Set-Top Boxes And Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

Set-Top Boxes And Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

Set-Top Boxes and Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

For as long as I can remember, home-based video gaming has always been the realm of just a few companies whose consoles dominated the desires of gamers. In the beginning it was Atari and Magnavox, with the 2600 and Odyssey, respectively. Today, Sony, Microsoft and Nintendo all vie for their share of the home-based video gaming market share.

The past couple of years have seen a true shake up of the norm, with new technologies allowing more players to enter the arena in an effective way. A perfect example was the Ouya, an Android-based console that first made its debut in 2012. Unfortunately, due to production delays and mixed reviews, the Ouya was unable to make its mark.

A few other companies have recently begun to make serious inroads into developing set-top boxes that could truly give console gaming a fresh perspective. Let’s take a look!

Android TVlogo-greenthrottle - Gaming

Headlines over the past few days have shown that Google’s recent acquisition of Green Throttle Games could herald Google’s decision to jump into the set-top box arena. Green Throttle Games is the company behind the Atlas, a Bluetooth controller used to play the game, Arena. Insiders claim that this controller could be used to play games on Google’s own set-top box.

These games would be available in tandem with the Android TV system, which is currently available. At the time of this writing, only television, audio and movie content is available though Android TV. However, the acquisition of Green Throttle Games’ and their controller could change all that.

Steam Machine

At the 2014 CES event (Consumer Electronics Show), Steam unveiled thirteen, different Steam Machines that are slated to make their appearance this year. Valve, the company behind the Steam service, has made deals with hardware giants, such as Alienware, Gigabyte and CyberPower. These machines will be run on Valve’s operating system, SteamOS.

Not all reception has been positive, however, with some industry leaders claiming that Steam machines are irrelevant and unnecessary. Reasons behind this range from butchered code to problems upgrading them.

Amazon Fire

Recent news in the set-top box arena has been dominated by Amazon’s announcement of the Amazon Fire system. Rather than solely playing video games, such as what a Steam Machine does, it combines video, audio and gaming content all in one package.

Some shortcomings currently exist that make the Amazon Fire more potential than polish. For example, it’s voice-search feature currently only runs though Amazon’s videos. Also, unless you own a Kindle HDX, you will be unable to use you tablet to control Amazon Fire.

There is no arguing the fact that online gaming in general, and cloud gaming in specific, is currently dominated by the “Big Three” console manufacturers and PC-based hardware. However, this could all change this coming yea with the release of new set-top boxes and improvements on ones currently available.

Would you be interested in using a set-top box for all of you cloud gaming activities? Let us know in the Comments section below!

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Personal Space And The Internet of Things (IoT)

Personal Space And The Internet of Things (IoT)

The Internet of Things (IoT) There is a long time concept of the personal area network or PAN. For all intent and purposes this is the maximum distance a Bluetooth device can move away from the host and still be functional. As I read the many wonderful pieces on the explosion of IoT and wearable…

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data The term “Big Data” is highly reminiscent of terms like “Big Pharma”, and it has a tendency to make consumers and professionals alike a bit nervous. However, whereas Big Pharma refers to large pharmaceuticals companies with market sway and seemingly countless political lobbyists, big data simply refers to the exponentially rapid growth…

3 Considerations To Help Businesses Navigate Cloud Implementation

3 Considerations To Help Businesses Navigate Cloud Implementation

Cloud Implementation Cloud computing technology has improved significantly in the past year, making it an appealing tool for businesses of all sizes. Cloud computing can benefit businesses in many ways, from cutting costs, to increasing business efficiency, to guaranteeing data recovery in case of an accident. In fact, 47 percent of medium and large enterprises…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How can we ensure that the right people in an organization have the right access to…

Methodically Plan Your Cloud Design First

Methodically Plan Your Cloud Design First

Are You Sure You Are Ready For The Cloud: Design For the last few months, we have been discussing getting ready to go to the cloud. We have covered topics such as Financial and Business Security reasons. We have even discussed the type of knowledge you should obtain. This month, we are going to take…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor