Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
Try it free
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
...Text adventure or "interactive fiction" is software simulating environments in which players use text commands to control characters and influence the environment. They were among the first computergames.
MAP includes tools to create the adventure and a runner that allows to play it. Source is available and open so both the runner and tools can be modified to fit the needs or style for each adventure/creator.
terminalmath is a textmode math practice game for school-level children. Its main distinguishing feature is that it talks via the eSpeak text-to-speech engine.
Te Tuhi turns pictures of video games drawn on paper into games that you can play on the computer. It invents rules to suit the picture. The project aims to be inclusive, experimental, and modular, with one aim being a scaled down version for the OLPC.
Super Star Trek — a classic computer game
Save the Federation from the invading Klingons! Visit exotic planets and strip-mine them for dilithium! Encounter mysterious space thingies! This is the home page of the classic Super Star Trek game from the days of slow teletypes, reloaded.
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.