Feeds
55%
Enslaved: Odyssey to the West

Enslaved: Odyssey to the West

Monkey Tragic

  • alert
  • submit to reddit

Security for virtualized datacentres

Review The central story of Enslaved: Odyssey to the West is one accustomed to poetic licence and dilution. The original 16th Century Chinese novel Journey to the West was itself an amalgamation of supernatural fables based loosely on a 7th Century Buddhist monk's pilgrimage to India.

Centuries later, in 1942, a heavily abridged English translation popularised the story as Monkey: A Folk Tale of China. But, of course, the fabled journey of Tripiktaka, Monkey, Pigsy and Sandy became familiar to us less scholarly mortals through the cult 1970s TV series Monkey – perhaps the most contentious treatment of all as a Japanese production with an all-Japanese cast.

Enslaved: Odyssey to the West

It's hard to see the light

It seems perfectly natural, then, that the first videogame translation takes place 150 years in the future, amid the post-apocalyptic wastelands of the United States. Fleeing their mysterious enslavers, Trip finds Monkey wearing that famous subjugating headband, and with it forces him into helping her - her quest now one of freedom rather than enlightenment; her enslavement of Monkey born of selfishness rather than divine providence.

A beautiful blanket of vegetation camouflages a perilous continent populated with battle-ready mechs from a long-forgotten war. Trip's genius hacking skills can't alone combat the horde of mechs, whose primary function remains the extermination of all humans, and so enslaves the brutish, brawny loner, promising to set him free once safely home.

Enslaved: Odyssey to the West

You know the drill

Thus begins Enslaved’s ten-hour long buddy adventure. Part written by Alex The Beach Garland, and directed and starring Andy 'Gollum, Ian Dury' Serkis, it's clear from the outset that Enslaved's ambitions lie in furthering the storytelling capabilities of videogames. But while Serkis produces one of gaming's finest performances as Monkey, the collaboration between Garland and developer Ninja Theory proves far less successful in realising its ambitions.

New hybrid storage solutions

Next page: Naff narrative

More from The Register

next story
Apple iPhone 6: Missing sapphire glass screen FAIL explained
They just cannae do it in time, says analyst
Oh noes, fanbois! iPhone 6 Plus shipments 'DELAYED' in the UK
Is EMBIGGENED Apple mobile REALLY that popular?
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
The Apple Watch and CROTCH RUBBING. How are they related?
Plus: 'NostrilTime' wristjob vid action
Half a BILLION in the making: Bungie's Destiny reviewed
It feels very familiar - but it's still good
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.