Replies: 1 comment
-
1. Open Source with a Monetization Strategy
2. Data Privacy and Online Security
3. Securing Data in Transit and at Rest
4. Balancing Open Source and Closed Source Philosophies
5. Modular Design for Ephemeral or Enduring Resources
|
Beta Was this translation helpful? Give feedback.
-
Okay, let's get into the theoretical pieces to the project.
The very nature of Executive Protection implies a certain level of secrecy by applied and intensely considered. It poses a lot of difficult challenges and constraints from a developmental prospective. Some of those questions include:
There will be more questions I add later on, and as I find answers to them I will share them in this discussion thread with you as I solve them. This is an open topic to discuss, so if your reading and feel like sharing your thoughts on this, please feel free to comment on these hard questions!
cywf
Beta Was this translation helpful? Give feedback.
All reactions