Feeds

IBM builds Second Life store for Circuit City

Avatars show where the work is

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

IBM has cut a deal with US electronic gizmo retailer Circuit City Stores to build a virtual store on one of the private fiefdoms it occupies on Second Life. There, virtual visitors will, in the form of their on-screen avatar, be able to go down the aisles of the store and examine products. The products can then be or ordered via the website.

The image it brings to mind is the obvious one – an on-screen clone of Captain Scarlett or Lady Penelope represents you as you gangle disjointedly towards a shelf of the latest techno-flash iPoddery and pick up a gizmo. It then shows you, as a virtual you, how it works without dropping it once, which would possibly happen in real life.

Well, that’s what came into my mind when I read that IBM has been dabbling some more down in the virtual world of Second Life. As suggested when such dabblings were first reported the idea of using the Second Life online get-a-life substitute does have some merit as a model for possible future business tools, and Big Blue is setting out to demonstrate this in a more (virtualised) concrete form.

It is easy to scoff at this – at the moment it’s probably far too easy – but there is some sense to it. There is certainly a good deal of potential for developers in creating new applications. For example, how about an avatar that can answer the perennial question: `how the *!!@ do I work this thing?’ It simply shows you.

In fact, that is one of the targets the two companies have an eye on already. And online avatar’d documentation and operational guides for even the most complex systems could prove to be a good market.

Perhaps most important of all, IBM is now talking up its plans to start promoting this type of technology to business – technology that sits inside a company firewall which allow users to build new ways of collaborating. The aim is build a community of like-minded businesses analogous to the open source community in order to develop the technology, already given the sobriquet `3-D Internet’, and to build the required standards.

And for developers it marks another example of where the get-out-of-trouble line: `honest, it's essential research’ becomes even more plausible when caught playing games at work. From here on in, it will very likely now be true. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Sin COS to tan Windows? Chinese operating system to debut in autumn – report
Development alliance working on desktop, mobe software
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.