Set-Top Boxes And Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

Set-Top Boxes And Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

Set-Top Boxes and Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

For as long as I can remember, home-based video gaming has always been the realm of just a few companies whose consoles dominated the desires of gamers. In the beginning it was Atari and Magnavox, with the 2600 and Odyssey, respectively. Today, Sony, Microsoft and Nintendo all vie for their share of the home-based video gaming market share.

The past couple of years have seen a true shake up of the norm, with new technologies allowing more players to enter the arena in an effective way. A perfect example was the Ouya, an Android-based console that first made its debut in 2012. Unfortunately, due to production delays and mixed reviews, the Ouya was unable to make its mark.

A few other companies have recently begun to make serious inroads into developing set-top boxes that could truly give console gaming a fresh perspective. Let’s take a look!

Android TVlogo-greenthrottle - Gaming

Headlines over the past few days have shown that Google’s recent acquisition of Green Throttle Games could herald Google’s decision to jump into the set-top box arena. Green Throttle Games is the company behind the Atlas, a Bluetooth controller used to play the game, Arena. Insiders claim that this controller could be used to play games on Google’s own set-top box.

These games would be available in tandem with the Android TV system, which is currently available. At the time of this writing, only television, audio and movie content is available though Android TV. However, the acquisition of Green Throttle Games’ and their controller could change all that.

Steam Machine

At the 2014 CES event (Consumer Electronics Show), Steam unveiled thirteen, different Steam Machines that are slated to make their appearance this year. Valve, the company behind the Steam service, has made deals with hardware giants, such as Alienware, Gigabyte and CyberPower. These machines will be run on Valve’s operating system, SteamOS.

Not all reception has been positive, however, with some industry leaders claiming that Steam machines are irrelevant and unnecessary. Reasons behind this range from butchered code to problems upgrading them.

Amazon Fire

Recent news in the set-top box arena has been dominated by Amazon’s announcement of the Amazon Fire system. Rather than solely playing video games, such as what a Steam Machine does, it combines video, audio and gaming content all in one package.

Some shortcomings currently exist that make the Amazon Fire more potential than polish. For example, it’s voice-search feature currently only runs though Amazon’s videos. Also, unless you own a Kindle HDX, you will be unable to use you tablet to control Amazon Fire.

There is no arguing the fact that online gaming in general, and cloud gaming in specific, is currently dominated by the “Big Three” console manufacturers and PC-based hardware. However, this could all change this coming yea with the release of new set-top boxes and improvements on ones currently available.

Would you be interested in using a set-top box for all of you cloud gaming activities? Let us know in the Comments section below!

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Comics
Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…