-
Posts
39,331 -
Joined
-
Last visited
-
Days Won
25
Content Type
Profiles
Forums
Events
Downloads
Everything posted by UHQBot
-
Patch NotesContent UpdatesAdded a condition for using "Change to Siege Mode" for Wheeled Mortar/Fire Ironclad/Ironclad. The content is not as exciting due to the high reliance on steamtanks (especially the use of Siege Ammos), so a condition was added for using "Change to Siege Mode."It can only be used while a Siege is in progress or at the "Mysthrane Gorge" region. We will continue to make improvements for content that utilizes steamtanks.The Enchanting Tail and Tempting Tail were added to the boss monster Aria (Hard difficulty) NPC's loot at Mistsong Summit.These items only dropped from the Easy and Normail difficulty Aria NPCs, but we realized the high demand for the item. Therefore the items will also drop from the Hard difficulty Aria.Increased the Health of Jola the Cursed, Meina, and Glenn.The below expired ArchePass will no longer be displayed.December ArchePass II EventsThe Sweet Love-filled Gift event has begun.Event Period: Mar. 2 (after maintenance)–Mar. 16 (before maintenance)A special daily quest (Lv55+) will be available through "Rabbit-Disguised Firran" who appears at the major cities (Marianople, Austera, Growlgate Isle).After accepting the quest, make the "Candy Bundle" and deliver it to the "Rabbit-Disguised Firran."Receive the "Candy Bundle With Letter" after completing the quest, and then give it to another player to get a special buff effect.Please check out the event post for the details.Bug FixesFixed the issue where you could not accept the "Defeat the Nightmare Glaive" Grimghast Rift quest.Fixed the issue where players wouldn't die in certain circumstances when the Purifying Archeum exploded. View the full article
-
The term “Soulslike” generates a specific kind of game in the mind. It conjures something that’s hard as hell, with fearsome bosses to beat, intricate levels to explore, tight combat to experience, and a world rife with enough lore to fill several tomes. You may call games in the genre alluring, unforgettable, and… Read more... View the full article
-
Were it almost any other game from almost any other studio, Cyberpunk 2077's disastrous launch would have condemned it to the sales bins of history. Big AAA releases dropping with some bugs is one thing; big AAA releases being taken off the PlayStation Store because they were so broken is something else entirely. Read more... View the full article
-
They were never headline news, but Sony did a pretty good job throughout the PlayStation 4's lifespan of releasing custom consoles. You know the drill: it’s a regular PlayStation 4 inside, but the case would be a new colour, or there’d be a fancy faceplate with a game’s logo or piece of art on it. Read more... View the full article
-
Yesterday, Luminous Productions, the developers behind the rocky fantasy parkour game Forspoken, announced that it will no longer exist as a separate game studio. On May 1, Luminous will be merged back into its parent company, Square Enix. Read more... View the full article
-
Elden Ring Director Turns To Escape From Tarkov For Inspiration
UHQBot posted a topic in Gaming News
It seems that Elden Ring director Hidetaka Miyazaki and I share an affinity for the same kind of game: Extraction shooters. (I always knew he had good taste). In a recent interview, the award-winning director said that he was a fan of none other than Escape From Tarkov and, more importantly, that it and other… Read more... View the full article -
The Xbox Series S may not be the most powerful console out there, but its a perfect little machine for playing most Game Pass bangers and Xbox exclusives. And now, the Series S is available for only $150. The catch: You have to be a Verizon subscriber to take advantage of this limited-time deal. Read more... View the full article
-
During today’s Pokémon Presents, we finally got a look at the upcoming and highly anticipated Pokémon Sleep app. It was accompanied with an adorable live-action promo and some actual in-game footage. Read more... View the full article
-
You’ll get coaxed into turning bounty hunter Samus Aran into a compact, slippy metal Morph Ball shortly after you start the new Metroid Prime Remastered, quickly forcing you to dodge churning, red lava pits and obnoxiously buzzing bombers by rolling around them. This basic bowling ball movement becomes complex as you… Read more... View the full article
-
During a press junket interview for Creed III, actor Michael B. Jordan revealed that he wanted his directorial debut to be jam-packed with references to some of the best fights in anime. Read more... View the full article
-
This week, Florida governor Ronald Dion DeSantis signed a bill that targets the Disney Company’s control over the Reedy Creek Improvement District, a nearly 40-square mile area in Florida’s Orange and Osceola counties. The area covers the Walt Disney World Resort and was, until now, under independent governance… Read more... View the full article
-
Just outside the main castle grounds in Hogwarts Legacy, the vibrant and towering Quidditch stands sit on the horizon, beckoning. If you hop on your broomstick, you can soar up the pitch’s shorter walls and down onto the field itself, the impossibly green grass begging to be sullied by your footsteps. If you want, you… Read more... View the full article
-
The opening level of GoldenEye 007 on the Nintendo 64 is one of the most iconic video game areas out there. The overcast skies, the low-res rock walls, the sniper towers, and the tunnel leading to an underground maze. Remember how it slowly causes your game to become more and more glitchy due to some unknown entity?… Read more... View the full article
-
In a lot of ways, Octopath Traveler II can feel like a pretty straightforward turn-based RPG, but when you take into account its eight characters’ original mechanics, its non-linear storytelling, and how unapologetic it can be about throwing you into the deep end, there’s a lot of complexity under the hood. Whether… Read more... View the full article
-
I like the Iron Bull a lot. I’d get a drink with a guy like him in real life. We’d get each others’ backs if anyone was giving 'frack' to either of us. Which is why I can’t stop thinking about how badly his story arc concluded in the action RPG Dragon Age: Inquisition, and why I’ve been revisiting the ways it lines up… Read more... View the full article
-
Kai Cenat, the 21-year-old rising Twitch star who took the Amazon-owned livestreaming platform by storm in 2021 and 2022, has smashed another record on the last day of Black History Month. This time, it was the record for the streamer with the most active subscribers, an accolade previously attained by Tyler “Ninja”… Read more... View the full article
-
Ahead of this week’s Lightfall release, Destiny 2 was on a roll. Season of the Seraph delivered on every front, including a terrific final mission and concluding cutscene showing the series’ infamous white orb called the Traveler finally getting off its 'donkey'. The pre-release marketing campaign for Lightfall was firing… Read more... View the full article
-
Cloud and edge networks are setting up a new line of defense, called confidential computing, to protect the growing wealth of data users process in those environments. Confidential Computing Defined Confidential computing is a way of protecting data in use, for example while in memory or during computation, and preventing anyone from viewing or altering the work. Using cryptographic keys linked to the processors, confidential computing creates a trusted execution environment or secure enclave. That safe digital space supports a cryptographically signed proof, called attestation, that the hardware and firmware is correctly configured to prevent the viewing or alteration of their data or application code. In the language of security specialists, confidential computing provides assurances of data and code privacy as well as data and code integrity. What Makes Confidential Computing Unique? Confidential computing is a relatively new capability for protecting data in use. For many years, computers have used encryption to protect data that’s in transit on a network and data at rest, stored in a drive or non-volatile memory chip. But with no practical way to run calculations on encrypted data, users faced a risk of having their data seen, scrambled or stolen while it was in use inside a processor or main memory. With confidential computing, systems can now cover all three legs of the data-lifecycle stool, so data is never in the clear. Confidential computing adds a new layer in computer security — protecting data in use while running on a processor. In the past, computer security mainly focused on protecting data on systems users owned, like their enterprise servers. In this scenario, it’s okay that system software sees the user’s data and code. With the advent of cloud and edge computing, users now routinely run their workloads on computers they don’t own. So confidential computing flips the focus to protecting the users’ data from whoever owns the machine. With confidential computing, software running on the cloud or edge computer, like an operating system or hypervisor, still manages work. For example, it allocates memory to the user program, but it can never read or alter the data in memory allocated by the user. How Confidential Computing Got Its Name A 2015 research paper was one of several using new Security Guard Extensions (Intel SGX) in x86 CPUs to show what’s possible. It called its approach VC3, for Verifiable Confidential Cloud Computing, and the name — or at least part of it — stuck. “We started calling it confidential cloud computing,” said Felix Schuster, lead author on the 2015 paper. Four years later, Schuster co-founded Edgeless Systems, a company in Bochum, Germany, that develops tools so users can create their own confidential-computing apps to improve data protection. Confidential computing is “like attaching a contract to your data that only allows certain things to be done with it,” he said. How Does Confidential Computing Work? Taking a deeper look, confidential computing sits on a foundation called a root of trust, which is based on a secured key unique to each processor. The processor checks it has the right firmware to start operating with what’s called a secure, measured boot. That process spawns reference data, verifying the chip is in a known safe state to start work. Next, the processor establishes a secure enclave or trusted execution environment (TEE) sealed off from the rest of the system where the user’s application runs. The app brings encrypted data into the TEE, decrypts it, runs the user’s program, encrypts the result and sends it off. At no time could the machine owner view the user’s code or data. One other piece is crucial: It proves to the user no one could tamper with the data or software. Attestation uses a private key to create security certificates stored in public logs. Users can access them with the web’s transport layer security (TLS) to verify confidentiality defenses are intact, protecting their workloads. (Source: Jethro Beekman) The proof is delivered through a multi-step process called attestation (see diagram above). The good news is researchers and commercially available services have demonstrated confidential computing works, often providing data security without significantly impacting performance. A high-level look at how confidential computing works. Shrinking the Security Perimeters As a result, users no longer need to trust all the software and systems administrators in separate cloud and edge companies at remote locations. Confidential computing closes many doors hackers like to use. It isolates programs and their data from attacks that could come from firmware, operating systems, hypervisors, virtual machines — even physical interfaces like a USB port or PCI Express connector on the computer. The new level of security promises to reduce data breaches that rose from 662 in 2010 to more than 1,000 by 2021 in the U.S. alone, according to a report from the Identity Theft Resource Center. That said, no security measure is a panacea, but confidential computing is a great security tool, placing control directly in the hands of “data owners”. Use Cases for Confidential Computing Users with sensitive datasets and regulated industries like banks, healthcare providers and governments are among the first to use confidential computing. But that’s just the start. Because it protects sensitive data and intellectual property, confidential computing will let groups feel they can collaborate safely. They share an attested proof their content and code was secured. Example applications for confidential computing include: Companies executing smart contracts with blockchains Research hospitals collaborating to train AI models that analyze trends in patient data Retailers, telecom providers and others at the network’s edge, protecting personal information in locations where physical access to the computer is possible Software vendors can distribute products which include AI models and proprietary algorithms while preserving their intellectual property While confidential computing is getting its start in public cloud services, it will spread rapidly. Users need confidential computing to protect edge servers in unattended or hard-to-reach locations. Enterprise data centers can use it to guard against insider attacks and protect one confidential workload from another. Market researchers at Everest Group estimate the available market for confidential computing could grow 26x in five years. So far, most users are in a proof-of-concept stage with hopes of putting workloads into production soon, said Schuster. Looking forward, confidential computing will not be limited to special-purpose or sensitive workloads. It will be used broadly, like the cloud services hosting this new level of security. Indeed, experts predict confidential computing will become as widely used as encryption. The technology’s potential motivated vendors in 2019 to launch the Confidential Computing Consortium, part of the Linux Foundation. CCC’s members include processor and cloud leaders as well as dozens of software companies. The group’s projects include the Open Enclave SDK, a framework for building trusted execution environments. “Our biggest mandate is supporting all the open-source projects that are foundational parts of the ecosystem,” said Jethro Beekman, a member of the CCC’s technical advisory council and vice president of technology at Fortanix, one of the first startups founded to develop confidential computing software. “It’s a compelling paradigm to put security at the data level, rather than worry about the details of the infrastructure — that should result in not needing to read about data breaches in the paper every day,” said Beekman, who wrote his 2016 Ph.D. dissertation on confidential computing. A growing sector of security companies is working in confidential computing and adjacent areas. (Source: GradientFlow) How Confidential Computing Is Evolving Implementations of confidential computing are evolving rapidly. At the CPU level, AMD has released Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). It extends the process-level protection in Intel SGX to full virtual machines, so users can implement confidential computing without needing to rewrite their applications. Top processor makers have aligned on supporting this approach. Intel’s support comes via new Trusted Domain Extensions. Arm has described its implementation, called Realms. Proponents of the RISC-V processor architecture are implementing confidential computing in an open-source project called Keystone. Accelerating Confidential Computing NVIDIA is bringing GPU acceleration to VM-style confidential computing to market with its Hopper architecture GPUs. The H100 Tensor Core GPUs enable confidential computing for a broad swath of AI and high performance computing use cases. This gives users of these security services access to accelerated computing. An example of how GPUs and CPUs work together to deliver an accelerated confidential computing service. Meanwhile, cloud service providers are offering services today based on one or more of the underlying technologies or their own unique hybrids. What’s Next for Confidential Computing Over time, industry guidelines and standards will emerge and evolve for aspects of confidential computing such as attestation and efficient, secure I/O, said Beekman of CCC. While it’s a relatively new privacy tool, confidential computing’s ability to protect code and data and provide guarantees of confidentiality makes it a powerful one. Looking ahead, experts expect confidential computing will be blended with other privacy methods like fully homomorphic encryption (FHE), federated learning, differential privacy, and other forms of multiparty computing. Using all the elements of the modern privacy toolbox will be key to success as demand for AI and privacy grows. So, there are many moves ahead in the great chess game of security to overcome the challenges and realize the benefits of confidential computing. Take a Deeper Dive To learn more, watch “Hopper Confidential Computing: How it Works Under the Hood,” session S51709 at GTC on March 22 or later (free with registration). Check out “Confidential Computing: The Developer’s View to Secure an Application and Data on NVIDIA H100,” session S51684 on March 23 or later. You also can attend a March 15 panel discussion at the Open Confidential Computing Conference moderated by Schuster and featuring Ian Buck, NVIDIA’s vice president of hyperscale and HPC. In addition, Mark Overby, NVIDIA’s chief platform security architect, will host a session there on “Attesting NVIDIA GPUs in a Confidential Computing Environment.” And watch the video below. View the full article
-
Last week, the official One Piece staff Twitter account posted a video of creator Eiichiro Oda diving completely off of the deep end by asking ChatGPT, the world’s most popular AI chat software, to write a new One Piece chapter for him. The tweet described the bold request as Oda asking “the taboo question,” according… Read more... View the full article
-
The quest for knowledge at work can feel like searching for a needle in a haystack. But what if the haystack itself could reveal where the needle is? That’s the promise of large language models, or LLMs, the subject of this week’s episode of the NVIDIA AI Podcast featuring Deedy Das and Eddie Zhou, founding engineers at Silicon Valley-based startup Glean, in conversation with our host, Noah Kravitz. With LLMs, the haystack can become a source of intelligence, helping guide knowledge workers on what they need to know. Glean is focused on providing better tools for enterprise search by indexing everything employees have access to in the company, including Slack, Confluence, GSuite and much more. The company raised a series C financing round last year, valuing the company at $1 billion. Large language models can provide a comprehensive view of the enterprise and its data, which makes finding the information needed to get work done easier. In the podcast, Das and Zhou discuss the challenges and opportunities of bringing LLMs into the enterprise, and how this technology can help people spend less time searching and more time working. The AI Podcast · Glean Founders Talk AI-Powered Enterprise Search on NVIDIA Podcast – Ep. 190 You Might Also Like Sequoia Capital’s Pat Grady and Sonya Huang on Generative AI Pat Grady and Sonya Huang, partners at Sequoia Capital, to discuss their recent essay, “Generative AI: A Creative New World.” The authors delve into the potential of generative AI to enable new forms of creativity and expression, as well as the challenges and ethical considerations of this technology. They also offer insights into the future of generative AI. Real or Not Real? Attorney Steven Frank Uses Deep Learning to Authenticate Art Steven Frank is a partner at the law firm Morgan Lewis, specializing in intellectual property and commercial technology law. He’s also half of the husband-wife team that used convolutional neural networks to authenticate artistic masterpieces, including da Vinci’s Salvador Mundi, with AI’s help. GANTheftAuto: Harrison Kinsley on AI-Generated Gaming Environments Humans playing games against machines is nothing new, but now computers can develop games for people to play. Programming enthusiast and social media influencer Harrison Kinsley created GANTheftAuto, an AI-based neural network that generates a playable chunk of the classic video game Grand Theft Auto V. Subscribe to the AI Podcast on Your Favorite Platform You can now listen to the AI Podcast through Amazon Music, Apple Music, Google Podcasts, Google Play, Castbox, DoggCatcher, Overcast, PlayerFM, Pocket Casts, Podbay, PodBean, PodCruncher, PodKicker, Soundcloud, Spotify, Stitcher and TuneIn. View the full article
-
Hello QingGe, Welcome to UnityHQ Nolfseries Community. Please feel free to browse around and get to know the others. If you have any questions please don't hesitate to ask. QingGe joined on the 03/01/2023. View Member
-
Over 100 quality assurance testers at Electronic Arts’ Baton Rouge, LA office were abruptly laid off during a surprise Zoom call on Tuesday, three sources familiar with the meeting tell Kotaku. They worked predominantly on Apex Legends, the publisher’s hit battle royale developed by Respawn Entertainment. Read more... View the full article
-
As the meteoric rise of ChatGPT demonstrates, generative AI can unlock enormous potential for companies, teams and individuals. Whether simplifying time-consuming tasks or accelerating 3D workflows to boost creativity and productivity, generative AI is already making an impact across industries — and there’s much more to come. How generative AI is paving the way for the future will be a key topic at NVIDIA GTC, a free, global conference for the era of AI and the metaverse, taking place online March 20-23. Dozens of sessions will dive into topics around generative AI — from conversational text to the creation of virtual worlds from images. Here’s a sampling: Fireside Chat With NVIDIA founder and CEO Jensen Huang and OpenAI’s Ilya Suskever: Join this conversation to learn more about the future of AI. How Generative AI Is Transforming the Creative Process: In this fireside chat, Scott Belsky, chief product officer at Adobe, and Bryan Catanzaro, vice president of applied deep learning research at NVIDIA, will discuss the powerful impact and future direction of generative AI. Generative AI Demystified: Discover how generative AI enables businesses to improve products and services. NVIDIA’s Bryan Catanzaro will discuss major developments in generative AI and share popular use cases driving cutting-edge generative applications. Generating Modern Masterpieces: MoMA Dreams Become a Reality: Hear from multimedia artist Refik Anadol, as well as Museum of Modern Art curators Michelle Kuo and Paola Antonelli, who’ll discuss how AI helped transform the archive of data from New York’s legendary modern art museum into a real-time art piece — the first of its kind in a major art museum. How Generative AI Will Transform the Fashion Industry: See examples of how the latest generative tools are used in fashion, and hear from experts on their experiences in building a practice based on AI. Emerging Tech in Animation Pre-Production: Learn how Sony Pictures Animation is using generative AI to improve the creative pre-production and storytelling processes. 3D by AI: How Generative AI Will Make Building Virtual Worlds Easier: See some of NVIDIA’s latest work in generative AI models for creating 3D content and scenes, and explore how these tools and research can help 3D artists in their workflows. Many more sessions on generative AI are available to explore at GTC, and registration is free. Join to discover the latest AI technology innovations and breakthroughs. Featured image courtesy of Refik Anadol. View the full article
-
Brian Spears says his children will enjoy a more sustainable planet, thanks in part to AI and high performance computing (HPC) simulations. “I believe I’ll see fusion energy in my lifetime, and I’m confident my daughters will see a fusion-powered world,” said the 45-year-old principal investigator at Lawrence Livermore National Laboratory who helped demonstrate the physics of the clean and abundant power source, making headlines worldwide. Results from the experiment hit Spears’ inbox at 5:30 a.m. on Dec. 5 last year. “I had to rub my eyes to make sure I wasn’t misreading the numbers,” he recalled. A Nuclear Family Once he assured himself, he scurried downstairs to share the news with his wife, a chemical engineer at the lab who’s pioneering ways to 3D print glass, and also once worked on the fusion program. Brian Spears “One of my friends described us as a Star Trek household — I work on the warp core and she works on the replicator,” he quipped. In a tweet storm after the lab formally announced the news, Spears shared his excitement with the world. “Exhausted by an amazing day … Daughters sending me screenshots with breaking news about Mom and Dad’s work … Being a part of something amazing for humanity.” In another tweet, he shared the technical details. “Used two million joules of laser energy to crush a capsule 100x smoother than a mirror. It imploded to half the thickness of a hair. For 100 trillionths of a second, we produced ten petawatts of power. It was the brightest thing in the solar system.” AI Helps Call the Shots A week before the experiment, Spears’ team analyzed its precision HPC design, then predicted the result with AI. Two atoms would fuse into one, releasing energy in a process simply called ignition. It was the most exciting of thousands of AI predictions in what’s become the two-step dance of modern science. Teams design experiments in HPC simulations, then use data from the actual results to train AI models that refine the next simulation. AI uncovers details about the experiments hard for humans to see. For example, it tracked the impact of minute imperfections in the imploding capsule researchers blasted with 192 lasers to achieve fusion. A look inside the fusion experiment. Graphic courtesy of Lawrence Livermore National Laboratory. “You need AI to understand the complete picture,” Spears said. It’s a big canvas, filled with math describing the complex details of atomic physics. A single experiment can require hundreds of thousands of relatively small simulations. Each takes a half day on a single node of a supercomputer. The largest 3D simulations — called the kitchen sinks — consume about half of Sierra, the world’s sixth fastest HPC system, packing 17,280 NVIDIA GPUs. Edge AI Guides Experiments AI also helps scientists create self-driving experiments. Neural networks can make split-second decisions about which way to take an experiment based on results they process in real time. For example, Spears, his colleagues and NVIDIA collaborated on an AI-guided experiment last year that fired lasers up to three times a second. It created the kind of proton beams that could someday treat a cancer patient. “In the course of a day, you can get the kind of bright beam that may have taken you months or years of human-designed experiments,” Spears said. “This approach of AI at the edge will save orders of magnitude of time for our subject-matter experts.” Directing lasers fired many times a second will also be a key job inside tomorrow’s nuclear fusion reactors. Navigating the Data Deluge AI’s impacts will be felt broadly across both scientific and industrial fields, Spears believes. “Over the last decade we’ve produced more simulation and experimental data than we’re trained to deal with,” he said. That deluge, once a burden for scientists, is now fuel for machine learning. “AI is putting scientists back in the driver seat so we can move much more quickly,” he said. Spears explained the ignition result in an interview (starting 8:19) with Government Matters. Spears also directs an AI initiative at the lab that depends on collaborations with companies including NVIDIA. “NVIDIA helps us look over the horizon, so we can take the next step in using AI for science,” he said A Brighter Future It’s hard work with huge impacts, like leaving a more resilient planet for the next generation. Asked whether his two daughters plan a career in science, Spears beams. They’re both competitive swimmers who play jazz trumpet with interests in everything from bioengineering to art. “As we say in science, they’re four pi, they cover the whole sky,” he said. View the full article
-
Flawless Fractal Food Featured This Week ‘In the NVIDIA Studio’
UHQBot posted a topic in PC Hardware
Editor’s note: This post is part of our weekly In the NVIDIA Studio series, which celebrates featured artists, offers creative tips and tricks, and demonstrates how NVIDIA Studio technology improves creative workflows. ManvsMachine steps In the NVIDIA Studio this week to share insights behind fractal art — which uses algorithms to artistically represent calculations — derived from geometric objects as digital images and animations. Ethos Reflected Founded in London in 2007, ManvsMachine is a multidimensional creative company specializing in design, film and visual arts. https://blogs.nvidia.com/wp-content/uploads/2023/02/studio-itns-manvsmachine-wk46-animation1-1280w.mp4 ManvsMachine works closely with the world’s leading brands and agencies, including Volvo, Adidas, Nike and more, to produce award-winning creative content. https://blogs.nvidia.com/wp-content/uploads/2023/02/studio-itns-manvsmachine-wk46-animation2-1280w.mp4 The team at ManvsMachine finds inspiration from a host of places: nature and wildlife, conversations, films, documentaries, as well as new and historic artists of all mediums. Fractal Food For fans of romanesco broccoli, the edible flower bud resembling cauliflower in texture and broccoli in taste might conjure mild, nutty, sweet notes that lend well to savory pairings. For ManvsMachine, it presented an artistic opportunity. Romanesco broccoli is the inspiration behind ‘Roving Romanesco.’ The Roving Romanesco animation started out as a series of explorations based on romanesco broccoli, a prime example of a fractal found in nature. ManvsMachine’s goal was to find an efficient way of recreating it in 3D and generate complex geometry using a simple setup. The genesis of the animation revolved around creating a phyllotaxis pattern, an arrangement of leaves on a plant stem, using the high-performance expression language VEX in SideFX’s Houdini software. Points offset at 137.5 degrees, known as the golden angle. This was achieved by creating numerous points and offsetting each from the previous one by 137.5 degrees, known as the golden or “perfect circular” angle, while moving outward from the center. The built-in RTX-accelerated Karma XPU renderer enabled fast simulation models powered by the team’s GeForce RTX 3090 GPUs. Individual florets begin to form. The team added simple height and width to the shapes using ramp controls then copied geometry onto those points inside a loop. Romanesco broccoli starts to come together. With the basic structure intact, ManvsMachine sculpted florets individually to create a stunning 3D model in the shape of romanesco broccoli. The RTX-accelerated Karma XPU renderer dramatically sped up animations of the shape, as well. “Creativity is enhanced by faster ray-traced rendering, smoother 3D viewports, quicker simulations and AI-enhanced image denoising upscaling — all accelerated by NVIDIA RTX GPUs.” — ManvsMachine The project was then imported to Foundry’s Nuke software for compositing and final touch-ups. When pursuing a softer look, ManvsMachine counteracted the complexity of the animation with some “easy-on-the-eyes” materials and color choices with a realistic depth of field. Many advanced nodes in Nuke are GPU accelerated, which gave the team another speed advantage. Projects like Roving Romanesco represent the high-quality work ManvsMachine strives to deliver for clients. “Our ethos is reflected in our name,” said ManvsMachine. “Equal importance is placed on ideas and execution. Rather than sell an idea and then work out how to make it later, the preference is to present clients with the full picture, often leading with technique to inform the creative.” Designers, directors, visual effects artists and creative producers — team ManvsMachine. Check out @man.vs.machine on Instagram for more inspirational work. Artists looking to hone their Houdini skills can access Studio Shortcuts and Sessions on the NVIDIA Studio YouTube channel. Discover exclusive step-by-step tutorials from industry-leading artists, watch inspiring community showcases and more, powered by NVIDIA Studio hardware and software. Follow NVIDIA Studio on Instagram, Twitter and Facebook. Access tutorials on the Studio YouTube channel and get updates directly in your inbox by subscribing to the Studio newsletter. View the full article
