EVE Echoes

EVE Echoes, like the original game, EVE Online, is a space simulation MMO game that is heavily focused around players' actions. Almost everything has to be performed by the players, from mining and gathering minerals and planetary resources to manufacturing and transporting finished products to trade hubs to sell. PvP is relatively straightforward here: You fit up a ship, undock from the station, and go to a place where PvP is allowed. You don't need spreadsheets for this. But it's an entirely different story when it comes to the manufacturing section of the game.

With the game data mostly a duplicate of EVE Online's, static data are already available and can be downloaded for immediate processing. Using these, I was able to create various tools that are meant to answer the different questions EVE players often have, such as:

To that end, among others, I have made the following spreadsheets (in no particular order):

And many more, of which all of them contain sensitive information that I cannot sanitise without breaking the sheets or exposing those information.

The EVE Echoes SovMap is one of my proud creations as it was made to be completely self-sustainable with community-provided data. As sovereignty data is submitted through the form, the information gets processed and published to a mapping website that in turn visualises the data for general availability. Contributors are also able to register themselves with the system so that they can be listed as a contributor, therefore recognising their contributions. Everything in this system is automated via the Sheets. The only thing that is manual is the submission of sovereignty data from players.

Two other sets of complex spreadsheets were also created, but as they are for a specific client, I am not at the liberty of sharing them. However, one of it is to support a PvP Bounty System, while the other is to support a PvE Contribution-based Loot and Profit Sharing System.

In these complex spreadsheets, forms are typically used to gather and control user input. The spreadsheet itself will be mainly read-only. This is so that users would not inadvertently corrupt the spreadsheet by copying and pasting cells as a whole instead of as values, which can mess up formulas easily.

Where confidentiality is required, the sheets holding the sensitive information will be hidden away in separate spreadsheets and named ranges so as to obfuscate the location of the sensitive information. This is an important step in ensuring the safety and privacy of the users who are trusting me with their sensitive information.