Feeds
55%
Enslaved: Odyssey to the West

Enslaved: Odyssey to the West

Monkey Tragic

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Review The central story of Enslaved: Odyssey to the West is one accustomed to poetic licence and dilution. The original 16th Century Chinese novel Journey to the West was itself an amalgamation of supernatural fables based loosely on a 7th Century Buddhist monk's pilgrimage to India.

Centuries later, in 1942, a heavily abridged English translation popularised the story as Monkey: A Folk Tale of China. But, of course, the fabled journey of Tripiktaka, Monkey, Pigsy and Sandy became familiar to us less scholarly mortals through the cult 1970s TV series Monkey – perhaps the most contentious treatment of all as a Japanese production with an all-Japanese cast.

Enslaved: Odyssey to the West

It's hard to see the light

It seems perfectly natural, then, that the first videogame translation takes place 150 years in the future, amid the post-apocalyptic wastelands of the United States. Fleeing their mysterious enslavers, Trip finds Monkey wearing that famous subjugating headband, and with it forces him into helping her - her quest now one of freedom rather than enlightenment; her enslavement of Monkey born of selfishness rather than divine providence.

A beautiful blanket of vegetation camouflages a perilous continent populated with battle-ready mechs from a long-forgotten war. Trip's genius hacking skills can't alone combat the horde of mechs, whose primary function remains the extermination of all humans, and so enslaves the brutish, brawny loner, promising to set him free once safely home.

Enslaved: Odyssey to the West

You know the drill

Thus begins Enslaved’s ten-hour long buddy adventure. Part written by Alex The Beach Garland, and directed and starring Andy 'Gollum, Ian Dury' Serkis, it's clear from the outset that Enslaved's ambitions lie in furthering the storytelling capabilities of videogames. But while Serkis produces one of gaming's finest performances as Monkey, the collaboration between Garland and developer Ninja Theory proves far less successful in realising its ambitions.

Beginner's guide to SSL certificates

Next page: Naff narrative

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.