tag:blogger.com,1999:blog-4870014986255177973.post2293059500856418467..comments2023-05-27T00:29:52.323-07:00Comments on Secure natural communications: Secure natural communications - achievability and relationship with computingJeff Jaffehttp://www.blogger.com/profile/09233009935110372272noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-4870014986255177973.post-12855942815285081952013-01-29T01:01:14.729-08:002013-01-29T01:01:14.729-08:00Your list gives me many creational ideas that I ca...Your list gives me many creational ideas that I can perhaps use on my web tender too.<br /><a href="http://ansaf10.com" rel="nofollow">Look for Ansaf 10 Here</a>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4870014986255177973.post-70364006298143412822010-02-24T06:33:14.635-08:002010-02-24T06:33:14.635-08:00Chiku,
The elaboration on intelligent infrastruct...Chiku,<br /><br />The elaboration on intelligent infrastructure will come in subsequent posts.<br /><br />JeffJeff Jaffehttps://www.blogger.com/profile/09233009935110372272noreply@blogger.comtag:blogger.com,1999:blog-4870014986255177973.post-63395564335557304942010-02-19T10:38:30.484-08:002010-02-19T10:38:30.484-08:00"with secure natural communications people ca..."with secure natural communications people can walk around the streets not holding any computing device and look up some piece of data or request a computation from the computing cloud, and it gets performed by an intelligent infrastructure"<br /><br />You are right in saying "having an infrastructure that works without devices does not preclude people from using devices if they want to".<br /><br />Can you elaborate more on the intelligent infrastructure that you have in mind? <br />One Possibility : Is the infrastructure like telephone booths present at every street, where you can go on communicate without need for any device. The infrastructure combines with something like satellites and Radar technologies. The satellite camera can use powerful cameras to figure out a position of a person, or small radars/video surveillance can be located at various strategic positions. These two can be combined along with intelligent infrastructure which signals to the telephone booth that the person is nearby and can be contacted.Chiraghttps://www.blogger.com/profile/12499382928600391432noreply@blogger.comtag:blogger.com,1999:blog-4870014986255177973.post-72755016172907102762010-02-18T13:00:12.892-08:002010-02-18T13:00:12.892-08:00Chiku,
Your insights are terrific. While I'v...Chiku,<br /><br />Your insights are terrific. While I've been focusing on the infrastructure - and expecting that applications will exploit the infrastructure to improve what they do today - you point out that this new infrastructure will fundamentally change the nature of applications.<br /><br />Earlier I talked about five constructs: semantic experience, physical experience, decoding, core infrastructure, and information intelligence - all at the infrastructure level. But you are dragging me in! I think we'll need a sixth construct to develop the notion of natural applications.<br /><br />I'm not sure I agree with your concerns about a deviceless world. To be sure, having an infrastructure that works without devices does not preclude people from using devices if they want to. You are right that we need to make sure that we can secure it with the right biometrics, but I see that as a problem we can solve.Jeff Jaffehttps://www.blogger.com/profile/09233009935110372272noreply@blogger.comtag:blogger.com,1999:blog-4870014986255177973.post-14940931794856673032010-02-17T07:24:13.621-08:002010-02-17T07:24:13.621-08:00"with secure natural communications people ca..."with secure natural communications people can walk around the streets not holding any computing device and look up some piece of data or request a computation from the computing cloud, and it gets performed by an intelligent infrastructure"<br /><br />- Having a device actually helps and make the job easier. Example: I use a cellphone, if my cellphone gets lost/stolen, I can ask my telephone operator to just block my SIM card. You may argue that with secure natural communication, losing a device may be dangerous, as it will give access to all the information(conversation threads etc.) about a person. If I lose a device which is as important as the one we are talking about(Secure Natural Communication Device), then it will make anyone go mad. Usually, it takes time for me to realize things like I have left my cellphone somewhere, or my cellphone is stolen. In this time frame, anyone can misuse the information. Now we can have a password protection for the same to avoid a possible misuse. <br />- Now suppose I do not have a device, but instead we have the infrastructure talked about earlier. How will a user login to such a system? We can use biometric for authentication purpose. But suppose a user is unable to logout of such system, then that will make any other user who is just passing by have total access to my information(Its the same problem while checking the emails from the public computer). Infrastructure will have to be intelligent enough to figure out the identity of the person example: using video cameras + sound recognition etc. Now when I think about this, there is some infrastructure which IBM was working on which used the video surveillance to detect/reduce crime in New York(not sure about the city).Chiraghttps://www.blogger.com/profile/12499382928600391432noreply@blogger.comtag:blogger.com,1999:blog-4870014986255177973.post-57193000457132394102010-02-17T06:52:44.589-08:002010-02-17T06:52:44.589-08:001) "Most of the value is in the applications ...1) "Most of the value is in the applications - e-commerce, auctions, advertising, document interchange, compute intensive applications, storage. How does our focus on communications relate to the larger computing applications."<br /><br />-Advertising: Just as google shows ads for the gmail, similarly automated systems can be developed which display relevant ads based on the data exchanged over the Secure Natural Communication channel. Example: Suppose me and my friend are discussing going out for dinner to some place, the automated system listens to the data, and suggests some good places(if we request the system).<br />- Document interchange: Concept of teaming/ google wave extended to another level.<br />- Auctions: Secure natural communication everywhere, I can participate in the auctions example amazon. Also, I can be notified on the various auctions taking place for the items I am looking for. More transparency, repugnant markets and better auctions. <br />- Compute intensive applications: The infrastructure will need lots of computation intensive applications which will support the mapping/transformation/processing of the data. Concepts like parallel computing will be used extensively by the infrastructure.<br />- Storage: Infrastructure again will need to process and store large amount of data+ backups.<br /><br />So in a way focus on secure natural communication requires the support of existing(or better) computing applications.Chiraghttps://www.blogger.com/profile/12499382928600391432noreply@blogger.com