A Basic Look At Gaming As A Service

A Basic Look At Gaming As A Service

A Basic Look At Gaming As A Service

The developments that have come together to create a modern world has come from some surprising places. We cannot imagine a world where we could not go on line and reserve airline tickets, make dinner arrangements, or even buy a book from Amazon. Did you realize that the technology and protocols that make e-commerce possible were first developed by and for the on-line pornography business?

It is easy to understand that some of the earliest interfaces between computers and the non-technical general public was through video games. In 1952, A.S. Douglas did his PhD at Cambridge on EDSAC vacuum-tube computer by creating the first graphical computer game, a version of Tic Tac Toe called “Noughts And Crosses”. The very first video game was Tennis For Two, played on an oscilloscope at the Brookhaven National Laboratory. The first real computer game was Space War, which was developed in 1962 at MIT. Later versions of Tennis for Two and Space War would become truly important parts of AtNoughts-And-Crossesari Computers.

The video game industry has grown to generate more than $25 billion per annum. The lion’s share of this development has been for gaming consoles, which provides far from the best gaming experience. A gaming console is just a computer, even though its architecture and interface are different from a traditional desktop. Like any other computing situation, the biggest weakness of the gaming console has always been keeping it fed with up to date software. Cloud Gaming is a relatively cheap alternative to the constant need to feed a console.

Cloud Gaming may be one of the easiest cloud concepts for the non-IT users to understand. Anyone who has played a game through their Facebook account has had a cloud game experience. With cloud gaming, not only is the software handled in the cloud, but the records of the gaming experience are recorded and archived there.

Massive Multiplayer Online Role Playing Games seem like the most natural fit for cloud gaming, but any type of game that is played on a console or with local software can be found through a cloud gaming service. The area of greatest potential for cloud gaming is the freedom of interface options. For those who simply must replicate the console experience, thin-client type devices are available which are basically a console without a disk slot. The disk is replaced by a connection to the Internet.

Games can also be played on any desktop or laptop computer that is connected to the ‘net. Smartphones and tablets are already popular gaming platforms as cloud- connectivity significantly increases the potential sophistication of gaming on mobile devices, although the experience may be limited by the speed of the users data connection.

By Peter Knight

Sorry, comments are closed for this post.

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

The Lighter Side Of The Cloud – Energy Battle

The Lighter Side Of The Cloud – Energy Battle

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…