Difference between revisions of "Elite Islands"

From ScenarioThinking
Jump to navigation Jump to search
Line 1: Line 1:
==Evolution: Elite Islands: Unlimited Human border, Closed Networks==
==Evolution - Elite Islands: Unlimited Human border, Closed Networks==


[[Image:elite_islands.JPG]]
[[Image:elite_islands.JPG]]

Revision as of 15:38, 18 December 2005

Evolution - Elite Islands: Unlimited Human border, Closed Networks

Elite islands.JPG



Technological impact
2010 – Several network technologies are available. The new IPv6 protocol is introduced, and begins to be utilized in parallel to the existing IPv4 internet infrastructure. The US government reaches the goal of deploying IPv6 for all federal agencies. China and Japan help developing the protocol: a multinational consortium controls access to IP addresses. The new WiMax is introduced. Some users are able to enjoy higher speed in local areas, for a premium. Most users stick to slower wireless technologies, but they cannot seamlessly roam from one network to the other.
Wireless networks are closed. Users are concerned about security issues and worried that other users will slow down their speed.

The first alter-ego pilot is started, enabling the creation of a virtual online identity, an online “passport” which can be used for payments and for identification purposes. The US government imposes that porn, governmental and “security sensitive” websites run in its territory can only be accessed through this technology.

Nanotechnologies develop fast. The first nanotech microprocessor is introduced from Intel. The first appendicitis operation is performed using nanorobots.

Concerns over the security of open source software limit the effectiveness of SOA solutions and Web Services. The first “software bomb” is created, by inserting corrupted code within open source software used to automate nuclear power stations, which brings the US utility network to a grinding halt for 3 days. President H. Clinton declares war to open source underground terrorism.

New high definition technologies emerge to improve the interaction between human and computer.
The first holographic 3D interface is introduced on the market, which enables an enhanced interaction with computers. Video goggles with enhanced reality become affordable.

Neural technologies are for the first time able to transform the brain’s electrical signals which compose thoughts and dreams into images and sounds.

2015
Increased privacy and security concerns motivated by increasing terrorist and hacker attacks on the internet spur local government to enforce the capacity given by IPv6 to limit internet access directed in and out of their borders. In particular some countries with lower freedom of speech enforce restrictions on the internet traffic.

Each person has an online “dubbelganger” called alter ego. Alter ego profiles are used to enforce security and authorization on access to any data. Governments force a strict control on access to data and information.

Open Source software shrinks due to the fear spread by repeated software terrorist attacks aimed at paralyzing the increasing dependence on automation. Software monopolies thrive and expand thanks to their promise of providing a more controllable, reliable and secure alternative.

Nanotechnologies continue to develop, but at a lower pace than initially thought, due to increased difficulty in the sharing of research caused by internet restrictions. Nanotech remains too expensive for average consumers. The first studies prove how nanorobots can reverse the aging process. Wealthy people can afford nanosurgical operations to remove cancer.

A wealth of peripherals is available to improve the interaction human-machine. The first “dream player/recorder” is introduced, capable of recording dreams and feelings and playing them back through a non-intrusive magnetic brain interface.
The same device is capable of wirelessly transmitting thoughts to the network, effectively bypassing the need for computers.
Visual, tactile and audio information can be directly communicated to the brain through the use of brain magnetic interfaces.



Social impact<br>

2010
The first “safe areas” are introduced online, allowing access to “sanitized media”. The content provided in these areas is certified to be hacker and virus free, and can only be accessed by users with a suitable age. User’s credentials are checked to reveal terrorist associations and pedophile behavior. Parents feel relieved knowing their kids are in a “safe online world”. Any type of entertainment and social interaction is offered for a fee.

Social groups emerge thanks to the new internet technology. New “high end” online clubs are created allowing free access to media and software and to online social events. The users who can afford the high fees of these clubs and to enjoy new faster connection in combinations and new body-extending technologies praise the new, “cool” virtual online experience.

Skype and MSN become the two biggest online communities followed by Aol and Linked-in. Users can connect to this communities using the new high definition interfaces.

The first people are found dead after living a continuous online life and forgetting to eat and drink for days.

2015

The time when all information was available to anyone have changed.
Big corporations and Governments take control over the internet media. Data can be accessed only with specific credentials, and power is proportional to the level of information which can be accessed.

The first protests are started against the freedom limitation on the internet imposed by most governments in the developed world

In most countries data can only be accessed by using the “alter-ego” online identity. Each person has such identity, but based on social or economical status he/she has access to different type of information. First “ego-crackers” operate, giving illegal access to higher information levels to people from lower information classes.
“Casts” emerge in society. Each cast effectively has certain level of political, economical and information power.

Online communities (Skype, MSN,etc) offer a complete world. Any media and software experience is provided, at different level of participation based on the alter-ego identity level. These online worlds are safe areas where the alter ego can live a life of their choice. Filter settings can be created against “non-desired information” happening in the real world.
First “racist” behavior of Skypers towards MSNers. The first virtual identity racial violence episodes occur.


Economical impact
2010
Whilst developed economy find it hard to grow further, due to the increase scarcity of natural resources and the decreasing growth of learning economies, emerging economies are growing at an increased speed after surviving a strong financial crisis caused by a heated economy which had culminated into the Shanghai stock market crash.

Petrol costs continue to rise, creating tensions among big countries that rival the remaining resources. In an effort to reduce dependency on fossil fuels, most developed countries reintroduce nuclear energy.

In a desperate attempt to arrest the growing power of emerging countries, developed countries increase the use of trading blocks.

Three economic blocks begin to emerge: Chindia, America and Eurussia

Local products are preferred in most countries. They are seen as more qualitative.


2015
Emerging economies have emerged. China is the most powerful country in the world, followed by India.

Nuclear energy has effectively become the most used energy source>

The three macro blocks have become completely autarchic. Only a small amount of goods flow among the three macro-economies.


Political impact
2010
By using as motive the war on open source terrorism, the US introduce a ban on open source. Most countries follow the US in introducing the IPv6 Protocol.

Nationalistic parties in developed countries thrive on increased fear for anything “foreign”. Extreme neonazi and communist parties re-emerge.

2015

By introducing information boundaries through IPv6, the three blocks effectively limit also exchange of information in between blocks. Each block competes for superiority of information and does not share data with any other block.
Countries introduce penalties for “information smugglers”, who can be jailed or executed if they try to bring information across borders.

ELITE ISLANDS:

Everyone has a parallel identity online, which can be used for authorization, payments, and to interact in the online social life.
The old days of “free information for everyone” are over. In order to be able to access data, the online alter-ego of users must be authorized to have access to it. The level of access to information is most often proportional to the level of education and of wealth of the individual. The society is effectively divided into info-casts: the higher the cast a person is in, the more information, wealth and power he/she can reach.
First “ego-crackers” operate, giving illegal access to higher information levels to people from lower information classes.

Three trading blocks emerge: Chindia, America and Eurussia. Economic exchanges within these macro-economies are relatively fluid, whereas strong trade and emigration blocks persist among them. Governments limit the access of information in entrance and exit to their countries. Only information agreements between blocks allow citizen of certain casts to retrieve information which has been stored in other countries. Countries introduce penalties for “information smugglers”, who can be jailed or executed if they try to bring information across borders.

The decreased information exchange slows down technological development: several new science progresses including nanotechnologies achieve first important successes, such as non invasive surgical operations, life-extending medicines, and stronger, better materials, but the high costs of research translate into the fact that only members of higher info-casts are able to enjoy their advantages.

Thanks to high definition network interfacing peripherals which grid users can use to communicate their thoughts, feeling and emotions directly to the internet, many people live an online life afar from reality.
Online “safe worlds” are created, allowing users to define filters to protect themselves from intrusions and unwanted information. These worlds offer every form of entertainment and social interaction. Users are screened for security purposes, and some clubs are only exclusive to higher info-casts levels. Most online individuals loose contact with reality. The most known worlds are Skype and MSN. Users of these groups are seen those of other groups as inferior, and the first online racist episodes occur.