Feeds
70%
007 Blood Stone

007 Blood Stone

A view to a thrill?

  • alert
  • submit to reddit

Top three mobile application threats

The shame's Bond...

007 Blood Stone's greatest flaw is pacing. After the ubiquitous fight-and-chase prologue, the game tries its hardest to alienate players, first by torturing them with Joss Stone's ghastly theme tune, and then by submitting them to around three hours of flaccid, highly derivative cover and shoot gameplay.

007 Blood Stone

I'm going to unload in your face

Devoid of Splinter Cell's complex patrol patterns, and light and dark interplay, stealth is reduced to a game of patience, where guards patrol with comical predictability, and are picked off one by one as they lag precariously behind comrades. Going loud elicits a touch more self-preservation, but it's still a one-sided affair as, incapable of flanking, enemies saunter towards you, or bounce up and down out of cover, as if sitting on pogo sticks.

Bullet-sponge Bond can soak up so much lead that it's easy to jog towards enemies and use the single-button takedown for instakills. And, as if things weren't easy enough, takedowns are rewarded with Focus Aims - slow-mo, guaranteed head-shots which only differ from Splinter Cell Conviction's Mark and Execute by the width of an intellectual property writ.

Espionage is dumbed down too. With a gadget repertoire limited to a single "smartphone", which can scan computers, crack electronic locks, disable cameras and see enemies through walls, infiltration requires simply following objective markers and completing short button-sequence minigames.

007 Blood Stone

Top of the morning to ya, Double O'Seven

When infiltrating public areas, NPCs are embarrassingly oblivious to Bond's suspicious behaviour, as he walks around casinos or corporate offices with his smartphone extended curiously in front of him. Bound by heavily scripted routines, even when suspicion is raised - by purposely setting off a car alarm, for example - guards will rush to investigate, but won't bat an eyelid at Bond, no matter how odd your behaviour in front of them.

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.