Audrey Tang

But there is another system, CrowdStrike, verifying the integrity of my device. And yet another system, Cloudflare, that verifies the integrity of the CrowdStrike connection. And we never go to a system integrator for all three layers or rather to any two adjacent layers, because that will – the next thing we know, it will be a vendor lock-in. It will be proprietary protocols and so on. So, we insist on open and interoperable protocols on each, like, juncture between the two system parameters.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech