Feeds
70%
Resistance 3

Resistance 3

Hostile virus

  • alert
  • submit to reddit

3 Big data security analytics techniques

Review It's hard to know whether to blame its own over-bearing derivation or the over-saturation of FPS games in general: either way, Resistance 3 is an anticlimatic end to a series that has struggled to rise above mediocrity.

Resistance 3

Holey smoke

That's hardly surprising. The greatest achievement of the first two Resistance games was their infusion of science fiction to bring novel enemies and weapons to the staid WWII FPS genre. But that novelty was outweighed by developer Insomniac's brazen borrowings from the shooters it sought to immitate.

Although drawing inspiration from only the best of the genre – occasionally even matching them for narrative and gameplay – when stretched across a trilogy, a lack of innovation has failed to unshackle the series from the all-too apparent influences of Call of Duty, Halo and, most of all, Half Life 2.

Resistance 3

Cheeky punch

Indeed, by taking further inspiration from more recent shooters, Resistance 3 feels the most derivative of all the series. Set in the dishevelled hinterlands of a post-apocalyptic America, the parallels with Homefront and Metro 2033 are palpable.

Humanity's last remnants have been driven underground, eking out an existence in cellars and tunnels beneath rural towns. With seemingly no hope of victory against the indomitable Chimera, the resistance has largely abandoned its asymmetric guerrilla campaign, replacing it with the simpler fight and flight tactics of survival.

Resistance 3

Bugged out and on the run

Your character, Corporal Joe Capelli, embodies the bleak pessimism. Following his mercy killing of erstwhile protagonist Nathan Hale – who succumbed to the Chimera virus at the end of Resistance 2 – Joe is living as normal a life as possible with his wife and son in a small community in the Oklahoma dustbowl.

SANS - Survey on application security programs

Next page: Out on a spree

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.