And how do you make that secure? Because I assume that when you put all of these on this technology, does that make the system vulnerable to cyber-attacks, cyber breaches?
j previous speech k next speech