Today I’ll address two questions that continue to come up.
First: with secure natural communications people can walk around the streets not holding any computing device and look up some piece of data or request a computation from the computing cloud, and it gets performed by an intelligent infrastructure. I’m asked - how realistic is this? People struggle to understand the vastness of the infrastructure needs to achieve this lofty goal. Are parts of this “vision” beyond our grasp?
Here is how I think about it. There are more and less demanding variations on secure natural communications. Enough technology exists that a proof-of-concept could be built, today. Over a long period of time technology and infrastructure advances will make more of this possible. Key to making this happen, however, is to set a stretch goal so we can plan the required physical infrastructure and motivate the necessary innovation.
Second question: Information infrastructure, as in today’s wireless infrastructure, Internet or World Wide Web provides more than communications. Most of the value is in the applications - e-commerce, auctions, advertising, document interchange, compute intensive applications, storage. How does our focus on communications relate to the larger computing applications.
Here is how I think about this issue. At the moment, this blog is focusing on the core infrastructure rather than the compute tasks because for each of these tasks, there is a dominant common communications infrastructure need. To be sure, communications takes place at every level: from physical transmission of bits at the lowest level to the interpretation thereof by applications that have application level protocols.
In particular, when we discuss “the player’s semantic experience”, we will ultimately support the semantics for every type of computing task. However, with the existence of millions of applications this blog will not address application specific protocols herein – although some require substantial infrastructure of their own. That work must proceed in parallel with the core communications infrastructure.
Next blog posting I will next move to a detailed description of the five constructs mentioned in the introductory posting.