Feeds
70%
Call of Duty: Black Ops 2

Call of Duty: Black Ops 2 game review

Playing with fire

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

The knives have been sharpened, the vitriol pumped, the maps cleared of bodies and the zombies starved. It can only mean one thing: Call of Duty: Black Op 2 is upon us.

Call of Duty: Black Ops 2

Flagging the issue

It's the series where reviewers can never win, and Activision's coffers never fail to be filled. Where one wrong word can lead to talkback meltdown – just try suggesting it looks better on PS3 than Xbox 360 (I'm not, but try it). And where console owners, whose device has a layer of dust an inch thick, will inexplicably feel compelled to hit their local games store because “You know, it's Call of Duty isn't it?”

So what of Treyarch's Black Ops 2, the continuation of a brand new saga which Activision is no doubt hoping will equal its other clockwork Call of Duty series, Modern Warfare.

Call of Duty: Black Ops 2

Ship shot

2010's Black Ops single-player campaign was something of an oddity, a mishmash of missions derived from various recent conflicts, all-threaded together by a genre-standard, over-egged plot.

Yes it had its moments, but it also relied far too much on tired principals. First there was "infinitely spawning bad guy" syndrome, where countless hostiles would harass the player until you had progressed a preordained distance. Then there were bottlenecks, where only killing "x" amount of enemies would have an area declared clear, thus enabling advancement.

Call of Duty: Black Ops 2

On a rampage

So, in two years, what's changed? Has Treyarch learnt any new tricks with which to bamboozle players, or has the series finally run out of luck?

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.