Vladimir

52%
Flag icon
However, the company asked its consultants to determine its supply chain risk. They reported that the company had two key vulnerabilities: access to Google’s Android operating system, the core software on which all non-Apple smartphones run, and the supply of the semiconductors that every smartphone requires.
Chip War: The Fight for the World's Most Critical Technology
Rate this book
Clear rating
Open Preview