Feeds
70%
Socom 4

SOCOM 4

Another banger?

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Last orders

The tactical command system at the heart of SOCOM 4 is reminiscent of SCI's Conflict series and Pandemic's excellent Full Spectrum Warrior. Action is divided between controlling Squad Commander Cullen Gray and issuing orders to his squad members, combining cover-and-shoot gunplay with tactical exploitation of multiple routes to flank and outmanœuvre an engaging enemy AI.

Socom 4

Do you smell what the rock is cooking?

Three basic orders: go there, cover me and shoot him, work well in preparing for firefights. And they excel in the game's underused 'last stand' set pieces, where you need to keep re-organising your squad to repel incoming waves of enemies. But with no option to take control of individual squad members, or pause the action to issue commands, the constant distraction of self-preservation in sustained engagements dilutes their efficacy, reducing the mainstay of combat to an average, third-person cover shooter.

Espionage sections provide welcome respite from the monotony of combat. Set during nighttime, you control Forty-Five, using the cover of darkness and vegetation to infiltrate cleverly designed compounds. The third-person mechanics transpose well into stealth, and, although highly derivate, Forty-Five's stealth kills and dead body concealment abilities bring a satisfying additional depth to gameplay.

Socom 4

More potholes than a Bob Marley T-shirt

But espionage levels also reveal SOCOM 4's technical cracks. An additional ability to distract guards by throwing empty bullet casings proves hit and miss, with guards often failing to react, or heading in completely the wrong direction. And dim lighting and threadbare undergrowth require you to suspend disbelief entirely by providing impenetrable cover from nearby enemies, despite your body remaining clearly visible on-screen.

Remote control for virtualized desktops

Next page: Forward march

More from The Register

next story
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.