A Chronological History Of Cloud Gaming Down Through The Ages

A Chronological History Of Cloud Gaming Down Through The Ages

A Chronological History of Cloud Gaming Down Through the Ages

Cloud video games, also known in this capacity as online games or MMOs (massively multiplayer online) have been steadily progressing in power and appeal since they first arrived in the 1970s. What was once solely a text-based experience, has grown into one sporting untold virtual worlds in many different genres.

Have you ever wondered where the incredible cloud games we play today began? Let’s take a look at their history, which will actually go back much farther than most people might think.

MUDs

Cloud gaming actually predates the modern incarnation of the internet. One of the first types of cloud games were called MUDs, which stands for multi-user dungeons. MUD1, the very first MUD to be created, was launched in 1979 and is the oldest virtual world still in existence. Gameplay was extremely basic and consisted solely of typed commands in a text-based environment.

Ultima Online

The next truly groundbreaking incarnation of cloud games came in 1997, with the launch of Ultima Online. What set this game apart from other cloud games is that it was the first to offer graphics in tandem with a cloud gaming experience. Ultima Online is credited as being one of the most influential games to set the tone for modern cloud gaming.

Everquest

Jumping two short years into the future would bring you to Everquest, the cloud game credited as being the primary drive in the expansion of cloud gaming and MMORPGs (massively multiplayer online role play games) to the mainstream West. It sported something unheard of at the time, 3D graphics, and went on to spawn over 20 different expansions over the years.

World of Warcraft

Anyone with any interest in cloud gaming whatsoever, and even those who do not, has most likely heard of one of the cloud games synonymous with current online gaming: World of Warcraft. Credited as being the most successful cloud game in history, with sales in excess of $10 billion, World of Warcraft also holds the Guinness Book of World Records’ top-selling game spot of all time.

Eve Online

Eve Online sets itself apart by being the most successful space-based cloud game, as well as one of the first with a fully player-driven economy. Eve Online is considered by many avid players as “part game, part soap opera and part shadow economy.” This has led to an entire virtual existence inside the Eve universe and sports over 5 million registered users.

ravens_warp_940

(Image Source: http://www.eveonline.com)

The Future?

Tons of new cloud games are released each year, most of which fail to make any significant impact. Several factors need to be met in order to even hope to make a mark in this over-saturated market, ranging from using the free-to-play model to creating an in-depth user economy. Several games do have the potential to be big names this year in cloud gaming; however, only time will tell which of them are truly up to snuff.

Do you have a particular game that you feel has influenced the modern world of cloud-based gaming? Let us know in the Comments section below!

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…