SCHAPPY — 21. Februar 2007, 0:13

Security is limited by the weakest link.

Taken from: Jim Rymarczyk, Chief Virtualization Technologist, IBM Fellow, Systems and Technology Group, Virtualization Technology Outlook, First International Conference, November 2006.

Keine Kommentare »

RSS feed for comments on this post.

Bisher noch keine Kommentare.

Kommentare verfassen

Line and paragraph breaks automatic, e-mail address never displayed, HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>