Welcome to Xaede.com. Originally this site was intended to support a next-generation first-person shooter online multiplayer game-concept code-named Xaede (pronounced "zade"). It has since morphed into a place for me to showcase my 2D and 3D game development projects as well as my blog on software engineering and game development. The site also hosts some 2D game projects I've worked on via my Java-Applet game engine Lyra. Please see the about page for more information.
Linked-in Share Plug-in
SThe Battle for America’s Army 3 (Game Development)
This blog details my personal experiences with keeping the various systems that run the Unreal Engine 3 game title America’s Army 3 (AA3) running during and after the initial launch on June 17th (please refer to my previous blog post for a detailed description of the various back-end systems I designed and lead a team of developers to implement).
Stage IV Breast Cancer Foundation (Consulting)
My favorite charitable foundation, the Gal to Gal Foundation will be executing their annual virtual (i.e. online) walk through the month of October with a goal of raising more than $250,000 for education, awareness, and granting wishes to women with stage IV breast cancer.
Targa (TGA) Plug-in Library (Game Development)
I found that the TGA file format is quite useful in game development, and is used extensively by a number of modern game-engines, including Unreal Engine 3. There are a number of online examples and tutorials describing how to bang out some C or C++ code to load a TGA file so that it can be used by a DirectX or OpenGL application. However, I wanted to create my own library that solves the following problems:
- It can load the file into a graphics-library compatible format in a single pass (thus being ...
Using RSA to Exchange Cryptographic Keys (Game Development)
The following is a methodology for programmers to provide a simplified implementation for using the RSA algorithm to exchange a shared private key from another cryptosystem such as AES or Blowfish for further secure communications. This methodology will be described following the typical practice in cryptography as an imaginary conversation between two fictional characters that have names taken from successive letters of the alphabet. For the the following discussion, Alfred represents an entity wishing to instantiate ...
Whitepaper on Software Development (Part 1) (White Papers)
Having worked as the lead-geek on a number of disparate projects over the last decade ranging from small one-off applications to multi-million-lines-of-code major enterprise applications and multiplayer games, I have developed a realistic and rather hard-nosed approach to software development revolving around the following principles, namely:
- First refer to rule number one.
I name maintainability as the primary (and in the above list, sole) principle to software ...