Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Ah, but this is one port to rule them all.
Wireless thunderbolt, except for power xfer, why not use software defined radio to support *all* standards AND have a wideband "thunderbolt io" compatible mode as well. One wireless standard to rule them all...
Also, destroying the competitive advantage of Exchange and Lotus Notes will have certain long-term strategic benefits.
True! But I can't wait to get waves + notes apps working together... I'm still curious about how waves resolve conflicting offline edits outside of the wave with just XML... hrm...
Lotus Notes can probably interact with the wave much more easily than Exchange's collection of apps (sharepoint - yuk). Notes 8 is built on Eclipse, so all you really need is someone to wire up the right kind of plug-in or extension and you should be able to interact with all those great Notes apps directly with the wave. That's the great equalizer of waves, a 'robot' can interact automatically to 'do the right thing' to get two very disparate systems to seem to work together. Watch the video to see how a the view can interact directly with Blog post replies...
Actually, imagine being able to add two numbers together without knowing what those two numbers were and returning the total that you STILL don't know what the number is, but you have the cyphertext for it. You still need the key to decrypt the total.
Example in plaintext:
4 + 5 = 9
Example encypted (oversimplified):
D32JFS3 + 234DSF31 = 42SDF23
So the third party would receive D32JFS3 and 234DSF31 (not knowing they meant 4 and 5) and he would return 42SDF23 (not knowing it was 9)
The ablility to add two peices of cyphertext to get some (still unknonw) peice of cyphertext does not increase the "breakability" of the encryption because, just like the rosetta stone, you really need pairs of plaintext and cyphertext to do any real analysis. There may be some NEW attack methods on lattice based encryption techniques, but they are not yet widely known.