Feeds
70%
Operation Flashpoint: Red River

Operation Flashpoint 2: Red River

Strategic manœuvres

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Conflict zone

Notwithstanding its puerile narrative, Red River presents a more cerebral approximation of conflict than most other games. The campaign's ten hour-long missions are broken up into enclosed engagements, interposed with hikes across huge terrains and lengthy transports in troop helicopters and open-top Humvees.

Operation Flashpoint: Red River

Red sky at night, sniper's delight

Firefights often take place at considerable range, but are nonetheless deadly. Just a few bullets can kill, and you can bleed out from minor wounds if left untreated. But while single bullets can kill enemies, it takes many more to find your mark, with red-dot sights and magnified scopes offering a more authentic guide to bullet trajectories than the lethal cursors of the blockbuster FPSs.

Operation Flashpoint: Red River

Second sight

Once again, gameplay is divided between standard FPS gunplay and tactical command of your four-man fireteam, which consists of a Rifleman, Scout, Grenadier, and the LMG-toting Automatic Rifleman. Your squad isn't just there to make up the numbers, though.

Operation Flashpoint: Red River

Night stalker

Red River's AI might be erratic at times, with enemies occasionally facing the wrong way or standing motionless in the middle of a road, but you'll need precise co-ordination of your squad to combat an enemy that generally uses cover and flanking well, and often ambushes you from the most unexpected places.

Application security programs and practises

Next page: Firing squad

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.