Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

(Other) Chronicles Of The Android

  • Post author:
  • Post last modified:April 8, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:April 8, 2011

I know it is late and I am quite tired after a day of work. Still few seconds (and energies)…

Continue Reading(Other) Chronicles Of The Android

Tecnologia e Normativa: Le Due Facce Del Cloud

  • Post author:
  • Post last modified:February 22, 2011
  • Post category:Cloud
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:February 22, 2011

In queste ore IDC ha pubblicato un interessante documento "Accelerate Hybrid Cloud Success: Adjusting the IT Mindset" (sponsorizzato da VMware)…

Continue ReadingTecnologia e Normativa: Le Due Facce Del Cloud

Due Tacchini Non Fanno Un’Aquila

  • Post author:
  • Post last modified:February 9, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:February 9, 2011

Con questa perentoria battuta, Vic Gundotra, Vice-President di Google (ironia della sorte Ex Manager di Microsoft), ha commentato le presunte…

Continue ReadingDue Tacchini Non Fanno Un’Aquila

Astici, Androidi e Tablet (Prima Parte)

  • Post author:
  • Post last modified:January 15, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:January 15, 2011

L'inusuale accostamento che contraddistingue il titolo di questo post prende spunto dal titolo della commedia che ho visto ieri sera…

Continue ReadingAstici, Androidi e Tablet (Prima Parte)
Copyright 2022 - HACKMAGEDDON.COM