1 00:00:00,150 --> 00:00:07,530 ‫Guys, this is a technology that will change the course of the future for database's proxy's backing 2 00:00:07,530 --> 00:00:09,780 ‫applications, pretty much everything. 3 00:00:10,200 --> 00:00:12,270 ‫Hommel Morphic encryption. 4 00:00:12,760 --> 00:00:14,910 ‫How about we jump into it, guys? 5 00:00:15,030 --> 00:00:26,120 ‫MANNHEIMER Morphic encryption definitely is a huge, huge change in the computer science industry and 6 00:00:26,850 --> 00:00:28,590 ‫is going to it's going to change the whole world. 7 00:00:28,810 --> 00:00:30,380 ‫And how will we discuss it, guys? 8 00:00:30,490 --> 00:00:37,050 ‫That's what I'm going to talk about is briefly what is encryption, because why not just describe why 9 00:00:37,050 --> 00:00:43,770 ‫do we have encryption obviously to protect us Bashur then I'm going to talk about why we can't always 10 00:00:43,770 --> 00:00:45,320 ‫encrypt data. 11 00:00:45,450 --> 00:00:49,380 ‫There is a particular reason encryption is good one to secure stuff. 12 00:00:49,380 --> 00:00:50,580 ‫But guess what? 13 00:00:50,790 --> 00:00:52,110 ‫We cannot always encrypt. 14 00:00:52,170 --> 00:00:56,180 ‫You cannot store your data encrypted in the database. 15 00:00:56,460 --> 00:01:06,180 ‫You cannot have a Layer seven proxy, that load balancer that looks at your data without actually disrupting 16 00:01:06,180 --> 00:01:06,630 ‫traffic. 17 00:01:06,870 --> 00:01:08,550 ‫So there's so many use cases. 18 00:01:09,240 --> 00:01:10,200 ‫We're going to talk about that. 19 00:01:10,440 --> 00:01:17,310 ‫And then we're going to talk about the Haoma Merfolk encryption, which is the key of this video. 20 00:01:17,460 --> 00:01:19,110 ‫And to discuss that, what is that? 21 00:01:19,110 --> 00:01:20,050 ‫Exactly right. 22 00:01:20,340 --> 00:01:26,010 ‫Basically, in a nutshell, is the ability to operate on encrypted data, which is something we couldn't 23 00:01:26,010 --> 00:01:26,610 ‫do before. 24 00:01:26,850 --> 00:01:38,040 ‫IBM has just released a few days ago a working example of C++, C, C++ code that will allow us to search 25 00:01:38,040 --> 00:01:39,390 ‫a database that is fully encrypted. 26 00:01:39,390 --> 00:01:40,740 ‫And we going to do this. 27 00:01:40,770 --> 00:01:46,800 ‫We're going to show a demo and download their repo, run the code, compile and do the search. 28 00:01:47,190 --> 00:01:50,100 ‫Yes, a little bit slow, but it's going to improve. 29 00:01:50,910 --> 00:01:52,890 ‫We have all the time in the world, guys.