Feeds

Swedish school puts Minecraft on the curriculum

Those are some lucky students

High performance access to file storage

Whereas most schoolchildren have to sneak in a gaming fix at school on the sly, one Swedish hall of education has made playing Minecraft compulsory.

The Viktor Rydberg school in Stockholm introduced the gaming lessons to inspire creative thought. Minecraft, which was developed by the delightfully named Swedish programmer Markus "Notch" Persson and has a global user base of over 40 million players, teaches creative thought the school reasoned, and therefore has a place in lessons.

"It's their world and they enjoy it," Monica Ekman, a teacher at the school told The Local. "They learn about city planning, environmental issues, getting things done, and even how to plan for the future."

Players of Minecraft collect natural resources and use them to build structures within a 3D environment while defending them against zombies and spiders at night. Players can build whatever they like, and they do build pretty much anything.

One team of three players created an entire stop-motion film of Super Mario Land, which involved shifting 18 million blocks representing pixels on a flat plain and took over a month of play to achieve. It's that kind of game - one of those you can start playing after dinner and then realize it's 3:30am and the boss is getting antsy about punctuality.

"The boys knew a lot about it before we even started, but the girls were happy to create and build something too - it's not any different from arts or woodcraft," Ekman said.

The initiative came from a national school competition called "Future City," where students were asked to suggest things that might improve the future. Some parents weren't keen on the idea Ekman said, but it looked as though the classes will become a permanent feature of the curriculum.

"It's been a great success and we'll definitely do it again," she told The Local.

"We think it's a fun way of learning and it's nice for the students to achieve something." ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
Sammy's newbie cooked slower than iPhone, also costs more to build
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.