les dangers du social login

The risks of Social Login

You have seen it before, or even already used it to connect to a website, the social login seduces because...

Read

Of Machine Learning and Application Virtualization

Machine Learning is nowadays one of the most common expressions in literature, but the fields of application are so vast…

The History of Uberization

The usage of the word “uberize” should be a source of endless amusement for contemporary wordsmith. Today, any new product,…

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result…

Will our PCs even exist in 5 years?

Unlike the new generation stepping into the digital era failing to see how upsetting it is for us and the…

Windows 10 on a connected watch?

As a little kid from the suburbs of Paris, how I loved to gaze at the animated shop windows of…

Freed of BYOD, how can you finally make mobility productive?

I BYOD, you BYOD, he BYODs… The world of computing is an inexhaustible source of newly created or reinvented words….

Virtualization and security in the courtroom

The courtroom barely holds a multicolored crowd comprising the media, professionals, practitioners and onlookers with a vivid opinion about everything….

Acropolis, Greece has the honor!

What a tough job it is being a technology analyst. With every day spent in front of a blank page,…

In the interest of virtualizing the health sector

Everyone has their own obsession. One of these that made me famous (well, at least only in the family) is…