SCHAPPY — 21. Februar 2007, 0:13
Security is limited by the weakest link.
Taken from: Jim Rymarczyk, Chief Virtualization Technologist, IBM Fellow, Systems and Technology Group, Virtualization Technology Outlook, First International Conference, November 2006.
Filed under: Hypnotized...