I think just piggybacking on that, we can offer very similar services and interpret it so that we can say, “Oh, if you work with the public infrastructure in the public cloud with this and these battle-tested criteria, then even when all our submarine cables are cut your data is safe, your computation is safe.” and so on.

Keyboard shortcuts

j previous speech k next speech