Audrey Tang

Moreover, in our procurement processes, we avoid using the same vendor for two consecutive layers in a stack. For instance, if one vendor provides endpoint detection and response, another will handle the TW FidO implementation. This policy prevents vendor lock-in and ensures that every layer adheres to international interoperable standards. While we are not exclusively reliant on open-source solutions like Element/Matrix, we firmly believe in preventing vendor lock-in at any level of our technology stack.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech