Review of purpose of this blog
I’ve described the concept of Secure Natural Communications, why it is broadly achievable, and the benefits. I’ve described 5-6 key constructs: the player’s semantic experience, the player’s physical experience, the decode engine, core infrastructure, information intelligence, and advanced applications.
To move forward requires an inventory of the technical areas that will require more development to perfect secure natural communications. We rely on numerous technologies – all of them are good enough to get started; most of them would benefit from further enhancement. So after we inventory these areas, we will need to assess our current level of capability in these areas and then create a roadmap to improve capability.
Today’s blog begins the inventory.
Technologies related to a player’s semantic experience
Today’s technology already has many of the components needed to provide a natural semantic interface for the player. Each will be enhanced further and customized to provide secure natural communications. Here are some of the areas that require attention.
• Networked consumer devices. There already has been tremendous progress in making consumer devices for music, video, telephony, and computing to be more universal (capability) and networked. Increasingly, their user interfaces will adapt to the interfaces that people find most natural. This progress will continue. More focus will be necessary on standardization and integration.
• Multiple communication threads. Inherent in the notion of group communications is that a person will be involved in multiple communications threads simultaneously. For the player’s semantic experience the infrastructure must be able to surface these multiple threads to people irrespective of how they interact with the infrastructure. We have some technologies to do this for a person sitting at their display. More challenging will be if they are using shared video screens in the infrastructure, or if they are trying to communicate naturally without devices.
• Higher-level semantics. This is too large an area to deal with comprehensively in this paper, but ultimately it is the broadest part of secure natural communications. This paper limits its focus to infrastructure common to all applications – not the semantics of each application. However, each application area requires its own standardization on semantics. Example areas are:
o Non-communications infrastructure intensive. Examples include numerical applications, devtest, ERP, and database.
o Base-level communications infrastructure. Examples include Web, file, and transaction processing
o Applications that require their own infrastructure. This is the most interesting area for higher-level semantics. There are some applications that are so communications intensive that they require their own sophisticated semantic infrastructure to be provided by an overall infrastructure. These would include social networking, collaboration, and virtual desktop.