https://www.kinetikon.com/wp-content/uploads/2021/05/fondirigenti-1-2025-img-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-28 14:49:172025-05-06 11:41:19Avviso 1/2025 Fondirigenti – Competenze per il cambiamento
https://www.kinetikon.com/wp-content/uploads/2025/03/ai-coding1-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-24 15:32:252025-04-24 11:16:50AI Coding: sicurezza e strumenti Open Source per generare codice
https://www.kinetikon.com/wp-content/uploads/2025/03/cybercrime-italia-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-17 16:29:282025-04-24 11:17:57Analisi del cyber crime in Italia: caratteristiche, attori e tecniche di attacco
https://www.kinetikon.com/wp-content/uploads/2022/02/fondimpresa-2-2023-evidenza.png287365adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-04 09:04:352025-04-24 11:20:14Fondimpresa: Avviso 1/2025 – Competenze di base e trasversali
https://www.kinetikon.com/wp-content/uploads/2025/03/automl-02-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-03 14:22:282025-04-24 11:21:15AutoML: come funziona una pipeline e quali sono gli strumenti
https://www.kinetikon.com/wp-content/uploads/2025/02/ner02-news-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-02-18 12:02:122025-04-24 11:23:41Applicazioni e strumenti della Named Entity Recognition
https://www.kinetikon.com/wp-content/uploads/2025/02/post-quantum-cyrpto-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-02-04 08:45:592025-04-24 11:25:38Post Quantum Cryptography e gli algoritmi standard del NIST