Re: [mmox] Creating walled gardens considered harmful

Lisa Dusseault <lisa.dusseault@gmail.com> Mon, 30 March 2009 23:56 UTC

Return-Path: <lisa.dusseault@gmail.com>
X-Original-To: mmox@core3.amsl.com
Delivered-To: mmox@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84D713A6B67 for <mmox@core3.amsl.com>; Mon, 30 Mar 2009 16:56:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.815
X-Spam-Level:
X-Spam-Status: No, score=-1.815 tagged_above=-999 required=5 tests=[AWL=0.784, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BEY96Z1a839e for <mmox@core3.amsl.com>; Mon, 30 Mar 2009 16:56:44 -0700 (PDT)
Received: from qw-out-2122.google.com (qw-out-2122.google.com [74.125.92.27]) by core3.amsl.com (Postfix) with ESMTP id 751613A6A36 for <mmox@ietf.org>; Mon, 30 Mar 2009 16:56:43 -0700 (PDT)
Received: by qw-out-2122.google.com with SMTP id 9so2305066qwb.31 for <mmox@ietf.org>; Mon, 30 Mar 2009 16:57:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=kIp3VV6fy6JTNjPnIYTf4DWD/sbuPBNZrdEVSmXun6I=; b=kr4NMEDuc7zVRU+wmBO24QyAfvc3QSFk8BJO60BjKMvhleGpeJRj4y+cbdqPEk5QHZ LVtTMh2o4Gbt+zxI0GqpowCIXi9v5Rs7dXgYjRgqZAoAyJ89Ts/r6uXeej/i+sElkpwh eAYTsknjG+XVPYL8pz/poNSAuJapy0PVIUIEk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=n5jDbpgEKYb+SNpPTCHu2D4cGvclunClUTGVy3ZcQq1Y8efjCpz55BC/vLxZNNjhkE vE9OKDZ0yHU2hXa1UGpG58E9tR8ec/00XkpBHcf+7KYQPMSbTY8rjqz1lJWi+VdIlc/0 k+TL1867VsrAk/85lFCt+K2asUXOFhxbEzPuc=
MIME-Version: 1.0
Received: by 10.220.100.83 with SMTP id x19mr29646vcn.84.1238457462130; Mon, 30 Mar 2009 16:57:42 -0700 (PDT)
In-Reply-To: <49D1500C.1030604@gmail.com>
References: <e0b04bba0903250007k6886383bja0a06884e8081ac7@mail.gmail.com> <e0b04bba0903281057g943ce9cjdcce0fc2712a4ec3@mail.gmail.com> <49CF1B1E.4070506@gmail.com> <e0b04bba0903290138ifbfaf18p930f87d1e49e6dbb@mail.gmail.com> <49D0081E.4010007@gmail.com> <e0b04bba0903291942k69f6e970yee8b8a80dd8df2fa@mail.gmail.com> <49D0D846.5010401@gmail.com> <170fa1780903300854s34da03eaq8b3ed2f7eb9c2a62@mail.gmail.com> <382d73da0903301459j308445f7uec660dab275175a1@mail.gmail.com> <49D1500C.1030604@gmail.com>
Date: Mon, 30 Mar 2009 16:57:41 -0700
Message-ID: <ca722a9e0903301657m3615ae8fnb07b428419e563f6@mail.gmail.com>
From: Lisa Dusseault <lisa.dusseault@gmail.com>
To: Jon Watte <jwatte@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: MMOX-IETF <mmox@ietf.org>, Kari Lippert <kari.lippert@gmail.com>
Subject: Re: [mmox] Creating walled gardens considered harmful
X-BeenThere: mmox@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Massively Multi-participant Online Games and Applications <mmox.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mmox>, <mailto:mmox-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mmox>
List-Post: <mailto:mmox@ietf.org>
List-Help: <mailto:mmox-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmox>, <mailto:mmox-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Mar 2009 23:56:45 -0000

How about a very persona-oriented (specific) use case...

Lisa has a house in one virtual world, with virtual rooms that she
frequently hangs out in, that friends might find her at.  One day she
goes to a party in another virtual world.  She leaves behind a note on
her virtual door or bulletin board (she has control over the
presentation, it could be a spinning hovering party hat or a blue
police phone booth if the home world allows that).  The note has a
link to the party world because it's an open party.  Lisa's friends
can now find her, and the more seamless their experience in getting
from the first virtual world to the second, the more likely they are
to enjoy the experience, follow through, and see her.

Seamless is a goal, but might involve:
 - Not launching a new client, if possible, and if it is
      - A transition that is not too jarring, minimizing reload
screens, blank screens, dialog boxes, choices
 - Low time consumption for transport, including time navigating from
an initial destination to a final destination, if allowed by the
destination world
 - Avoiding a registration step if possible, and if it is
      - Lisa can recognize her friends under the moniker she'd
normally see them under
 - Keeping avatar consistency to the extent possible, for recognition
as well as seamlessness

For bonus points, Lisa can open a door from her house into the party,
and visitors can get a glimpse of what's beyond, then just walk
through.

Lisa

On Mon, Mar 30, 2009 at 4:04 PM, Jon Watte <jwatte@gmail.com> wrote:
> Kari Lippert wrote:
>>
>> <clearing throat>
>>
>> I've been lurking for some time now and reading and trying to understand
>> the basic user requirement that is driving this work. I have to admit this
>> is as close as I've seen.
>>
>> I understand "teleport" (and believe if you can define it well enough,
>> smart people can make it so) but it leaves me asking why? Why would a user
>> desire to "teleport" from one VWE to another? The answer to this will, I
>> believe, help you focus on what needs to be included in the definition of
>> what it means to "teleport", and what can be safely set aside for the
>> moment.
>>
>> Kari
>
> I think "teleport" is an implementation detail. Does this use case seem like
> a good description of what you consider a "teleport"?
>
>
>     2.1. Friend Invite
>
>
>       2.1.1. Description
>
>
>
>  1.  User A uses virtual world system A that complies with MMOX
>      interoperability.
>  2.  User B uses virtual world system B that complies with MMOX
>      interoperability.
>  3.  User A wants user B to visit him/her in system/world A, and gets
>      a suitable URL from his/her system (A), and sends this to user B
>      using any transport (mail, IM, integrated communication, carrier
>      pigeon, ...)
>  4.  User B clicks/activates this link.
>  5.  After a brief "loading" screen, user B sees user A in user A's
>      environment, including a representative form of any simulated
>      object in that environment.
>  6.  User B can interact at some level with the objects from user A.
>  7.  Objects that user B take out of inventory show up in some
>      representative form for both user A and user B.
>  8.  User A can interact at some level with any objects that user B
>      bring out of inventory.
>
>
>
> Note that I assumed that if you have avatars and objects, you also have
> text/speech, but that's a poor assumption -- it should go as line 5.5 in
> this use case, I guess.
>
> Sincerely,
>
> jw
>
> _______________________________________________
> mmox mailing list
> mmox@ietf.org
> https://www.ietf.org/mailman/listinfo/mmox
>