Virtual Economies: Gaming In The Cloud Is Big Business

Virtual Economies: Gaming In The Cloud Is Big Business

Virtual Economies: Gaming In the Cloud Is Big Business

A little while back, I did an article on how to make money as a professional, playing different types of cloud video games. The industry behind this phenomenon is growing at a geometric rate, with new events and tournaments popping up every year.

Fortunately for those of us who do not have the time or skills to game professionally, that is not the only aspect of cloud gaming that has real-world benefits and rewards. The economies inside the games themselves many times mirror what you would find out in the real world. And given that a whole slew of in-game items have value out in the real world, virtual economies are increasingly becoming attractive for entrepreneurs.

Eve Online
eyjolfurWhen it comes to providing an example of a cloud game that has developed in intricate and thriving virtual economy, Eve Online is sure to be the first to pop into most industry professional’s mind. In fact, Eve Online’s economy, in terms of sheer size, actually dwarfs the real-world economy of Iceland, the company from which it is based.

Size is not the only factor that makes Eve Online’s economy such an interesting thing to examine. The mechanics and operation of the economy are so intricate that they require an economist to oversee. Eyjólfur Guðmundsson, the economist responsible for Eve Online’s oversight, is quoted as saying “For all intents and purposes, this is an economy that has activity equal to a small country in real life. There’s nothing ‘virtual’ about this world.”

Second Life

The vibrancy and importance of the virtual economy goes a step further when it comes to the game Second Life. In fact, Second Life’s in-game operations and economy are so well developed, it has been designated as a virtual world instead of a game by many people.

A perfect example of the similarities between Second Life’s virtual economy and that of the real world can be seen with the scare that occurred in 2006 with CopyBot. CopyBot allowed any item in Second Life to be copied, bypassing the need to buy them with the in-game currency, Linden Dollars. This prompted the game’s creators, Linden Lab, to explore the option of filing a complaint under the Digital Millennium Copyright Act. This, in essence, gave real-world value to the virtual items inside the game.

Diablo 3

Blizzard, the creator of the highly-popular cloud game, Diablo 3, actually took things a bit further when they established a real money auction house (RMAH), which allowed players to auction off in-game items for real-world cash. The idea behind the RMAH was to steer players away from third-party markets held outside of the Blizzard umbrella.

Unfortunately, the result was a whole slew of new botters (gamers who use automated scripts solely to accrue virtual items), which in turn tanked the gold value in Diablo 3. This had pretty much the same effect that it would have had on a real-world economy: hyperinflation.

Virtual economies are growing in size and complexity with each cloud game that makes its mark with the public. Have you had any experience buying and selling in a virtual environment? Let us know in the Comments section below!

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…