From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?