Feeds
90%
Vanquish

Vanquish

Programmed to kill

  • alert
  • submit to reddit

High performance access to file storage

Suit and cable ties

With an army of robots, Victor Zaitsev, an ultra-nationalist Russian megalomaniac, has hijacked a city-sized space station which the American's use to harness the power of the sun. Turning the microwave energy towards Earth, Victor obliterates San Francisco and holds the US to ransom, threatening New York as his next target.

Vanquish

This hallway has many grate features

Your character, Sam Gideon, is a government agent sent alongside an elite team of Marines to recapture the station. Kitted out with futuristic weapons and an experimental battle suit known as the Augmented Reaction Suit – ARS - Sam is America's latest and most powerful weapon. The ARS can boost around the battlefield at phenomenal speeds and slow time to a crawl. But for all your seeming omnipotence, the mechanic at the heart of Vanquish's gameplay is vulnerability.

You see, the ARS overheats with overuse. Use of either ability drains an on-screen gauge, increasing exponentially when both are combined. And a powerful melee strike, which can destroy enemies instantaneously, also drains the gauge instantaneously. Once overheated, the ARS is rendered powerless during a ten-second cool-down period.

For a couple of hours, familiar cover points and run-and-gun mechanics fool you into considering Vanquish an underwhelming Gears of War clone. The suit's abilities feel extraneous, the boost mechanic feeling particularly cumbersome as you bump around tight battle spaces through a cacophony of lasers, rockets and gun turrets, often finding yourself in dangerously advanced positions.

Vanquish

Multiple shot wounds

But all the time you're learning by osmosis. As you begin to master the ARS, you begin to understand Vanquish itself. One eye on the relentless action, the other remains firmly upon the gauge. Use cover to patiently pick off distant enemies, or slow-mo-boost-flank to take them by surprise? Take out the toughest enemy with a melee strike, and overheat the ARS, or hang back and chip away at them and your ammo?

High performance access to file storage

Next page: Combat evolved?

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.