Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search

Strategia Intel Per il Mobile: Io Ballo Da Sola

  • Post author:
  • Post last modified:February 21, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:February 21, 2011

Devo ammettere che la strategia Intel in ambito sicurezza e mobile mi sta incuriosendo molto. Commentando il matrimonio dell'anno tra…

Continue ReadingStrategia Intel Per il Mobile: Io Ballo Da Sola

Due Tacchini Non Fanno Un’Aquila

  • Post author:
  • Post last modified:February 9, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:February 9, 2011

Con questa perentoria battuta, Vic Gundotra, Vice-President di Google (ironia della sorte Ex Manager di Microsoft), ha commentato le presunte…

Continue ReadingDue Tacchini Non Fanno Un’Aquila

Subscribe

Enter your email address to subscribe and receive notifications of new posts by email.

Join 1,190 other subscribers
Copyright 2022 - HACKMAGEDDON.COM