Salta al contenuto principale



A Gentle Introduction to COBOL


As the Common Business Oriented Language, COBOL has a long and storied history. To this day it’s quite literally the financial bedrock for banks, businesses and financial institutions, running largely unnoticed by the world on mainframes and similar high-reliability computer systems. That said, as a domain-specific language targeting boring business things it doesn’t quite get the attention or hype as general purpose programming or scripting languages. Its main characteristic in the public eye appears be that it’s ‘boring’.

Despite this, COBOL is a very effective language for writing data transactions, report generating and related tasks. Due to its narrow focus on business applications, it gets one started with very little fuss, is highly self-documenting, while providing native support for decimal calculations, and a range of I/O access and database types, even with mere files. Since version 2002 COBOL underwent a number of modernizations, such as free-form code, object-oriented programming and more.

Without further ado, let’s fetch an open-source COBOL toolchain and run it through its paces with a light COBOL tutorial.

Spoiled For Choice


It used to be that if you wanted to tinker with COBOL, you pretty much had to either have a mainframe system with OS/360 or similar kicking around, or, starting in 1999, hurl yourself at setting up a mainframe system using the Hercules mainframe emulator. Things got a lot more hobbyist & student friendly in 2002 with the release of GnuCOBOL, formerly OpenCOBOL, which translates COBOL into C code before compiling it into a binary.

While serviceable, GnuCOBOL is not a compiler, and does not claim any level of standard adherence despite scoring quite high against the NIST test suite. Fortunately, The GNU Compiler Collection (GCC) just got updated with a brand-new COBOL frontend (gcobol) in the 15.1 release. The only negative is that for now it is Linux-only, but if your distribution of choice already has it in the repository, you can fetch it there easily. Same for Windows folk who have WSL set up, or who can use GnuCOBOL with MSYS2.

With either compiler installed, you are now ready to start writing COBOL. The best part of this is that we can completely skip talking about the Job Control Language (JCL), which is an eldritch horror that one would normally be exposed to on IBM OS/360 systems and kin. Instead we can just use GCC (or GnuCOBOL) any way we like, including calling it directly on the CLI, via a Makefile or integrated in an IDE if that’s your thing.

Hello COBOL


As is typical, we start with the ‘Hello World’ example as a first look at a COBOL application:
IDENTIFICATION DIVISION.
PROGRAM-ID. hello-world.
PROCEDURE DIVISION.
DISPLAY "Hello, world!".
STOP RUN.
Assuming we put this in a file called hello_world.cob, this can then be compiled with e.g. GnuCOBOL: cobc -x -free hello_world.cob.

The -x indicates that an executable binary is to be generated, and -free that the provided source uses free format code, meaning that we aren’t bound to specific column use or sequence numbers. We’re also free to use lowercase for all the verbs, but having it as uppercase can be easier to read.

From this small example we can see the most important elements, starting with the identification division with the program ID and optionally elements like the author name, etc. The program code is found in the procedure division, which here contains a single display verb that outputs the example string. Of note is the use of the period (.) as a statement terminator.

At the end of the application we indicate this with stop run., which terminates the application, even if called from a sub program.

Hello Data


As fun as a ‘hello world’ example is, it doesn’t give a lot of details about COBOL, other than that it’s quite succinct and uses plain English words rather than symbols. Things get more interesting when we start looking at the aspects which define this domain specific language, and which make it so relevant today.

Few languages support decimal (fixed point) calculations, for example. In this COBOL Basics project I captured a number of examples of this and related features. The main change is the addition of the data division following the identification division:
DATA DIVISION.
WORKING-STORAGE SECTION.
01 A PIC 99V99 VALUE 10.11.
01 B PIC 99V99 VALUE 20.22.
01 C PIC 99V99 VALUE 00.00.
01 D PIC $ZZZZV99 VALUE 00.00.
01 ST PIC $*(5).99 VALUE 00.00.
01 CMP PIC S9(5)V99 USAGE COMP VALUE 04199.04.
01 NOW PIC 99/99/9(4) VALUE 04102034.
The data division is unsurprisingly where you define the data used by the program. All variables used are defined within this division, contained within the working-storage section. While seemingly overwhelming, it’s fairly easily explained, starting with the two digits in front of each variable name. This is the data level and is how COBOL structures data, with 01 being the highest (root) level, with up to 49 levels available to create hierarchical data.

This is followed by the variable name, up to 30 characters, and then the PICTURE(or PIC) clause. This specifies the type and size of an elementary data item. If we wish to define a decimal value, we can do so as two numeric characters (represented by 9) followed by an implied decimal point V, with two decimal numbers (99). As shorthand we can use e.g. S9(5) to indicate a signed value with 5 numeric characters. There a few more special characters, such as an asterisk which replaces leading zeroes and Z for zero suppressing.

The value clause does what it says on the tin: it assigns the value defined following it to the variable. There is however a gotcha here, as can be seen with the NOW variable that gets a value assigned, but due to the PIC format is turned into a formatted date (04/10/2034).

Within the procedure division these variables are subjected to addition (ADD A TO B GIVING C.), subtraction with rounding (SUBTRACT A FROM B GIVING C ROUNDED.), multiplication (MULTIPLY A BY CMP.) and division (DIVIDE CMP BY 20 GIVING ST.).

Finally, there are a few different internal formats, as defined by USAGE: these are computational (COMP) and display (the default). Here COMP stores the data as binary, with a variable number of bytes occupied, somewhat similar to char, short and int types in C. These internal formats are mostly useful to save space and to speed up calculations.

Hello Business


In a previous article I went over the reasons why a domain specific language like COBOL cannot be realistically replaced by a general language. In that same article I discussed the Hello Business project that I had written in COBOL as a way to gain some familiarity with the language. That particular project should be somewhat easy to follow with the information provided so far. New are mostly file I/O, loops, the use of perform and of course the Report Writer, which is probably best understood by reading the IBM Report Writer Programmer’s Manual (PDF).

Going over the entire code line by line would take a whole article by itself, so I will leave it as an exercise for the reader unless there is somehow a strong demand by our esteemed readers for additional COBOL tutorial articles.

Suffice it to say that there is a lot more functionality in COBOL beyond these basics. The IBM ILE COBOL reference (PDF), the IBM Mainframer COBOL tutorial, the Wikipedia entry and others give a pretty good overview of many of these features, which includes object-oriented COBOL, database access, heap allocation, interaction with other languages and so on.

Despite being only a novice COBOL programmer at this point, I have found this DSL to be very easy to pick up once I understood some of the oddities about the syntax, such as the use of data levels and the PIC formats. It is my hope that with this article I was able to share some of the knowledge and experiences I gained over the past weeks during my COBOL crash course, and maybe inspire others to also give it a shot. Let us know if you do!


hackaday.com/2025/04/30/a-gent…



You wouldn't download an illegal font ... unless you wanted to use it to sell a modem for the Sega Genesis?

You wouldnx27;t download an illegal font ... unless you wanted to use it to sell a modem for the Sega Genesis?#XBAND #conspiracytheories #InternetMysteries




precedente #28 ––– successivo #30 di Enrico Nardelli Abbiamo discusso nel precedente post la necessità di un diverso punto di vista su...
#28 #30


Other official government domains included DinnerForAmerica.gov and TheTrillion.Gov, and signal that there may have been plans to incorporate official government internet infrastructure with the meme coin investment dinner.#News
#News


Meta's wild AI chatbots; a wildly unethical piece of research on Reddit; and the age of realtime deepfake fraud is here.

Metax27;s wild AI chatbots; a wildly unethical piece of research on Reddit; and the age of realtime deepfake fraud is here.#Podcast



Terminal DAW Does it in Style


As any Linux chat room or forum will tell you, the most powerful tool to any Linux user is a terminal emulator. Just about every program under the sun has a command line alternative, be it CAD, note taking, or web browsing. Likewise, the digital audio workstation (DAW) is the single most important tool to anyone making music. Therefore, [unspeaker] decided the two should, at last, be combined with a terminal based DAW called Tek.

Tek functions similarly to other DAWs, albeit with keyboard only input. For anyone used to working in Vim or Emacs (we ask you keep the inevitable text editor comment war civil), Tek will be very intuitive. Currently, the feature set is fairly spartan, but plans exist to add keybinds for save/load, help, and more. The program features several modes including a multi-track sequencer/sampler called the “arranger.” Each track in the arranger is color coded with a gradient of colors generated randomly at start for a fresh look every time.

Modern audio workflows often span across numerous programs, and Tek was built with this in mind. It can take MIDI input and output from the JACK Audio Connection Kit, and plans also exist to create a plugin server so Tek could be used with other DAWs like Ardor or Zrythm. Moreover, being a terminal program opens possibilities for complicated shell scripting and other such Linux-fu.

Maybe a terminal DAW is not your thing, so make sure to check out this physical one instead!


hackaday.com/2025/04/30/termin…



Google scopre 75 vulnerabilità zero-day: lo spionaggio non è mai stato così fuori controllo


Il team del Google Threat Intelligence Group (GTIG) ha scoperto uno sfruttamento su larga scala di falle critiche del software. Nell’ultimo anno, i criminali informatici hanno sfruttato 75 falle di sicurezza precedentemente sconosciute, le cosiddette vulnerabilità zero-day. Gli aggressori hanno prestato particolare attenzione al software aziendale, in particolare ai sistemi di sicurezza e alle soluzioni di rete.

Le violazioni scoperte sono state classificate in due categorie principali. Nelle tecnologie aziendali, gli esperti hanno rilevato 33 falle critiche, le restanti 42 hanno interessato piattaforme e prodotti per gli utenti finali: dispositivi mobili, sistemi operativi, browser e programmi applicativi.

Rispetto all’anno precedente, il numero totale di attacchi che sfruttano vulnerabilità zero-day è leggermente diminuito, passando da 98 a 75 casi. Tuttavia, gli analisti notano che la tendenza a lungo termine rimane al rialzo. Per fare un paragone: l’anno prima erano stati registrati solo 63 incidenti simili.

Di particolare preoccupazione per i ricercatori sono le attività dei fornitori commerciali di spyware. Questi gruppi migliorano costantemente i metodi per mascherare le loro attività e aumentare il livello di sicurezza operativa, il che rende molto più difficile la loro individuazione e identificazione.

Più della metà delle vulnerabilità individuate dagli esperti di Google sono state sfruttate in operazioni di spionaggio informatico. La situazione era particolarmente tesa nel segmento della tecnologia aziendale: sono stati identificati 20 bug critici nei sistemi di sicurezza e nelle apparecchiature di rete, che rappresentavano oltre il 60% di tutti i casi di attacchi alle infrastrutture aziendali.

Il browser web Chrome di Google è rimasto l’obiettivo principale tra i browser, sebbene il numero complessivo di attacchi a questa categoria di software sia diminuito. Nell’ultimo anno sono state scoperte 11 vulnerabilità zero-day, rispetto alle 17 dell’anno precedente. Una dinamica simile è stata osservata nel segmento dei dispositivi mobili, dove la cifra è scesa a 9.

Il sistema operativo Windows ha mostrato il maggiore incremento nel numero di difetti critici. I ricercatori di Google hanno registrato 22 exploit, in aumento rispetto ai 17 dell’anno precedente. Gli esperti sottolineano che finché questa piattaforma manterrà la sua posizione di leadership sia nell’uso domestico che professionale, continuerà senza dubbio a rappresentare un bersaglio interessante per gli aggressori.

Nel settore aziendale, gli obiettivi più comuni degli attacchi sono stati i servizi cloud Ivanti, il sistema PAN-OS di Palo Alto Networks, il firewall Adaptive Security Appliance di Cisco e la soluzione Connect Secure VPN di Ivanti. In totale sono stati interessati prodotti di 18 diversi produttori di soluzioni aziendali.

Gli analisti sono riusciti a stabilire l’origine di una parte significativa degli attacchi. Gli sviluppatori di spyware commerciali hanno sfruttato otto falle zero-day. Cinque casi hanno coinvolto gruppi sostenuti dalla Cina e dalla Corea del Nord, con gli hacker nordcoreani che perseguivano sia obiettivi di intelligence che finanziari. Altri cinque attacchi sono stati perpetrati da gruppi indipendenti di criminalità informatica. Almeno tre casi di sfruttamento di vulnerabilità critiche sono stati attribuiti alla Russia.

Gli esperti sottolineano la crescente disponibilità di strumenti per individuare e utilizzare gli 0-day. Gli aggressori esplorano attivamente nuove direzioni tecnologiche, attaccando spesso gli sviluppatori meno esperti. Si prevede che tali tecniche saranno utilizzate ancora per molto tempo, poiché consentono operazioni segrete, presenza a lungo termine nei sistemi ed elusione della giustizia.

L'articolo Google scopre 75 vulnerabilità zero-day: lo spionaggio non è mai stato così fuori controllo proviene da il blog della sicurezza informatica.



Numeri di Mattarella e Meloni in vendita online: non è un problema cyber, ma di privacy


cybersecurity360.it/legal/priv…

Il caso di database con presunti numeri di personaggi pubblici in vendita indigna molti in queste ore, ma probabilmente non c’è stato nessun furto. Né un problema di cyber security. Di privacy violata però, forse, sì. Bene conoscere il tema del web scraping, che minaccia tutti

Presunti numeri di Mattarella, Meloni e altri personaggi pubblici in libera vendita sul web: il caso indigna molti in queste ore, ma probabilmente non c’è stato nessun furto. Né un problema di cyber security.

Di privacy violata però, forse, sì.

Com’è noto, una segnalazione pubblica di un esperto ha aperto un’indagine della Polizia Postale, ancora con contorni da verificare, per la presenza di numeri e altri contatti di personaggi pubblici italiani in vendita sul web.

La spiegazione più probabile però è che non si tratti di un attacco informatico né di un data breach di un database istituzionale ma il risultato di una raccolta di informazioni da fonti pubbliche da parte di aziende specializzate in lead generation.


dicorinto.it/temi/privacy/nume…



Il Ministro Giuseppe Valditara si è recato ieri in Liguria per una visita istituzionale sul territorio e per incontrare studenti, docenti e amministratori locali.


Intesa paziente e contendenti

@Politica interna, europea e internazionale

Si può raccontarla usando il vocabolario della finanza, correndo però il rischio di non aiutare a capire quel che sta succedendo. Perché l’intrecciarsi delle offerte pubbliche di scambio è naturalmente guidato dalle convenienze e compatibilità finanziarie, ma indirizzate a una risistemazione degli equilibri di potere. Tanto che il governo ha



This morning the White House Press Secretary accused Amazon of conducting a 'hostile political action.'

This morning the White House Press Secretary accused Amazon of conducting a x27;hostile political action.x27;#News

#News #x27


For a few hours, 19,000 NFTS that Nike helped mint returned a Cloudflare error instead of the picture people promised would live forever online.#News


NFTs That Cost Millions Replaced With Error Message After Project Downgraded to Free Cloudflare Plan


On Friday, thousands of NFTs that had once sold collectively for millions of dollars vanished from the internet and were replaced with the phrase “This content has been restricted. Using Cloudflare’s basic service in this manner is a violation of the Terms of Service.” The pictures eventually returned but their brief loss, as a result of one of the services that served the NFTs being migrated to a free account, is a reminder of the ephemeral nature of digital goods as well as the craze for crypto-backed pictures that dominated the internet for a few years.

The pictures were part of a CloneX RTFKT (pronounced “artifact”) collection, a Nike-backed NFT project done in collaboration with Japanese artist Takashi Murakami. They disappeared because the corporate overlord that acquired them was no longer investing the time or capital into the project it once had.
playlist.megaphone.fm?p=TBIEA2…
At around 5 a.m. EST on the morning of April 24, more than 19,000 NFTs in the CloneX RTFKT (pronounced “artifact”) collection vanished. In their place was white text on a black background that said: “This content has been restricted. Using Cloudflare’s basic service in this manner is a violation of the Terms of Service.”

The pictures linked to a URL on Cloudflare’s site that explained a bit more about what was going on. “If you are on a Free, Pro, or Business Plan and your application appears to be serving videos or a disproportionate amount of large files without using the appropriate paid service as described below, Cloudflare may redirect your content or take other actions to protect quality of service,” it said.

One of the original pitches of NFTs is that they would live forever on the internet. The idea is that they were a digital asset, as good as a real world asset like gold or silver, and could never be destroyed or erased. The flicking out of some 19,000 NFTs and the erasure of tens of millions of dollars in Etherium called that into question.

https://x.com/PixOnChain/status/1915352785626845289

NFTs are non-fungible tokens, which use the blockchain to “prove” the ownership of digital assets. In the speculative frenzy that followed, a lot of people got rich minting grotesque pictures and selling them online. The trend peaked around the start of 2022 when Jimmy Fallon and Paris Hilton talked about the then-popular Bored Ape Yacht Club on the Tonight Show.

Nike bought RTFKT in 2021 when corporations and investors thought NFTs would be the next big thing. No one knows what Nike paid for the company, but earlier that year Andreeseen Horowitz had valued RTFKT at $33 million and RTFKT used that number to raise $8 million in capital.

Three years later, Nike decided to pull the plug and sunset the project. At the time, Samuel Cardillo was RTFKT’s CTO and the man in charge of keeping things running. At its height, Cardillo had a team of 12 people helping him run the project. Now it’s just him. He stayed on as a consultant after Nike said it wouldn’t support the project anymore.

He’s currently in the process of migrating Nike’s NFTs off of a DigitalOcean cloud server and onto AWS. “I, personally, wanted to decentralize the assets instead of moving them just to yet another centralized hosting which would be under someone else’s will,” he said.

But Nike gets the final say, even now.

He was using Cloudflare as a third-party service to secure inbound and outbound connections from the user to DigitalOcean. The plan was and is to use this as a bridge while he decentralized the pictures on ArWeave—a blockchain for data storage.

According to Cardillo, the images vanished because Cloudflare moved RTFKT onto a free plan earlier than he expected. “The reason we're moving to the free plan is that, RTFKT is sunset, there are no plans to do any drops or anything like that so having a paid plan with Cloudflare makes absolutely no sense anymore,” he told 404 Media.

https://x.com/cardillosamuel/status/1915331631998500879?s=46

Cardillo posted about the issues on RTFKT’s Discord and fielded questions on X while he got the pictures back online. “I understand the panic,” he said. “It’s my duty to ensure that those people can be reassured, it’s part of my responsibility being in charge of all of this.”

Around the same time that the NFTs vanished, some of the people left holding the RTFKT bag filed a lawsuit against Nike. An Australian resident filed the class action lawsuit in Brooklyn, New York federal court. It said that the shoe company ending support for the NFT company led to significant losses for people who had bought them.

Cardillo declined to comment on the lawsuit, but said he still believed in the technology underlying NFTs. “I hope people see the point of this technology itself and stop using it to fuel the casino that crypto became,” he said.


#News


Sono stati firmati dal Ministro Giuseppe Valditara due decreti finalizzati all’attivazione dei percorsi di specializzazione sul sostegno previsti dal decreto legge 71 del 2024.


Il Ministro Giuseppe Valditara ha inviato alle scuole una circolare relativa alla programmazione delle verifiche in classe e all’assegnazione dei compiti da svolgere a casa.

Qui tutti i dettagli ▶️ mim.gov.

Poliverso & Poliversity reshared this.



#NotiziePerLaScuola
È disponibile il nuovo numero della newsletter del Ministero dell’Istruzione e del Merito.



Il fondatore di WikiLeaks, Julian Assange, ha reso un sentito omaggio a Papa Francesco in occasione delle sue esequie, manifestando rispetto e gratitudine per il Pontefice che, nel corso degli anni, si è interessato alla sua vicenda.


Instance drama, with some reflection on how federation could be improved on the fediverse.


Fediverse Report – #114

Posts made by a Fosstodon server moderator on Reddit has caused some drama, leading to both Fosstodon admins to call it quits, a number of servers (threatening to) defederate from the Fosstodon server, leading to an uncertain future for the Fosstodon server.

Fosstodon drama


A few days ago someone published a post on Mastodon, with screenshots and links to posts made on Reddit by one of the Fosstodon moderators. In the linked posts, the Reddit account in question, which seemingly belongs to the Fosstodon moderator, holds various right-wing beliefs, ranging from defending the deportation of Mahmoud Khalil to claiming Democrat supporters are in a cult. Backlash to the Fosstodon server was swift and strong, with various calls and plans from other servers to defederate from Fosstodon, members of the Fosstodon server looking for other servers to move their account to, and a general condemnation from the wider community. Both Fosstodon admins have posted articles declaring they are stepping down, citing not only the current drama as a reason, but that they see the work of being server admins as frustrating with little pay-off. One Fosstodon community member is considering to take over the administration of the server, though as of writing, that process is still ongoing and the outcome unclear.

Some thoughts and takeaways about what this drama says about the social side of federation on the network, and how different communities interact:

When a server moderators holds opinions other people view as problematic, the social cost of these views is partially extended to server users as well. See for example the account for fediverse streaming platform Owncast, which has an account on the Fosstodon server. Owncast says that they are getting messages that say they need to move servers, otherwise people will see them as Nazis. This blog post about another Fosstodon user explains a similar thought process, where it is rational for them to move to a different server, because they will be associated with the politics of the server moderator in question otherwise.

This behaviour has an impact on how people on the fediverse should find an instance they want to join. It turns out that knowing the political affiliations of server moderators is important, and that this is something that people should know about before joining a server. People will be judged for being on a server that has a moderator with toxic political views. As such, it becomes important for people to know this information beforehand: both that they will get judged for the politics of server moderators, as well as knowing what those political views actually are.

This is another indication of why the process of selecting a server when someone joins the fediverse is actually a challenge: important information that should impact server choice is not made available to users, nor is it made clear that this information is important in the first place.

The second takeaway from the situation is that it shows a need for fediverse servers to have a federation policy. How federation currently works on the fediverse is that servers are connected with each other by default, and the assumption is that servers can disconnect from each other for any reason, but will mostly do so only if one of the servers is misbehaving in some way. Freedom of association is one of the valuable features of the fediv erse. Server operators should be free to defederate from any other server, for any reason. Being able to defederate from another server because you strongly disagree with the politics from one of the server moderators is a good thing. But if this is a consistent policy of the server, it would do well to make this policy public and explicit. Servers defederating from each other can have significant impact on users, who suddenly can lose connections with their friends. A policy of defederating from other servers based on the expressed beliefs of server moderators is something that is not immediately obvious to new people joining the fediverse. There are absolutely valid reasons to do so, but it seems to me that formalising such a policy would be a good step towards making the culture on the fediverse more sustainable.

The third takeaway is that running a fediverse server is challenging, especially over longer periods of time. Both Fosstodon admins have called in quits in response to the most recent drama. Their blog posts explaining their perspectives is that this has been a long time coming, and that the Fosstodon server has been uncompensated work that they do not love doing for years now. Regardless of one’s perspective on how the admins handled the latest situation, it is a further indication that being a fediverse server admin is a challenging job, one that should not be expected that someone can do forever. This means that servers like Fosstodon need governance systems that allow for better and earlier rotation of administrative power. Fediverse software should also be better at dealing with the realities of admin burnout. The users who are transferring from Fosstodon to another server will lose their posts; Mastodon does only transfer the social graph, and not posting history. While ideally the majority of servers would have extensive governance systems in place that can help deal with admin burnout, the reality is that most servers do not. More fediverse software should provide better support for users having to move to different servers, including with their posts.

The Links


  • NLnet, a fund that contributes to many open-source initiatives with a long track record of support fediverse projects, has published the beneficiaries of their latest funding round. PeerTube has gotten another grant, and publisher Framasoft talked about more how the money will be spend in their 2025 roadmap. The other fediverse beneficiary is an OpenScience flavour of Bonfire. Bonfire is an upcoming fediverse platform with a broad range of features, but the platform has struggled to get to an actual release. Bonfire published a blog post about their ‘road to Bonfire 1.0’ in September 2023, and an update in October 2024 where they announced a bounty program to get contributions to improve performance of the app.
  • Flipboard uploaded more videos from last months Fediverse House event at SXSW on their PeerTube channel, including an interview with Cory Doctorow and a demo of the Surf app.
  • The Doo the Woo podcast, hosted by WordPress ActivityPub plugin developer Matthias Pfefferle, interviewed André Menrath. Menrath is working on a plugin to bring WordPress events to ActivityPub.
  • The Bad Space is a project where various fediverse servers share their blocklists to build an aggregate of fediverse servers that are potentially worth blocking. The project is now available for self-hosting.
  • Some new features for FediAlgo, a customisable timeline algorithm for Mastodon, including a ‘What’s Trending’ feature.
  • A writeup on how to make a blog site using Lemmy as data storage.
  • This week’s fediverse software updates.

That’s all for this week, thanks for reading! You can subscribe to my newsletter to get all my weekly updates via email, which gets you some interesting extra analysis as a bonus, that is not posted here on the website. You can subscribe below:

#fediverse

fediversereport.com/fediverse-…




SIRIA. Dopo gli alawiti, ora sotto attacco sono i drusi. E Israele sfrutta l’occasione


@Notizie dall'Italia e dal mondo
Oltre 22 morti a Jaramana, città a maggioranza drusa attaccata da miliziani delle nuove autorità di Damasco, e in altre località. Tra le vittime anche militari governativi Israele intanto bombarda "in difesa dei drusi" e porta avanti i



Governance di Internet, l’Icann lancia l’allarme: “La rete globale è a rischio”

Al Wsis+20 si decide il futuro della rete: il modello multistakeholder minacciato da nuove spinte stataliste. L’Internet Corporation for Assigned Names and Numbers avverte: senza un “governo” inclusivo si andrebbe verso la frammentazione e il controllo geopolitico

corrierecomunicazioni.it/telco…

@Politica interna, europea e internazionale

reshared this




la corea del nord penso sia forse l'unico paese del mondo dove il turista invece di portare ricchezza consuma ricchezza... penso sia il motivo per cui ne autorizzano pochi (ma buoni, per loro).



Fragilità


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/fragilit…
No, non è Frittole, non è il millequattrocento - quasi millecinque, ma ci assomiglia molto e, mio malgrado, posso dire "io c'ero". Forse mi sto ripetendo perché cito spesso "non ci resta che piangere" ma non trovo nulla di più adatto. Tornando da una lunga…

Privacy Pride reshared this.



con trump si può dire come minimo che gli usa sono diventati un interlocutore inaffidabile per chiunque


SIRIA. Dopo gli alawiti, ora sotto attacco sono i drusi


@Notizie dall'Italia e dal mondo
Almeno 14 i morti a Jaramana, città a maggioranza drusa attaccata da miliziani delle nuove autorità di Damasco.
L'articolo SIRIA. Dopo gli alawiti, ora sotto attacco sono i drusi proviene da pagineesteri.it/2025/04/30/med…



Perché Zuckerberg ha lanciato una app Meta Ai per iOS e Android?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Menlo Park sfodera l'app Meta Ai compatibile con gli occhiali intelligenti realizzati dal gruppo. Chiara l'intenzione di presidiare tutti gli ambiti utili a potenziare e sfamare i propri algoritmi: via



🚩ATTENZIONE🚩: il 2 maggio è prevista la migrazione di Pixelfed.uno su un nuovo server dedicato![i]

Venerdì 2 maggio, l'istanza Pixelfed.uno verrà spostata su un server più veloce e capiente per sostenere la sua recente crescita(sono stati superati i 500GB di immagini condivise!).

[b]⚠️ Cosa aspettarsi:
- Interruzioni durante i lavori (il sito sarà offline alcune ore).
- Nessun dato perso: tutte le foto e i profili saranno al sicuro!

Perché la migrazione?
🚀 Pixelfed.uno è la prima istanza italiana pixelfed e la prima consigliata dopo quella ufficiale: pixelfed.org/servers e c'è l'intenzione di mantenerla veloce, gratuita e senza pubblicità

🔗 Aggiornamenti in tempo reale su mastodon.uno/@pixelfed

@Che succede nel Fediverso?



Selçuk Kozağaçlı: Un Simbolo della Resistenza Legale sotto il Regime di Erdoğan


@Notizie dall'Italia e dal mondo
L'ex presidente dell’Associazione degli Avvocati Progressisti (ÇHD) è stato scarcerato dopo otto anni di prigione. Ma solo un giorno dopo, lo stesso tribunale che aveva approvato la sua liberazione ha emesso un nuovo mandato di arresto. La sua



Ucraina. Il bastone e la carota di Mosca spazientiscono Trump


@Notizie dall'Italia e dal mondo
Putin offre una tregua ma martella le linee e le città ucraine, confermando le rivendicazioni territoriali e il no all'ingresso di Kiev nella Nato. La strategia di Trump mostra i suoi limiti
L'articolo Ucraina. Il bastone e la carota di Mosca spazientiscono Trump pagineesteri.it/2025/04/30/mon…




Bisogna avere la faccia come il sedere per dire determinate cose. Io non so che posizione abbiano tutti gli altri cittadini europei, ma quelli italiani in larga maggioranza sono contrari ai piani di riarmo guerrafondai di Ursula Von der Leyen.
Questa naista dei giorni nostri continua a mentire spudoratamente. Il discorso che ha fatto oggi al congresso del Partito Popolare Europeo sembrava scopiazzato dagli appunti di Hitler a cavallo tra la prima e la seconda guerra mondiale: dobbiamo riarmarci, dobbiamo difenderci, ci vogliono invadere, non bisogna cedere alla diplomazia.
Servono armi e guerra per fare la pace. Non sto scherzando! Questa na
ista del nuovo secolo, sappiatelo, è a capo dell'Unione Europea grazie a personaggi come Giorgia Meloni ed Elly Schlein.

Questa na*ista del nuovo secolo parla di diritto di difendersi ma non dice una sola parola sulla difesa dei Palestinesi contro i terroristi isrl.

GiuseppeSalamone



L'intelligenza artificiale ha ingannato gli utenti di Reddit

Un esperimento “non autorizzato”, condotto dall'Università di Zurigo, ha riempito un subreddit di commenti generati dall'AI

Aspre polemiche sul fatto che i ricercatori dell'Università di Zurigo lo abbiano condotto di nascosto, senza informare i moderatori del subreddit: "L'abbiamo fatto a fin di bene!". Ma Reddit valuta azioni legali.

wired.it/article/intelligenza-…

@Etica Digitale (Feddit)

reshared this



Ecco quanto è complicato il nostro lavoro. mi riferisco agli informatici.

Ed ecco perché metterci sotto pressione, sottopagati, con carenze di organico strutturali non è mai una buona idea.

Poi, magari le cause del problema non sono state queste ma voglio puntare il dito sul fatto che ormai tutto è informatizzato, anche in sistemi critici. È in questo contesto che va inserito il mio discorso; l'articolo è solo uno spunto.

ilsole24ore.com/art/blackout-s…



Effetto #Trump: #Canada ai liberali


altrenotizie.org/primo-piano/1…


Tra Italia e Turchia un’alleanza industriale nel segno della pragmaticità. Intervista a Cossiga (Aiad)

@Notizie dall'Italia e dal mondo

Nel cuore del Mediterraneo, Italia e Turchia stanno ridefinendo il panorama della cooperazione industriale nel settore della difesa. A margine degli incontri a Roma, che hanno visto la firma di accordi strategici tra i



La Germania riarmata, le spese a debito e il nodo sui fondi di coesione europei. Intervista a Nelli Feroci (Iai)

@Notizie dall'Italia e dal mondo

È ufficiale: la Germania sarà il primo Paese europeo a richiedere formalmente lo scorporo delle spese per la Difesa dai parametri sul debito previsti dal Patto di stabilità. Dopo ottant’anni di politiche in senso opposto, Berlino intende




Berlino si smarca dal Patto di stabilità e accelera sulla Difesa europea. E l’Italia? Scrive Volpi

@Notizie dall'Italia e dal mondo

La Germania è il primo Paese europeo ad avvalersi della possibilità di escludere dal calcolo del Patto di Stabilità le spese militari, nell’ambito del programma ReArm Europe lanciato per rafforzare le capacità di difesa