Come Taiwan si difende dalla Cina
Come Taiwan si difende dalla Cina

Giorgio Cuscito

Added on 28/05/2021

Scenario
The United States, China, and Taiwan: a strategy to prevent war
The United States, China, and Taiwan: a strategy to prevent war

Robert D. Blackwill
Philip Zelikow

Added on 28/05/2021

Scenario
Perché Usa e Cina si contendono i microchip di Taiwan
Perché Usa e Cina si contendono i microchip di Taiwan

Giorgio Cuscito

Added on 28/05/2021

Scenario
Contending on the periphery: Taiwan and Hong Kong
Contending on the periphery: Taiwan and Hong Kong

Richard Bush

Added on 28/05/2021

Scenario
Cuscinetto o ariete, l’Ucraina per Mosca è persa
Cuscinetto o ariete, l’Ucraina per Mosca è persa

Mikhail Minakov

Added on 28/05/2021

Scenario
Taiwan forgia la sua identità per sfuggire alla Cina
Taiwan forgia la sua identità per sfuggire alla Cina

Giorgio Cuscito

Added on 28/05/2021

Scenario
La breve vita dell’ufficio di Taiwan in Guyana
La breve vita dell’ufficio di Taiwan in Guyana

Giorgio Cuscito

Added on 28/05/2021

Scenario
Here’s what could happen if China invaded Taiwan
Here’s what could happen if China invaded Taiwan

Samson Ellis

Added on 28/05/2021

Scenario
Russia, Ukraine and the West: how do you solve a problem like Vladimir?
Russia, Ukraine and the West: how do you solve a problem like Vladimir?

Ian Bond

Added on 28/05/2021

Scenario
Zelens’kyj l’equilibrista
Zelens’kyj l’equilibrista

Fulvio Scaglione

Added on 28/05/2021

Scenario
Economics in a COVID-19 World: Global and Local Challenges
Economics in a COVID-19 World: Global and Local Challenges

Fadi Hassan

Added on 27/05/2021

Scenario Economia
Take aways post-pandemia  per una nuova  strategia cybersecurity aziendale
Take aways post-pandemia per una nuova strategia cybersecurity aziendale

Alberto Manfredi

Added on 25/05/2021

Operations - R&D Innovazione
Italia threat report. Le imprese estese sotto minaccia
Italia threat report. Le imprese estese sotto minaccia

VMware

Added on 25/05/2021

Operations - R&D Innovazione
Top threats to cloud computing - The egregious 11
Top threats to cloud computing - The egregious 11

Cloud Security Alliance

Added on 25/05/2021

Operations - R&D Innovazione
Infrastrutture digitali abilitanti @ Eni
Infrastrutture digitali abilitanti @ Eni

Gabriele Provana

Added on 25/05/2021

Operations - R&D Innovazione
2020 Threat Landscape
2020 Threat Landscape

VMware Threat Analysis Unit

Added on 25/05/2021

Operations - R&D Innovazione
Cybersecurity trailblazers. Make security intrinsic to their business
Cybersecurity trailblazers. Make security intrinsic to their business

VMware

Added on 25/05/2021

Operations - R&D Innovazione
Make cybersecurity a strategic asset
Make cybersecurity a strategic asset

Manuel Hepfer
Thomas C. Powell

Added on 25/05/2021

Operations - R&D Innovazione
The danger in calling the SolarWinds breach an act of war
The danger in calling the SolarWinds breach an "act of war"

Tarah Wheeler

Added on 25/05/2021

Operations - R&D Innovazione
A comprehensive approach to cyber resilience
A comprehensive approach to cyber resilience

Chon Abraham
Ronald R. Sims

Added on 25/05/2021

Operations - R&D Innovazione
Artificial Intelligence in the automobile industry
Artificial Intelligence in the automobile industry

ACEA Position Paper

Added on 24/05/2021

Operations - R&D Innovazione
Il futuro delle Super Sports Car
Il futuro delle Super Sports Car

Maurizio Reggiani
Riccardo Parenti

Added on 24/05/2021

Operations - R&D Innovazione
Reshoring, restructuring, and the future of supply chains
Reshoring, restructuring, and the future of supply chains

Sara Brown

Added on 24/05/2021

Operations - R&D Innovazione
MIT researchers collaborate with Lamborghini to develop an electric car of the future
MIT researchers collaborate with Lamborghini to develop an electric car of the future

Danielle Randall

Added on 24/05/2021

Operations - R&D Innovazione