Skip to main content

Global Game Jam 2017: Our game "Speaker Rumble"

Global Game Jam ran a couple weeks ago, and this year I was able to participate. The jam's theme was "Waves".


Teaming up with Chris Sotiropoulos, we made this little game:


Speaker Rumble is a game where you control a speaker-like robot thrown into a junkyard and attacked by hostile robots, and you have to fight your way out using your blasting soundwaves.

I've been on game jams before, but GGJ was a new experience for me for 2 reasons:
  • All my previous jams were online, so I didn't actually get to meet the other participants.
  • I have always participated solo (as opposed to having to cooperate).

Not having any available colleagues of my own, I looked for people to team up with and met Chris. We came up with this simple concept, made a quick draft on paper and started working on it.



Regarding the game's development, I was quite pleased with how everything went:
  • The initial draft barely needed changes, and we pretty much stayed on what we had planned. 
  • The graphics came out good-looking and style-consistent. Keeping them simple helped a lot with deadlines without making the game look badly designed.
  • While a two-member team did not allow us to assign strict roles, the cooperation went smoothly and we retained a good team spirit.
  • The gameplay was satisfying, and we had time to implement a two-player mode in addition to the single-player.


One of the things we had to forfeit from the initial plan was the final Boss Fight. Time limitations restricted us from completing this part, but I was keen on finishing it after the jam. Now I finally had time to do that, so it's ready and the latest version now includes the Boss fight.

Feel free to check out the game:


Special thanks to Chris, the GGJ Athens volunteers, and the other jammers for making this a great experience. Hope to see you guys again in more jams.

-Kostas

Comments

Popular posts from this blog

Hi folks!

Eventually, after some brainstorming conversations with Kostas we decided to create this blog in order to post our work.

As you may guess my name is Anastasios. My interests are comprised of computer security, linux, operating systems and many more low level programming concepts :P.

Finally and before my first post, I would like to thank Kostas for taking care of junkbytes.com because i wasn't involved in the creation process. May the source be with you Kostas :) .

So regarding my first post, last days i encountered a very interesting way to execute ptrace. What is ptrace system call ?

ptrace is a system call found in several Unix and Unix-like operating systems. By using ptrace (the name is an abbreviation of "process trace") one process can control another, enabling the controller to inspect and manipulate the internal state of its target. ptrace is used by debuggers and other code-analysis tools, mostly as aids to software development. (wikipedia.org)

As you can see i…

Revisiting "Stick Soldiers"

Update 16 Sep 2016: The project mentioned in this post has its own page on Gamejolt and Itch.io now: Visit "Stick Veterans" on Gamejolt or Itch.io for more info.
Some of you may have played the classic games Stick Soldiers 1 and 2 by WhiteSpaceUnlimited. Stick Soldiers belongs to the list of small, humble games that manage to captivate our interest and have made many of us spend a lot of our free time and have a lot of fun. (you can download them here: SS1, SS2)

Stick Soldiers has remained discontinued for the past years after the hiatus of the development team and the cancellation of the long-awaited sequel Stick Soldiers 3 by Andrew Russell Studios.

For a long time, I have aspired to revive the Stick Soldiers series by making a fan sequel to the game. Since school's start, I spent about a whole year working on a Game Maker / Ultimate3D project, aiming to evolve it to a complete and worthy sequel, which I called "Stick Soldiers: Encore". Second year of school …

Digital Forensics: Imaging

Hello! Sorry for being inactive so much time but summer lasted a little bit longer than usual..!

Regarding my digging in digital forensics, i decided to create a series of posts beginning with imaging. So today i will show you the three most prevalent formats of "post-mortem" imaging and how to obtain them (on a *nix system) from a test disk.

The discussed formats are the following:
(1) Raw Format
(2) Expert Witness Compression Format (or ewf)
(3) Advanced Forensic Format (or aff)