. We fired up our mics, connected those headphones as we searched the community for themes to expound upon. We kept the banter friendly, the conversation somewhat on topic, and had fun doing it.

  • Bringing Windows Best Feature To Linux!! - Invidious

    Have you ever felt like Linux was just missing something but not sure what it was missing, well maybe it was missing a really annoying watermark telling you to activate your system everytime you use it.

  • Why Use The Terminal Instead of GUI Apps? - Invidious

    New Linux users often are confused with why more intermediate-to-advanced users gravitate to the terminal rather than just using GUI apps for the same task. There are reasons why newer users hate the terminal and longtime Linux users love the terminal.

  • Linux in the Ham Shack/LHS Episode #467: The Weekender XCI

    It's time once again for The Weekender. This is our departure into the world of hedonism, random topic excursions, whimsy and (hopefully) knowledge. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. We'd love to hear from you.

Android Leftovers