A Whether it’s reverse engineering a communications protocol, designing a database schema, building secure software or programming a microcontroller, Tom is comfortable negotiating IT systems from the highest overview down to the bit level.
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed