Feeds

Grand Theft Auto IV coming to the iPhone?

Video teases gamers

Security for virtualized datacentres

The appearance of mysterious video has got the gaming world convinced that Grand Theft Auto IV is coming to... the iPhone.

iPhone_GTA_02

The video hints that GTA IV's coming to the iPhone

On a website called coming-on-iphone.com, you're shown a horizontally placed iPhone underneath the banner heading: "You have no idea what’s coming on iPhone."

Click on the iPhone’s screen and you’re treated to a 40-second video clip of something that looks a lot like GTA IV down to the very last detail.

For example, two gun-wielding men drive a blacked-out four-by-four that’s being chased by several police cars. Even the buildings look almost identical to those seen in New York Liberty City.

iPhone_GTA_03

Is that Niko Bellic's reflection?

One shot also shows a man who looks suspiciously like GTA IV protagonist the blood-thirsty gangster Niko Bellic.

It’s important to note that the footage hasn’t actually been taken directly from GTA IV and is obviously a out-of-game rendering – as many videogame adverts are.

iPhone_GTA_01

Rockstar has denied all knowladge

The game - whatever it is - is set to be released this summer, according to the website.

Rockstar's UK wouldn't confirm or deny that an iPhone version of GTA is on the way. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.