Feeds

Cobain band mates denounce dead rocker's Guitar Hero gig

Activision and widow dispute rights

Security for virtualized datacentres

Guitar Hero 5 has failed to hit the right note with the surviving members of grunge band Nirvana.

Krist Novoselic and Dave Grohl – now the Foo Fighters' frontman – are reportedly “dismayed and very disappointed” that a digital Kurt Cobain can be used by gamers to play songs by other bands in the latest incarnation of Activision’s videogame.

Cobain committed suicide in 1994.

"It's hard to watch an image of Kurt pantomiming other artists' music alongside cartoon characters... We feel he deserves better," Grohl and Novoselic said in a statement.

"While we were aware of Kurt's image being used with two Nirvana songs, we didn't know players have the ability to unlock the character. This feature allows the character to be used with any kind of song the player wants. We urge Activision to do the right thing in 're-locking' Kurt's character so that this won't continue in the future."

Courtney Love, Cobain’s widow, has claimed that she never approved use of Cobain’s digital likeness.

However, Activision has since said that it secured the necessary licensing rights - signed by Love – to used Cobain’s likeness in Guitar Hero 5. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.