Playing In The Clouds: A Gamer’s New Paradise

Playing In The Clouds: A Gamer’s New Paradise

Long ago and far away, the home game of Pong brought families together around the television that up until then was only accomplished by a celebrity’s death, a monumental speech, or the moon landing. From there, the game console industry began to grow by leaps and bounds. Soon enough, names like Pac-Man, Donkey Kong, and Super Mario became commonplace. As the gaming and game hardware technology advanced, possibilities opened up that could never been imagined—such as multiplayer games, networked gaming, and team conferencing. Cloud gaming, the greatest innovation since World of Warcraft, is causing a flurry of activity in gaming forums around the world.

Cloud gaming is a service that uses a high speed Internet connection to stream games to a subscriber’s technology device of choice. For many gamers, gaming depends on a specific console device, such as a Wii or an Xbox, and the only possibility for playing games at another location involves packing up the console and setting it up elsewhere.

Gaikai, a cloud gaming company, which was purchased a few months ago by Sony Entertainment, offered the streaming model that allowed subscribers to stream games to their computers, smart digital televisions and tablets. The games were run inside of web browsers, using Java or Adobe Flash. With the purchase by Sony, there are rumours that the next itineration of the PlayStation might be totally cloud-streaming based.

Another player on the cloud gaming field is OnLive. OnLive offers the service on devices running Microsoft, Mac, or Android operating system. It is possible to play the games on an HDTV, but this requires purchasing OnLive’s gaming console system, which is composed of an Xbox-like controller and a television adapter. The OnLive catalog features over 200 games, including popular titles like the Assassin’s Creed series, Hitman, Tomb Raider, and Oddworld.

One of the main drawbacks of cloud gaming, which is beyond the control of the cloud gaming service provider, is the connection between the gaming servers and the end subscriber. The servers running the games are high-quality-calibre machines, but the Internet pipe that runs between the two points may not be able to handle the compression and transfer rates required to render the high density graphics. This makes the cloud gaming service market somewhat limited, unless there is sufficient demand from Internet service provider clients to upgrade the infrastructure.

Could cloud gaming be the end of game cartridges, CDs/DVDs, and proprietary consoles? The answer might very well remain clouded—at least for now.

By Robin Berry

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…