Gaming at work. Gaming at Work: Taking the Boredom Out of Training A $60 billion per year price tag, training created for U.S. business employees just.

Slides:



Advertisements
Similar presentations
1 Radio Maria World. 2 Postazioni Transmitter locations.
Advertisements

AKC Rally Signs These are copies of the 2012 AKC Rally signs, as re-drawn by Chuck Shultz. Use them to print your own signs. Be prepared to use a LOT of.
Chapter 5 Transfer of Training
/ /17 32/ / /
Reflection nurulquran.com.
EDA Lab. Dept. of Computer Engineering C. N. U. 1 FSM Structures Mealy, Moore and Combined Mealy/Moore outputs Figure 8.3.
Worksheets.
1 Estimating Your Technical Communications Project Controlling Project Results.
Multiplication X 1 1 x 1 = 1 2 x 1 = 2 3 x 1 = 3 4 x 1 = 4 5 x 1 = 5 6 x 1 = 6 7 x 1 = 7 8 x 1 = 8 9 x 1 = 9 10 x 1 = x 1 = x 1 = 12 X 2 1.
Division ÷ 1 1 ÷ 1 = 1 2 ÷ 1 = 2 3 ÷ 1 = 3 4 ÷ 1 = 4 5 ÷ 1 = 5 6 ÷ 1 = 6 7 ÷ 1 = 7 8 ÷ 1 = 8 9 ÷ 1 = 9 10 ÷ 1 = ÷ 1 = ÷ 1 = 12 ÷ 2 2 ÷ 2 =
Update on IPv4 Address Transfers NANOG June 2012 John Curran CEO, ARIN.
IPv4 Address Sales and Emerging Market for Address Space Winter 2012 ESCC/Internet2 Joint Techs John Curran President and CEO, ARIN.
Random Number Generator (RNG) for Microcontrollers
The portal that offers the opportunity to: Business Language acquire new knowledge and improve your proficiency and.
Created By Sherri Desseau
Created By Sherri Desseau
Summative Math Test Algebra (28%) Geometry (29%)
Modern Systems Analyst and as a Project Manager
Compound Interest and Present Value
Student Guide Access List.
Building Relationships
1 One App to lead them all!. 2 About TCS Tata Consultancy Services is an IT services, consulting and business solutions organisation We have over 277,000.
© 2011 Crain Communications Inc.. Always on Women A survey of how women are using technology today What Devices Millennials are Using, And What They Are.
Our Digital World Second Edition
1 IT Rocks Let IT Take You There! Speaker Name. 2 Innovations That Were Not in the Market 30 Years Ago…what will the next 30 years bring ? The next few.
1 Learning Through Innovation Dissemination Meeting.
TIME CODE 1:15:21:071:15:21:081:15:21:091:15:21:101:15:21:11.
Division- the bus stop method
1 Searching in a Graph Jeff Edmonds York University COSC 3101 Lecture 5 Generic Search Breadth First Search Dijkstra's Shortest Paths Algorithm Depth First.
1 Consumer Motivation CHAPTER 8. 2 Consumer Motivation Represents the drive to satisfy both physiological and psychological needs through product purchase.
Economic Tasks Topic
The National Hockey League Lockout «Pass the puck» to Astral TVPlus!
2014 Level I Prep Class Determining a Neighborhood Factor 1.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
Look at This PowerPoint for help on you times tables
Juni 14 1 New actors in MATSim –T: Agent based retailers F. Ciari IVT – ETH Zürich MATSim Seminar - Castasegna.
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2010 Cisco and/or its affiliates. All rights reserved. LISP Mobility.
Copyright C-SAM Solutions Pvt. Ltd.
Area Of Shapes. 8cm 2cm 5cm 3cm A1 A2 16m 12m 10m 12cm 7cm.
1 Slipping and Drifting: Using Older Users to Uncover Pen-based Target Acquisition Difficulties Karyn Moffatt and Joanna McGrenere Department of Computer.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Route Optimisation RD-CSY3021.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1 Lab Guide.
Doc.: 06/1535r0 lb86-comment-resolution-summary-gv Sep 2006 Ganesh venkatesan (Intel Corporation)Slide 1 Comment Resolutions Resolutions are in spreadsheet.
District Network IP Address Standard View your school’s IP addresses DHCP Wireless Clients (1020 Addresses) P = Primary Scope B = Backup Scope located.
25 seconds left…...
Knowledge Pathways in IT
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
Paul Ormerod – Co Founder > Head of Sales & Research John Dale – Co Founder > Head of Products & Services Paul Ormerod – Co Founder > Head of Sales & Research.
We will solve problems involving a percent of a quantity1.
ANALYTICAL GEOMETRY ONE MARK QUESTIONS PREPARED BY:
Resistência dos Materiais, 5ª ed.
Doc.: IEEE /0333r2 Submission July 2014 TGaj Editor Report for CC12 Jiamin Chen, HuaweiSlide 1 Date: Author:
E-Auction presentation
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—4-1 Single-Area OSPF Implementation Implementing OSPF.
. 0. SECOR Conceptual Slides Evaluation Comment Option 1 Criterion 4Criterion 3Criterion 2Criterion 1Options Option 2 © 2010 Accenture. All rights.
Multiplication Facts Practice
IT Job Roles Task 20. Software Engineer Job Description Software engineers are responsible for creating and maintaining software of various different.
Unit 10 – Using Multimedia Software
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Course Title: M.M.T Chapter No: 01 “Introduction to Multimedia”
Gaming Servers Presented by David Hom & Jackson Nguyen.
Salevich Alex & Frenkel Eduard Wizard Hunting
Presentation transcript:

Gaming at work

Gaming at Work: Taking the Boredom Out of Training A $60 billion per year price tag, training created for U.S. business employees just isn't working. According to training experts, training designed to be more engaging and entertaining, like computer games, is the solution. startup companies creating training games, some industries have branched out to develop their own, such as Cisco Systems Creative Learning Studio. The employee who completed training games with perfect scores get a free ipod as a motivating factor by Borland Software Corp. The games were simple and inexpensive, helped salespersons memorize product information in time for a major sales meeting.

Gaming at Work As proof of training/ gaming 's effectiveness, ERC Properties Inc.'s Candace Armstrong compared test results from separate groups of employees. One group played a game; the other had a standard review. Against a passing score of 80%, the "game group" had an 88% passing rate, while the standard review group's passing rate was 54%. Ms. Armstrong states the importance of instructional gaming best, "People learn more when they laugh."

Gaming at Work Training through gaming plays a large role in the realms of multimedia, e-learning, and high-tech industry; Instructional gaming relies on multimedia for its basic structure, whether as a Macromedia Flash game, Director movie or, it can contain digital images, sound effects, movie clips, and more. Gaming excites the senses and demands interaction from the user. The terms instructional gaming and e-learning could be perceived to a degree as synonymous due to their strong relationship.

Gaming at Work Many industry analysts feel instructional gaming is the next big thing in business, and this goes double for the high-tech industry world. A networking company or online consulting firm wouldn't issue employee training via pen-and-paper evaluations. survival of the companies, and relying on yesterday's training methods could mean the difference between profit and obsolescence.

Supporting engagement with games techniques Factors that used for enhancement of game learning »Challenging tasks » Affiliation with others » Identity and roles »Focused goals » Protection from adverse consequences: » Clear and compelling standards »Protection from adverse consequences » Clear and compelling standards: » Authenticity » Affirmation of progress » Choice

Interactive personalized feedback tool

How Gaming Servers Work When a person is playing a game from his or her computer on the net, it connects to game servers such as these

How Gaming Servers Work The following is a basic idea of how information is sent from your computer to the server as well as other computers on the network: When a person is playing a game online, more important is with speed take care of amount of hops, (one hop is the step from one router to the next, on the path of a packet on any communications network ) routerpacket trace routes, that the data packets from the computer have to bounce through (routers/switches) to get to its destination.

How Gaming Servers Work The moment When you input information from your computer it bounces. Here is a technical example: Tracing route to over a maximum of 30 hops 1 10 ms 10 ms 10 ms ms 13 ms 34 ms boi-edge-01.inet.qwest.net [ ] 3 14 ms 17 ms 24 ms boi-core-02.tamerica.net [ ] ms 130 ms 127 ms sea-core-03.tamerica.net [ ] ms 111 ms 120 ms unknown.Level3.net [ ] ms 104 ms 102 ms ge mp1.Seattle1.level3.net [ ] ms 131 ms 142 ms so mp2.LosAngeles1.Level3.net [ ] ms 171 ms 168 ms gige9-0.hsipaccess1.LosAngeles1.Level3.net [ ] ms 153 ms 206 ms unknown.Level3.net [ ] ms 148 ms 144 ms cor01-vl-127.ca-pasadena0.ne.earthlink.net [ ] ms 177 ms 178 ms dir01-vl-264.ca-pasadena0.ne.earthlink.net [ ] ms 143 ms 135 ms Trace complete.

The route that the data packet takes would be from a house in coimbatore to several places across the country until it reaches the game server in japan.

How Gaming Servers Work You tell the computer to shoot (Normally by pressing the left button on the mouse) The data packet is then sent to the server, via trace routes. The server then receives the information and sends another data packet known as a reply packet which confirms the packet has been received.

How Gaming Servers Work While at the same time, the server calculates your position in 3D space, the direction of the projectile, and takes the position of the enemy in 3D space and his movement speed and direction. It will then calculate whether or not you successfully hit your target. The server decides that you successfully hit your target. It then sends data packets (hit points lost, armor, etc.) to both you and the enemy telling you that the enemy has been hit. ENEMY HERE YOU ARE HERE

How Gaming Servers Work CONGRATULATIONS!!! YOU HAVE ELIMINATED THE ENEMY - SERVER