SCHAPPY — 21. February 2007, 0:13

Security is limited by the weakest link.

Taken from: Jim Rymarczyk, Chief Virtualization Technologist, IBM Fellow, Systems and Technology Group, Virtualization Technology Outlook, First International Conference, November 2006.

Security is limited by the weakest link


No Comments »

RSS feed for comments on this post.

Bisher noch keine Kommentare.

Kommentare verfassen

Sie müssen angemeldet sein, um Kommentare verfassen zu können.