Feeds

Sysadmins get Quake tools

Fragging system processes

High performance access to file storage

Managing a network just got a whole lot more fun - Aussie boffins have created a version of Quake which finally lets you deal with network problems with a shotgun.

Researchers at Swinburne University, Melbourne, have mapped network services and events onto a Quake Arena, allowing budding BOFHs to utilise skills honed over hours - or days - spent playing games.

The system is called L3DGEWorld, and uses Open Arena, an open-source game based on the Quake III Arena game engine, to render system events and display them as effects within the 3D world.

The idea of navigating a computer network as a 3D environment will be familiar to fans of Tron, amongst others, and even the idea of using extreme violence to manage system processes is nothing new - Doom was being used to represent processes on a single machine almost 10 years ago.

"After I took the screenshot of myself being attacked by csh, csh was shot by friendly fire from behind, possibly by tcsh or xv, and my session was abruptly terminated."

But L3DGEWorld is taking the concept a bit further. Indeed, games were far from the plan when they started by attempting to build their own rendering engine, before realising the time that could be saved by using Open Arena.

Mostly the system consists of rows of pyramids, each representing one server, the appearance of which can be altered in up to seven different ways to indicate its status - colour, bounce height and speed, form, rotation, patterning and size (video).

The user can interact with the systems, using different weapons to have different effects, such as locking down a firewall or getting further information about a system.

The major advantage of such systems, regardless of their base code, is the ability to see massive amounts of information at a glance, ensuring that everything is ticking over and quickly zooming in on areas of concern. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.