The different vendors, they will have to talk interoperability, again open protocols. You’re not locked in by one single vendor. If your computation, your communication, your storage, or authentication all go to the same vendor, and that same vendor someday turns against you. Or maybe not against you, but was cyber attacked, then you’re gone. There’s no redundancy.

Keyboard shortcuts

j previous speech k next speech