Browse Definitions :
Definition

demo and demoscene

Contributor(s): Thorsten

A demo is a non-interactive multimedia presentation that is rendered in real time .

Demos are usually created to showcase some or all of the following: computer hardware and/or software capabilities (such as multi-channel sound or 3-D effects); a specific subject (such as a product or a musician); or the abilities of the programmer (such as complex motion).

There are organized competitions for demos, which classify them as belonging to one of three subsets:

  • Intro 4k, which is fairly basic and generally has no music
  • Intro 64k, which has no restrictions other than size
  • Demo, which may contain any possible media.

Demos are the work of computer enthusiasts who often spend many days (or even weeks or months) creating a demo that may not have any external motivation (such as money, or acclaim in the broader world). Here are some related terms:

Demomaker: typically a male between 15 and 30, identified by a pseudonym
Demoscene: an underground community that includes elite programmers, composers and artists
Demogroup: a group of demomakers with complementary skills that collaborates on presentations
Demoparty: a showcase for demos, sometimes involving thousands of participants.

The demoscene originated in Europe and is most active in Scandinavia, Denmark, Germany, The Netherlands, Switzerland, Poland and France, although it is gradually making its presence felt in the rest of the world.

This was last updated in March 2008

Continue Reading About demo and demoscene

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close