Return to Technology
2.0 serves the function of the internet combined with many private networks in our world today. The main difference is that a large chunk of its data is better accessed through total immersion into the virtual reality it can create for those with neural connections. Wireless neural ports exist as well, but the use of them is dangerous as being dumped in certain situations can result in brain damage or even death. Telephones, television broadcast, etc, has all been unified into 2.0 channels. Sensies and VR dreamgames have become popular forms of media in 2.0.
In addition, there is now Augmented Reality, where a person hooked to 2.0 (through neural interface, direct ocular implants, or special glasses) with the same files and images that one would see on a computer desktop or other useful information. This allows many users to stay on 2.0 constantly while walking around in normal space (though the traditional full-immersion Virtual Reality is still accessible).
Most objects in the world are ‘tagged’ by a free program called Light, giving descriptions of the object. This information is rated based on the number of users who submit the data, then (by a dedicated AI) organized and checked for accuracy. This is all stored in 2.0 and is accessable through computer implants instantaneously as long as there is an active 2.0 connection.
Virtual Reality and Logging Off
Logging Off Actually logging off of VR is very important – it gives your brain time to readjust to natural inputs which have been disabled to accommodate the virtual ones. It takes only a few seconds, but if your connection is terminated before log off is complete your brain is quite vulnerable to the shock. At the very least, you will be in a stupor much like when you first awake in the morning to an alarm clock, not entirely sure whats going on or where you were – just like you’d been dreaming. At worst, it can result in death.
With the advent of neural interfaces cyber-security has become ever more important. Wireless neural interfaces are uncommon as a skilled hacker could cause permanent damage or even death to someone by accessing it. Wired interfaces are safer as a net connection can be cut by physically disconnecting it.
A barrier is a physical security device. A physical connection is established to a barrier via neural interface, and then the barrier establishes the connection to the net and runs its own firewall. They are designed to be somewhat disposable and easily repairable because their purpose is to absorb attacks from offensive firewalls preventing damage to neural interfaces or facer’s brains.
For a full list of security software, see Sample Software.
As wireless interfaces became commonplace in the late 2000’s a clear need arose to establish common information standards to ease the interconnect-ability of these devices. As a result protocols have been largely standardized so most earth manufactured equipment is able to use other devices in most ways that make sense. All devices that a person carries link to their PAN. These encrypted networks allow anything that has been configured to speak to other devices in the network.