Feeds
75%
Infinity Blade iOS game icon

Infinity Blade II

In need of a quick slash?

  • alert
  • submit to reddit

High performance access to file storage

iGamer I liked the original Infinity Blade when it arrived just over a year ago, but it seemed to fall short of classic status due to the repetitive nature of the combat, the rigidly linear exploration and threadbare fantasy storyline.

This sequel does try to add a bit more variety to the formula, although I still found the continuous conveyor belt of demonic foes a tad tedious at times.

I was also a little miffed at the price increase: £4.99, compared to £3.99 for the original. And I’m no great fan of games that tempt you with in-app purchases for weapons and other items either – although, to be fair, you can still get by perfectly well without having to cough up extra cash for the Super Sword Of Thumping+3.

Infinity Blade iOS game icon

Blinded by the light: optical effects abound in IB II

The original Infinity Blade looked wonderful, and Infinity Blade II goes even further thanks to the A5 processor in the latest iPhone and iPad.

Developer Chair has really gone to town with the lighting effects, with endless shafts of light streaming through foliage and epic vistas with castles perched on craggy mountaintops.

Infinity Blade iOS game screenshot

The swipe'n'slash combat remains - but with a few new twists

In fact, it got so carried away with the lens-flare effects that there were times when I felt I needed sunglasses to go into combat.

And why is there lens flare anyway? Do games developers only see the real world through a camera's optics? My eyes certainly don't bring their own Photoshop filters with them.

Infinity Blade iOS game screenshot

You can now use two-handed hardware

The storyline follows straight on from the original game. You've wrested control of the mighty Infinity Blade sword from the God King and now you're heading off in search of the mysterious Worker of Secrets for some reason that I didn’t entirely understand.

Fortunately, there’s a tie-in paperback advertised within the game to shed some light on the finer details of the plot. And a soundtrack album too.

Ker-ching!

High performance access to file storage

Next page: Fight is right

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.