@pjhaan - You have time - keep at it, you can do it!
@fdanielx - Yikes! The Level Starters aren't firing on the imported boxes! So the cannons don't go turbo, the Tron player-character doesn't get auto-equipped with an Identity Disc, and in Nightmare Nod, the player-character doesn't get auto-equipped with the sword! Oddly enough, the Level Starter appears to fire if you switch the character after going through the door (?!!). Since I'd switched to Crystal Jack Sparrow in testing, I hadn't noticed it. <sigh>. Maybe they'll met me remix again with 3.0 - I was really hoping to kickstart the library's design club from a virtual library
.
Regardless of the contest results, this is why I loved remixing Tron Trace...
My job is rather serious, in the area of Secure Engineering for the IBM mainframe. Tron Trace is a whimsical spin on Cybersecurity. There's something personally satisfying in visualizing a software pirate walking the plank of his own ship, to be blasted through the Back Door of a Firewall in order to infiltrate a distributed system infected by a virus. The opposing software pirates have disabled the frost generators for the water-cooled processors, causing them to run extremely hot. Fix-It Felix needs the binary passcode to get the generators turned back on. In the Java Virtual Machine, garbage collection is critical to returning virtual memory to the system that is no longer referenced so that is doesn't run out. Here, garbage collection has been disabled so that WALL-E is compacting an ever-increasing amount of garbage that he needs help in removing. Advancements in Cybersecurity include detection of unauthorized users after they've infiltrated the system; here, Stitch's Collector Units have been infected by the Blue Team "Sapphire Virus" so that they attack the authorized users - so you can infect your own persona in order to avoid further conflict. With international export, there's a limit to the size of the encryption keys used in your product depending on the country where it's delivered, so in Tron Trace you need to collect 3 encryption keys to gain access to the upper level. Hidden near the bottom of the distributed system box is a multi-layer lava cake with Rex celebrating last year's 50th anniversary of the mainframe. Then on the top of the system box is a huge knight chess piece, the visual construct of the Trojan Horse software used to let Davy Jones & his software pirates in. The pirates have stolen personal data, the precious treasure of IT, and it must be retrieved before it is misused! So the box is full of visual Cybersecurity puns. Had lots of fun making it
.