Feeds
90%
Vanquish

Vanquish

Programmed to kill

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Suit and cable ties

With an army of robots, Victor Zaitsev, an ultra-nationalist Russian megalomaniac, has hijacked a city-sized space station which the American's use to harness the power of the sun. Turning the microwave energy towards Earth, Victor obliterates San Francisco and holds the US to ransom, threatening New York as his next target.

Vanquish

This hallway has many grate features

Your character, Sam Gideon, is a government agent sent alongside an elite team of Marines to recapture the station. Kitted out with futuristic weapons and an experimental battle suit known as the Augmented Reaction Suit – ARS - Sam is America's latest and most powerful weapon. The ARS can boost around the battlefield at phenomenal speeds and slow time to a crawl. But for all your seeming omnipotence, the mechanic at the heart of Vanquish's gameplay is vulnerability.

You see, the ARS overheats with overuse. Use of either ability drains an on-screen gauge, increasing exponentially when both are combined. And a powerful melee strike, which can destroy enemies instantaneously, also drains the gauge instantaneously. Once overheated, the ARS is rendered powerless during a ten-second cool-down period.

For a couple of hours, familiar cover points and run-and-gun mechanics fool you into considering Vanquish an underwhelming Gears of War clone. The suit's abilities feel extraneous, the boost mechanic feeling particularly cumbersome as you bump around tight battle spaces through a cacophony of lasers, rockets and gun turrets, often finding yourself in dangerously advanced positions.

Vanquish

Multiple shot wounds

But all the time you're learning by osmosis. As you begin to master the ARS, you begin to understand Vanquish itself. One eye on the relentless action, the other remains firmly upon the gauge. Use cover to patiently pick off distant enemies, or slow-mo-boost-flank to take them by surprise? Take out the toughest enemy with a melee strike, and overheat the ARS, or hang back and chip away at them and your ammo?

Secure remote control for conventional and virtual desktops

Next page: Combat evolved?

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
Amazon hopes FIRE STICK will light up its video service
We do streaming video? It seems we do...
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.