Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:17 mins read
  • Post published:August 22, 2011

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue ReadingThe Dangerous Liaisons (Updated)

Astici, Androidi e Tablet (Prima Parte)

  • Post author:
  • Post last modified:January 15, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:January 15, 2011

L'inusuale accostamento che contraddistingue il titolo di questo post prende spunto dal titolo della commedia che ho visto ieri sera…

Continue ReadingAstici, Androidi e Tablet (Prima Parte)

La Corsa Dell’Androide

  • Post author:
  • Post last modified:December 2, 2010
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:2 mins read
  • Post published:December 2, 2010

Secondo una recente analisi di IDC, l'Androide Verde di Mountan View si appresta a superare il gigante di Espoo nel…

Continue ReadingLa Corsa Dell’Androide
Copyright 2022 - HACKMAGEDDON.COM