Is Groove Notes Done Right?
Interesting snipets from an Internet with Groove's Ray Ozzie.
Internetnews.com yesterday posted an interview with Ray Ozzie. Reporter Susan Kuchinskas caught up with Ray recently when he spoke at Kevin Werbach's Supernova Conference. Her first question to Ray: Is Groove Notes done right? Ray's reply: “The contrast mostly is that Notes, besides being e-mail, was a collaborative infrastructure for within the firewall in global enterprises. It never served outside contractors. Groove was fundamentally born as an Internet application into a world of cooperating companies.” Here's another excerpt from the interview:
Q: One of the biggest fears of IT is that unauthorized applications will deliver viruses, spyware and Trojans, something the music P2P apps are infamous for. What prevents this in Groove?
A:Groove uses a peer-based person-to-person trust model that works because the product's designed to support small group interactions, generally with people that we recognize.
Groove's security architecture is a great model for how many communication tools including groove should be addressing peer trust. If we need to communicate, you send me an e-mail. I can press a button saying I trust this individual, and you get in the response the opportunity to trust me. From that moment, everything we send is automatically authenticated and encrypted.