Feeds
90%
Modern Warfare 3

Call of Duty: Modern Warfare 3

Barrels of fun

  • alert
  • submit to reddit

High performance access to file storage

Review Look who’s back. Despite well-documented development team difficulties after the release of Modern Warfare 2, a feeling of increasing apathy for a franchise already over milked and fierce competition from EA in the shape of Battlefield 3, it seems you just can’t keep a good - and immensely profitable - series down.

Modern Warfare 3

Gun and bear it

To introduce the game seems all but redundant, such has been the hype and market saturation surrounding the series since Call of Duty 4: Modern Warfare first launched way back in 2007.

Suffice it to say then that Modern Warfare 3 reintroduces nefarious Russian terrorist Vladimir Makarov and takes place in a not-too-distant future in which World War III is well and truly underway. It brings back series stalwarts - Captain Price and a couple of surprises - and introduces a few new soldiers: Yuri, Burns and Frost. And, yes, it delivers an absurd plot in which major cities and historic landmarks are destroyed with laughable alacrity.

Modern Warfare 3

Soldier, soldier, won't you carry me?

The campaign is once more delivered in episodic manner. Missions are separated by a brief piece of narration, a shiny cutscene, and confirmation of the name and affiliation of the player character. From the off, it’s clear that the world has changed for the worse: he Statue of Liberty standing defiantly in a New York Harbour filled with invading Russian vessels.

Welcome to the future.

In many ways, I prefer this mental “What if?” approach to MW3, over say the (slightly) more rational Battlefield 3. It’s a mechanised Rancor away from Bulletstorm’s craziness, and all the more enjoyable for it.

Modern Warfare 3

Howitzer doin'?

Further comparisons to EA’s shooter are both natural and inevitable: BF3 and MW3 being, after all, at war for not only hearts and minds, but also our wallets. Perhaps one of the most noteworthy discrepancies between said titles comes with the visuals.

High performance access to file storage

Next page: Quite a looker

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.