<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>tech &amp;mdash; project7</title>
    <link>https://noblogo.org/project7/tag:tech</link>
    <description></description>
    <pubDate>Sat, 18 Apr 2026 06:53:08 +0000</pubDate>
    <item>
      <title>complacency = compiacimento - sicurezza di sé oltre il ragionevole dubbio...</title>
      <link>https://noblogo.org/project7/complacency-compiacimento-sicurezza-di-se-oltre-il-ragionevole-dubbio</link>
      <description>&lt;![CDATA[&#xA;&#xA;complacency = compiacimento - sicurezza di sé oltre il ragionevole dubbio rispetto ai rischi che si possono incontrare&#xA;&#xA;https://opensource.com/article/23/4/my-website-compromised&#xA;by David Both&#xA;[...]&#xA;em&#34;What I learned&#xA;Having written many books and articles in which I discuss the necessity to keep systems updated with the latest versions of operating system and application software, I&#39;m frankly embarrassed by this. However, it has been a good learning experience for me and a reminder that I must not become complacent. I almost didn&#39;t write this article! I didn&#39;t want to admit to being negligent with one of my own systems. And yet, I felt compelled to write about it in the hope that you learn from my experience.&#xA;&#xA;So, as I have learned from painful experience, it is critical to keep our systems updated. It&#39;s one of the most vital steps in the continuing battle to prevent the computers under our care from being infected. The specific details of the infection I experienced are less important than the fact that there are always attacks taking place against our systems. Complacency is one of the attack vectors that crackers can count on to aid their efforts.&#34;/em&#xA;&#xA;Essere troppo sicuri porta sempre a sottovalutare qualcosa&#xA;in ambito personale, lavorativo, della vita in genere,&#xA;al punto che qualcuno se ne può approfitare per trovare la falla, il momento di disattenzione.&#xA;Nella maggior parte dei casi un buon &#34;backup&#34; non solo informatico è di estremo aiuto, alcune volte si prendo delle bastonate significative.&#xA;&#xA;tech]]&gt;</description>
      <content:encoded><![CDATA[<p>complacency = compiacimento – sicurezza di sé oltre il ragionevole dubbio rispetto ai rischi che si possono incontrare</p>

<p><a href="https://opensource.com/article/23/4/my-website-compromised" rel="nofollow">https://opensource.com/article/23/4/my-website-compromised</a>
by David Both
[...]
<em>“What I learned
Having written many books and articles in which I discuss the necessity to keep systems updated with the latest versions of operating system and application software, I&#39;m frankly embarrassed by this. However, it has been a good learning experience for me and a reminder that I must not become complacent. I almost didn&#39;t write this article! I didn&#39;t want to admit to being negligent with one of my own systems. And yet, I felt compelled to write about it in the hope that you learn from my experience.</p>

<p>So, as I have learned from painful experience, it is critical to keep our systems updated. It&#39;s one of the most vital steps in the continuing battle to prevent the computers under our care from being infected. The specific details of the infection I experienced are less important than the fact that there are always attacks taking place against our systems. Complacency is one of the attack vectors that crackers can count on to aid their efforts.”</em></p>

<p>Essere troppo sicuri porta sempre a sottovalutare qualcosa
in ambito personale, lavorativo, della vita in genere,
al punto che qualcuno se ne può approfitare per trovare la falla, il momento di disattenzione.
Nella maggior parte dei casi un buon “backup” non solo informatico è di estremo aiuto, alcune volte si prendo delle bastonate significative.</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/complacency-compiacimento-sicurezza-di-se-oltre-il-ragionevole-dubbio</guid>
      <pubDate>Mon, 05 Jun 2023 06:44:17 +0000</pubDate>
    </item>
    <item>
      <title>Avvenire 30 maggio 2023</title>
      <link>https://noblogo.org/project7/avvenire-30-maggio-2023</link>
      <description>&lt;![CDATA[Avvenire 30 maggio 2023&#xA;Mathias Risse&#xA;https://www.avvenire.it/opinioni/pagine/le-superintelligenze-artificiali-possono-decidere-di-eliminarci&#xA;&#xA;&#34;Una volta che l’IA generale sarà più intelligente di noi, potrebbe produrre qualcosa di più intelligente di sé stessa, e così via, forse molto rapidamente. Quel momento è noto come la singolarità, un’esplosione di intelligenza che sarebbe probabilmente il più grande evento della storia umana.&#34;&#xA;&#xA;IA GENERALE&#xA;approccio non specialistico per affrontare problemi imparando dagli errori&#xA;&#xA;Quanto costano gli errori di un ia?!&#xA;In termini: economici, sociali, ecologici, umani,&#xA;&#xA;tech]]&gt;</description>
      <content:encoded><![CDATA[<p>Avvenire 30 maggio 2023
Mathias Risse
<a href="https://www.avvenire.it/opinioni/pagine/le-superintelligenze-artificiali-possono-decidere-di-eliminarci" rel="nofollow">https://www.avvenire.it/opinioni/pagine/le-superintelligenze-artificiali-possono-decidere-di-eliminarci</a></p>

<p>“Una volta che l’IA generale sarà più intelligente di noi, potrebbe produrre qualcosa di più intelligente di sé stessa, e così via, forse molto rapidamente. Quel momento è noto come la singolarità, un’esplosione di intelligenza che sarebbe probabilmente il più grande evento della storia umana.”</p>

<p>IA GENERALE
approccio non specialistico per affrontare problemi imparando dagli errori</p>

<p>Quanto costano gli errori di un ia?!
In termini: economici, sociali, ecologici, umani,</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/avvenire-30-maggio-2023</guid>
      <pubDate>Tue, 30 May 2023 23:47:38 +0000</pubDate>
    </item>
    <item>
      <title>Asahi shibun english ver</title>
      <link>https://noblogo.org/project7/asahi-shibun-english-ver</link>
      <description>&lt;![CDATA[Asahi shibun english ver&#xA;&#xA;https://www.asahi.com/sp/ajw/articles/14907186&#xA;&#xA;A decade-long emdata breach/em in Toyota’s much-touted online service put some information on more than 2 million vehicles at risk, the Japanese automaker said Friday.&#xA;&#xA;Spanning from January 2012 to April 2023, the problem with Toyota’s cloud-based Connected service pertains only to vehicles in Japan, said spokesperson Hideaki Homma.&#xA;&#xA;The Connected service reminds owners to get maintenance checks and links to streaming entertainment and provides help during emergencies. It can call for help after a crash or locate a car that’s been stolen.&#xA;&#xA;No issues arising from the breach have been reported so far.&#xA;&#xA;Although there is no evidence any information was leaked, copied or misused due to the breach, the data at risk includes: the vehicle identification number, which is separate from the license plate; the location of the vehicle and at what time it was there; and video footage taken by the vehicle, known as the “drive recorder” in Japan.&#xA;&#xA;Such information cannot be used to identify individual owners, according to Toyota Motor Corp., which makes the Prius hybrid and Lexus luxury models.&#xA;&#xA;Vehicles belonging to about 2.15 million people have been affected, including those who used net services called G-Link, G-Book and Connected.&#xA;&#xA;Toyota’s Connected service in Japan is operated by a subsidiary. Until recently, no one noticed outside access to such information should have been turned off, Homma said.&#xA;&#xA;“We are so sorry to have caused such trouble to all the people,” he said.&#xA;&#xA;The problem is a major embarrassment for Japan’s top automaker, which has built a reputation for quality and attention to detail.&#xA;&#xA;Automakers worldwide are competing to differentiate model offerings with the latest technology to lure buyers.&#xA;&#xA;The problem with the system has been fixed, Homma said, so it’s safe to continue driving Connect-enabled vehicles as usual, and there is no need to bring them in for repairs.&#xA;&#xA;#databreach #dataprotection #tech]]&gt;</description>
      <content:encoded><![CDATA[<p>Asahi shibun english ver</p>

<p><a href="https://www.asahi.com/sp/ajw/articles/14907186" rel="nofollow">https://www.asahi.com/sp/ajw/articles/14907186</a></p>

<p>A decade-long <em>data breach</em> in Toyota’s much-touted online service put some information on more than 2 million vehicles at risk, the Japanese automaker said Friday.</p>

<p>Spanning from January 2012 to April 2023, the problem with Toyota’s cloud-based Connected service pertains only to vehicles in Japan, said spokesperson Hideaki Homma.</p>

<p>The Connected service reminds owners to get maintenance checks and links to streaming entertainment and provides help during emergencies. It can call for help after a crash or locate a car that’s been stolen.</p>

<p>No issues arising from the breach have been reported so far.</p>

<p>Although there is no evidence any information was leaked, copied or misused due to the breach, the data at risk includes: the vehicle identification number, which is separate from the license plate; the location of the vehicle and at what time it was there; and video footage taken by the vehicle, known as the “drive recorder” in Japan.</p>

<p>Such information cannot be used to identify individual owners, according to Toyota Motor Corp., which makes the Prius hybrid and Lexus luxury models.</p>

<p>Vehicles belonging to about 2.15 million people have been affected, including those who used net services called G-Link, G-Book and Connected.</p>

<p>Toyota’s Connected service in Japan is operated by a subsidiary. Until recently, no one noticed outside access to such information should have been turned off, Homma said.</p>

<p>“We are so sorry to have caused such trouble to all the people,” he said.</p>

<p>The problem is a major embarrassment for Japan’s top automaker, which has built a reputation for quality and attention to detail.</p>

<p>Automakers worldwide are competing to differentiate model offerings with the latest technology to lure buyers.</p>

<p>The problem with the system has been fixed, Homma said, so it’s safe to continue driving Connect-enabled vehicles as usual, and there is no need to bring them in for repairs.</p>

<p><a href="/project7/tag:databreach" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">databreach</span></a> <a href="/project7/tag:dataprotection" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">dataprotection</span></a> <a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/asahi-shibun-english-ver</guid>
      <pubDate>Sun, 14 May 2023 20:33:38 +0000</pubDate>
    </item>
    <item>
      <title>Fabio Manganiello</title>
      <link>https://noblogo.org/project7/fabio-manganiello-t1fm</link>
      <description>&lt;![CDATA[Fabio Manganiello&#xA;&#xA;https://mobile.slashdot.org/story/23/05/12/2051201/millions-of-mobile-phones-come-pre-infected-with-malware-say-researchers&#xA;&#xA;That of mobile phones hardware and firmware is a very mature industry that still has many competitors.&#xA;&#xA;What it means is that everybody must keep their prices as low as possible if they want somebody to buy the phones that mount their components. To the point that, for low-end Android phones, chip and firmware manufacturers have basically no profit margins.&#xA;&#xA;So what do you do when you have nearly no profit margins and no way out of it? Simple: you create profit margins out of thin air by pre-installing spyware on the firmware itself. The phone comes out of the box with the spyware already installed.&#xA;&#xA;There&#39;s apparently a big market down there with dozens of available plugins. From gathering data from your SMS texts, to sniffing Facebook sessions, to accessing your location data, to shoveling custom ads, up to selling &#34;device time&#34; to criminals for all kind of purposes (just like you can rent an AWS node on the fly for a few hours, criminals can also rent access to somebody&#39;s phones for slots of up to 5 minutes to do whatever they want with it).&#xA;&#xA;If a phone (or a smartwatch, or a smart TV) looks too cheap to be true, it&#39;s because it is. Devices like the Fairphone or Librem may be a bit more expensive at parity of features, but you&#39;re paying the right not to have surveillance pre-installed on those devices.&#xA;&#xA;#tech #soc]]&gt;</description>
      <content:encoded><![CDATA[<p>Fabio Manganiello</p>

<p><a href="https://mobile.slashdot.org/story/23/05/12/2051201/millions-of-mobile-phones-come-pre-infected-with-malware-say-researchers" rel="nofollow">https://mobile.slashdot.org/story/23/05/12/2051201/millions-of-mobile-phones-come-pre-infected-with-malware-say-researchers</a></p>

<p>That of mobile phones hardware and firmware is a very mature industry that still has many competitors.</p>

<p>What it means is that everybody must keep their prices as low as possible if they want somebody to buy the phones that mount their components. To the point that, for low-end Android phones, chip and firmware manufacturers have basically no profit margins.</p>

<p>So what do you do when you have nearly no profit margins and no way out of it? Simple: you create profit margins out of thin air by pre-installing spyware on the firmware itself. The phone comes out of the box with the spyware already installed.</p>

<p>There&#39;s apparently a big market down there with dozens of available plugins. From gathering data from your SMS texts, to sniffing Facebook sessions, to accessing your location data, to shoveling custom ads, up to selling “device time” to criminals for all kind of purposes (just like you can rent an AWS node on the fly for a few hours, criminals can also rent access to somebody&#39;s phones for slots of up to 5 minutes to do whatever they want with it).</p>

<p>If a phone (or a smartwatch, or a smart TV) looks too cheap to be true, it&#39;s because it is. Devices like the Fairphone or Librem may be a bit more expensive at parity of features, but you&#39;re paying the right not to have surveillance pre-installed on those devices.</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a> <a href="/project7/tag:soc" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">soc</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/fabio-manganiello-t1fm</guid>
      <pubDate>Sun, 14 May 2023 20:19:13 +0000</pubDate>
    </item>
    <item>
      <title>Fabio Manganiello</title>
      <link>https://noblogo.org/project7/fabio-manganiello</link>
      <description>&lt;![CDATA[Fabio Manganiello&#xA;&#xA;https://mobile.slashdot.org/story/23/05/12/2051201/millions-of-mobile-phones-come-pre-infected-with-malware-say-researchers&#xA;&#xA;That of mobile phones hardware and firmware is a very mature industry that still has many competitors.&#xA;&#xA;What it means is that everybody must keep their prices as low as possible if they want somebody to buy the phones that mount their components. To the point that, for low-end Android phones, chip and firmware manufacturers have basically no profit margins.&#xA;&#xA;So what do you do when you have nearly no profit margins and no way out of it? Simple: you create profit margins out of thin air by pre-installing spyware on the firmware itself. The phone comes out of the box with the spyware already installed.&#xA;&#xA;There&#39;s apparently a big market down there with dozens of available plugins. From gathering data from your SMS texts, to sniffing Facebook sessions, to accessing your location data, to shoveling custom ads, up to selling &#34;device time&#34; to criminals for all kind of purposes (just like you can rent an AWS node on the fly for a few hours, criminals can also rent access to somebody&#39;s phones for slots of up to 5 minutes to do whatever they want with it).&#xA;&#xA;If a phone (or a smartwatch, or a smart TV) looks too cheap to be true, it&#39;s because it is. Devices like the Fairphone or Librem may be a bit more expensive at parity of features, but you&#39;re paying the right not to have surveillance pre-installed on those devices.&#xA;&#xA;Quando una cosa è gratuita sei tu il prodotto.&#xA;&#xA;#tech #soc]]&gt;</description>
      <content:encoded><![CDATA[<p>Fabio Manganiello</p>

<p><a href="https://mobile.slashdot.org/story/23/05/12/2051201/millions-of-mobile-phones-come-pre-infected-with-malware-say-researchers" rel="nofollow">https://mobile.slashdot.org/story/23/05/12/2051201/millions-of-mobile-phones-come-pre-infected-with-malware-say-researchers</a></p>

<p>That of mobile phones hardware and firmware is a very mature industry that still has many competitors.</p>

<p>What it means is that everybody must keep their prices as low as possible if they want somebody to buy the phones that mount their components. To the point that, for low-end Android phones, chip and firmware manufacturers have basically no profit margins.</p>

<p>So what do you do when you have nearly no profit margins and no way out of it? Simple: you create profit margins out of thin air by pre-installing spyware on the firmware itself. The phone comes out of the box with the spyware already installed.</p>

<p>There&#39;s apparently a big market down there with dozens of available plugins. From gathering data from your SMS texts, to sniffing Facebook sessions, to accessing your location data, to shoveling custom ads, up to selling “device time” to criminals for all kind of purposes (just like you can rent an AWS node on the fly for a few hours, criminals can also rent access to somebody&#39;s phones for slots of up to 5 minutes to do whatever they want with it).</p>

<p>If a phone (or a smartwatch, or a smart TV) looks too cheap to be true, it&#39;s because it is. Devices like the Fairphone or Librem may be a bit more expensive at parity of features, but you&#39;re paying the right not to have surveillance pre-installed on those devices.</p>

<p>Quando una cosa è gratuita sei tu il prodotto.</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a> <a href="/project7/tag:soc" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">soc</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/fabio-manganiello</guid>
      <pubDate>Sun, 14 May 2023 11:42:57 +0000</pubDate>
    </item>
    <item>
      <title>Oggi rubrica radiofonica su reel shorts video piattaforme video social etc.</title>
      <link>https://noblogo.org/project7/oggi-rubrica-radiofonica-su-reel-shorts-video-piattaforme-video-social-etc</link>
      <description>&lt;![CDATA[Oggi rubrica radiofonica su reel shorts video piattaforme video social etc.&#xA;&#xA;E parlavano di questo shorts il cui audio sono estratti da standup commedy e in video ci sono ragazze che, facendo delle cose normali in casa o fuori, ridono alle battutte dell&#39;audio in sincro.&#xA;&#xA;In sintesi dicevano i conduttori: emguardi un video di qualcuno che ride alle battute di qualcun altro che però non vedi/em&#xA;&#xA;Un audiovideo del&#xA;emNULLA/em&#xA;&#xA;Nessuna conoscenza prodotta, trasmessa, ideata... cioè prendi qualcosa di altri (comici) lo estrapoli e lo riproponi con una traccia videoaudio di niente.&#xA;&#xA;Vedere ridere qualcun altro può essere contagioso, ma a distanza, vedendo una sconosciuta che ride a delle battute fuori contesto, che cosa può rappresentare?!&#xA;&#xA;I conduttori ipotizzavano la ricerca di click in un filone sociale che in quel momento va e che poi boh, cioè segui il flusso dei più e prendi la tua fetta fino a quando ce n&#39;è...&#xA;A di là che una bella ragazza attira gli spettatori solo per l&#39;estetica.&#xA;&#xA;#tech #soc]]&gt;</description>
      <content:encoded><![CDATA[<p>Oggi rubrica radiofonica su reel shorts video piattaforme video social etc.</p>

<p>E parlavano di questo shorts il cui audio sono estratti da standup commedy e in video ci sono ragazze che, facendo delle cose normali in casa o fuori, ridono alle battutte dell&#39;audio in sincro.</p>

<p>In sintesi dicevano i conduttori: <em>guardi un video di qualcuno che ride alle battute di qualcun altro che però non vedi</em></p>

<p>Un audiovideo del
<em>NULLA</em></p>

<p>Nessuna conoscenza prodotta, trasmessa, ideata... cioè prendi qualcosa di altri (comici) lo estrapoli e lo riproponi con una traccia videoaudio di niente.</p>

<p>Vedere ridere qualcun altro può essere contagioso, ma a distanza, vedendo una sconosciuta che ride a delle battute fuori contesto, che cosa può rappresentare?!</p>

<p>I conduttori ipotizzavano la ricerca di click in un filone sociale che in quel momento va e che poi boh, cioè segui il flusso dei più e prendi la tua fetta fino a quando ce n&#39;è...
A di là che una bella ragazza attira gli spettatori solo per l&#39;estetica.</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a> <a href="/project7/tag:soc" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">soc</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/oggi-rubrica-radiofonica-su-reel-shorts-video-piattaforme-video-social-etc</guid>
      <pubDate>Wed, 03 May 2023 16:18:33 +0000</pubDate>
    </item>
    <item>
      <title>Conoscenza web social.</title>
      <link>https://noblogo.org/project7/conoscenza-web-social</link>
      <description>&lt;![CDATA[Conoscenza web social.&#xA;&#xA;Gli influencer producono conoscenza?!&#xA;&#xA;Alcuni video amatoriali producono conoscenze più di quelli professionali perché hanno l obiettivo di trasmettere quello che l&#39;autore sa piuttosto di quello che il protagonista vuole vendere.&#xA;&#xA;Mi ricordo di due ragazzi che hanno fatto un video su come si cambiano pastiglie e dischi dei freni per cui la conoscenza e la sua trasmissione erano evidenti.&#xA;&#xA;Più del canale autoxyz che fa il tutorial per vendere onestamente il proprio brand o sottobanco il prodotto di qualche &#34;finanziatore&#34;...&#xA;&#xA;tech]]&gt;</description>
      <content:encoded><![CDATA[<p>Conoscenza web social.</p>

<p>Gli influencer producono conoscenza?!</p>

<p>Alcuni video amatoriali producono conoscenze più di quelli professionali perché hanno l obiettivo di trasmettere quello che l&#39;autore sa piuttosto di quello che il protagonista vuole vendere.</p>

<p>Mi ricordo di due ragazzi che hanno fatto un video su come si cambiano pastiglie e dischi dei freni per cui la conoscenza e la sua trasmissione erano evidenti.</p>

<p>Più del canale autoxyz che fa il tutorial per vendere onestamente il proprio brand o sottobanco il prodotto di qualche “finanziatore”...</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/conoscenza-web-social</guid>
      <pubDate>Sun, 30 Apr 2023 08:34:24 +0000</pubDate>
    </item>
    <item>
      <title>Open to meraviglia.</title>
      <link>https://noblogo.org/project7/open-to-meraviglia</link>
      <description>&lt;![CDATA[Open to meraviglia.&#xA;&#xA;Nuova campagna per il turismo in italia nel 2023.&#xA;&#xA;Al di là delle polemiche e delle news, sentendo questo “titolo”, qualcosa non mi tornava. Ho dovuto pensarci per una settimana, a farlo sedimentare perché non girava...&#xA;E finalmente ho capito quello che non torna leggendolo: è l&#39;abbinamento inglese italiano, quello stile tutto italiano di fare gli internazionali, di fare i finti colti, che però usano i traduttori online per la tesi in inglese.&#xA;&#xA;Ricordiamoci ai tempi di expo c&#39;era &#34;very bello&#34;... storia simile&#xA;&#xA;E poi c&#39;è il capitolo traduzioni dei testi del sito ad esempio: &#34;Camerino&#34;, la città, diventa &#34;guardrobe&#34;&#xA;&#xA;Senza poi dimenticare i video girati in slovenia per la pubblicità del turismo italiano.&#xA;&#xA;tech]]&gt;</description>
      <content:encoded><![CDATA[<p>Open to meraviglia.</p>

<p>Nuova campagna per il turismo in italia nel 2023.</p>

<p>Al di là delle polemiche e delle news, sentendo questo “titolo”, qualcosa non mi tornava. Ho dovuto pensarci per una settimana, a farlo sedimentare perché non girava...
E finalmente ho capito quello che non torna leggendolo: è l&#39;abbinamento inglese italiano, quello stile tutto italiano di fare gli internazionali, di fare i finti colti, che però usano i traduttori online per la tesi in inglese.</p>

<p>Ricordiamoci ai tempi di expo c&#39;era “very bello”... storia simile</p>

<p>E poi c&#39;è il capitolo traduzioni dei testi del sito ad esempio: “Camerino”, la città, diventa “guardrobe”</p>

<p>Senza poi dimenticare i video girati in slovenia per la pubblicità del turismo italiano.</p>

<p><a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/open-to-meraviglia</guid>
      <pubDate>Thu, 27 Apr 2023 06:06:25 +0000</pubDate>
    </item>
    <item>
      <title>What Are Autonomous Agents?</title>
      <link>https://noblogo.org/project7/emwhat-are-autonomous-agents</link>
      <description>&lt;![CDATA[emWhat Are Autonomous Agents?&#xA;&#xA;Autonomous agents are programs, powered by AI, that when given an objective are able to create tasks for themselves, complete tasks, create new tasks, reprioritize their task list, complete the new top task, and loop until their objective is reached./em&#xA;&#xA;https://www.mattprd.com/p/the-complete-beginners-guide-to-autonomous-agents&#xA;&#xA;Sistemi autonomi.&#xA;Compiti e obiettivi.&#xA;Al di là del trend su AI e affini, che va tanto di moda nel 2023 dopo chatgpt etc, non sembra nulla di nuovo. Se vediamo alcune ricerche su agenti automomi del 1991 o 1995 &#xA;&#xA;Wikipedia &#34;Autonomous agent&#34;:&#xA;&#xA;emThere are various definitions of autonomous agent. According to Brustoloni (1991)&#xA;&#xA;    &#34;Autonomous agents are systems capable of autonomous, purposeful action in the real world.&#34;[1]&#xA;&#xA;According tuo Maes (1995)&#xA;&#xA;    &#34;Autonomous agents are computational systems that inhabit some complex dynamic environment, sense and act autonomously in this environment, and by doing so realize a set of goals or tasks for which they are designed.&#34;[2]&#xA;&#xA;Franklin and Graesser (1997) review different definitions and propose their definition&#xA;&#xA;    &#34;An autonomous agent is a system situated within and a part of an environment that senses that environment and acts on it, over time, in pursuit of its own agenda and so as to effect what it senses in the future.&#34;[3]&#xA;&#xA;They explain it&#xA;&#xA;    &#34;Humans and some animals are at the high end of being an agent, with multiple, conflicting drives, multiples senses, multiple possible actions, and complex sophisticated control structures. At the low end, with one or two senses, a single action, and an absurdly simple control structure we find a thermostat.&#34;/em&#xA;&#xA;Reference&#xA;1 Brustoloni, Jose C. (1991). Autonomous Agents: Characterization and Requirements, Carnegie Mellon Technical Report CMU-CS-91-204. Carnegie Mellon University.&#xA;&#xA;2 Maes, Pattie (1995). &#34;Artificial life meets entertainment&#34;. Communications of the ACM. Association for Computing Machinery (ACM). 38 (11): 108–114. doi:10.1145/219717.219808. ISSN 0001-0782. S2CID 8122852.&#xA;&#xA;3 Franklin, Stan; Graesser, Art (1997). &#34;Is It an agent, or just a program?: A taxonomy for autonomous agents&#34;. Intelligent Agents III Agent Theories, Architectures, and Languages. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 21–35. doi:10.1007/bfb0013570. ISBN 978-3-540-62507-0. ISSN 0302-9743.&#xA;tech]]&gt;</description>
      <content:encoded><![CDATA[<p><em>What Are Autonomous Agents?</p>

<p>Autonomous agents are programs, powered by AI, that when given an objective are able to create tasks for themselves, complete tasks, create new tasks, reprioritize their task list, complete the new top task, and loop until their objective is reached.</em></p>

<p><a href="https://www.mattprd.com/p/the-complete-beginners-guide-to-autonomous-agents" rel="nofollow">https://www.mattprd.com/p/the-complete-beginners-guide-to-autonomous-agents</a></p>

<p>Sistemi autonomi.
Compiti e obiettivi.
Al di là del trend su AI e affini, che va tanto di moda nel 2023 dopo chatgpt etc, non sembra nulla di nuovo. Se vediamo alcune ricerche su agenti automomi del 1991 o 1995</p>

<p>Wikipedia “Autonomous agent”:</p>

<p><em>There are various definitions of autonomous agent. According to Brustoloni (1991)</p>

<p>    “Autonomous agents are systems capable of autonomous, purposeful action in the real world.”[1]</p>

<p>According tuo Maes (1995)</p>

<p>    “Autonomous agents are computational systems that inhabit some complex dynamic environment, sense and act autonomously in this environment, and by doing so realize a set of goals or tasks for which they are designed.”[2]</p>

<p>Franklin and Graesser (1997) review different definitions and propose their definition</p>

<p>    “An autonomous agent is a system situated within and a part of an environment that senses that environment and acts on it, over time, in pursuit of its own agenda and so as to effect what it senses in the future.”[3]</p>

<p>They explain it</p>

<p>    “Humans and some animals are at the high end of being an agent, with multiple, conflicting drives, multiples senses, multiple possible actions, and complex sophisticated control structures. At the low end, with one or two senses, a single action, and an absurdly simple control structure we find a thermostat.”</em></p>

<p>Reference
1 Brustoloni, Jose C. (1991). Autonomous Agents: Characterization and Requirements, Carnegie Mellon Technical Report CMU-CS-91-204. Carnegie Mellon University.</p>

<p>2 Maes, Pattie (1995). “Artificial life meets entertainment”. Communications of the ACM. Association for Computing Machinery (ACM). 38 (11): 108–114. doi:10.1145/219717.219808. ISSN 0001-0782. S2CID 8122852.</p>

<p>3 Franklin, Stan; Graesser, Art (1997). “Is It an agent, or just a program?: A taxonomy for autonomous agents”. Intelligent Agents III Agent Theories, Architectures, and Languages. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 21–35. doi:10.1007/bfb0013570. ISBN 978-3-540-62507-0. ISSN 0302-9743.
<a href="/project7/tag:tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tech</span></a></p>
]]></content:encoded>
      <guid>https://noblogo.org/project7/emwhat-are-autonomous-agents</guid>
      <pubDate>Mon, 24 Apr 2023 15:42:49 +0000</pubDate>
    </item>
  </channel>
</rss>