Feeds
55%
Enslaved: Odyssey to the West

Enslaved: Odyssey to the West

Monkey Tragic

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Review The central story of Enslaved: Odyssey to the West is one accustomed to poetic licence and dilution. The original 16th Century Chinese novel Journey to the West was itself an amalgamation of supernatural fables based loosely on a 7th Century Buddhist monk's pilgrimage to India.

Centuries later, in 1942, a heavily abridged English translation popularised the story as Monkey: A Folk Tale of China. But, of course, the fabled journey of Tripiktaka, Monkey, Pigsy and Sandy became familiar to us less scholarly mortals through the cult 1970s TV series Monkey – perhaps the most contentious treatment of all as a Japanese production with an all-Japanese cast.

Enslaved: Odyssey to the West

It's hard to see the light

It seems perfectly natural, then, that the first videogame translation takes place 150 years in the future, amid the post-apocalyptic wastelands of the United States. Fleeing their mysterious enslavers, Trip finds Monkey wearing that famous subjugating headband, and with it forces him into helping her - her quest now one of freedom rather than enlightenment; her enslavement of Monkey born of selfishness rather than divine providence.

A beautiful blanket of vegetation camouflages a perilous continent populated with battle-ready mechs from a long-forgotten war. Trip's genius hacking skills can't alone combat the horde of mechs, whose primary function remains the extermination of all humans, and so enslaves the brutish, brawny loner, promising to set him free once safely home.

Enslaved: Odyssey to the West

You know the drill

Thus begins Enslaved’s ten-hour long buddy adventure. Part written by Alex The Beach Garland, and directed and starring Andy 'Gollum, Ian Dury' Serkis, it's clear from the outset that Enslaved's ambitions lie in furthering the storytelling capabilities of videogames. But while Serkis produces one of gaming's finest performances as Monkey, the collaboration between Garland and developer Ninja Theory proves far less successful in realising its ambitions.

Build a business case: developing custom apps

Next page: Naff narrative

More from The Register

next story
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.