Feeds

Twenty classic arcade games

Cabinet reshuffle

Choosing a cloud hosting partner with confidence

Gauntlet

Reg Hardware retro numbers

Inventive, overhead dungeon roamer with impressive synthesised speech from the machine’s Texas Instruments sound chip – which was also used on many of Atari’s games of the time. One of the first coin-ops to feature four-player simultaneous play, characters needed to co-operate over keys, food and magic while taking on a breadth of enemies among the puzzling labyrinths.

Gauntlet
Release 1985
Publisher Atari

Yie Ar Kung Fu

The slimline grand-daddy of one-on-one brawlers, where would Streetfighter 2, Mortal Kombat and Tekken be without this pioneering title? Oolong, the main protagonist, could deliver up to 16 unique moves, on his journey past 11 different opponents, each with varying fighting characteristics.

Yie Ar Kung Fu
Release 1985
Publisher Konami

Operation Wolf

One of the first titles to provide players with a light-gun - this one swivel-mounted on the cabinet with innovative rumble feedback built-in. Wonderfully apolitically correct by today’s standards, the game sees you shooting the Taliban’s long-lost cousins as well as the odd farm animal – this replenishes ammunition supplies, obviously. Classically adored action with three sequels, and most home platforms of the day had a conversion.

Operation Wolf
Release 1987
Publisher Taito

Security for virtualized datacentres

Next page: R-Type

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.