SteamPower1830, Premium Coding, Microsoft Windows Azure Servers and Next Gen Gaming Experience Coded with HTML5

The first release from Hamburg-based indie developer Hexagon Game Labs uses both the proprietary HTML5-based Ubique Game and Microsoft’s powerful Windows Azure servers. This gives the strategy game with its meticulously crafted railroad setting a technological framework which allows a next-generation, cross-device and cross-plattform gaming experience. Game sessions can be shifted anytime between all supported platforms, such as PC, Microsoft Surface and Windows Phone.
Players of the free-to-play online game, SteamPower1830, can continuously expand their own railway empire on any end device by saving their game status in the cloud. It makes no difference whether SteamPower1830 is launched via the new app or directly in the browser. Users can refer to the constantly updated overview on www.steampower1830.com/Whitelist.php so see which systems SteamPower1830 can be played on. With this technological innovation, newcomer Hexagon Game Labs is pursuing a strategy which Microsoft, too, views as a major gaming industry trend. Check it out here.



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • In today's distributed enterprise, the need to share information has gone beyond what traditional systems provide. At the same time, cloud networks are on the rise among organizations. While employees have become used to consumer-grade file sync and share (FSS) solutions in their personal lives, enterprise IT is increasingly recognizing the need to deploy a business-ready file sync and share solution that is suitable across different devices and locations. Read this research report to learn why current …

  • Threats are constantly changing, so security controls must adapt accordingly. These security controls include being aware of the latest malicious IPs, the types of websites that are most often impersonated in phishing attacks, and the categories of apps that are most likely to be malicious. Read this report to learn why real-time, contextual, and predictive threat intelligence that spans the spectrum of attack vectors is a critical component to implementing a defense-in-depth strategy to take on today's …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date