Feeds

Duke Nukem to make Xbox debut

"Let's kick ass and chew bubble gum"

Choosing a cloud hosting partner with confidence

If aliens recently invaded your home to enslave your womenfolk, then don’t fret. Simply log onto Xbox Live and call up the ultimate cigar smoking hero, who’s all about alien bashing and leering at ladies.

Duke_Nukem

Duke's said to be part Arnie, part Stallone and part Bronson

Yes, that’s right, Duke Nukem 3D has finally been approved for Xbox Live. According to a posting on the website of developer 3D Realms: “The game has indeed passed final certification with Microsoft”.

The bad news is that although Nukem’s developer has said that the game “will be coming to your Xbox 360 console soon”, the firm hasn’t given an exact date for the gun-wielding, alien-killing womaniser's Xbox debut.

Teaser trials of the game will be “appearing online” from 26 August. So, for now at least, you’ll just have to make do with that.

The original, PC version of the game was released in January 1996. Hints that developer 3DRealms was working on a sequel, Duke Nukem Forever, emerged a couple of years later. Ten years on, it has still yet to ship.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.