Feeds

How long until the mobile is the heart of entertainment?

It'll be sooner than you think...

New hybrid storage solutions

Set tops, PCs, TVs and hi-fi may all speak Wireless USB, but their data types also need to be recognisable, as do their metadata and XML tagging systems. As long as the consumer electronics companies continue to stick firmly to a broad standards roadmap, then this is all possible in the short term.

We can then build out an EPG that is not just a phone EPG, but a "nearby device" EPG. Each data component would be like an open broadcast web service to the handset and it would display what's on your Pay TV system, your PC, your friend's phone, on a content web site you have subscribed to, on the DVR and on your gaming systems, and MP3 players, both portable and fixed.

Such an EPG could also have hidden elements. So for instance if you decide to show your personalised hand held EPG on the TV screen, you can hold back the adult content, private pictures or anything that you don't want to have public.

The real problem here is DRM, except that it's not a problem. This entire idea only becomes politically acceptable when one company is at the heart of most of these services. So a quadruple play can offer entitlement messages delivered to any secure device, and use either a home DVR or a PC as an entitlement issuer. Entitlement messages are the encrypted keys that are sent alongside content, that will unlock it as long as your device has a key that can unlock the entitlement message.

A centralised license server for all devices types can be put together easily and no clever interoperability tricks are required between different alien DRMs.

But it's not just DRM that presents a problem here, but presentation graphics and interaction. At present there are no standards for sending interactivity messages as feedback. You might use html, but there are many other schemes currently being offered. So watching your TV and responding, perhaps voting, with your handset as if it is the remote control, with the return path through your fixed broadband link, needs to result in the same outcome as when you use mobile web to respond, or a Wi-Fi link to the fixed line or used SMS to vote.

In fact, it's better if the device decides on the route for the interaction, leaving the consumer to decide on the voting process. Of course there are thousands of scenarios to work out.

At work you don't want to display your favorite TV shows instead of your business slides using a phone and a projector. At home there needs to be a pecking order in who gets to change the TV channel or push the record button on the DVR, and that needs to be built into systems.

There needs to be defaults that say that when the handset is going to run out of storage, it doesn't try to record a film on the handset, but defaults to the home DVR.

Another service this all gives operators is audience measurement. Nielsen is the master of audience measurement, and it spends millions maintaining a monopoly in simply telling advertisers and TV channels what people are watching, but an always on handset, that acts as the controller for turning these devices on and off, and changing channel could do that automatically, for the price of some software that records and interprets control button pushes.

These thoughts always seem most obvious when visiting exhibitions with stands full of remote control devices. How anyone can consider adding more, but they do. One for each TV, each DVD player, each DVR, each music player, each VHS player.

Of course, this cannot happen in a way that makes it a detriment to the cellular operator and it has to come as a differentiator for the cellular services. After all there has to be a reason for subsidy for the handset, at least for a while longer, and that comes from a motive by the cellular operator of offering something that retains customer loyalty in the basic handset functions, even if that means continued expensive mobile voice. Our best guess is that the handset will begin to emerge as the heart of all entertainment in the 2010 to 2012 time frame.

Copyright © 2006, Faultline

Faultline is published by Rethink Research, a London-based publishing and consulting firm. This weekly newsletter is an assessment of the impact of the week's events in the world of digital media. Faultline is where media meets technology. Subscription details here.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.