Feeds
60%
Tron Evolution

Tron Evolution

Glowing nowhere?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Review The original movie Tron was something of an irony. Considered by many as a landmark in computer animated cinema, the movie actually owed more to traditional animation techniques than CGI.

Tron Evolution

I'll punch your lights out

As the technology to mix computer animation and live action didn't exist in the early 1980s, of Tron's 96-minute running time only 15 minutes contain computer-generated imagery. Those scenes - mostly featuring light-cycles, tanks and ships - had to be intercut with filmed characters. The film's overall aesthetic - the keystone to Tron's enduring status as cult classic – was achieved using photographic and rotoscopic techniques - not to mention a few hundred-thousand man-hours in a Taiwanese animation sweatshop.

It's fitting, then, that at its core Tron Evolution - Disney Interactive's tie-in to the forthcoming movie sequel Tron Legacy - contains just 15 minutes of gameplay. And while those 15 minutes comprise solid, enjoyable elements, their continuous recycling fails to sustain play through the five-hour long single-player campaign and online multiplayer modes.

Tron Evolution

Tanks for the memory

Acting as a backstory, Tron Evolution bridges the 20 years between movies by introducing developments to the sub-silicon realm of The Grid. A mysterious virus threatens the fragile harmony between Basics, The Grid's original denizens, and ISOs, a new race of rogue, sentient programs. In a plot essentially about Nazism, 'The Creator' Flynn's original avatar, CLU, has become corrupt, and seeks to exploit prevailing xenophobia among Basics by using the virus as a pretext for the genocidal derezzing – Tron-speak for killing - of ISOs.

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.