Systems | Development | Analytics | API | Testing

Latest Posts

How to Build in the Metaverse - A Primer on Metaverse Game Development

So you want to get into metaverse game development — but the metaverse isn’t here yet. It is still being built in pieces. Some say Web3/NFT/blockchain companies like Sandbox or Decentraland are leading the way. Others say that Meta is leading the way with its immersive VR Horizon World metaverse. But what about Epic Games and their deep investment into the underlying infrastructure? And what about the creative and educational side with Minecraft and Roblox?

In-Camera VFX - How Industry Experts are Using ICVFX

In-camera VFX (ICVFX) and LED wall virtual production methods — sometimes also referred to as on-set virtual production — are being used to create some of the most cutting-edge media today. Global creative studio Final Pixel has been using in-camera VFX and LED walls since 2020. Read on to learn more about their execution of these virtual production methods from their CEO and Co-Founder, Michael McKenna. First, let’s cover some basics.

What Is a Merge Conflict? How to Avoid Merge Conflicts

You’re working on a team project and have made substantial progress. You go to submit your code changes only to find out someone else on your team was working on the same file(s) and submitted their changes before you did. Now you have the problem of conflicting code – and the time required to resolve your changes against the other person’s changes. This is called a merge conflict and can be a source of headache for many developers.

Cybersecurity Update: What Do the Latest WP.29 UNECE Regulations Cover?

With the growth in the number of electric and autonomous vehicles, where the vast majority of components are built on software, the amount of code in a vehicle is only going to increase. Connectivity, both within the vehicle and outside, is also increasing, meaning that the security of these systems has become more critical than ever before. For any system where there is communication between components or with the outside world, there is an increase in possible software cybersecurity threats.