Feeds
85%

Tom Clancy's Splinter Cell: Conviction

Classic territory

7 Elements of Radically Simple OS Migration

Last Known Position

Necking

Ubisoft didn't just stop there. It has also introduced a feature known as your Last Known Position. If your cover is blown, all guards in the immediate vicinity will focus their fire on that position, which is marked onscreen by a Ghost-like outline of your body. As with Mark and Execute, this offers another dynamic to your tactics. Until you're spotted again, enemy focus remains on that Last Known Position, providing you an opportunity to go covert once more, flank around them and take them down.

Although possible to adopt this strategy in almost every engagement, and, in a sense, cheat the game, enemy AI and firepower is sufficient enough, especially in the realistic mode, to ensure you are at a significant disadvantage when detected.

Compelling you to make the most of these new features (not to mention Conviction's competent cover-based system), Ubisoft has mixed up the level design to great effect. Levels based at night or in dimly lit car parks and buildings see you firmly in classic Splinter Cell territory: taking out light sources and using environmental features such as drain pipes and sewer tunnels to sneak past enemy strongholds unnoticed. Other levels based in broad daylight or in well lit locations, however, force you to adopt a more gung-ho attitude.

Mixing it up even further, one level sees you in a heart pounding foot chase in pursuit of an enemy assassin; and in another, set in a flashback during the Iraq conflict, you're forced to fight in relentless engagements, where stealth is anything but the key to success.

This mix in gameplay is Conviction's critical success, and the developers are keen for you to employ as many strategies as possible. So much so, they even reward you for doing it. P.E.C. Challenges work in a similar vein to many Xbox Live Achievements. Rack up silent headshots or disappear without a trace after being discovered and you'll be awarded points redeemable at weapon stashes to upgrade your arsenal.

Although not core to gameplay (it is theoretically possible to complete Conviction with just a silenced pistol and stealth alone), the new features combined should please all but the most hardened stealth purists.

Who's in Da House?

Build a business case: developing custom apps

Next page: Wash out

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?