Salta al contenuto principale



Fitting a Spell Checker into 64 kB


By some estimates, the English language contains over a million unique words. This is perhaps overly generous, but even conservative estimates generally put the number at over a hundred thousand. Regardless of where the exact number falls between those two extremes, it’s certainly many more words than could fit in the 64 kB of memory allocated to the spell checking program on some of the first Unix machines. This article by [Abhinav Upadhyay] takes a deep dive on how the early Unix engineers accomplished the feat despite the extreme limitations of the computers they were working with.

Perhaps the most obvious way to build a spell checker is by simply looking up each word in a dictionary. With modern hardware this wouldn’t be too hard, but disks in the ’70s were extremely slow and expensive. To move the dictionary into memory it was first whittled down to around 25,000 words by various methods, including using an algorithm to remove all affixes, and then using a Bloom filter to perform the lookups. The team found that this wasn’t a big enough dictionary size, and had to change strategies to expand the number of words the spell checker could check. Hash compression was used at first, followed by hash differences and then a special compression method which achieved an almost theoretically perfect compression.

Although most computers that run spell checkers today have much more memory as well as disks which are orders of magnitude larger and faster, a lot of the innovation made by this early Unix team is still relevant for showing how various compression algorithms can be used on data in general. Large language models, for one example, are proving to be the new frontier for text-based data compression.


hackaday.com/2025/03/26/fittin…



Smishing a tema INPS, documenti rubati in vendita nel dark web: quali conseguenze


@Informatica (Italy e non Italy 😁)
I criminali informatici hanno messo in vendita nel dark web i dati personali e i documenti riservati sottratti alle vittime della truffa smishing a tema INPS. Queste stesse vittime sono ora esposte a un concreto rischio di furto di identità. Ecco

reshared this



Integrated BMS Makes Battery Packs Easy


Lithium technology has ushered in a new era of batteries with exceptionally high energy density for a reasonably low cost. This has made a lot possible that would have been unheard of even 20 years ago such as electric cars, or laptops that can run all day on a single charge. But like anything there are tradeoffs to using these batteries. They are much more complex to use than something like a lead acid battery, generally requiring a battery management system (BMS) to keep the cells in tip-top shape. Generally these are standalone systems but [CallMeC] integrated this one into the buswork for a battery pack instead.

The BMS is generally intended to make sure that slight chemical imbalances in the battery cells don’t cause the pack to wear out prematurely. They do this by maintaining an electrical connection to each cell in the battery so they can charge them individually when needed, making sure that they are all balanced with each other. This BMS has all of these connections printed onto a PCB, but also included with the PCB is the high-power bus that would normally be taken care of by bus bar or nickel strips. This reduces the complexity of assembling the battery and ensures that any time it’s hooked up to a number of cells, the BMS is instantly ready to go.

Although this specific build is meant for fairly large lithium iron phosphate batteries, this type of design could go a long way towards making quick battery packs out of cells of any type of battery chemistry that typically need a BMS system, from larger 18650 packs or perhaps even larger cells like those out of a Nissan Leaf.


hackaday.com/2025/03/26/integr…

reshared this





c'è il dividi et impera... ma anche lo spaventa e impera...



dip 038, #sintassi , #davidlynch https://slowforward.net/2025/01/22/dip038/


dip 038, #sintassi , #davidlynch slowforward.net/2025/01/22/dip…


dip 038, sintassi


questa annotazione può sembrar cadere qui out of the blue (e forse un po’ è così), ma va detto – o sono persuaso possa essere detto – che:

c’è un modo specifico di sentire, di avvertire la sintassi, e di naturalmente tornirne i labirinti, che è in profondità analogo al lavoro di Lynch non soltanto con la macchina da presa e con determinate sue carrellate lentissime in climax o anticlimax (per esempio), ma proprio con la gestione della trama, intesa come:

tessuto che non solo si smaglia ma si riannoda in punti imprevedibili, come un abito non euclideo. o non sempre – non tutto – euclideo.

a differenza della radice, verticale e gerarchica, il rizoma è intersecante, trasverso, anarchico e orizzontale.

in questo, una certa modalità della ricerca letteraria, che soprattutto metto al lavoro con prose brevi in un libro che uscirà prima dell’estate, le asimmetrie e astrazioni (e torsioni) sintattiche che ho sperimentato dialogano, credo proficuamente, con una idea post-novecentesca di montaggio, frammentazione e ripresa di unità.

vorrò/vorrei poi sempre più che una quota forte, alta, di indeterminazione connotasse i materiali dei prossimi testi. (ma “textus” è un vocabolo inesatto, e la parentesi resta aperta

#111 #DavidLynch #dip #dip038 #dip038 #Lynch #sintassi





temo si sia palesata la possibilità di un nuovo ipotetico scenario di terza guerra mondiale: usa che invade l'europa da ovest, russia che invade l'europa da est, e cina che attacca la russia (e taiwan) da sud. giappone, africa, australia, resto dell'asia e america del sud neutrali.


3D-Printed Scanner Automates Deck Management for Trading Card Gamers


Those who indulge in trading card games know that building the best deck is the key to victory. What exactly that entails is a mystery to us muggles, but keeping track of your cards is a vital part of the process, one that this DIY card scanner (original German; English translation) seeks to automate.

At its heart, [Fraens]’ card scanner is all about paper handling, which is always an engineering task fraught with peril. Cards like those for Magic: The Gathering and other TCGs are meant to be handled by human hands, and automating the task of flipping through them presents some challenges. [Fraens] uses a pair of motorized 3D-printed rollers with O-rings to form a conveyor belt that can pull one card at a time off the bottom of a deck. An adjustable retaining roller made from the most adorable linear bearing we’ve ever seen ensures that only one card at a time is pulled from the hopper onto an imaging platen. An adjustable mount holds a smartphone to take a picture of the card, which is fed into an app that extracts all the details and categorizes the cards in the deck.

Aside from the card handling mechanism, there are some pretty slick details to this build. The first is that [Fraens] noticed that the glossy finish on some cards interfered with scanning, leading him to add a diffused LED ringlight to the rig. If an image isn’t scannable, the light goes through a process of dimming and switching colors until a good scan is achieved. Also, to avoid the need to modify the existing TCG deck management app, [Fraens] added a microphone to the control side of the scanner that listens for the sounds the app makes when it scans cards. And if Magic isn’t your thing, the basic mechanism could easily be modified to scan everything from business cards to old family photos.

youtube.com/embed/dl2RyKrg4pI?…


hackaday.com/2025/03/26/3d-pri…



FLOSS Weekly Episode 826: Fedora 42 and KDE


This week, Jonathan Bennett chats with Neal Gompa about Fedora 42 and KDE! What’s new, what’s coming, and why is flagship status such a big deal?


youtube.com/embed/xwgqPwsjd0g?…

Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or contact the guest and have them contact us! Take a look at the schedule here.

play.libsyn.com/embed/episode/…

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:


Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License


hackaday.com/2025/03/26/floss-…




L’AI Sa Più Password di Te! 3 Impiegati su 4 le Condividono con gli LLM


E ora di definire nuove policy e procedure. E’ ora di regolamentare l’utilizzo dell’intelligenza artificiale generativa all’interno delle aziende.

Il Generative AI Cloud and Threat Report 2025, pubblicato da Netskope Threat Labs, ha evidenziato un aumento preoccupante nell’uso di applicazioni di intelligenza artificiale generativa (genAI) da parte degli utenti aziendali. Nell’ultimo anno, il volume di dati inviati a queste app è cresciuto di 30 volte, comprendendo informazioni altamente sensibili come codice sorgente, dati regolamentati e proprietà intellettuale. Questa tendenza amplifica il rischio di violazioni dei dati, problemi di conformità e furto di informazioni critiche.

Uno degli aspetti più critici emersi dal rapporto è l’uso diffuso di account personali per accedere alle applicazioni genAI. Il 72% degli utenti aziendali utilizza strumenti genAI per scopi lavorativi tramite account non gestiti dall’organizzazione, creando un grave punto cieco in termini di sicurezza. James Robinson, CISO di Netskope, sottolinea nel report che nonostante gli sforzi per implementare strumenti ufficiali, la cosiddetta “shadow AI” è diventata una nuova sfida per l’IT, mettendo a rischio il controllo aziendale sui dati.

L’analisi ha rivelato che 3 utenti aziendali su 4 caricano dati sensibili su applicazioni di genAI, incluse password e chiavi di accesso. Netskope ha monitorato 317 diverse piattaforme genAI, tra cui strumenti noti come ChatGPT, Google Gemini e GitHub Copilot. La crescente integrazione di queste tecnologie negli ambienti aziendali ha reso fondamentale rafforzare la governance e il controllo, per evitare perdite involontarie di dati o violazioni della sicurezza.

Un altro dato significativo riguarda il cambiamento nell’adozione di infrastrutture locali per la genAI. Il numero di organizzazioni che utilizzano genAI on-premise è salito da meno dell’1% al 54% in un solo anno. Questo riduce il rischio di esposizione a terze parti, ma introduce nuove vulnerabilità legate alla gestione interna dei dati, alle catene di fornitura e alle potenziali fughe di informazioni. I team di sicurezza devono affrontare queste sfide con strategie più sofisticate, superando approcci di semplice blocco dell’accesso.

Per mitigare i rischi, Netskope raccomanda alle aziende di rivedere e personalizzare i propri framework di sicurezza per l’intelligenza artificiale. Le misure chiave includono la valutazione dell’uso di genAI, il rafforzamento dei controlli sulle applicazioni e la gestione più sicura dell’infrastruttura locale. L’adozione di strumenti avanzati di protezione basati sull’intelligenza artificiale sarà fondamentale per garantire un utilizzo sicuro e responsabile di queste tecnologie nel contesto aziendale.

L'articolo L’AI Sa Più Password di Te! 3 Impiegati su 4 le Condividono con gli LLM proviene da il blog della sicurezza informatica.



Windows Verrai Licenziato? Il Pinguino come Sistema Operativo per le Agenzie Governative Europee


In Europa si sta sviluppando l’interesse per un sistema operativo realizzato per le agenzie governative. Il progetto EU OS propone di creare una distribuzione Linux immutabile basata sull’ambiente desktop KDE con un’interfaccia che ricorda quella di Windows. Autore dell’idea è il Dott. Robert Riemann, dipendente dell’Autorità europea di vigilanza sulla protezione dei dati (GEPD).

In questa fase, EU OS non è un sistema operativo pronto all’uso, bensì dettagliato. documentazione. Descrive le funzionalità richieste, i metodi di distribuzione e amministrazione, nonché i principi di collaborazione con gli utenti. Il progetto è pensato per le organizzazioni di medie dimensioni, fino a diverse centinaia di dipendenti.

Nonostante l’attenzione rivolta all’Europa, si propone di prendere come base la distribuzione americana Fedora, o più precisamente la sua versione non modificabile Kinoite con la shell KDE. Questa scelta solleva interrogativi, soprattutto alla luce delle attuali tensioni geopolitiche. Sarebbe più saggio utilizzare sviluppi europei, ad esempio openSUSE. Tuttavia, Fedora Kinoite è davvero uno dei sistemi immutabili più maturi: le sue prime versioni sono apparse più di quattro anni fa.

Un sistema operativo immutabile è un OS in cui i file di base non possono essere modificati o sovrascritti durante il normale utilizzo. Questo significa che le modifiche al sistema vengono applicate solo tramite immagini predefinite, rendendo più sicuri gli aggiornamenti e riducendo il rischio di corruzione o malware. Se qualcosa va storto, è possibile ripristinare rapidamente una versione precedente senza compromettere la stabilità del sistema. Questo approccio è particolarmente utile in ambienti aziendali e governativi, dove l’affidabilità e la sicurezza sono prioritarie. Alcuni esempi di sistemi immutabili sono Fedora Silverblue/Kinoite, openSUSE MicroOS/Kalpa e ChromeOS.

I creatori hanno studiato attentamente l’esperienza di precedenti iniziative volte a migrare le agenzie governative verso Linux. Tra questi ci sono il progetto LiMux con sede a Monaco di Baviera, attivo dal 2004 al 2017, GendBuntu della gendarmeria francese e Linux Plus 1 nello stato tedesco dello Schleswig-Holstein.

Gli esperti, tuttavia, notano che alcune delle soluzioni tecniche del progetto appaiono controverse. L’ambiente desktop KDE Plasma potrebbe essere troppo complesso per un ambiente aziendale altamente regolamentato. Sebbene la versione immutabile di Fedora sia piuttosto affidabile, esistono alternative europee, come Desktop di Kalpa basato su openSUSE.

Domande più serie sorgono proprio dal concetto di un sistema operativo locale pienamente funzionale. Nell’era degli attacchi ransomware, questo approccio sembra obsoleto. La comunità del software libero dovrebbe creare un equivalente di ChromeOS: un sistema semplice, minimalista e a doppia ridondanza, in grado di funzionare con i server cloud tramite protocolli aperti. Tutti i componenti necessari esistono già, non resta che combinarli correttamente.

Vale la pena notare che le versioni open source esistenti di ChromeOS, come ChromiumOS, ChromeOS Flex o FydeOS, non risolvono questo problema. Funzionano solo con i servizi cloud di Google e non supportano standard di autenticazione aperti come LDAP o OpenID, la sincronizzazione dei file tramite WebDAV o l’archiviazione di segnalibri, password e impostazioni utente su server indipendenti

L'articolo Windows Verrai Licenziato? Il Pinguino come Sistema Operativo per le Agenzie Governative Europee proviene da il blog della sicurezza informatica.

Giupardeb reshared this.

in reply to Cybersecurity & cyberwarfare

per quanto riguarda il sw, quello è un altro problema, non relativo all'os: ad es. la suite per ufficio può essere migrata indipendentemente da os. Per il resto cosa è la curva? Sapere quali icone cliccare? L'unica cosa forse più complicata è la struttura del fs, ma in ambito pa per la maggior parte gli utenti possono scrivere solo nella loro cartella o in quelle condivise. Io ho avuto una tale esperienza. Ma sono conscio che in altri ambiti può essere diverso.Resistenza utente😑


Quale difesa europea per il futuro del multilateralismo? Il dibattito al Cnel

@Notizie dall'Italia e dal mondo

L’Europa è a un bivio. La difesa comune, tema dibattuto sin dal fallimento della Comunità europea di Difesa nel 1954, torna al centro del dibattito con ReArm Europe, il progetto promosso dalla Commissione europea per rafforzare le capacità strategiche del



Tagli alla cyber security negli Usa: l’impatto delle nuove politiche di Trump


@Informatica (Italy e non Italy 😁)
Le decisioni adottate includono il ridimensionamento della CISA e la cessazione di oltre l’80% dei programmi della USAID, che finanzia gli alleati per la costruzione di infrastrutture internet sicure. Ecco l'effetto Trump sulla cyber



Fantastica questa notizia!

Effettivamente, se esiste un settore nel quale il 90% dei programmi che servono è sviluppato ad hoc e in Cloud, è proprio la PA. Non vedo perché non si debba usare proprio Linux, con una distribuzione dedicata.

zeusnews.it/n.php?c=30849

#linux #software #indipendenza



Supercon 2024: A New World of Full-Color PCBs


Printed circuit boards were once so simple. One or two layers of copper etched on a rectangular fiberglass substrate, with a few holes drilled in key locations so components could be soldered into place. They were functional objects, nothing more—built only for the sake of the circuit itself.

Fast forward to today, and so much has changed. Boards sprout so many layers, often more than 10, and all kinds of fancy geometric features for purposes both practical and pretty. But what catches they eye more than that, other than rich, saturated color? [Joseph Long] came to the 2024 Hackaday Supercon to educate us on the new world of full color PCBs.

youtube.com/embed/LOSMH_EV6pQ?…

[Joseph] begins his talk with an explanation of terminology. We often look at a PCB and cite its color—say, green for example. As [Joseph] explains, the color comes from the solder mask layer—so called for its job in ensuring solder can only go where it’s supposed to go. The solder mask sits atop the copper layer, but beneath the silk screen which has all the component outlines and part labels.

Solder mask was traditionally green, and this is still the most common color you’ll find in the majority of electronics. However, in recent decades, the available gamut of colors has increased. Now, you can routinely order yellow, blue, purple, and red solder masks quite easily, as well as black or white if you’re so inclined. As some creative makers have found, when designing a board, it’s possible to get several colors into a design even if you’re just using one color of solder mask. That’s because the solder mask appears in slightly different shades when it’s laid over the bare fiberglass of the PCB, versus being laid over copper, for example. Add in white silkscreen and you’ve got quite a lot to work with.

PCB Color Palette
byu/Half_Slab_Conspiracy inPrintedCircuitBoard

Different colors are achievable on a PCB even just by using a single soldermask color.
We’re used to having a choice of color on our PCB orders today, but so much more is possible.
But what if you want more? What if you want real color? [Joseph] realized this could be possible when he found out that PCB board houses were already using inkjet-like printers to lay down silkscreen layers on small-run boards. Since there was already a printer involved in the board production process, wouldn’t it be simple to start printing on circuit boards in full color?

As it turns out, this was very practical. Two big Shenzhen board houses—JLCPCB and PCBWay—both started delivering color printed boards in 2024. The method involved using a white solder mask layer, with a full-color “silkscreen” layer printed on top using UV-cured ink. Using this ink was a particular key to unlocking full color PCBs. The UV-cured inks are more robust under the tough conditions PCBs face, such as the high temperatures during reflow or hand soldering.

Color printing PCBs might sound trivial and only relevant for cosmetic purposes, but [Joseph] points out it has lots of practical applications too. You can easily color code pinouts and traces right on the the board, a feature that has obvious engineering value. You can even use photorealistic footprints to indicate where other board-level modules should be soldered in, too, making assembly more intuitive. Plus, full color boards are fun—don’t discount that!

[Joseph] likes using the full-color prints to aid in assembly, by using far more realistic footprints for items like board-scale modules and batteries.[Joseph] is also a big fan of the SAO format, having designed several compatible boards himself. At his talk, he showed off special “extender” boards of his own creation and offered giveaways to attendees.If you’re wondering how to get started, [Joseph]’s talk covers all the important ground. He goes over the workflow for doing color PCBs with typical board houses. As the main suppliers in this area, PCBWay and JLCPCB both have slightly different ways of working with design files for color boards. Obviously, creating a color board involves making images outside of your traditional board design software. It’s straightforward enough, but you have to follow some careful practices to ensure your images are printed in the right size and right orientation to match the rest of your PCB design. PCBWay lets you make your own images and submit them with your Gerber files from whatever board design tool, while JLCPCB requires you to produce your PCB within their EasyEDA design software and put the graphics directly in there. [Joseph] also explains the costs involved for printing these boards, which does come at a premium relative to traditional boards.

As a bonus, we even get to see some of Joseph’s awesome color boards. The graphics are stunning—they really show the potential of full-color PCBs and how they can elevate a project or a fun badge design. If you’re eager to try this out, go ahead and watch [Joseph]’s primer and dive in for yourself!


hackaday.com/2025/03/26/superc…



Così la US Navy risponde ai progetti navali di Trump

@Notizie dall'Italia e dal mondo

“Gli Stati Uniti proiettano la loro presenza in tutto il mondo attraverso le loro navi da guerra, influenzando quotidianamente le decisioni geopolitiche mantenendo lo stile di vita americano”, ha detto Brett Seidle, assistente (acting) segretario della Marina per la ricerca, lo sviluppo e l’acquisizione. Seidle ha



No phone, no app, no encryption can protect you from yourself if you send the information you’re trying to hide directly to someone you don’t want to have it.#Signal #PeteHegseth


Encryption can’t protect you from adding the wrong person to a group chat. But there is also a setting to make sure you don’t.


You Need to Use Signal's Nickname Feature


You all already know the story about national security leaders, Signal, and The Atlantic by now. But to summarize in one sentence: a top U.S. official accidentally added the editor-in-chief of The Atlantic to a group chat on the secure messaging app Signal, and members of the group chat then discussed plans for striking Houthi targets (and with what weapons) before they happened or were public knowledge, resulting in a catastrophic leak of information bringing up all sorts of questions about why top U.S. brass were sharing these details on a consumer app, potentially on their personal phones, and not a communications channel approved for the sharing of classified information or combat plans.

According to screenshots of the chats and the group chat’s members published by The Atlanticon Wednesday, the outlet’s editor Jeffrey Goldberg used the display name “JG” on Signal. He also said in the original article that he displayed as JG. Presumably National Security Adviser Michael Waltz, who accidentally added Goldberg, added the wrong JG. This is a big, big mistake obviously.

But there is a somewhat overlooked setting inside Signal that can ensure you don’t make the same mistake. It’s the nickname feature. First, take a look at my Signal when I search for “Jason” when trying to make a new group and add members to it.

What a total fucking mess. As a journalist I receive Signal messages constantly, all day, every day, from people I know and people I don’t. More times than I can literally count, these people use or have names that are the same as people I’ve already spoken to. It gets even worse when someone pinging me uses the display name “M” or “A” or some other single initial.

A couple of those Jasons are Signal accounts belonging to 404 Media co-founder Jason Koebler, who I often have to add to group chats or talk to. But definitely not all of them. So, when creating a new group, I have to figure out, god, which Jason is the Jason I want to add this time. Previously I’ve worked it out by backing out of the create group section, finding the Jason I want, verifying their phone number if it’s available by clicking on my chat settings with them (which it seems you can’t do from within Signal’s create a group section), remembering what color Jason it is, then adding them. This information isn’t available for every contact though.

There is a much easier way, but it requires you to be proactive. You can add your own nickname to a Signal contact by clicking on the person’s profile picture in a chat with them then clicking “Nickname.” Signal says “Nicknames & notes are stored with Signal and end-to-end encrypted. They are only visible to you.” So, you can add a nickname to a Jason saying “co-founder,” or maybe “national security adviser,” and no one else is going to see it. Just you. When you’re trying to make a group chat, perhaps.

See what my Signal looks like after I use the nickname feature to label the correct Jason with “404”:

Signal could improve its user interface around groups and people with duplicate display names. But maybe, also don’t plan sensitive military operations in a group chat like this either.




Teardown of Casio Credit Card-Sized Radio


These days we don’t get too fussed about miniaturized electronics, not when you can put an entire processor and analog circuitry on a chip the size of a grain of sand. Things were quite different back in the 1980s, with the idea of a credit card-sized radio almost preposterous. This didn’t stop the engineers over at Casio from having a go at this and many other nutty ideas, with [Matt] from Techmoan having a go at taking one of these miniaturized marvels apart.
The Casio FM Stereo radio in happier days. (Credit: Techmoan, YouTube)
On the chopping block is the FM stereo device that was featured in a previous episode. Out of the four credit card-sized radios in that video, the one with the rechargeable battery (obviously) had ceased to work, so it was the obvious choice for a teardown. This mostly meant peeling off the glued-on top and bottom, after which the circuitry became visible.

In addition to the battery with a heavily corroded contact, the thin PCB contains a grand total of three ICs in addition to the analog circuitry. These were identified by [Spritetm] as an AM/FM tuner system IC (TA7792), an FM PLL MPX (TA7766AF) and a headphone amplifier (TA7767F), all of them manufactured by Toshiba.

Although [Matt] reckons this was a destructive teardown, we’re looking forward to the repair video where a fresh cell is soldered in and the case glued back together.

youtube.com/embed/XX_wOOvByPs?…


hackaday.com/2025/03/26/teardo…




siamo tutti parassiti.... mannaggia. magari trump ha anche ragione. se però il non parassita è putin io preferisco essere un parassita...


Ieri il Ministro Giuseppe Valditara si è recato in visita istituzionale in Veneto e ha incontrato studenti, docenti, famiglie e amministratori locali nella provincia di Padova.


sembrava trump ce l'avesse solo con persone gay e persone transessuali non cigender. nessuno ha protestato per questo motivo. alla fine fino a quando non toccano te chi se ne frega. invece no. l'italia non ha una tradizione di solidarietà. siamo troppo indivdualisti. il problema della discriminazione, tipico, è che quando si comincia a pesare le persone in modo diverso in base a criteri arbitrari, si sa come si comincia ma non si sa come si finisce, e chi verrà alla fine colpito. e così adesso sappiamo che trump è pure contro le donne. probabilmente pensa che siano solo degli uteri ambulanti, e non persone.


Lettera aperta al cinema e al mondo della cultura in Italia Noi che lavoriamo e viviamo nel mondo della cultura, ci rifiutiamo di continuare a assistere indifferenti al genocidio in atto nei confronti del popolo palestinese dopo decenni di occupazione illegale e violenta, di pulizia etnica e di oppressione, di regime di apartheid. Non si [...]


Un video interessante che ci fa capire, tra le altre cose, come la "macchina dell'informazione" italiana sia pesantemente spostata ad est, con tutte le conseguenze che ne derivano per l'opinione pubblica.

Ecco perché, poi vediamo questo sentimento antioccidentale e il sentimento anti-armamento crescente. Forse, in molti casi, anche perché mancano le premesse.

youtu.be/uCjn7IFBO90?si=EztVjP…

#russia #ucraina #disinformazione #disinformazionerussa #disinformazioneonline #guerraucraiana #GuerraUcrainaRussia #Travaglio #fact-checking



Tech in Plain Sight: Hearing Aids


You might think you don’t need a hearing aid, and you might be right. But in general, hearing loss eventually comes to all of us. In fact, you progressively lose hearing every year, which is why kids can have high-pitched ringtones their parents can’t hear.

You’d think hearing aids would be pretty simple, right? After all, we know how to pick up sounds, amplify them, and play them back. But there’s a lot more to it. Hearing aids need to be small, comfortable, have great battery life, and cram a microphone and speaker into a small area. That also can lead to problems with feedback, which can be very uncomfortable for the user. In addition, they need to handle very soft and loud sounds and accommodate devices like telephones.

Although early hearing aids just made sound louder and, possibly, blocked unwanted sound, modern devices will try to increase volume only in certain bands where the user has hearing loss. They may also employ sophisticated methods to block or reduce noise.

A Brief History


Hearing loss is nothing new. Ear trumpets appeared around the 17th century. These were just simple sound baffles that directed sound to your ear and, perhaps, cut some noise out that wasn’t in the trumpet’s direction.

The modern hearing aid dates back to the akouphone in 1895. [Miller Hutchison] developed the device for a friend who was deaf from a bout of scarlet fever. It was bulky — sitting on a table top — and used a carbon microphone, but it did work. He was also able to sell several models to royalty, many of whom suffered from hereditary deafness. This included Denmark’s Queen Alexandra, who, reportedly, was very impressed with the results.
The Acousticon microphone (left) and complete unit (right) (From Hawkins Electrical Guide #7, 1923)
Around 1902, [Hutchison] changed the device’s name to the acousticon, making it more portable with battery power. Despite impressive marketing, not all medical professionals were sold. If you were totally deaf, the device did nothing, unsurprisingly. In addition, the bulky batteries required frequent replacement, and the frequency response was poor.

It was still better than nothing, and the invention also led to the massacon and akoulalion that converted sound into vibration for the profoundly deaf. He later sold the rights for the acousticon to [Kelley Turner], who would not only improve the device, but also use the technology to launch the dictograph, which was a well-known office machine for many years.

Modern Times


The Zenith Miniature 75 (photo by [France1978] CC-BY-SA-2.0).Amplified hearing aids appeared around 1913, but they were still large boxes. By 1920, the vactuphone used vacuum tubes to perform amplification. At “only” seven pounds, the vactuphone was considered quite portable.

Keep in mind that portable hearing aids in the 1920s was a relative term. Typically, you’d have a unit carried in a bag or hung around your neck. World War II brought advances in minaturization which benefited hearing aids like the Zenith Miniature 75.

Transistors, of course, changed everything, including hearing aids. The Sonotone 1010, which appeared in 1952, used both transistors and tubes. Early transistor units were known to fail early due to moisture and heat. Silicon transistors and encapsulation helped.

Naturally, all of these hearing aids were analog as were the earliest IC-based devices. However, with the advent of ICs, it was possible to use digital techniques.
Patent drawing from 1984 — Hardly portable!
The path to digital hearing aids was difficult. In the 1970s, large computers could program digital elements in hearing aids to tune the device to set frequency bands and gains.

By 1980, several groups were experimenting with real digital hearing aids, although many of them had wireless links to real computers. A fully digital hearing aid first appeared in a 1984 patent, but it wasn’t tiny. Since then, things have gotten smaller and more capable.

Physical Form


Hearing aids went from table-top devices, to boxes hanging on necks. Getting smaller devices allowed for small boxes that hug the back of the ear with the earpiece into the ear canal.

With even smaller devices, the entire apparatus can be placed in the ear canal. Many of these go so deeply into the ear that they are largely invisible. There are also hearing aids that can surgically attach to your skull using a titanium post embedded in the bone. This can transmit sound even to people who can’t hear sound directly since it relies on bone conduction.

Other places to find hearing aids are built into thick glasses frames. Doctors with hearing problems can opt for stethoscopes with integrated hearing aids.

Modern hearing aids sometimes have rechargeable batteries. Otherwise, there will be some kind of small battery. There was a time that mercury cells were common, but with those banned in most places, many aids now take zinc-air batteries that deliver about 1.4 V.

We hear from an 8th grader that you can make hearing aid batteries last longer by peeling the sticker from them and waiting five minutes before installing them. Apparently, giving them a little time to mix with the air helps them.

What’s Next?


On the market today are hearing aids that use neural networks, have Bluetooth connections, and use other high tech tricks. We’ve looked at the insides of a hearing aid and why they cost so much before. If you want to roll your own, there is an open source design.


hackaday.com/2025/03/26/tech-i…



L’intesa sulla difesa tra Londra e Bruxelles dipende dalla pesca. Ecco perché

@Notizie dall'Italia e dal mondo

“Basta con la retorica sulla Brexit”, dice John Healey. Il segretario alla Difesa del Regno Unito parla di difesa, ma anche di pesca. Perché i due dossier sembrano sempre più collegati man mano che ci sia avvicina al summit tra Regno Unito e Unione europea in agenda il prossimo 19 maggio. L’entente cordiale tra Londra […]



Satelliti commerciali, cresce il rischio cyber. Enisa promuove il modello ‘zero trust’


@Informatica (Italy e non Italy 😁)
Proteggere le infrastrutture satellitari è un must sempre più impellente e per questo è necessario adottare un modello di sicurezza “robusto” e sposare un modello di sicurezza “zero trust”. Lo scrive l’Enisa, l’agenzia Ue per la cybersicurezza, in

reshared this



Google ha rimosso 180 app dal Play Store, per difenderci dalla truffa “Vapor”: di cosa si tratta


@Informatica (Italy e non Italy 😁)
Le minacce evolvono e Integral Ad Science (IAS) lo dimostra. Le 180 app rimosse non sono il classico repulisti che Google fa di tanto in tanto, ma rappresentano la parte visibile di un fenomeno sempre più complesso: una

reshared this




225 milioni di dollari per l’Uso Illecito delle Foto Online. Clearview perde la class Action e cede il 23%


Clearview AI ha ricevuto l’approvazione giudiziaria definitiva per un accordo che fornisce una quota azionaria del 23% della società a una categoria di consumatori che hanno affermato che la società di riconoscimento facciale ha utilizzato in modo improprio le immagini delle persone senza il loro consenso riporta Bloomberg.

Approvando l’accordo giovedì, la giudice Sharon Johnson Coleman della Corte distrettuale degli Stati Uniti per il distretto settentrionale dell’Illinois ha stimato che la quota dell’accordo valesse 51,75 milioni di dollari, sulla base di una valutazione di 225 milioni di dollari di gennaio 2024.

“Certo, la natura di una quota azionaria è che potrebbe ridursi o crescere a seconda delle performance della società”, ha detto Coleman nel suo ordine. Ma “Clearview è ottimista sulla potenziale crescita della società in base al mercato disponibile”, ha detto.

In assenza di un accordo, non era chiaro se Clearview avrebbe potuto pagare milioni di dollari come parte di una sentenza, o se avesse i fondi per superare il processo, secondo un giudice in pensione che ha facilitato le negoziazioni per la conciliazione.

Clearview ha raggiunto questo accordo per risolvere le cause legali consolidate secondo cui l’azienda avrebbe violato l’Illinois Biometric Information Privacy Act estraendo miliardi di foto online e inserendole in un database di riconoscimento facciale.

L’accordo prevede la nomina di un supervisore con il diritto di ispezionare le finanze di Clearview e di vendere la quota, al fine di proteggere gli interessi della class action che ha concluso l’accordo. Coleman ha ritenuto l’accordo equo, ragionevole e adeguato, nonostante le obiezioni politiche di 22 stati e del Distretto di Columbia, nonché dei gruppi di pressione.

L'articolo 225 milioni di dollari per l’Uso Illecito delle Foto Online. Clearview perde la class Action e cede il 23% proviene da il blog della sicurezza informatica.