Feeds

(Back) into The Valley

Remembering a BASIC coding classic from 1982

Gartner critical capabilities for enterprise endpoint backup

Forgotten Tech I first explored The Valley late in 1982. My method of entry: a Research Machines 380Z. I loved it and didn't want to leave.

But the school lunch period ended at 1.30 and the computer room was locked then, so I had to wait a day or two until I could get time on the RM again.

The Valley - CT Cover

The Valley had been hacked onto the 380Z by a guy called Roy Walker. In a rare moment of schoolboy honesty, he admitted he'd keyed it in from a listing in a magazine. The publication was Computing Today, which had run an article - bylined only 'HB' and 'RM' - in April that year centred on a modular sword-and-sorcery "real-time adventure with graphics" designed to not only be entertaining to play but also to be used as a programming teaching aid.

"The published listing was developed and tested on a 32K Commodore Pet but will, if all non-essential spaces and REMs are removed, run in 16K," the authors promised.

"The best way to implement the program on your system is to key it in one module at a time following the notes," we were advised. "As each block is completed, SAVE it on tape before adding the next; 16K is a lot of program to lose if you make a mistake!"

Hard drive users - they don't know they're born...

CT published follow-up articles during the following months, mostly centred on adapting the code for other machines. The May 1982 issue, for example, featured writer Peter Green detailing a TRS-80 version. In the August 1982 number, Andrew Bain offered notes on coding The Valley for the Sharp MZ-80K. A year after the initial listing, readers' additions - extra spells and conversion hints - were being published en masse.

The Valley - Hob Goblin

The original Valley was written for the Commodore Pet, but Roy had tweaked it into RM's dialect of Basic. I asked if I could borrow the listing to recode it for Microsoft Colour Basic - what my Dragon 32 used - but Roy told me to piss off.

A friend, Iain, was more lucky. He too had a Dragon and, after he'd borrowed the listing from Roy for an evening or two, I had a photocopy of the Pet code. Iain was no coder, but he knew I was and wanted to play the game on his own machine, so it made sense for him to get me the listing.

I can't recall how long the conversion took. Not long, I think. The hard bit was working out what the addresses that codes were Poke'd into the Pet's memory map represented. I made some guesses and seemed to get it right.

Boost IT visibility and business value

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.