We had a great online session yesterday, including a welcome for a new player named "Peter", who flew as "NEW1031".
Peter had previous experience with other high-quality online flight simulators, so he already knew how to fly basic Air Combat Maneuvers. He was flying the Raspberry Pi version of LAC, with the current release 8.95. He had been practicing offline and studying our forums for tips, so he already knew the keyboard and joystick commands, and he gave a very good account of himself.
I captured three YouTube video clips of all of this. I've stored them at the bottom of our "LAC2023" YouTube PlayList according to the usual pattern. Here's a link to that PlayList:
Obviously we will be adding more clips into that PlayList in the future. The clips from yesterday will always be dated "04Feb2022" in that list. If you just want a quick summary of yesterday's experience with Peter, I recommend you take a look at the shortest of the three new clips. It's the last of the three from 04Feb2022, and here's a direct link:
Peter's Raspberry Pi doesn't have a microphone, so he couldn't speak to us with Mumble, but as the event went on we learned that he could HEAR the rest of us when we spoke on Mumble. Accordingly, in the later of the three clips you'll see that he was using the text-based Morse Code Radio to send messages to us, but the other players were all speaking out loud to him via Mumble.
All three of these clips were captured from the viewpoint of "LINCOLN" as he flew among the others.
Last edit: bbosen 2023-02-06
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
I just published four additional, narrated video clips from a session of Thursday 13Jul2023 in Network Mission 02, in which Lincoln and Henk led the BlueTeam in a rampage, collecting the scalps of at least 15 RedTeam blokes. Find those clips at the end of our "Lac2023" Playlist (same list as described above). Here's the link again:
We had a great online session yesterday, including a welcome for a new player named "Peter", who flew as "NEW1031".
Peter had previous experience with other high-quality online flight simulators, so he already knew how to fly basic Air Combat Maneuvers. He was flying the Raspberry Pi version of LAC, with the current release 8.95. He had been practicing offline and studying our forums for tips, so he already knew the keyboard and joystick commands, and he gave a very good account of himself.
I captured three YouTube video clips of all of this. I've stored them at the bottom of our "LAC2023" YouTube PlayList according to the usual pattern. Here's a link to that PlayList:
https://www.youtube.com/watch?v=BRNZ09eyTPg&list=PL1IYes9MY6lIp5aM0tAVE9u853Pk9dSpR
Obviously we will be adding more clips into that PlayList in the future. The clips from yesterday will always be dated "04Feb2022" in that list. If you just want a quick summary of yesterday's experience with Peter, I recommend you take a look at the shortest of the three new clips. It's the last of the three from 04Feb2022, and here's a direct link:
https://www.youtube.com/watch?v=CMTwiuRv7Mg&list=PL1IYes9MY6lIp5aM0tAVE9u853Pk9dSpR&index=8
Peter's Raspberry Pi doesn't have a microphone, so he couldn't speak to us with Mumble, but as the event went on we learned that he could HEAR the rest of us when we spoke on Mumble. Accordingly, in the later of the three clips you'll see that he was using the text-based Morse Code Radio to send messages to us, but the other players were all speaking out loud to him via Mumble.
All three of these clips were captured from the viewpoint of "LINCOLN" as he flew among the others.
Last edit: bbosen 2023-02-06
I just published four additional, narrated video clips from a session of Thursday 13Jul2023 in Network Mission 02, in which Lincoln and Henk led the BlueTeam in a rampage, collecting the scalps of at least 15 RedTeam blokes. Find those clips at the end of our "Lac2023" Playlist (same list as described above). Here's the link again:
https://www.youtube.com/watch?v=BRNZ09eyTPg&list=PL1IYes9MY6lIp5aM0tAVE9u853Pk9dSpR