Feeds
90%
World of Warcraft Cataclysm

World of Warcraft: Cataclysm

OK, where are the pandas?

  • alert
  • submit to reddit

High performance access to file storage

Review World of Warcraft actually bears more than a passing resemblance to it’s new - or old, depending on your perspective - villain Deathwing. Since its launch in 2004, it has trampled through the lives of millions, wreaking havock and destruction while altering the landscape of massively multiplayer online role-playing games forever.

World of Warcraft Cataclysm

Burn the Village People

Cataclysm is the third expansion set to be announced at Blizzcon 2009, which isn't really that long ago but has seemed like an eternity for those of us who hit 80 and got bored with Wrath of the Daily Quest – sorry - Lich King, long ago. To entice me and my monthly subscription fees back, Blizzard have woken Evil old Deathwing the Dragon. The Daddy of the black dragon flight is not a happy bunny and the fallout is some jawdropping environment changes to Azeroth.

One question, though: wasn’t this expansion supposed to see us brave heroes entering the Emerald Dream? Not to mention all the talk awhile back of underwater WoW and having Naga as a new playable race. Making the Black Dragon flight the main baddies once again seems a bit predictable, in spite of all the world-changing (Lava? Again?)

World of Warcraft Cataclysm

Shut your goblin

Anyway, what I’m excited about are the two new races Cataclysm has to offer: the Worgen coming down for Alliance, and Goblins now siding with the Horde. I may be excited but I’m not happy. I am Horde through and through; why are you punishing me with such a lame new race - goblins? WTF?! Should've been Worgen for Horde - no human state - and Pandaren for Alliance. Blizzard has been promising Pandaren as a playable race since forever. I imagine I’m not the only one severely disappointed by the lack of fuzzy brewmasters. Is Blizzard afraid of their awesomeness?

But screw it, for this review I will turn traitor…. Worgen for the win!

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.