"Tell me and I forget, show me and I may remember, involve me and I learn." - Confucius Xunzi, 3rd century BC



2022-05-18 17:43:53 Mind Map software, Drawing Tools | Project Management software
estimated reading time: < 1 min This site uses cookies. By continuing to browse the ConceptDraw site you are agreeing to our Use of Site Cookies. New ways to create and manage everything you need to go from idea to implementation. A world-class business diagramming, idea management a
2022-03-25 09:58:06+01:00 Informativa sulla privacy
estimated reading time: 56 min For your convenience, we have provided a translation of this page below. This translation is for informational purposes only, and the definitive version of this page is the English version.Last updated: February 3, 2022This Privacy Policy includes importan
2022-02-14 09:54:25+01:00 Pushover: Privacy Policy
estimated reading time: 5 min Pushover, LLC ("Pushover", "we", "us", "our") provides online and mobile services, including but not limited to, the Pushover website ("Pushover.net" or the "Site"), API, and mobile applications (collectively, the "Service"). Pushover is committed to mainta
2022-01-20 18:29:30+01:00 LEOS Drafting tool Getting started
estimated reading time: < 1 min This page is dedicated to documentation that is meant to give a short introduction to LEOS, Open Source software created by LegIT  - 2016.38 Legislation Interoperability Tools ISA2 Action.For a quick overview of the pr
2021-07-26 16:26:48 Le abilità del giurista (legal skills)
estimated reading time: 5 min Corsi Universitari Le abilità del giurista (legal skills) By In 21 Febbraio 2021 Le abilità del giurista (Legal skills) Prof. Giovanni Pascuzzi Anno accademico 2020-2021 Syllabus del corso Imparare a distanza. Piccola guida per i miei studenti
2021-07-11 11:38:08 Readiness |
estimated reading time: 2 min Get ready for CYBER ESSENTIALS Cyber Essentials is a simple but effective, Government backed scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber attacks. Cyber attacks come in man