Feeds
70%
Brink

Brink

Edge of existence

  • alert
  • submit to reddit

High performance access to file storage

Suits you sir

Next you’ll choose a primary and a secondary weapon from a choice of a whole range of rifles, SMGs, pistols, shotguns, grenade launchers and more; before finally spending the experience points you’re initially allotted – so expanding your character’s abilities and making him harder, better, faster, stronger as Daft Punk might put it.

Brink

Take it on the chin

While the more devil-may-care players might head straight on to the on-line servers at this point, the cautious can instead elect to play the game solo, using either the Campaign or Challenge modes. Campaign mode presents the player with the same maps and missions you will encounter in multiplayer, with preceding cutscenes just about stringing together the overarching plot before pitting you in a pitched battle between reasonably programmed bots.

Challenge mode, meanwhile, playable by a team of four human players with bots filling in the other roles, drops the pretence of story. Instead, players are presented with mini-objectives which act as tutorials of sorts as classes, movement, objective types and so on are introduced. Each carries three difficulty levels and rewards the player with upgrades for all kinds of weapons. Alas, the harder difficulties are nigh on impossible for a single player and still very hard with fellow human players in tow, such is the accuracy of the AI.

Brink

What happens if you don't pay the toll

Suitably warmed up, there’s really no reason not to jump into the on-line maelstrom and that is exactly what I did. Other than a troubling degree of texture blurring (which Splash Damage has promised to patch), the first thing to strike you is the SMART movement system. This is not too dissimilar from the movement of Mirror’s Edge – with leaping, climbing and sliding aplenty. It’s a cool system, which advances standard FPS locomotion; leaving lighter classes to clambering up obstacles on their way to completing objectives.

High performance access to file storage

Next page: It's all objective

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.