Cloud TV, Gaming and Entertainment: Making The Joystick Airborne

Cloud TV, Gaming and Entertainment: Making The Joystick Airborne

Cloud Gaming: Making the Joystick Airborne

I should just come out with it. The last video game system I purchased was a Nintendo 64, back in the early 2000s. No, I am not a bells-and-whistles type of gamer, by any stretch of the imagination.

But yes, I do have an opinion on this sizable, influential community. Video games are a means by which a great many of us escape the reality of our sometimes disappointing lives. And according to several updates in tech news, the cloud will revolutionize just how quickly gamers can tap into that escape: the celebration of the console, the liberation of the joystick.

Last year, CNN broke news that OnLive, a major gaming organization, would release a collection of video games — more than 20 titles strong — via an “online subscription service” – read: via cloud computing. What is more, the Tokyo Game Show this fall featured a keynote address that espoused “cloud gaming” as the future of the community.

Even that ubiquitous power-mogul Richard Branson is breaking into the act; he plans to release Virgin Gaming in an attempt to lionize a slice of the increasingly tasty cloud-game pie.

So what is “cloud gaming,” exactly? How precisely will Mario maneuver his plucky way through this new thicket of technology? Yoshi Wada, who delivered the TGS keynote, claims that the cloud will “[change] all the rules and laws that drive current industry business models.” As the cloud applies elsewhere, businesses will no longer charge access to games by the title. Instead, players will be free to experience every game their hearts desire — for a monthly fee.

The advantages of this “Gaming-as-a-Service” concept extend not only to the business honchos and tech-folk behind it, but also to the gaming community at large. Cloud gaming would redefine the idea of playing in “real time.”

Whereas the traditional model of purchasing a game in order to play it was followed an orchestration of gamers to meet and interact in unison, the cloud wipes away such wait time: once subscribed, a gamer immediately enters a live, populated realm, where virtual play takes place on a dime that keeps on spinning.

With no limit as to how long gamers can play, or how many titles they experience either, cloud gaming could potentially instigate a new movement in the community, where game aficionados find themselves more enveloped in their favorite titles than ever.

Yet the downside also merits mentioning. The old maxim that “cheaters never prosper” has rarely been true in the gaming community. Indeed, many gamers experience their virtual worlds exclusively with cheats, or previously worked-out tutorials for the entire game, in tow.

The speed and access of “gaming-as-a-service” could potentially facilitate how easily even the most labyrinthine of video games are solved. The subsequent “cheat codes” would also be distributed more widely. Instead of bravely fumbling their way through a title, more players would simply follow another’s directions for an easy win. Cloud gaming should be on guard against a lazier gaming community.

Before cloud gaming even becomes a reality, however, the industry has a tough pill to swallow: gamers love their hardware. They adore their consoles, snuggle with their joysticks. These apparatuses make their virtual worlds concrete. The cloud would render Halo, Minecraft, Assassins: Creed II, and other major titles into just that: abstract, cloud-like wisps of a game.

Convincing hardcore gamers otherwise will prove to be a video game in itself. Unfortunately for “cloud gaming” believers and businessmen, the cheat code has yet to be written.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…