Feeds

Guitar Hero III goes mobile

Rockin' all over the world

Choosing a cloud hosting partner with confidence

Rock music has several different forms, such as punk rock, hard rock or god rock. But now mobile rock has been added to that list, now that one developer has ported Guitar Hero III to a range of phones.

The mobile version of the hugely popular virtual guitar game, which turns talentless rockstar hopefuls into instant Alice Coopers, is fairly similar to the original version – except rockers use three keys on their mobile phones to control the music instead of a plastic axe.

guitar_hero_mobile

Guitar Hero Mobile: rock out on the road, in bed, in the car...

Guitar Hero Mobile is available as either a one-time download, which gives you access to a jamming list that includes School’s Out and Suck My Kiss, or as subscription version that allows you to download three further tracks each month.

Several venues have been created for tapping your fingers in, and an encore option ensures you always leave the crowd wanting "more, more, more”. If your virtual fretwork is of a suitably Slash/Eddie van Halen/Michael Schenker-style then you’ll also unlock additional guitar models.

Details of how to download Guitar Hero Mobile and the compatible handsets are available online here. Rock on!

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.