mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

918
active users

Learn more

#sviluppato

0 posts0 participants0 posts today
Redhotcyber<p>Gli scienziati hanno creato una batteria eterna che promette una rivoluzione nella ricarica</p><p><a href="https://mastodon.bida.im/tags/Scienziati" class="mention hashtag" rel="tag">#<span>Scienziati</span></a> statunitensi hanno <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un nuovo <a href="https://mastodon.bida.im/tags/design" class="mention hashtag" rel="tag">#<span>design</span></a> di batteria basato su una sostanza <a href="https://mastodon.bida.im/tags/chimica" class="mention hashtag" rel="tag">#<span>chimica</span></a> utilizzata negli impianti di trattamento delle acque reflue che mira a soddisfare la crescente domanda di fonti <a href="https://mastodon.bida.im/tags/energetiche" class="mention hashtag" rel="tag">#<span>energetiche</span></a> <a href="https://mastodon.bida.im/tags/rinnovabili" class="mention hashtag" rel="tag">#<span>rinnovabili</span></a> come l’energia eolica e solare.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/gli-scienziati-hanno-creato-una-batteria-eterna-che-promette-una-rivoluzione-nella-ricarica/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/gli-scien</span><span class="invisible">ziati-hanno-creato-una-batteria-eterna-che-promette-una-rivoluzione-nella-ricarica/</span></a></p>
Redhotcyber<p>Armi Autonome per pochi euro: un ingegnere crea un drone killer in poche ore con riconoscimento facciale</p><p>I <a href="https://mastodon.bida.im/tags/droni" class="mention hashtag" rel="tag">#<span>droni</span></a> sono ormai una presenza comune nella vita di molte <a href="https://mastodon.bida.im/tags/persone" class="mention hashtag" rel="tag">#<span>persone</span></a>, ma pochi hanno considerato il pericolo potenziale che essi possono rappresentare in alcune situazioni. L’ingegnere e imprenditore Luis Wenus ha recentemente <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un <a href="https://mastodon.bida.im/tags/drone" class="mention hashtag" rel="tag">#<span>drone</span></a> <a href="https://mastodon.bida.im/tags/killer" class="mention hashtag" rel="tag">#<span>killer</span></a> in grado di individuare e perseguire una persona specifica in un tempo incredibilmente breve.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/armi-autonome-per-pochi-euro-un-ingegnere-crea-un-drone-killer-in-poche-ore-con-riconoscimento-facciale/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/armi-auto</span><span class="invisible">nome-per-pochi-euro-un-ingegnere-crea-un-drone-killer-in-poche-ore-con-riconoscimento-facciale/</span></a></p>
Redhotcyber<p>Arriva il “fog computing”. L’elaborazione dei dati si sposta tra le nuvole utilizzando Datacenter volanti</p><p>I matematici dell’Università Russa dell’Amicizia dei Popoli (<a href="https://mastodon.bida.im/tags/RUDN" class="mention hashtag" rel="tag">#<span>RUDN</span></a>) hanno <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un concetto innovativo per l’Internet delle cose.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/arriva-il-fog-computing-lelaborazione-dei-dati-si-sposta-tra-le-nuvole-utilizzando-datacenter-volanti/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/arriva-il</span><span class="invisible">-fog-computing-lelaborazione-dei-dati-si-sposta-tra-le-nuvole-utilizzando-datacenter-volanti/</span></a></p>
Redhotcyber<p>La Privacy Apple è a Rischio? Scopri il Bug e le Misure adottate!</p><p>Tre anni fa, <a href="https://mastodon.bida.im/tags/Apple" class="mention hashtag" rel="tag">#<span>Apple</span></a> ha <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un meccanismo per i suoi <a href="https://mastodon.bida.im/tags/dispositivi" class="mention hashtag" rel="tag">#<span>dispositivi</span></a> che prometteva di migliorare la <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> quando erano connessi alla rete <a href="https://mastodon.bida.im/tags/WiFi" class="mention hashtag" rel="tag">#<span>WiFi</span></a>. Tuttavia, ricerche recenti hanno dimostrato che questa funzionalità non ha quasi mai funzionato come previsto.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-privacy-apple-e-a-rischio-scopri-il-bug-e-le-misure-adottate/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-privac</span><span class="invisible">y-apple-e-a-rischio-scopri-il-bug-e-le-misure-adottate/</span></a></p>
Redhotcyber<p>iLeakage: il Side Channel per device Apple che consente l’accesso ad informazioni sensibili visitando un sito web</p><p>Un gruppo di <a href="https://mastodon.bida.im/tags/scienziati" class="mention hashtag" rel="tag">#<span>scienziati</span></a> ha <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/sidechannel" class="mention hashtag" rel="tag">#<span>sidechannel</span></a> chiamato <a href="https://mastodon.bida.im/tags/iLeakage" class="mention hashtag" rel="tag">#<span>iLeakage</span></a>, che funziona contro i dispositivi <a href="https://mastodon.bida.im/tags/Apple" class="mention hashtag" rel="tag">#<span>Apple</span></a> e consente di estrarre <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="tag">#<span>informazioni</span></a> sensibili dal <a href="https://mastodon.bida.im/tags/browser" class="mention hashtag" rel="tag">#<span>browser</span></a> <a href="https://mastodon.bida.im/tags/Safari" class="mention hashtag" rel="tag">#<span>Safari</span></a>, comprese password e contenuti delle schede.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/ileakage-il-side-channel-per-device-apple-che-consente-laccesso-ad-informazioni-sensibili-visitando-un-sito-web/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/ileakage-</span><span class="invisible">il-side-channel-per-device-apple-che-consente-laccesso-ad-informazioni-sensibili-visitando-un-sito-web/</span></a></p>
Redhotcyber<p>Cyber Dome: Lo Scudo Digitale di Israele – Una Rivoluzione nella Sicurezza Informatica?</p><p>Nel luglio 2023, i giornalisti di The Week hanno avuto l’opportunità unica di visitare il <a href="https://mastodon.bida.im/tags/CyberDome" class="mention hashtag" rel="tag">#<span>CyberDome</span></a> progettato da <a href="https://mastodon.bida.im/tags/Israele" class="mention hashtag" rel="tag">#<span>Israele</span></a>. Questo <a href="https://mastodon.bida.im/tags/progetto" class="mention hashtag" rel="tag">#<span>progetto</span></a> è stato <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> come l’equivalente digitale di <a href="https://mastodon.bida.im/tags/IronDome" class="mention hashtag" rel="tag">#<span>IronDome</span></a> per la sicurezza <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="tag">#<span>informatica</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/cyber-dome-lo-scudo-digitale-di-israele-una-rivoluzione-nella-sicurezza-informatica/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/cyber-dom</span><span class="invisible">e-lo-scudo-digitale-di-israele-una-rivoluzione-nella-sicurezza-informatica/</span></a></p>
Redhotcyber<p>La IBM migliora l’efficienza dei suoi chip ispirandosi al modello ideale: il cervello umano</p><p>Gli specialisti <a href="https://mastodon.bida.im/tags/IBM" class="mention hashtag" rel="tag">#<span>IBM</span></a> hanno <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un nuovo <a href="https://mastodon.bida.im/tags/approccio" class="mention hashtag" rel="tag">#<span>approccio</span></a> per creare <a href="https://mastodon.bida.im/tags/retineurali" class="mention hashtag" rel="tag">#<span>retineurali</span></a> ad alte <a href="https://mastodon.bida.im/tags/prestazioni" class="mention hashtag" rel="tag">#<span>prestazioni</span></a>, ispirate alla struttura del <a href="https://mastodon.bida.im/tags/cervello" class="mention hashtag" rel="tag">#<span>cervello</span></a> umano. I risultati del loro studio sono pubblicati sulla rivista Nature.</p><p>Le reti neurali profonde mostrano progressi impressionanti nel campo dell’intelligenza artificiale generativa. Tuttavia, la loro <a href="https://mastodon.bida.im/tags/architettura" class="mention hashtag" rel="tag">#<span>architettura</span></a> presenta <a href="https://mastodon.bida.im/tags/limitazioni" class="mention hashtag" rel="tag">#<span>limitazioni</span></a> che impediscono la massima <a href="https://mastodon.bida.im/tags/efficienza" class="mention hashtag" rel="tag">#<span>efficienza</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-ibm-migliora-lefficienza-dei-suoi-chip-ispirandosi-al-modello-ideale-il-cervello-umano/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-ibm-mi</span><span class="invisible">gliora-lefficienza-dei-suoi-chip-ispirandosi-al-modello-ideale-il-cervello-umano/</span></a></p>
Redhotcyber<p>La IBM migliora l’efficienza dei suoi chip ispirandosi al modello ideale: il cervello umano</p><p>Gli specialisti <a href="https://mastodon.bida.im/tags/IBM" class="mention hashtag" rel="tag">#<span>IBM</span></a> hanno <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un nuovo <a href="https://mastodon.bida.im/tags/approccio" class="mention hashtag" rel="tag">#<span>approccio</span></a> per creare <a href="https://mastodon.bida.im/tags/retineurali" class="mention hashtag" rel="tag">#<span>retineurali</span></a> ad alte <a href="https://mastodon.bida.im/tags/prestazioni" class="mention hashtag" rel="tag">#<span>prestazioni</span></a>, ispirate alla struttura del <a href="https://mastodon.bida.im/tags/cervello" class="mention hashtag" rel="tag">#<span>cervello</span></a> umano. I risultati del loro studio sono pubblicati sulla rivista Nature.</p><p>Le reti neurali profonde mostrano progressi impressionanti nel campo dell’intelligenza artificiale generativa. Tuttavia, la loro <a href="https://mastodon.bida.im/tags/architettura" class="mention hashtag" rel="tag">#<span>architettura</span></a> presenta <a href="https://mastodon.bida.im/tags/limitazioni" class="mention hashtag" rel="tag">#<span>limitazioni</span></a> che impediscono la massima <a href="https://mastodon.bida.im/tags/efficienza" class="mention hashtag" rel="tag">#<span>efficienza</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-ibm-migliora-lefficienza-dei-suoi-chip-ispirandosi-al-modello-ideale-il-cervello-umano/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-ibm-mi</span><span class="invisible">gliora-lefficienza-dei-suoi-chip-ispirandosi-al-modello-ideale-il-cervello-umano/</span></a></p>
Redhotcyber<p>La IBM migliora l’efficienza dei suoi chip ispirandosi al modello ideale: il cervello umano</p><p>Gli specialisti <a href="https://mastodon.bida.im/tags/IBM" class="mention hashtag" rel="tag">#<span>IBM</span></a> hanno <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un nuovo <a href="https://mastodon.bida.im/tags/approccio" class="mention hashtag" rel="tag">#<span>approccio</span></a> per creare <a href="https://mastodon.bida.im/tags/retineurali" class="mention hashtag" rel="tag">#<span>retineurali</span></a> ad alte <a href="https://mastodon.bida.im/tags/prestazioni" class="mention hashtag" rel="tag">#<span>prestazioni</span></a>, ispirate alla struttura del <a href="https://mastodon.bida.im/tags/cervello" class="mention hashtag" rel="tag">#<span>cervello</span></a> umano. I risultati del loro studio sono pubblicati sulla rivista Nature.</p><p>Le reti neurali profonde mostrano progressi impressionanti nel campo dell’intelligenza artificiale generativa. Tuttavia, la loro <a href="https://mastodon.bida.im/tags/architettura" class="mention hashtag" rel="tag">#<span>architettura</span></a> presenta <a href="https://mastodon.bida.im/tags/limitazioni" class="mention hashtag" rel="tag">#<span>limitazioni</span></a> che impediscono la massima <a href="https://mastodon.bida.im/tags/efficienza" class="mention hashtag" rel="tag">#<span>efficienza</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-ibm-migliora-lefficienza-dei-suoi-chip-ispirandosi-al-modello-ideale-il-cervello-umano/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-ibm-mi</span><span class="invisible">gliora-lefficienza-dei-suoi-chip-ispirandosi-al-modello-ideale-il-cervello-umano/</span></a></p>
Redhotcyber<p>Quattro studenti delle superiori hackerano la metro di Boston per ottenere infinite corse gratis</p><p>Nell’agosto 2021, quattro studenti delle <a href="https://mastodon.bida.im/tags/scuole" class="mention hashtag" rel="tag">#<span>scuole</span></a> <a href="https://mastodon.bida.im/tags/superiori" class="mention hashtag" rel="tag">#<span>superiori</span></a> di <a href="https://mastodon.bida.im/tags/Boston" class="mention hashtag" rel="tag">#<span>Boston</span></a> hanno riprodotto una <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> nel <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> tariffario della metropolitana della città scoperta dagli studenti del Massachusetts Institute of Technology (MIT) nel 2008.  </p><p>Gli adolescenti non solo hanno abusato del vecchio metodo, ma ne hanno anche <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> uno nuovo per l’attuale <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> <a href="https://mastodon.bida.im/tags/CharlieCard" class="mention hashtag" rel="tag">#<span>CharlieCard</span></a>, con il quale è possibile utilizzare la <a href="https://mastodon.bida.im/tags/metropolitana" class="mention hashtag" rel="tag">#<span>metropolitana</span></a> <a href="https://mastodon.bida.im/tags/gratuitamente" class="mention hashtag" rel="tag">#<span>gratuitamente</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/quattro-studenti-delle-superiori-hackerano-la-metro-di-boston-per-ottenere-infinite-corse-gratis/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/quattro-s</span><span class="invisible">tudenti-delle-superiori-hackerano-la-metro-di-boston-per-ottenere-infinite-corse-gratis/</span></a></p>
Redhotcyber<p>Gli hacker possono scoprire la password dal suono emesso dai tasti della tastiera. Scopriamo il nuovo attacco in side channel</p><p>Un gruppo di <a href="https://mastodon.bida.im/tags/scienziati" class="mention hashtag" rel="tag">#<span>scienziati</span></a> ha <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un nuovo “attacco acustico del <a href="https://mastodon.bida.im/tags/canale" class="mention hashtag" rel="tag">#<span>canale</span></a> <a href="https://mastodon.bida.im/tags/laterale" class="mention hashtag" rel="tag">#<span>laterale</span></a>” basato su un <a href="https://mastodon.bida.im/tags/modello" class="mention hashtag" rel="tag">#<span>modello</span></a> di <a href="https://mastodon.bida.im/tags/rete" class="mention hashtag" rel="tag">#<span>rete</span></a> <a href="https://mastodon.bida.im/tags/neurale" class="mention hashtag" rel="tag">#<span>neurale</span></a>. L’attacco può essere utilizzato per rilevare sequenze di <a href="https://mastodon.bida.im/tags/tasti" class="mention hashtag" rel="tag">#<span>tasti</span></a> che sono state <a href="https://mastodon.bida.im/tags/registrate" class="mention hashtag" rel="tag">#<span>registrate</span></a> utilizzando il <a href="https://mastodon.bida.im/tags/microfono" class="mention hashtag" rel="tag">#<span>microfono</span></a> di un <a href="https://mastodon.bida.im/tags/telefono" class="mention hashtag" rel="tag">#<span>telefono</span></a> nelle vicinanze.</p><p>Condividi questo post se hai trovato la news interessante.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/gli-hacker-possono-scoprire-la-password-dal-suono-emesso-dai-tasti-della-tastiera-scopriamo-in-nuovo-attacco-side-channel/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/gli-hacke</span><span class="invisible">r-possono-scoprire-la-password-dal-suono-emesso-dai-tasti-della-tastiera-scopriamo-in-nuovo-attacco-side-channel/</span></a></p>
Redhotcyber<p>Immagini AI sempre più coerenti. Le AI ora possono migliorare la realizzazione delle immagini grazie alle relazioni tra gli oggetti</p><p>Gli scienziati dell’<a href="https://mastodon.bida.im/tags/Universit%C3%A0" class="mention hashtag" rel="tag">#<span>Università</span></a> di Twente (Paesi Bassi) hanno <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un nuovo metodo di <a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="tag">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="tag">#<span>artificiale</span></a> (<a href="https://mastodon.bida.im/tags/AI" class="mention hashtag" rel="tag">#<span>AI</span></a>) in grado di costruire scene da <a href="https://mastodon.bida.im/tags/immagini" class="mention hashtag" rel="tag">#<span>immagini</span></a> che possono servire come base per generare immagini realistiche e <a href="https://mastodon.bida.im/tags/coerenti" class="mention hashtag" rel="tag">#<span>coerenti</span></a>. </p><p>I modelli di <a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="tag">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="tag">#<span>artificiale</span></a> (<a href="https://mastodon.bida.im/tags/AI" class="mention hashtag" rel="tag">#<span>AI</span></a>) generativa possono creare immagini basate su <a href="https://mastodon.bida.im/tags/query" class="mention hashtag" rel="tag">#<span>query</span></a> di testo. Questi modelli funzionano meglio quando creano immagini di singoli oggetti. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/immagini-ai-sempre-piu-coerenti-le-ai-ora-possono-migliorare-la-realizzazione-delle-immagini-grazie-alle-relazioni-tra-gli-oggetti/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/immagini-</span><span class="invisible">ai-sempre-piu-coerenti-le-ai-ora-possono-migliorare-la-realizzazione-delle-immagini-grazie-alle-relazioni-tra-gli-oggetti/</span></a></p>
Redhotcyber<p>I Geni li abbiamo anche in Italia. A 17 anni utilizza le AI per scoprire i segni precoci del Parkinson</p><p>Tommaso Caligari, un giovane inventore e studente di soli 17 anni, ha recentemente ottenuto grandi risultati nel campo scientifico. Non solo ha vinto un importante premio, ma ha anche <a href="https://mastodon.bida.im/tags/sviluppato" class="mention hashtag" rel="tag">#<span>sviluppato</span></a> un <a href="https://mastodon.bida.im/tags/dispositivo" class="mention hashtag" rel="tag">#<span>dispositivo</span></a> basato sull’<a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="tag">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="tag">#<span>artificiale</span></a> in grado di rilevare il morbo di <a href="https://mastodon.bida.im/tags/Parkinson" class="mention hashtag" rel="tag">#<span>Parkinson</span></a> in fase precoce.</p><p>Il suo <a href="https://mastodon.bida.im/tags/progetto" class="mention hashtag" rel="tag">#<span>progetto</span></a>, chiamato <a href="https://mastodon.bida.im/tags/ParkinsonDetector" class="mention hashtag" rel="tag">#<span>ParkinsonDetector</span></a>, ha superato altre 33 innovative proposte, permettendo a Tommaso di partecipare a <a href="https://mastodon.bida.im/tags/Eucys" class="mention hashtag" rel="tag">#<span>Eucys</span></a>, il prestigioso <a href="https://mastodon.bida.im/tags/concorso" class="mention hashtag" rel="tag">#<span>concorso</span></a> europeo per giovani <a href="https://mastodon.bida.im/tags/scienziati" class="mention hashtag" rel="tag">#<span>scienziati</span></a> che si terrà a settembre a <a href="https://mastodon.bida.im/tags/Bruxelles" class="mention hashtag" rel="tag">#<span>Bruxelles</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/i-geni-li-abbiamo-anche-in-italia-a-17-anni-utilizza-le-ai-per-scoprire-i-segni-precoci-del-parkinson/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/i-geni-li</span><span class="invisible">-abbiamo-anche-in-italia-a-17-anni-utilizza-le-ai-per-scoprire-i-segni-precoci-del-parkinson/</span></a></p>