Set-Top Boxes And Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

Set-Top Boxes And Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

Set-Top Boxes and Cloud Gaming: Affordable Alternatives To Traditional Game Consoles

For as long as I can remember, home-based video gaming has always been the realm of just a few companies whose consoles dominated the desires of gamers. In the beginning it was Atari and Magnavox, with the 2600 and Odyssey, respectively. Today, Sony, Microsoft and Nintendo all vie for their share of the home-based video gaming market share.

The past couple of years have seen a true shake up of the norm, with new technologies allowing more players to enter the arena in an effective way. A perfect example was the Ouya, an Android-based console that first made its debut in 2012. Unfortunately, due to production delays and mixed reviews, the Ouya was unable to make its mark.

A few other companies have recently begun to make serious inroads into developing set-top boxes that could truly give console gaming a fresh perspective. Let’s take a look!

Android TVlogo-greenthrottle - Gaming

Headlines over the past few days have shown that Google’s recent acquisition of Green Throttle Games could herald Google’s decision to jump into the set-top box arena. Green Throttle Games is the company behind the Atlas, a Bluetooth controller used to play the game, Arena. Insiders claim that this controller could be used to play games on Google’s own set-top box.

These games would be available in tandem with the Android TV system, which is currently available. At the time of this writing, only television, audio and movie content is available though Android TV. However, the acquisition of Green Throttle Games’ and their controller could change all that.

Steam Machine

At the 2014 CES event (Consumer Electronics Show), Steam unveiled thirteen, different Steam Machines that are slated to make their appearance this year. Valve, the company behind the Steam service, has made deals with hardware giants, such as Alienware, Gigabyte and CyberPower. These machines will be run on Valve’s operating system, SteamOS.

Not all reception has been positive, however, with some industry leaders claiming that Steam machines are irrelevant and unnecessary. Reasons behind this range from butchered code to problems upgrading them.

Amazon Fire

Recent news in the set-top box arena has been dominated by Amazon’s announcement of the Amazon Fire system. Rather than solely playing video games, such as what a Steam Machine does, it combines video, audio and gaming content all in one package.

Some shortcomings currently exist that make the Amazon Fire more potential than polish. For example, it’s voice-search feature currently only runs though Amazon’s videos. Also, unless you own a Kindle HDX, you will be unable to use you tablet to control Amazon Fire.

There is no arguing the fact that online gaming in general, and cloud gaming in specific, is currently dominated by the “Big Three” console manufacturers and PC-based hardware. However, this could all change this coming yea with the release of new set-top boxes and improvements on ones currently available.

Would you be interested in using a set-top box for all of you cloud gaming activities? Let us know in the Comments section below!

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Comic
How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…