https://www.kinetikon.com/wp-content/uploads/2025/03/ai-coding1-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-24 15:32:252025-07-17 10:00:04AI Coding: sicurezza e strumenti Open Source per generare codice
https://www.kinetikon.com/wp-content/uploads/2025/03/cybercrime-italia-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-17 16:29:282025-04-24 11:17:57Analisi del cyber crime in Italia: caratteristiche, attori e tecniche di attacco
https://www.kinetikon.com/wp-content/uploads/2022/02/fondimpresa-2-2023-evidenza.png287365adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-04 09:04:352025-06-17 14:46:04Fondimpresa: Avviso 1/2025 – Competenze di base e trasversali
https://www.kinetikon.com/wp-content/uploads/2025/03/automl-02-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-03 14:22:282025-04-24 11:21:15AutoML: come funziona una pipeline e quali sono gli strumenti
https://www.kinetikon.com/wp-content/uploads/2025/02/ner02-news-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-02-18 12:02:122025-04-24 11:23:41Applicazioni e strumenti della Named Entity Recognition
https://www.kinetikon.com/wp-content/uploads/2025/02/post-quantum-cyrpto-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-02-04 08:45:592025-04-24 11:25:38Post Quantum Cryptography e gli algoritmi standard del NIST
https://www.kinetikon.com/wp-content/uploads/2025/01/cyber-solidarity-act-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-01-27 15:12:572025-04-24 11:26:40Cyber Solidarity Act: il cambio di paradigma per la sicurezza informatica in UE