Feeds
85%

Tom Clancy's Splinter Cell: Conviction

Classic territory

Choosing a cloud hosting partner with confidence

Splinter Cell ConvictionReview

Sam Fisher's sixth videogame outing, and his first in almost four years, marks a further refinement of the core principles of the Splinter Cell franchise. The real-world credibility provided by Clancy's endorsement remains intact, as does Sam's modus operandi of infiltrate, interrogate and assassinate. Even the story, although devoid of the geopolitics of previous entries, still resounds with murky government agencies, PMCs and EMPs.

What has changed, however, is something of a quiet revolution. By introducing a much greater sandbox approach to gameplay, Ubisoft had successfully broadened the series' appeal to a wider audience, one previously turned off by its traditionally punishing pedantics. Sure, the developers have tinkered with the core game mechanic of stealth before, especially apparent between the soul-destroyingly difficult Pandora Tomorrow and the more forgiving Chaos Theory, but Splinter Cell has never felt so accessible and, dare I say it, fun!

Whereas in previous games missing alarms, being caught in spotlights, or not concealing dead bodies, invariably meant game over, in all but one of Conviction's single-player levels such mistakes now result in far less finite outcomes: messy, frenetic gunfights against multiple hostiles.

That's not to say you'll always survive such gunfights - Sam Fisher is still no bullet sponge. But at least got a fighting chance to survive and continue the level uninterrupted.

In relaxing the rigidity of stealth, Ubisoft has also been careful not to alienate the series' hardcore fanbase. Stealth still remains the absolute best strategy. And while Conviction offers no particular reward for avoiding enemy guards altogether, there certainly is for killing them surreptitiously.

For every hand-to-hand kill, you're rewarded with a single burst of a new mode called Mark and Execute. Depending on the weapon in hand, you can tag up to four different targets. Once tagged and in range, markers turn red, signalling you're just one button press away from executing them with single, automated bullet-time shots.

Whose round?

Remote control for virtualized desktops

Next page: Last Known Position

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
Disturbance in the force lets phones detect gestures with Wi-Fi
These are the movement detection devices you're looking for
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?