A lot of the work that we do, like here in the administration, we also set up a, what we call, a sandstorm. A cyber security-hardened computation environment where we can share our work nodes, our combined system, the cars that we check our work on, show spreadsheets, and things like that.

Keyboard shortcuts

j previous speech k next speech