Virtual Economies: Gaming In The Cloud Is Big Business

Virtual Economies: Gaming In The Cloud Is Big Business

Virtual Economies: Gaming In the Cloud Is Big Business

A little while back, I did an article on how to make money as a professional, playing different types of cloud video games. The industry behind this phenomenon is growing at a geometric rate, with new events and tournaments popping up every year.

Fortunately for those of us who do not have the time or skills to game professionally, that is not the only aspect of cloud gaming that has real-world benefits and rewards. The economies inside the games themselves many times mirror what you would find out in the real world. And given that a whole slew of in-game items have value out in the real world, virtual economies are increasingly becoming attractive for entrepreneurs.

Eve Online
eyjolfurWhen it comes to providing an example of a cloud game that has developed in intricate and thriving virtual economy, Eve Online is sure to be the first to pop into most industry professional’s mind. In fact, Eve Online’s economy, in terms of sheer size, actually dwarfs the real-world economy of Iceland, the company from which it is based.

Size is not the only factor that makes Eve Online’s economy such an interesting thing to examine. The mechanics and operation of the economy are so intricate that they require an economist to oversee. Eyjólfur Guðmundsson, the economist responsible for Eve Online’s oversight, is quoted as saying “For all intents and purposes, this is an economy that has activity equal to a small country in real life. There’s nothing ‘virtual’ about this world.”

Second Life

The vibrancy and importance of the virtual economy goes a step further when it comes to the game Second Life. In fact, Second Life’s in-game operations and economy are so well developed, it has been designated as a virtual world instead of a game by many people.

A perfect example of the similarities between Second Life’s virtual economy and that of the real world can be seen with the scare that occurred in 2006 with CopyBot. CopyBot allowed any item in Second Life to be copied, bypassing the need to buy them with the in-game currency, Linden Dollars. This prompted the game’s creators, Linden Lab, to explore the option of filing a complaint under the Digital Millennium Copyright Act. This, in essence, gave real-world value to the virtual items inside the game.

Diablo 3

Blizzard, the creator of the highly-popular cloud game, Diablo 3, actually took things a bit further when they established a real money auction house (RMAH), which allowed players to auction off in-game items for real-world cash. The idea behind the RMAH was to steer players away from third-party markets held outside of the Blizzard umbrella.

Unfortunately, the result was a whole slew of new botters (gamers who use automated scripts solely to accrue virtual items), which in turn tanked the gold value in Diablo 3. This had pretty much the same effect that it would have had on a real-world economy: hyperinflation.

Virtual economies are growing in size and complexity with each cloud game that makes its mark with the public. Have you had any experience buying and selling in a virtual environment? Let us know in the Comments section below!

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Comics
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls systems, retail terminals and scanners, and kiosks to medical devices, heating and lighting systems, connected homes, and smart cars. Identity…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are taking steps to improve data security, few are considering the most likely cause of such a threat: human error. According…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything across back-end networks causes headaches for the end-users who try to access the systems over VPN and other private links. Many strategies…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly darken your cloud. And as far as performance is concerned, it’s simply not ideal to be hosting large files such…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your content in the cloud is dangerous. The truth is that top tier cloud storage is more secure than most organizations’…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around the goal of finding a cure for cancer. President Obama put his second-in-command, Vice President Joe Biden, in charge of…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how safely the cars are driving, not how safe they are from cyber-attack – the McAfee Threat Predictions 2016 Report warned…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy and the way they were clearly leveraging the world of social, mobile analytics and cloud. So I mentioned to our…