Conway's Game of Life—the OG cellular automaton toy—is put in three dimensions by Samuel Levy. You can spin the playfield as it mutates, too! It beat the hell out of my computer on the higher settings, though.
Cells (in this case, cubes) with only 1 or less neighbours die, as if by lonliness.
If 5 cells surround an empty cell, they breed and fill it.
If a cell has 8 or more neighbours, it dies from overcrowding.
Strictly speaking, that means it's not the Game of Life but a more elaborate automaton. The results are rather obscure, visually, to me, in this particular setup. I hope this gets expanded to allow for more experimenting with rules.
The game designer and artist Yifat Shaik has just released “The Workplace Saga”, a video game based on Conway’s “Game of Life” ruleset that runs in Excel as a set of macros. It’s an ingenious and lovely way of blending the metaphoric payload of Conway’s game (from very simple rules comes complex, gorgeous behavior) with […]
Noah writes, “Fabienne Serriere, a hacker and machine knitting enthusiast, is running a Kickstarter currently for provably unique mathematical scarves modeled off of cellular automaton and made of Merino wool.
A great one-shot site: punch your name in and watch it explode into a mass of wiggling cellular automata.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]