Hi Thomas, On Fri, Apr 24, 2009 at 10:48 AM, Thomas Roessler <[email protected]> wrote: > The implication is twofold: > > 1. If widgets are to use one of these storage mechanisms, then we need to > say what (instead of origin) the storage is scoped by, and how a widget > acquires an instance.
This is true. > 2. As far as security policies are concerned, this suggests that we are > acquiring an additional set of complexity earlier than I had thought. It would be really helpful if you could enumerate these complexities, please? -- Marcos Caceres http://datadriven.com.au
