Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Tecnologia e Normativa: Le Due Facce Del Cloud

  • Post author:
  • Post last modified:February 22, 2011
  • Post category:Cloud
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:February 22, 2011

In queste ore IDC ha pubblicato un interessante documento "Accelerate Hybrid Cloud Success: Adjusting the IT Mindset" (sponsorizzato da VMware)…

Continue ReadingTecnologia e Normativa: Le Due Facce Del Cloud

L’Androide (Virtuale)? E’ Tutto Casa e Lavoro

  • Post author:
  • Post last modified:February 16, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:February 16, 2011

In questi i giorni i fari multimediali del mondo sono puntati verso Barcellona, dove si sta svolgendo il Mobile World…

Continue ReadingL’Androide (Virtuale)? E’ Tutto Casa e Lavoro

Quando il telefono diventa virtuale…

  • Post author:
  • Post last modified:December 14, 2010
  • Post category:Mobile
  • Post comments:4 Comments
  • Reading time:3 mins read
  • Post published:December 14, 2010

Si parla molto in questo periodo di virtualizzazione. Nel corso del 2010 questo termine รจ diventato la parolina magica che…

Continue ReadingQuando il telefono diventa virtuale…
Copyright 2022 - HACKMAGEDDON.COM