Feeds

E3 2012: Prepare to have your buttons pushed

Shoot 'em, zap 'em, hack 'em, RULE THEM!

  • alert
  • submit to reddit

High performance access to file storage

The final frontier...

Into the world of sci-fi then, and avid fanbois could be torn between the latest LucasArts game Star Wars 1313 and the upcoming Star Trek game penned by God of War writer Marianne Krawczyk and those who wrote the next Star Trek movie. Nothing really floats my boat too much at first glance but neither are without their merits, particularly the latter with its menacing take on the human-like lizards of the Gorn Hegemony.

Star Trek

Star Trek

One game that definitely whets my appetite, though, is Dishonored, Bethesda's stealthy Neo-Victorian stab-fest. The open-world title is set for shelves this October, so there isn't long to wait there.

The publisher also teased its MMO epic The Elder Scrolls Online and its Skyrim DLC Dawnguard, which should extend gameplay by between 10 and 20 hours.

Dishonoured

Dishonoured

2K Games was offering hands on time with the forthcoming Borderlands 2 and Spec Ops: The Line, while it also presented footage of its Xcom: Enemy Unknown revival.

The list goes on, with honourable mentions to stupendous-looking titles such as NetherRealm Studio's DC fight fest Injustice: Gods Among Us and THQ's Company of Heroes 2, which I had the pleasure of seeing in action a few weeks ago here in London. More and more releases continue to excite and let's not forget Rockstar's GTA V is also on the way in the next year.

Injustice: Gods Among Us

Injustice: Gods Among Us

In fact those of you who said the game release schedule was looking thinner and bleaker as the current gen consoles picked up more cobwebs could well be eating your words in months to come. There's a lot on the calendar to keep us gamers busy, that's for sure.

E3 was brimming with them and while the lineup was inevitably over-saturated with sequels and refreshed franchises, there are definitely some standout new IPs to keep watch for. And with Nintendo's Wii U opening the door for a new wave of tablet-controlled hybrid gaming, the year ahead certainly looks to dazzle. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.