Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Minecraft Modding with Forge: A Family-Friendly Guide to Building Fun Mods in Java

Buy

One day a couple of years ago, I was stunned when my son told me, "Dad, my JAR snapshot messed up the configuration." As a curious dad and an experienced Java programmer, my question to him was, "How do you know what a JAR is?"

What I didn't anticipate at that time was how that one question would completely change our discussions over the ensuing months and years. I learned that the game of Minecraft is written in Java, and that my son had been installing mods, which are other JARs, to modify the gameplay. After helping him fix the configuration problem, my son expressed a desire to write a mod and we started exploring how to do that. This marked the beginning of an extremely rewarding and enjoyable journey for the both of us: he taught me about Minecraft, and I taught him basic Java programming concepts. Notes were exchanged over breakfast and dinner, during drives to school or classes while grocery shopping, and pretty much everywhere. After building our first mod during Christmas 2012, we decided to share the knowledge with his Minecraft buddies. That gave rise to the first Minecraft modding workshop in our living room with about 12 lads. Most of the lads had no programming experience, let alone experience with Java. However, there was high Minecraft experience in the group, with some ldds playing for about two years and up to two hours every day. When given the topic of Minecraft, the small group would talk excitedly about different aspects of the game, constantly using hundreds of game-specific terms and phrases as if speaking a different language. My goal was to leverage their passion and introduce them to Java programming.

(HTML tags aren't allowed.)

Endocannabinoids: The Brain and Body's Marijuana and Beyond
Endocannabinoids: The Brain and Body's Marijuana and Beyond

Over the past decade, there have been major advances in understanding the mechanisms whereby marijuana interacts with the brain in producing psychoactive and potentially therapeutic effects. The discovery of specific gene coding for cannabinoid receptors activated by smoking marijuana,  and the finding of endogenous cannabinoids, which...

Software Engineering Foundations: A Software Science Perspective
Software Engineering Foundations: A Software Science Perspective
A groundbreaking book in this field, Software Engineering Foundations: A Software Science Perspective integrates the latest research, methodologies, and their applications into a unified theoretical framework. Based on the author's 30 years of experience, it examines a wide range of underlying theories from philosophy, cognitive informatics,...
Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)
Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)

When we rst started working on the problem of making the kernel machine approach applicable to the classi cation of graphs a couple of years ago, our e orts were mainly driven by the fact that kernel methods had led to impressive performance results on many data sets. It didn't take us long to appreciate the sheer elegance of how...


How Learning Works: Seven Research-Based Principles for Smart Teaching
How Learning Works: Seven Research-Based Principles for Smart Teaching

Distilling the research literature and translating the scientific approach into language relevant to a college or university teacher, this book introduces seven general principles of how students learn. The authors have drawn on research from a breadth of perspectives (cognitive, developmental, and social psychology; educational research;...

Voice and Video Conferencing  Fundamentals
Voice and Video Conferencing Fundamentals
As audio and video conferencing move rapidly into the mainstream, customers and end users are demanding unprecedented performance, reliability, scalability, and security. In Voice and Video Conferencing Fundamentals, three leading experts systematically introduce the principles, technologies, and protocols...
Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy