My interview in Computing News on whether Tridant which relies so heavily on computer systems could be compromised by hackers.
You must be logged in to post a comment.
To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Learn More)