But if it’s an extension of your personal computer, then it just becomes like a normal audit problem, a normal cybersecurity problem. And we know how to solve those problems.
j previous speech k next speech