Feeds

Author of '80s classic The Hobbit didn't know game was a hit

The Register meets gaming pioneer - now Big Data researcher - Veronika Megler

High performance access to file storage

"I feel a bit sad"

While the messages of support are lovely, Megler says they also make her feel “a bit sad” because she had no idea the game was such a success.

“Only in the last five years have I realised what a hit it was,” she says. “It makes you wonder how my life would have been different had I known that.”

“One of the things I find still frustrating is that there is still an assumption that because I am a woman, Phil must have written most of the game and perhaps I just contributed to a few of the puzzles. I've also read things that leave my name off completely.”

Analysis of the game that attributes its success to Inglish also irritate just a little, as fans tell Megler that they didn't use much of the vocabulary it offered but did appreciate the ability to use different objects in imaginative ways that she into the game's engine.

Which is not to say that Megler is bitter, as she admits “I have a very low tolerance for doing the same thing over and over again.” By the time The Hobbit, (and Penetrator, the only other game she ever wrote) were complete, “I had been writing assemblers for years and I was tired of it.”

She was also tired of playing games and hardly touched another, bar Tetris, for 15 years.

Today she says The Hobbit has “Probably the most impact of anything I have done in my life until now.”

“It is odd to look back and think that from some perspectives the high point of my career came before I finished my bachelors degree! None of the my other jobs have had the same impact as writing that game did.”

But Megler is hopeful her PhD will top it, and is hard at work making that happen. On the day she was scheduled to chat to The Register, she was so immersed in debugging the project she was half an hour late for our call.

The interruption, and chance to reminisce, was welcome.

“Working on The Hobbit was a once in a lifetime gift,” she says.

The steady stream of emails thanking her for that gift surely show it's one that keeps on giving. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.