Feeds

Xbox gamers treated to Tomb Raider treat

Tomb Raider: Underworld cometh

Choosing a cloud hosting partner with confidence

You don’t have to be a gamer to recognise her svelte curves and thigh-strapped weaponry. But the tomb raiding temptress, Lara Croft, is to make a comeback in two new chapters, exclusive to the Xbox 360.

Tomb_Raider_Underworld_screenshot

Xbox 360 users will get two exclusive Tomb Raider: Underworld downloads

Eidos, the publisher of Tomb Raider: Underworld, will release the two chapters in stages over Xbox Live. The first chapter, which will be liberated this Christmas, is set to be called Tomb Raider: Underworld – Beneath the Ashes. The second will be dubbed Tomb Raider: Underworld – Lara’s Shadow and will be made available early next year.

The two chapters contain about six hours of tomb raiding action in all, Eidos claimed. It promised that both will “deliver two very different single player gameplay experiences”. For example, gamers will get new environments to explore, additional secrets to unlock and different enemies to fight.

Players will also be introduced to a new kind of playable character, but nothing more has been disclosed about what this could entail.

Although only Xbox 360 gamers will get access to these two gameplay extender downloads, Tomb Raider: Underworld will be released on 21 November for the PlayStation 2 and 3, PC and Wii. It’s set to cost from £25 ($43/€32) upwards.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.