coventry 1

This commit is contained in:
Francesco Mecca 2018-10-25 12:23:48 +02:00
parent 3f847d4f75
commit ee4fba2d86
73 changed files with 5730 additions and 4505 deletions

View file

@ -0,0 +1,254 @@
---
title: eLearning in the age of Social Networks, the EduHack Platform
date: 2018-10-24
author: pesceWanda
layout: post
categories:
- PesceWanda
tags:
- reddit
- education
- elearning
- lms
- facebook
---
Tomorrow I am giving this [talk](http://conf.owlteh.org/contributions/published/elearning-in-the-age-of-social-networks-the-eduhack-model/) at the [OWLTEH Conference 2018](https://www.conf.owlteh.org/) at the Coventry University.
This is what I am going to talk about.
# In the beginning there was the LMS
Learning Management Systems appeared on the market around the beginning of 2000.
Since then they have been the foundation of the modern education sector, ranging from the basic functionalities of activity tracking, grades and analytics for the students (and in some cases the parents) to complex environments for remote education or even experimental pedagogies (e.g. [FARE](https://fare.polito.it) that provides hospitalized students means to access the physical class and labs).
In the last five years commercial LMS reduced the pace of their progress, while providing better accessibility and decentralization.
The core of their principle hasn't changed. In this talk I am going to highlight their problems and outline a vision for a different approach that is supported by modern technologies.
## The problem of traditional LMS
The design of a Learning Management System is based mainly around closed structures, such as very strict roles management and access management.
In a scenario where a professor might want to bring a domain expert during classes and online, a traditional LMS doesn't provide any kind of facilities for things such a role (in terms of login rights, rights towards other users, moderation capabilities).
There are many corner cases that lack a general method that allows users to expand the features of an LMS, especially when an institution lacks the technical means to bring development to such platforms.
Moreover, traditional LMS are highly gerarchic and foster an epistemology of "possession": learners are defined by the content that they "possess", the course they subscribed to, the material they downloaded. The educator is forced to be an authoritative source of knowledge that needs to direct the activity of the learners by having students pull the knowledge through an online portal. The flow is unidirectional and content centric.
In my experience instructors create delivery-centered pedagogies because LMS lacks the flexibility to be adapted to learners, especially when they are used by a variety of instructors (e.g.: all of the professors of a UNI). While this model better reflects the traditional classroom I would argue that modern users are not used to this kind of dynamics in modern online communities.
You can learn more about the friction in the usage of traditional LMS in the following papers:
* Rubin, Fernandes, Avgerinou, & Moore, 2010
* Naveh, Tubin, & Pliskin, 2010
* Parry, 2009; Sanchez-Franco, 2010
* Beebe et al., 2010
## Hacking Education with Digital Pedagogies
What happens when education gets "hacked" and transitions in the digital world?
This is what we envision within the realms of the EduHack project:
* "Content to consume" becomes "content to consume to produce content": learners become knowledge builders because producing intellectual outputs is the logical continuation to learning.
* The environment goes from content centric to learner centric: teachers must be comfortable with the fluidity of such new roles.
* The distribution of information goes from knowledge-push to knowledge-pull: learners actively seek out educational material and gets rewarded.
In the academia the closest study in this direction has been:
eLearning 2 0 and new literacies are social practices lagging behind, W.-Y. Lim et al.
### What do we gain with OSNs
In the Web 2.0 landscape and in particular for younger generations, Online Social Networks (OSNs) have strong potential for building and mantaining strong connections and create an informal learning environment that collects and puts into actions the ideas that I have described.
I wont rehash widely known statistics, but it must be said that nowadays OSNs, in particular Facebook, Youtube and Twitter have a high rate of penetration towards students of upper secondary and post secondary education. For younger students OSNs are their primary means of communication while dominating their usage of the internet overall.
* Using Social Networks Technology to Enhance Learning in Higher Education: a Case Study using Facebook.
* Web-Based Learning Platforms integratins Social Networking for Design Educations at High Schols in China.
* Using online social networking for teaching and learning: Facebook use at the University of Cape Town.
## Case studies: Facebook as an alternative LMS
Different case studies analyzed the possible uses of Facebook as a social LMS.
The following is a list of the positive and negative results of such studies grouped by User Experience Design (UX), Behavior of the users and Quantitative Participation.
#### UX
Advantages:
1. Photos and discussions are presented better than traditional LMS.
2. User's walls, private messages and comments are considered just communication tools.
3. Users reported that the technologies used for sharing class related material was familiar.
4. Educators reported that Facebook was useful to answer questions in bulk.
5. Educators reported that given the capabilities above, they saved a lot of time that otherwise would have been spent dealing with class related communications and questions.
Disadvantages:
1. Users where skeptical in writing long essays.
2. Friction when used as a formal learning platform.
3. Private platforms have issues related to accessibilities and language. Communication was done in english even if that wasn't the case before;
3. Facebook doesn't support a wiki system.
4. There are no tools for group management.
5. There are no tools for sending bulk messages and group notifications.
6. No capabilities for deletion and archival of material.
7. No support for common multimedia (such as powerpoint slides or pdf).
8. Maximum characters limit for posts.
#### Behavior of the users
Advantages:
1. Users reached to older students and befriended them.
2. Users reported that they felt less pressure online.
3. Educators found that boldlier students asked more questions because of absense of face to face shyness.
4. Students avoided to befriend educators and lecturers in order to hide their private lives.
5. During the research period, no student befriended the interviewed lecturers.
6. Students did not accept friend requests from lecturers.
7. Students help each other in answering questions
8. Six people from prior classes idependently requested to join the group
9. Constant and more accurate feedback for teachers
10. Constant communication for teachers
11. They got to know classmates better
12. In heavily moderated OSNs, few users find disappropriate contents.
13. In a comparison Facebook's discussion were more numerous than Moodle's discussions even when people were not allowed to be friends
Disadvantages:
1. Addiction
2. Students reported difficulties to get used to the new online persona.
3. Miscommunication: many prefer face to face interaction to express views. This maybe because they are used to it in traditional classrooms.
4. Some people say that they don't feel safe on FB (this is even more common when interviewing master students).
5. Some students worry that their personal life could be discovered and misjudged by tutors.
#### Quantitative Participation
Advantages:
1. Overall the students are more responsive to issues and questions raised in classes.
2. There is a higher number of ongoing discussions in any period.
3. Users log to Facebook for class related activities also during vacations (while the university LMS was almost not used).
4. Very active participation: more than 90% of the students used Facebook outside of classes for study related activities.
5. Improved discussion outside of classes.
6. Students post class related material.
7. Creation of many User Generated Content.
There are no relevant reported challenges regarding participation and usage patterns.
## Where do we go from here?
I want to highlight some other threats that an OSN such as Facebook poses to the Open Web.
* The issue of privacy: forcing students to use a service that mines and sells their data is **unethical**.
* Identity pollution: the open web is based on the principle of pseudoanonimity, users should be capable of build a prism of different online identity for different communities and environments.
* Studies report Facebook as more appropriate for younger students, but younger people have higher rates of addiction to OSNs as well.
* Addicted OSNs users have a lower GPA.
* 20% of college students reported being stalked on OSNs.
While the reported results about learners and educators participation in the usage of OSNs as LMS is astounding, forcing students to signup and give away their sensible data to private services is debatable and could be considered unethical.
# The EduHack model
We need to develop a new LMS that is respectful of the Open Web standards without providing any friction to the users.
For this reasons, as part of the EduHack Project, we are developing the EduHack Knowledge Sharing Platform.
The EduHack Knowledge Sharing Platform was born around the assumption that many of the advantages in terms of user engagement and group dynamics
provided by OSNs could be replicated by adopting their widely known design patterns and replicating closely the UX.
At the core of the platform there are the founding principles of the Open Web.
For this reason no data is collected of mined. Users are provided with an account that could be separated from their different online persona.
#### A platform for collaborative learning
The EduHack Knowledge Sharing Platform is divided into two parts.
The personal area is user centric and provides a window into the activities of the user in the form of multimedia blogposts.
The user can create and manage different roles for external editors to his private area. By default no other user is allowed to post a "story" in his personal area, but other users can be added as team members and can manage group works in different blogs.
Learners are expected to create and remix what they learned (e.g. from online classes or MOOCs).
The public area is modelled after the UX of Reddit and it is divided into diffent sections (e.g.: mathematics, IT, discrete phisics, etc...), each providing a wiki.
Learners can subscribe to different sections or different users and be notified of new content or interactions.
Every user is allowed to post a link, an essay or any other widely adopted multimedia artifact to any section. Every user can positively vote and comment every post made. Comments can be positively voted as well.
Comments and content can be ordered by a custom algorithm (Wilson score interval) or chronologically.
Educators have a custom flair, can create new sections and moderate them. Moderation consists in changing links, removing posts or comments. Vote cannot be altered.
## Conclusions
The EduHack Knowledge Sharing Platform is an ongoing effort to evolve LMS and augment them with social features and modern group dynamics.
The UX is modeled after a widely used social network without sacrificing consolidated approaches from traditional LMS.
We want to provide with this model an ethically sound framework for user centric, knowledge-pull pedagogies.

View file

@ -35,6 +35,7 @@
<h2 id="blog-posts">Blog Posts</h2>
<ul>
<li><p>24 Oct 2018 &raquo; <a href="/pescewanda/2018/10/24/eduhack_coventry/"> eLearning in the age of Social Networks, the EduHack Platform </a></p></li>
<li><p>27 Jul 2018 &raquo; <a href="/pescewanda/2018/07/27/dtldr/"> Un articolo per r/italyinformatica </a></p></li>
<li><p>27 Mar 2018 &raquo; <a href="/pescewanda/2018/03/27/addio-reddit/"> Addio Reddit </a></p></li>
<li><p>02 Oct 2017 &raquo; <a href="/pescewanda/2017/10/02/minidoxguide/"> Minidox, a guide for the Europeans and the Scrooges </a></p></li>

View file

@ -4,7 +4,7 @@
<title>Caught in the Net</title>
<link href="francescomecca.eu/atom.xml" rel="self"/>
<link href="francescomecca.eu/"/>
<updated>2018-08-15T11:49:02+02:00</updated>
<updated>2018-10-25T12:23:31+02:00</updated>
<id>francescomecca.eu</id>
<author>
<name>Francesco Mecca</name>
@ -12,6 +12,206 @@
</author>
<entry>
<title>eLearning in the age of Social Networks, the EduHack Platform</title>
<link href="francescomecca.eu/pescewanda/2018/10/24/eduhack_coventry/"/>
<updated>2018-10-24T00:00:00+02:00</updated>
<id>francescomecca.eu/pescewanda/2018/10/24/eduhack_coventry</id>
<content type="html">&lt;p&gt;Tomorrow I am giving this &lt;a href=&quot;http://conf.owlteh.org/contributions/published/elearning-in-the-age-of-social-networks-the-eduhack-model/&quot;&gt;talk&lt;/a&gt; at the &lt;a href=&quot;https://www.conf.owlteh.org/&quot;&gt;OWLTEH Conference 2018&lt;/a&gt; at the Coventry University.&lt;/p&gt;
&lt;p&gt;This is what I am going to talk about.&lt;/p&gt;
&lt;h1 id=&quot;in-the-beginning-there-was-the-lms&quot;&gt;In the beginning there was the LMS&lt;/h1&gt;
&lt;p&gt;Learning Management Systems appeared on the market around the beginning of 2000.&lt;/p&gt;
&lt;p&gt;Since then they have been the foundation of the modern education sector, ranging from the basic functionalities of activity tracking, grades and analytics for the students (and in some cases the parents) to complex environments for remote education or even experimental pedagogies (e.g. &lt;a href=&quot;https://fare.polito.it&quot;&gt;FARE&lt;/a&gt; that provides hospitalized students means to access the physical class and labs).&lt;/p&gt;
&lt;p&gt;In the last five years commercial LMS reduced the pace of their progress, while providing better accessibility and decentralization.&lt;/p&gt;
&lt;p&gt;The core of their principle hasn&amp;#39;t changed. In this talk I am going to highlight their problems and outline a vision for a different approach that is supported by modern technologies.&lt;/p&gt;
&lt;h2 id=&quot;the-problem-of-traditional-lms&quot;&gt;The problem of traditional LMS&lt;/h2&gt;
&lt;p&gt;The design of a Learning Management System is based mainly around closed structures, such as very strict roles management and access management.&lt;/p&gt;
&lt;p&gt;In a scenario where a professor might want to bring a domain expert during classes and online, a traditional LMS doesn&amp;#39;t provide any kind of facilities for things such a role (in terms of login rights, rights towards other users, moderation capabilities).&lt;/p&gt;
&lt;p&gt;There are many corner cases that lack a general method that allows users to expand the features of an LMS, especially when an institution lacks the technical means to bring development to such platforms.&lt;/p&gt;
&lt;p&gt;Moreover, traditional LMS are highly gerarchic and foster an epistemology of &amp;quot;possession&amp;quot;: learners are defined by the content that they &amp;quot;possess&amp;quot;, the course they subscribed to, the material they downloaded. The educator is forced to be an authoritative source of knowledge that needs to direct the activity of the learners by having students pull the knowledge through an online portal. The flow is unidirectional and content centric.&lt;/p&gt;
&lt;p&gt;In my experience instructors create delivery-centered pedagogies because LMS lacks the flexibility to be adapted to learners, especially when they are used by a variety of instructors (e.g.: all of the professors of a UNI). While this model better reflects the traditional classroom I would argue that modern users are not used to this kind of dynamics in modern online communities.&lt;/p&gt;
&lt;p&gt;You can learn more about the friction in the usage of traditional LMS in the following papers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Rubin, Fernandes, Avgerinou, &amp;amp; Moore, 2010&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Naveh, Tubin, &amp;amp; Pliskin, 2010&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Parry, 2009; Sanchez-Franco, 2010&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Beebe et al., 2010&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;hacking-education-with-digital-pedagogies&quot;&gt;Hacking Education with Digital Pedagogies&lt;/h2&gt;
&lt;p&gt;What happens when education gets &amp;quot;hacked&amp;quot; and transitions in the digital world?
This is what we envision within the realms of the EduHack project:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&amp;quot;Content to consume&amp;quot; becomes &amp;quot;content to consume to produce content&amp;quot;: learners become knowledge builders because producing intellectual outputs is the logical continuation to learning.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The environment goes from content centric to learner centric: teachers must be comfortable with the fluidity of such new roles.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The distribution of information goes from knowledge-push to knowledge-pull: learners actively seek out educational material and gets rewarded.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In the academia the closest study in this direction has been:
eLearning 2 0 and new literacies are social practices lagging behind, W.-Y. Lim et al.&lt;/p&gt;
&lt;h3 id=&quot;what-do-we-gain-with-osns&quot;&gt;What do we gain with OSNs&lt;/h3&gt;
&lt;p&gt;In the Web 2.0 landscape and in particular for younger generations, Online Social Networks (OSNs) have strong potential for building and mantaining strong connections and create an informal learning environment that collects and puts into actions the ideas that I have described.
I wont rehash widely known statistics, but it must be said that nowadays OSNs, in particular Facebook, Youtube and Twitter have a high rate of penetration towards students of upper secondary and post secondary education. For younger students OSNs are their primary means of communication while dominating their usage of the internet overall.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Using Social Networks Technology to Enhance Learning in Higher Education: a Case Study using Facebook.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Web-Based Learning Platforms integratins Social Networking for Design Educations at High Schols in China.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using online social networking for teaching and learning: Facebook use at the University of Cape Town.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;case-studies-facebook-as-an-alternative-lms&quot;&gt;Case studies: Facebook as an alternative LMS&lt;/h2&gt;
&lt;p&gt;Different case studies analyzed the possible uses of Facebook as a social LMS.
The following is a list of the positive and negative results of such studies grouped by User Experience Design (UX), Behavior of the users and Quantitative Participation.&lt;/p&gt;
&lt;h4 id=&quot;ux&quot;&gt;UX&lt;/h4&gt;
&lt;p&gt;Advantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Photos and discussions are presented better than traditional LMS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;User&amp;#39;s walls, private messages and comments are considered just communication tools.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Users reported that the technologies used for sharing class related material was familiar.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Educators reported that Facebook was useful to answer questions in bulk.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Educators reported that given the capabilities above, they saved a lot of time that otherwise would have been spent dealing with class related communications and questions.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Disadvantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Users where skeptical in writing long essays.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Friction when used as a formal learning platform.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Private platforms have issues related to accessibilities and language. Communication was done in english even if that wasn&amp;#39;t the case before;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Facebook doesn&amp;#39;t support a wiki system.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There are no tools for group management.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There are no tools for sending bulk messages and group notifications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No capabilities for deletion and archival of material.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No support for common multimedia (such as powerpoint slides or pdf).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Maximum characters limit for posts.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&quot;behavior-of-the-users&quot;&gt;Behavior of the users&lt;/h4&gt;
&lt;p&gt;Advantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Users reached to older students and befriended them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Users reported that they felt less pressure online.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Educators found that boldlier students asked more questions because of absense of face to face shyness.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students avoided to befriend educators and lecturers in order to hide their private lives.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;During the research period, no student befriended the interviewed lecturers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students did not accept friend requests from lecturers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students help each other in answering questions&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Six people from prior classes idependently requested to join the group&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Constant and more accurate feedback for teachers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Constant communication for teachers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They got to know classmates better&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In heavily moderated OSNs, few users find disappropriate contents.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In a comparison Facebook&amp;#39;s discussion were more numerous than Moodle&amp;#39;s discussions even when people were not allowed to be friends&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Disadvantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Addiction&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students reported difficulties to get used to the new online persona.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Miscommunication: many prefer face to face interaction to express views. This maybe because they are used to it in traditional classrooms.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some people say that they don&amp;#39;t feel safe on FB (this is even more common when interviewing master students).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some students worry that their personal life could be discovered and misjudged by tutors.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&quot;quantitative-participation&quot;&gt;Quantitative Participation&lt;/h4&gt;
&lt;p&gt;Advantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Overall the students are more responsive to issues and questions raised in classes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There is a higher number of ongoing discussions in any period.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Users log to Facebook for class related activities also during vacations (while the university LMS was almost not used).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Very active participation: more than 90% of the students used Facebook outside of classes for study related activities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improved discussion outside of classes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students post class related material.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Creation of many User Generated Content.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;There are no relevant reported challenges regarding participation and usage patterns.&lt;/p&gt;
&lt;h2 id=&quot;where-do-we-go-from-here&quot;&gt;Where do we go from here?&lt;/h2&gt;
&lt;p&gt;I want to highlight some other threats that an OSN such as Facebook poses to the Open Web.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The issue of privacy: forcing students to use a service that mines and sells their data is &lt;strong&gt;unethical&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identity pollution: the open web is based on the principle of pseudoanonimity, users should be capable of build a prism of different online identity for different communities and environments.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Studies report Facebook as more appropriate for younger students, but younger people have higher rates of addiction to OSNs as well.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Addicted OSNs users have a lower GPA.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;20% of college students reported being stalked on OSNs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;While the reported results about learners and educators participation in the usage of OSNs as LMS is astounding, forcing students to signup and give away their sensible data to private services is debatable and could be considered unethical.&lt;/p&gt;
&lt;h1 id=&quot;the-eduhack-model&quot;&gt;The EduHack model&lt;/h1&gt;
&lt;p&gt;We need to develop a new LMS that is respectful of the Open Web standards without providing any friction to the users.&lt;/p&gt;
&lt;p&gt;For this reasons, as part of the EduHack Project, we are developing the EduHack Knowledge Sharing Platform.&lt;/p&gt;
&lt;p&gt;The EduHack Knowledge Sharing Platform was born around the assumption that many of the advantages in terms of user engagement and group dynamics&lt;/p&gt;
&lt;p&gt;provided by OSNs could be replicated by adopting their widely known design patterns and replicating closely the UX.&lt;/p&gt;
&lt;p&gt;At the core of the platform there are the founding principles of the Open Web.&lt;/p&gt;
&lt;p&gt;For this reason no data is collected of mined. Users are provided with an account that could be separated from their different online persona.&lt;/p&gt;
&lt;h4 id=&quot;a-platform-for-collaborative-learning&quot;&gt;A platform for collaborative learning&lt;/h4&gt;
&lt;p&gt;The EduHack Knowledge Sharing Platform is divided into two parts.&lt;/p&gt;
&lt;p&gt;The personal area is user centric and provides a window into the activities of the user in the form of multimedia blogposts.&lt;/p&gt;
&lt;p&gt;The user can create and manage different roles for external editors to his private area. By default no other user is allowed to post a &amp;quot;story&amp;quot; in his personal area, but other users can be added as team members and can manage group works in different blogs.&lt;/p&gt;
&lt;p&gt;Learners are expected to create and remix what they learned (e.g. from online classes or MOOCs).&lt;/p&gt;
&lt;p&gt;The public area is modelled after the UX of Reddit and it is divided into diffent sections (e.g.: mathematics, IT, discrete phisics, etc...), each providing a wiki.&lt;/p&gt;
&lt;p&gt;Learners can subscribe to different sections or different users and be notified of new content or interactions.&lt;/p&gt;
&lt;p&gt;Every user is allowed to post a link, an essay or any other widely adopted multimedia artifact to any section. Every user can positively vote and comment every post made. Comments can be positively voted as well.&lt;/p&gt;
&lt;p&gt;Comments and content can be ordered by a custom algorithm (Wilson score interval) or chronologically.&lt;/p&gt;
&lt;p&gt;Educators have a custom flair, can create new sections and moderate them. Moderation consists in changing links, removing posts or comments. Vote cannot be altered.&lt;/p&gt;
&lt;h2 id=&quot;conclusions&quot;&gt;Conclusions&lt;/h2&gt;
&lt;p&gt;The EduHack Knowledge Sharing Platform is an ongoing effort to evolve LMS and augment them with social features and modern group dynamics.&lt;/p&gt;
&lt;p&gt;The UX is modeled after a widely used social network without sacrificing consolidated approaches from traditional LMS.&lt;/p&gt;
&lt;p&gt;We want to provide with this model an ethically sound framework for user centric, knowledge-pull pedagogies.&lt;/p&gt;
</content>
</entry>
<entry>
<title>Un articolo per r/italyinformatica</title>
<link href="francescomecca.eu/pescewanda/2018/07/27/dtldr/"/>

View file

@ -6,6 +6,208 @@
<link>francescomecca.eu</link>
<item>
<title>eLearning in the age of Social Networks, the EduHack Platform</title>
<description>&lt;p&gt;Tomorrow I am giving this &lt;a href=&quot;http://conf.owlteh.org/contributions/published/elearning-in-the-age-of-social-networks-the-eduhack-model/&quot;&gt;talk&lt;/a&gt; at the &lt;a href=&quot;https://www.conf.owlteh.org/&quot;&gt;OWLTEH Conference 2018&lt;/a&gt; at the Coventry University.&lt;/p&gt;
&lt;p&gt;This is what I am going to talk about.&lt;/p&gt;
&lt;h1 id=&quot;in-the-beginning-there-was-the-lms&quot;&gt;In the beginning there was the LMS&lt;/h1&gt;
&lt;p&gt;Learning Management Systems appeared on the market around the beginning of 2000.&lt;/p&gt;
&lt;p&gt;Since then they have been the foundation of the modern education sector, ranging from the basic functionalities of activity tracking, grades and analytics for the students (and in some cases the parents) to complex environments for remote education or even experimental pedagogies (e.g. &lt;a href=&quot;https://fare.polito.it&quot;&gt;FARE&lt;/a&gt; that provides hospitalized students means to access the physical class and labs).&lt;/p&gt;
&lt;p&gt;In the last five years commercial LMS reduced the pace of their progress, while providing better accessibility and decentralization.&lt;/p&gt;
&lt;p&gt;The core of their principle hasn&amp;#39;t changed. In this talk I am going to highlight their problems and outline a vision for a different approach that is supported by modern technologies.&lt;/p&gt;
&lt;h2 id=&quot;the-problem-of-traditional-lms&quot;&gt;The problem of traditional LMS&lt;/h2&gt;
&lt;p&gt;The design of a Learning Management System is based mainly around closed structures, such as very strict roles management and access management.&lt;/p&gt;
&lt;p&gt;In a scenario where a professor might want to bring a domain expert during classes and online, a traditional LMS doesn&amp;#39;t provide any kind of facilities for things such a role (in terms of login rights, rights towards other users, moderation capabilities).&lt;/p&gt;
&lt;p&gt;There are many corner cases that lack a general method that allows users to expand the features of an LMS, especially when an institution lacks the technical means to bring development to such platforms.&lt;/p&gt;
&lt;p&gt;Moreover, traditional LMS are highly gerarchic and foster an epistemology of &amp;quot;possession&amp;quot;: learners are defined by the content that they &amp;quot;possess&amp;quot;, the course they subscribed to, the material they downloaded. The educator is forced to be an authoritative source of knowledge that needs to direct the activity of the learners by having students pull the knowledge through an online portal. The flow is unidirectional and content centric.&lt;/p&gt;
&lt;p&gt;In my experience instructors create delivery-centered pedagogies because LMS lacks the flexibility to be adapted to learners, especially when they are used by a variety of instructors (e.g.: all of the professors of a UNI). While this model better reflects the traditional classroom I would argue that modern users are not used to this kind of dynamics in modern online communities.&lt;/p&gt;
&lt;p&gt;You can learn more about the friction in the usage of traditional LMS in the following papers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Rubin, Fernandes, Avgerinou, &amp;amp; Moore, 2010&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Naveh, Tubin, &amp;amp; Pliskin, 2010&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Parry, 2009; Sanchez-Franco, 2010&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Beebe et al., 2010&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;hacking-education-with-digital-pedagogies&quot;&gt;Hacking Education with Digital Pedagogies&lt;/h2&gt;
&lt;p&gt;What happens when education gets &amp;quot;hacked&amp;quot; and transitions in the digital world?
This is what we envision within the realms of the EduHack project:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&amp;quot;Content to consume&amp;quot; becomes &amp;quot;content to consume to produce content&amp;quot;: learners become knowledge builders because producing intellectual outputs is the logical continuation to learning.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The environment goes from content centric to learner centric: teachers must be comfortable with the fluidity of such new roles.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The distribution of information goes from knowledge-push to knowledge-pull: learners actively seek out educational material and gets rewarded.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In the academia the closest study in this direction has been:
eLearning 2 0 and new literacies are social practices lagging behind, W.-Y. Lim et al.&lt;/p&gt;
&lt;h3 id=&quot;what-do-we-gain-with-osns&quot;&gt;What do we gain with OSNs&lt;/h3&gt;
&lt;p&gt;In the Web 2.0 landscape and in particular for younger generations, Online Social Networks (OSNs) have strong potential for building and mantaining strong connections and create an informal learning environment that collects and puts into actions the ideas that I have described.
I wont rehash widely known statistics, but it must be said that nowadays OSNs, in particular Facebook, Youtube and Twitter have a high rate of penetration towards students of upper secondary and post secondary education. For younger students OSNs are their primary means of communication while dominating their usage of the internet overall.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Using Social Networks Technology to Enhance Learning in Higher Education: a Case Study using Facebook.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Web-Based Learning Platforms integratins Social Networking for Design Educations at High Schols in China.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using online social networking for teaching and learning: Facebook use at the University of Cape Town.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;case-studies-facebook-as-an-alternative-lms&quot;&gt;Case studies: Facebook as an alternative LMS&lt;/h2&gt;
&lt;p&gt;Different case studies analyzed the possible uses of Facebook as a social LMS.
The following is a list of the positive and negative results of such studies grouped by User Experience Design (UX), Behavior of the users and Quantitative Participation.&lt;/p&gt;
&lt;h4 id=&quot;ux&quot;&gt;UX&lt;/h4&gt;
&lt;p&gt;Advantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Photos and discussions are presented better than traditional LMS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;User&amp;#39;s walls, private messages and comments are considered just communication tools.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Users reported that the technologies used for sharing class related material was familiar.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Educators reported that Facebook was useful to answer questions in bulk.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Educators reported that given the capabilities above, they saved a lot of time that otherwise would have been spent dealing with class related communications and questions.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Disadvantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Users where skeptical in writing long essays.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Friction when used as a formal learning platform.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Private platforms have issues related to accessibilities and language. Communication was done in english even if that wasn&amp;#39;t the case before;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Facebook doesn&amp;#39;t support a wiki system.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There are no tools for group management.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There are no tools for sending bulk messages and group notifications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No capabilities for deletion and archival of material.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No support for common multimedia (such as powerpoint slides or pdf).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Maximum characters limit for posts.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&quot;behavior-of-the-users&quot;&gt;Behavior of the users&lt;/h4&gt;
&lt;p&gt;Advantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Users reached to older students and befriended them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Users reported that they felt less pressure online.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Educators found that boldlier students asked more questions because of absense of face to face shyness.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students avoided to befriend educators and lecturers in order to hide their private lives.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;During the research period, no student befriended the interviewed lecturers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students did not accept friend requests from lecturers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students help each other in answering questions&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Six people from prior classes idependently requested to join the group&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Constant and more accurate feedback for teachers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Constant communication for teachers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They got to know classmates better&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In heavily moderated OSNs, few users find disappropriate contents.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In a comparison Facebook&amp;#39;s discussion were more numerous than Moodle&amp;#39;s discussions even when people were not allowed to be friends&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Disadvantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Addiction&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students reported difficulties to get used to the new online persona.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Miscommunication: many prefer face to face interaction to express views. This maybe because they are used to it in traditional classrooms.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some people say that they don&amp;#39;t feel safe on FB (this is even more common when interviewing master students).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some students worry that their personal life could be discovered and misjudged by tutors.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&quot;quantitative-participation&quot;&gt;Quantitative Participation&lt;/h4&gt;
&lt;p&gt;Advantages:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Overall the students are more responsive to issues and questions raised in classes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There is a higher number of ongoing discussions in any period.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Users log to Facebook for class related activities also during vacations (while the university LMS was almost not used).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Very active participation: more than 90% of the students used Facebook outside of classes for study related activities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improved discussion outside of classes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Students post class related material.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Creation of many User Generated Content.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;There are no relevant reported challenges regarding participation and usage patterns.&lt;/p&gt;
&lt;h2 id=&quot;where-do-we-go-from-here&quot;&gt;Where do we go from here?&lt;/h2&gt;
&lt;p&gt;I want to highlight some other threats that an OSN such as Facebook poses to the Open Web.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The issue of privacy: forcing students to use a service that mines and sells their data is &lt;strong&gt;unethical&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identity pollution: the open web is based on the principle of pseudoanonimity, users should be capable of build a prism of different online identity for different communities and environments.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Studies report Facebook as more appropriate for younger students, but younger people have higher rates of addiction to OSNs as well.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Addicted OSNs users have a lower GPA.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;20% of college students reported being stalked on OSNs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;While the reported results about learners and educators participation in the usage of OSNs as LMS is astounding, forcing students to signup and give away their sensible data to private services is debatable and could be considered unethical.&lt;/p&gt;
&lt;h1 id=&quot;the-eduhack-model&quot;&gt;The EduHack model&lt;/h1&gt;
&lt;p&gt;We need to develop a new LMS that is respectful of the Open Web standards without providing any friction to the users.&lt;/p&gt;
&lt;p&gt;For this reasons, as part of the EduHack Project, we are developing the EduHack Knowledge Sharing Platform.&lt;/p&gt;
&lt;p&gt;The EduHack Knowledge Sharing Platform was born around the assumption that many of the advantages in terms of user engagement and group dynamics&lt;/p&gt;
&lt;p&gt;provided by OSNs could be replicated by adopting their widely known design patterns and replicating closely the UX.&lt;/p&gt;
&lt;p&gt;At the core of the platform there are the founding principles of the Open Web.&lt;/p&gt;
&lt;p&gt;For this reason no data is collected of mined. Users are provided with an account that could be separated from their different online persona.&lt;/p&gt;
&lt;h4 id=&quot;a-platform-for-collaborative-learning&quot;&gt;A platform for collaborative learning&lt;/h4&gt;
&lt;p&gt;The EduHack Knowledge Sharing Platform is divided into two parts.&lt;/p&gt;
&lt;p&gt;The personal area is user centric and provides a window into the activities of the user in the form of multimedia blogposts.&lt;/p&gt;
&lt;p&gt;The user can create and manage different roles for external editors to his private area. By default no other user is allowed to post a &amp;quot;story&amp;quot; in his personal area, but other users can be added as team members and can manage group works in different blogs.&lt;/p&gt;
&lt;p&gt;Learners are expected to create and remix what they learned (e.g. from online classes or MOOCs).&lt;/p&gt;
&lt;p&gt;The public area is modelled after the UX of Reddit and it is divided into diffent sections (e.g.: mathematics, IT, discrete phisics, etc...), each providing a wiki.&lt;/p&gt;
&lt;p&gt;Learners can subscribe to different sections or different users and be notified of new content or interactions.&lt;/p&gt;
&lt;p&gt;Every user is allowed to post a link, an essay or any other widely adopted multimedia artifact to any section. Every user can positively vote and comment every post made. Comments can be positively voted as well.&lt;/p&gt;
&lt;p&gt;Comments and content can be ordered by a custom algorithm (Wilson score interval) or chronologically.&lt;/p&gt;
&lt;p&gt;Educators have a custom flair, can create new sections and moderate them. Moderation consists in changing links, removing posts or comments. Vote cannot be altered.&lt;/p&gt;
&lt;h2 id=&quot;conclusions&quot;&gt;Conclusions&lt;/h2&gt;
&lt;p&gt;The EduHack Knowledge Sharing Platform is an ongoing effort to evolve LMS and augment them with social features and modern group dynamics.&lt;/p&gt;
&lt;p&gt;The UX is modeled after a widely used social network without sacrificing consolidated approaches from traditional LMS.&lt;/p&gt;
&lt;p&gt;We want to provide with this model an ethically sound framework for user centric, knowledge-pull pedagogies.&lt;/p&gt;
</description>
<pubDate>2018-10-24T00:00:00+02:00</pubDate>
<link>francescomecca.eu/pescewanda/2018/10/24/eduhack_coventry/</link>
<guid isPermaLink="true">francescomecca.eu/pescewanda/2018/10/24/eduhack_coventry/</guid>
</item>
<item>
<title>Un articolo per r/italyinformatica</title>
<description>&lt;p&gt;Questo articolo è stato originalmente scritto per il &lt;a href=&quot;https://tldr.italyinformatica.org&quot;&gt;blog&lt;/a&gt; di &lt;a href=&quot;https://reddit.com/r/italyinformatica&quot;&gt;r/italyinformatica&lt;/a&gt;.&lt;/p&gt;

View file

@ -32,6 +32,214 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2018/10/24/eduhack_coventry/">
eLearning in the age of Social Networks, the EduHack Platform
</a>
</h1>
<span class="post-date">24 Oct 2018</span>
<p>Tomorrow I am giving this <a href="http://conf.owlteh.org/contributions/published/elearning-in-the-age-of-social-networks-the-eduhack-model/">talk</a> at the <a href="https://www.conf.owlteh.org/">OWLTEH Conference 2018</a> at the Coventry University.</p>
<p>This is what I am going to talk about.</p>
<h1 id="in-the-beginning-there-was-the-lms">In the beginning there was the LMS</h1>
<p>Learning Management Systems appeared on the market around the beginning of 2000.</p>
<p>Since then they have been the foundation of the modern education sector, ranging from the basic functionalities of activity tracking, grades and analytics for the students (and in some cases the parents) to complex environments for remote education or even experimental pedagogies (e.g. <a href="https://fare.polito.it">FARE</a> that provides hospitalized students means to access the physical class and labs).</p>
<p>In the last five years commercial LMS reduced the pace of their progress, while providing better accessibility and decentralization.</p>
<p>The core of their principle hasn&#39;t changed. In this talk I am going to highlight their problems and outline a vision for a different approach that is supported by modern technologies.</p>
<h2 id="the-problem-of-traditional-lms">The problem of traditional LMS</h2>
<p>The design of a Learning Management System is based mainly around closed structures, such as very strict roles management and access management.</p>
<p>In a scenario where a professor might want to bring a domain expert during classes and online, a traditional LMS doesn&#39;t provide any kind of facilities for things such a role (in terms of login rights, rights towards other users, moderation capabilities).</p>
<p>There are many corner cases that lack a general method that allows users to expand the features of an LMS, especially when an institution lacks the technical means to bring development to such platforms.</p>
<p>Moreover, traditional LMS are highly gerarchic and foster an epistemology of &quot;possession&quot;: learners are defined by the content that they &quot;possess&quot;, the course they subscribed to, the material they downloaded. The educator is forced to be an authoritative source of knowledge that needs to direct the activity of the learners by having students pull the knowledge through an online portal. The flow is unidirectional and content centric.</p>
<p>In my experience instructors create delivery-centered pedagogies because LMS lacks the flexibility to be adapted to learners, especially when they are used by a variety of instructors (e.g.: all of the professors of a UNI). While this model better reflects the traditional classroom I would argue that modern users are not used to this kind of dynamics in modern online communities.</p>
<p>You can learn more about the friction in the usage of traditional LMS in the following papers:</p>
<ul>
<li><p>Rubin, Fernandes, Avgerinou, &amp; Moore, 2010</p></li>
<li><p>Naveh, Tubin, &amp; Pliskin, 2010</p></li>
<li><p>Parry, 2009; Sanchez-Franco, 2010</p></li>
<li><p>Beebe et al., 2010</p></li>
</ul>
<h2 id="hacking-education-with-digital-pedagogies">Hacking Education with Digital Pedagogies</h2>
<p>What happens when education gets &quot;hacked&quot; and transitions in the digital world?
This is what we envision within the realms of the EduHack project:</p>
<ul>
<li><p>&quot;Content to consume&quot; becomes &quot;content to consume to produce content&quot;: learners become knowledge builders because producing intellectual outputs is the logical continuation to learning.</p></li>
<li><p>The environment goes from content centric to learner centric: teachers must be comfortable with the fluidity of such new roles.</p></li>
<li><p>The distribution of information goes from knowledge-push to knowledge-pull: learners actively seek out educational material and gets rewarded.</p></li>
</ul>
<p>In the academia the closest study in this direction has been:
eLearning 2 0 and new literacies are social practices lagging behind, W.-Y. Lim et al.</p>
<h3 id="what-do-we-gain-with-osns">What do we gain with OSNs</h3>
<p>In the Web 2.0 landscape and in particular for younger generations, Online Social Networks (OSNs) have strong potential for building and mantaining strong connections and create an informal learning environment that collects and puts into actions the ideas that I have described.
I wont rehash widely known statistics, but it must be said that nowadays OSNs, in particular Facebook, Youtube and Twitter have a high rate of penetration towards students of upper secondary and post secondary education. For younger students OSNs are their primary means of communication while dominating their usage of the internet overall.</p>
<ul>
<li><p>Using Social Networks Technology to Enhance Learning in Higher Education: a Case Study using Facebook.</p></li>
<li><p>Web-Based Learning Platforms integratins Social Networking for Design Educations at High Schols in China.</p></li>
<li><p>Using online social networking for teaching and learning: Facebook use at the University of Cape Town.</p></li>
</ul>
<h2 id="case-studies-facebook-as-an-alternative-lms">Case studies: Facebook as an alternative LMS</h2>
<p>Different case studies analyzed the possible uses of Facebook as a social LMS.
The following is a list of the positive and negative results of such studies grouped by User Experience Design (UX), Behavior of the users and Quantitative Participation.</p>
<h4 id="ux">UX</h4>
<p>Advantages:</p>
<ol>
<li><p>Photos and discussions are presented better than traditional LMS.</p></li>
<li><p>User&#39;s walls, private messages and comments are considered just communication tools.</p></li>
<li><p>Users reported that the technologies used for sharing class related material was familiar.</p></li>
<li><p>Educators reported that Facebook was useful to answer questions in bulk.</p></li>
<li><p>Educators reported that given the capabilities above, they saved a lot of time that otherwise would have been spent dealing with class related communications and questions.</p></li>
</ol>
<p>Disadvantages:</p>
<ol>
<li><p>Users where skeptical in writing long essays.</p></li>
<li><p>Friction when used as a formal learning platform.</p></li>
<li><p>Private platforms have issues related to accessibilities and language. Communication was done in english even if that wasn&#39;t the case before;</p></li>
<li><p>Facebook doesn&#39;t support a wiki system.</p></li>
<li><p>There are no tools for group management.</p></li>
<li><p>There are no tools for sending bulk messages and group notifications.</p></li>
<li><p>No capabilities for deletion and archival of material.</p></li>
<li><p>No support for common multimedia (such as powerpoint slides or pdf).</p></li>
<li><p>Maximum characters limit for posts.</p></li>
</ol>
<h4 id="behavior-of-the-users">Behavior of the users</h4>
<p>Advantages:</p>
<ol>
<li><p>Users reached to older students and befriended them.</p></li>
<li><p>Users reported that they felt less pressure online.</p></li>
<li><p>Educators found that boldlier students asked more questions because of absense of face to face shyness.</p></li>
<li><p>Students avoided to befriend educators and lecturers in order to hide their private lives.</p></li>
<li><p>During the research period, no student befriended the interviewed lecturers.</p></li>
<li><p>Students did not accept friend requests from lecturers.</p></li>
<li><p>Students help each other in answering questions</p></li>
<li><p>Six people from prior classes idependently requested to join the group</p></li>
<li><p>Constant and more accurate feedback for teachers</p></li>
<li><p>Constant communication for teachers</p></li>
<li><p>They got to know classmates better</p></li>
<li><p>In heavily moderated OSNs, few users find disappropriate contents.</p></li>
<li><p>In a comparison Facebook&#39;s discussion were more numerous than Moodle&#39;s discussions even when people were not allowed to be friends</p></li>
</ol>
<p>Disadvantages:</p>
<ol>
<li><p>Addiction</p></li>
<li><p>Students reported difficulties to get used to the new online persona.</p></li>
<li><p>Miscommunication: many prefer face to face interaction to express views. This maybe because they are used to it in traditional classrooms.</p></li>
<li><p>Some people say that they don&#39;t feel safe on FB (this is even more common when interviewing master students).</p></li>
<li><p>Some students worry that their personal life could be discovered and misjudged by tutors.</p></li>
</ol>
<h4 id="quantitative-participation">Quantitative Participation</h4>
<p>Advantages:</p>
<ol>
<li><p>Overall the students are more responsive to issues and questions raised in classes.</p></li>
<li><p>There is a higher number of ongoing discussions in any period.</p></li>
<li><p>Users log to Facebook for class related activities also during vacations (while the university LMS was almost not used).</p></li>
<li><p>Very active participation: more than 90% of the students used Facebook outside of classes for study related activities.</p></li>
<li><p>Improved discussion outside of classes.</p></li>
<li><p>Students post class related material.</p></li>
<li><p>Creation of many User Generated Content.</p></li>
</ol>
<p>There are no relevant reported challenges regarding participation and usage patterns.</p>
<h2 id="where-do-we-go-from-here">Where do we go from here?</h2>
<p>I want to highlight some other threats that an OSN such as Facebook poses to the Open Web.</p>
<ul>
<li><p>The issue of privacy: forcing students to use a service that mines and sells their data is <strong>unethical</strong>.</p></li>
<li><p>Identity pollution: the open web is based on the principle of pseudoanonimity, users should be capable of build a prism of different online identity for different communities and environments.</p></li>
<li><p>Studies report Facebook as more appropriate for younger students, but younger people have higher rates of addiction to OSNs as well.</p></li>
<li><p>Addicted OSNs users have a lower GPA.</p></li>
<li><p>20% of college students reported being stalked on OSNs.</p></li>
</ul>
<p>While the reported results about learners and educators participation in the usage of OSNs as LMS is astounding, forcing students to signup and give away their sensible data to private services is debatable and could be considered unethical.</p>
<h1 id="the-eduhack-model">The EduHack model</h1>
<p>We need to develop a new LMS that is respectful of the Open Web standards without providing any friction to the users.</p>
<p>For this reasons, as part of the EduHack Project, we are developing the EduHack Knowledge Sharing Platform.</p>
<p>The EduHack Knowledge Sharing Platform was born around the assumption that many of the advantages in terms of user engagement and group dynamics</p>
<p>provided by OSNs could be replicated by adopting their widely known design patterns and replicating closely the UX.</p>
<p>At the core of the platform there are the founding principles of the Open Web.</p>
<p>For this reason no data is collected of mined. Users are provided with an account that could be separated from their different online persona.</p>
<h4 id="a-platform-for-collaborative-learning">A platform for collaborative learning</h4>
<p>The EduHack Knowledge Sharing Platform is divided into two parts.</p>
<p>The personal area is user centric and provides a window into the activities of the user in the form of multimedia blogposts.</p>
<p>The user can create and manage different roles for external editors to his private area. By default no other user is allowed to post a &quot;story&quot; in his personal area, but other users can be added as team members and can manage group works in different blogs.</p>
<p>Learners are expected to create and remix what they learned (e.g. from online classes or MOOCs).</p>
<p>The public area is modelled after the UX of Reddit and it is divided into diffent sections (e.g.: mathematics, IT, discrete phisics, etc...), each providing a wiki.</p>
<p>Learners can subscribe to different sections or different users and be notified of new content or interactions.</p>
<p>Every user is allowed to post a link, an essay or any other widely adopted multimedia artifact to any section. Every user can positively vote and comment every post made. Comments can be positively voted as well.</p>
<p>Comments and content can be ordered by a custom algorithm (Wilson score interval) or chronologically.</p>
<p>Educators have a custom flair, can create new sections and moderate them. Moderation consists in changing links, removing posts or comments. Vote cannot be altered.</p>
<h2 id="conclusions">Conclusions</h2>
<p>The EduHack Knowledge Sharing Platform is an ongoing effort to evolve LMS and augment them with social features and modern group dynamics.</p>
<p>The UX is modeled after a widely used social network without sacrificing consolidated approaches from traditional LMS.</p>
<p>We want to provide with this model an ethically sound framework for user centric, knowledge-pull pedagogies.</p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2018/07/27/dtldr/">
@ -536,25 +744,6 @@ GND [ ] [x] GND
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2017/05/07/latestage_handbrake/">
Late Stage Capitalism meets FOSS
</a>
</h1>
<span class="post-date">07 May 2017</span>
<p><img src="/wp-content/uploads/2017/hn_handbrake_hack.jpg" alt="brainwashing"></p>
<p><a href="http://archive.is/XA3rj">source</a></p>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -123,6 +123,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -160,15 +169,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -268,6 +268,59 @@
@ -623,69 +676,6 @@

View file

@ -153,6 +153,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -190,15 +199,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -280,6 +280,49 @@
@ -583,57 +626,6 @@

View file

@ -117,6 +117,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -154,15 +163,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -262,6 +262,59 @@
@ -617,69 +670,6 @@

View file

@ -107,6 +107,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -144,15 +153,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -234,6 +234,49 @@
@ -519,57 +562,6 @@

View file

@ -111,6 +111,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -148,15 +157,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -238,6 +238,49 @@
@ -523,57 +566,6 @@

View file

@ -76,6 +76,15 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -113,15 +122,6 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -149,6 +149,19 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia
@ -225,21 +238,6 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia

View file

@ -49,6 +49,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -86,15 +95,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -122,6 +122,19 @@
@ -198,21 +211,6 @@

View file

@ -93,6 +93,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -130,15 +139,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -238,6 +238,59 @@
@ -593,69 +646,6 @@

View file

@ -166,6 +166,15 @@ Command successful.</pre>
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -203,15 +212,6 @@ Command successful.</pre>
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -329,6 +329,69 @@ Command successful.</pre>
@ -754,81 +817,6 @@ Command successful.</pre>

View file

@ -69,6 +69,15 @@ perl-cleaner --all</pre>
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -106,15 +115,6 @@ perl-cleaner --all</pre>
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -250,6 +250,79 @@ perl-cleaner --all</pre>
@ -745,93 +818,6 @@ perl-cleaner --all</pre>

View file

@ -131,6 +131,15 @@ The original idea for the Buridan&#39;s donkey came from my mentor <a href="http
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -168,15 +177,6 @@ The original idea for the Buridan&#39;s donkey came from my mentor <a href="http
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -330,6 +330,89 @@ The original idea for the Buridan&#39;s donkey came from my mentor <a href="http
@ -895,105 +978,6 @@ The original idea for the Buridan&#39;s donkey came from my mentor <a href="http

View file

@ -85,6 +85,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -122,15 +131,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -266,6 +266,79 @@
@ -761,93 +834,6 @@

View file

@ -108,6 +108,15 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -145,15 +154,6 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -235,6 +235,49 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
@ -520,57 +563,6 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil

View file

@ -667,6 +667,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -704,15 +713,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -740,6 +740,19 @@
@ -816,21 +829,6 @@

View file

@ -92,6 +92,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -129,15 +138,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -165,6 +165,19 @@
@ -241,21 +254,6 @@

View file

@ -68,6 +68,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -105,15 +114,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -141,6 +141,19 @@
@ -217,21 +230,6 @@

View file

@ -184,6 +184,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -221,15 +230,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -311,6 +311,49 @@
@ -596,57 +639,6 @@

View file

@ -105,6 +105,15 @@ Alcuni <a href="https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs" t
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -142,15 +151,6 @@ Alcuni <a href="https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs" t
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -232,6 +232,49 @@ Alcuni <a href="https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs" t
@ -517,57 +560,6 @@ Alcuni <a href="https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs" t

View file

@ -59,6 +59,15 @@ L&#8217;opera si trova a Berlino.</p>
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -96,15 +105,6 @@ L&#8217;opera si trova a Berlino.</p>
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -132,6 +132,19 @@ L&#8217;opera si trova a Berlino.</p>
@ -208,21 +221,6 @@ L&#8217;opera si trova a Berlino.</p>

View file

@ -113,6 +113,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -150,15 +159,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -186,6 +186,19 @@
@ -262,21 +275,6 @@

View file

@ -61,6 +61,15 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -98,15 +107,6 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -134,6 +134,19 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l
@ -210,21 +223,6 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l

View file

@ -149,6 +149,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -186,15 +195,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -222,6 +222,19 @@
@ -298,21 +311,6 @@

View file

@ -71,6 +71,15 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -108,15 +117,6 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -144,6 +144,19 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
@ -220,21 +233,6 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette

View file

@ -124,6 +124,15 @@ Estimates of the current size of the body of federal criminal law vary. It has b
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -161,15 +170,6 @@ Estimates of the current size of the body of federal criminal law vary. It has b
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -269,6 +269,59 @@ Estimates of the current size of the body of federal criminal law vary. It has b
@ -624,69 +677,6 @@ Estimates of the current size of the body of federal criminal law vary. It has b

View file

@ -89,6 +89,15 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -126,15 +135,6 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -306,6 +306,99 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
@ -959,117 +1052,6 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte

View file

@ -138,6 +138,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -175,15 +184,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -211,6 +211,19 @@
@ -287,21 +300,6 @@

View file

@ -61,6 +61,15 @@ Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrut
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -98,15 +107,6 @@ Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrut
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -134,6 +134,19 @@ Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrut
@ -210,21 +223,6 @@ Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrut

View file

@ -63,6 +63,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -100,15 +109,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -136,6 +136,19 @@
@ -212,21 +225,6 @@

View file

@ -113,6 +113,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -150,15 +159,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -186,6 +186,19 @@
@ -262,21 +275,6 @@

View file

@ -100,6 +100,15 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -137,15 +146,6 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -263,6 +263,69 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
@ -688,81 +751,6 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se

View file

@ -90,6 +90,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -127,15 +136,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -163,6 +163,19 @@
@ -239,21 +252,6 @@

View file

@ -79,6 +79,15 @@ echo Complete.
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -116,15 +125,6 @@ echo Complete.
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -206,6 +206,49 @@ echo Complete.
@ -491,57 +534,6 @@ echo Complete.

View file

@ -50,6 +50,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -87,15 +96,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -123,6 +123,19 @@
@ -199,21 +212,6 @@

View file

@ -92,6 +92,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -129,15 +138,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -219,6 +219,49 @@
@ -504,57 +547,6 @@

View file

@ -32,6 +32,43 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/55">
Javascript attacca la cache del processore
</a>
</h1>
<span class="post-date">23 Apr 2015</span>
<p>Lo scorso febbraio 4 ricercatori della Columbia University hanno ideato un attacco <a href="https://en.wikipedia.org/wiki/Side-channel_attack">side channel</a> in grado di penetrare la cache dei processori intel piu` recenti di qualsiasi OS.<br>
L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza la cache di terzo livello del processore. Il pdf tecnico e` disponibile a questo <a href="http://arxiv.org/abs/1502.07373">indirizzo</a>.</p>
<p>Di seguito una breve spiegazione dell&#8217;attacco.<br>
&#8211; Attacco side channel: i dati vengono estratti da fenomeni fisici correlati al funzionamento del terminale: ritardi nella risposta, consumo della cpu,voltaggio e altro se misurati in maniera molto precisa e in correlazione ad eventi esterni permettono di capire che informazioni stava processando la CPU.</p>
<div>
-Requisiti: un qualsiasi fra i browser piu` popolari, un processore intel 32 o 64 bit, almeno qualche minuto sulla pagina infetta.</p>
<p>
-Come avviene l&#8217;attacco: il codice Javascript permette al vettore di occupare una piccola parte di cache di cache e poi va a misurare il ritardo in una nuova lettura e controllando se altri processi la stanno usando. Se questa azione viene compiuta per tutte le &#8220;linee&#8221; della cache senza interruzioni permette di avere dati relativi all&#8217;utilizzo della CPU. Con analizi avanzate si possono stabilire a partire daqueste informazioni in alcuni casi i movimenti del mouse, l&#8217;accesso alle risorse, i tasti premuti.
</p>
</div>
<div>
-Come evitare l&#8217;infezione: non permettere al browser di attivare i javascript e evitare di tenere aperte pagine web mentre si compiono azioni sensibili, questi due sono gli unici metodi al momento. I ricercatori hanno deciso di non rilasciare alcun proof of concepit prima del rilascio di patch per i browser.
<div style="text-align:right;">
Francesco Mecca
</div>
</div>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/57">
@ -367,120 +404,6 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/70">
Anonymous: we are legion
</a>
</h1>
<span class="post-date">13 Apr 2015</span>
<div class="MsoNormal" style="text-align:justify;">
Trattando argomenti quali lanonimato e la privacy, non si può fare a meno di parlare di uno dei movimenti più rappresentativi di queste due tematiche, ovvero Anonymous. Questo movimento nasce nel 2003, e per il suo nome prende ispirazione dal nickname usato nei siti di imageboard, siti nei quali un thread può essere iniziato solo con un immagine, quali per esempio 4chan, 711chan, dove chi commentava senza identificarsi appariva come “anonymous”, e da qui si incominciò a identificare anonymous come una persona reale. </p>
</div>
<div class="MsoNormal" style="text-align:justify;">
Anonymous non ha un leader, è un insieme di persone, o anche singoli, spesso provenienti dagli stessi siti di imageboard citati prima, che agiscono con un fine comune che può essere visto nella libertà di espressione, infatti le attività mosse da questo gruppo mirano alla pubblicazione di informazioni riservate, forme di protesta quali attacchi DDoS o proteste in strada, le quali allinizio fecero capire limportanza che stava acquisendo il movimento, infatti si scoprirono essere numerosi coloro che aderirono nelle varie città del mondo.</p>
</div>
<div class="MsoNormal" style="text-align:justify;">
La grandezza di cui gode Anonymous è data dal web, grazie al quale persone con un ideologia comune si sono potute incontrare, hanno potuto organizzarsi e dare vita a quello che ad oggi è uno dei fenomeni più conosciuti su internet.</p>
</div>
<div class="MsoNormal" style="text-align:justify;">
Uno dei simboli che identifica Anonymous è la maschera di <span style="background-color:white;color:#252525;font-family:sans-serif;font-size:14px;line-height:22.39999961853px;text-align:start;"> </span><a href="http://it.wikipedia.org/wiki/Guy_Fawkes" style="background:none rgb(255,255,255);color:#0b0080;font-family:sans-serif;font-size:14px;line-height:22.39999961853px;text-align:start;" title="Guy Fawkes">Guy Fawkes</a>, famoso cospiratore inglese, che spesso viene usata nelle proteste per nascondere il volto dei protestanti, e celarne quindi lidentità.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="separator" style="clear:both;text-align:center;">
</div>
<div class="MsoNormal" style="text-align:center;">
<div class="separator" style="clear:both;text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/a31f5-211a67b4522ee844418ef0efa5e43c29.jpg" style="margin-left:1em;margin-right:1em;"><img border="0" height="160" src="http://francescomecca.eu/wp-content/uploads/2015/08/a31f5-211a67b4522ee844418ef0efa5e43c29.jpg" width="320" /></a>
</div>
<div class="separator" style="clear:both;text-align:center;">
<span style="background-color:white;line-height:23.519998550415px;text-align:start;"><span style="font-family:Georgia, Times New Roman, serif;font-size:xx-small;">Photo by <a href="https://www.flickr.com/photos/equinoxefr/6857189595/">Pierre (Rennes)</a>/Flickr (CC BY 2.0)</span></span>
</div>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Le varie attività svolte da questo gruppo, grazie alle quali ha ottenuto sempre più visibilità, sono diverse, quale ad esempio quello del 2010 quando il sito di WikiLeaks pubblicò documenti diplomatici segreti del governo americano, e questultimo a causa di ciò fece forti pressioni per interrompere tali pubblicazioni, ovviamente ciò attirò lattenzione di anonymous che iniziò a sostenere il sito, iniziando a lanciare attacchi DDoS contro siti quali Amazon.com, PayPal, MasterCard, Visa e la banca svizzera i quali avevano dimostrato un comportamento anti-WikiLeaks, perché stopparono lafflusso di donazioni al sito.</p>
<p>
 Un altro evento molto importante fu quando il sito Megaupload venne chiuso dallFBI, e in seguito a ciò anonymous rese impossibile laccesso a siti governativi americani, scatenando quella che fu chiamata W W W W (World Wide Web War), ovvero uno degli attacchi da parte del gruppo più grande e importante realizzato sul web.
</p>
<p>
Infine uno degli eventi più recenti è stato quello contro lo Stato Islamico, infatti gli anonymous hanno bloccato e sospeso tutti gli account social di coloro che avessero a che fare con lorganizzazione dellISIS, a causa di azioni terroristiche condotte da quest&#8217;ultima, e tuttora danno la caccia agli esponenti del movimento per arrestarlo.
</p>
<p>
Fonti: <a href="https://www.youtube.com/watch?v=YJmRqgBE_t8">www.youtube.com</a></div>
<div class="highlight"><pre><code class="language-" data-lang="">&lt;div class="MsoNormal" style="text-align:justify;"&gt;
&lt;p&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:justify;"&gt;
&lt;div style="text-align:center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear:both;text-align:center;"&gt;
&lt;a href="https://www.youtube.com/embed/LiFrjbjASk4?feature=player_embedded"&gt;https://www.youtube.com/embed/LiFrjbjASk4?feature=player_embedded&lt;/a&gt;
&lt;/div&gt;
&lt;div style="text-align:center;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:justify;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt;We are Anonymous.&lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt; We are legion.&lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt; We do not forgive. &lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt;We do not forget. &lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt;Expect us&lt;/span&gt;!
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US"&gt;                                                                                                        Gabriele Corso&lt;/span&gt;
&lt;/div&gt;
</code></pre></div>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,120 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/70">
Anonymous: we are legion
</a>
</h1>
<span class="post-date">13 Apr 2015</span>
<div class="MsoNormal" style="text-align:justify;">
Trattando argomenti quali lanonimato e la privacy, non si può fare a meno di parlare di uno dei movimenti più rappresentativi di queste due tematiche, ovvero Anonymous. Questo movimento nasce nel 2003, e per il suo nome prende ispirazione dal nickname usato nei siti di imageboard, siti nei quali un thread può essere iniziato solo con un immagine, quali per esempio 4chan, 711chan, dove chi commentava senza identificarsi appariva come “anonymous”, e da qui si incominciò a identificare anonymous come una persona reale. </p>
</div>
<div class="MsoNormal" style="text-align:justify;">
Anonymous non ha un leader, è un insieme di persone, o anche singoli, spesso provenienti dagli stessi siti di imageboard citati prima, che agiscono con un fine comune che può essere visto nella libertà di espressione, infatti le attività mosse da questo gruppo mirano alla pubblicazione di informazioni riservate, forme di protesta quali attacchi DDoS o proteste in strada, le quali allinizio fecero capire limportanza che stava acquisendo il movimento, infatti si scoprirono essere numerosi coloro che aderirono nelle varie città del mondo.</p>
</div>
<div class="MsoNormal" style="text-align:justify;">
La grandezza di cui gode Anonymous è data dal web, grazie al quale persone con un ideologia comune si sono potute incontrare, hanno potuto organizzarsi e dare vita a quello che ad oggi è uno dei fenomeni più conosciuti su internet.</p>
</div>
<div class="MsoNormal" style="text-align:justify;">
Uno dei simboli che identifica Anonymous è la maschera di <span style="background-color:white;color:#252525;font-family:sans-serif;font-size:14px;line-height:22.39999961853px;text-align:start;"> </span><a href="http://it.wikipedia.org/wiki/Guy_Fawkes" style="background:none rgb(255,255,255);color:#0b0080;font-family:sans-serif;font-size:14px;line-height:22.39999961853px;text-align:start;" title="Guy Fawkes">Guy Fawkes</a>, famoso cospiratore inglese, che spesso viene usata nelle proteste per nascondere il volto dei protestanti, e celarne quindi lidentità.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="separator" style="clear:both;text-align:center;">
</div>
<div class="MsoNormal" style="text-align:center;">
<div class="separator" style="clear:both;text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/a31f5-211a67b4522ee844418ef0efa5e43c29.jpg" style="margin-left:1em;margin-right:1em;"><img border="0" height="160" src="http://francescomecca.eu/wp-content/uploads/2015/08/a31f5-211a67b4522ee844418ef0efa5e43c29.jpg" width="320" /></a>
</div>
<div class="separator" style="clear:both;text-align:center;">
<span style="background-color:white;line-height:23.519998550415px;text-align:start;"><span style="font-family:Georgia, Times New Roman, serif;font-size:xx-small;">Photo by <a href="https://www.flickr.com/photos/equinoxefr/6857189595/">Pierre (Rennes)</a>/Flickr (CC BY 2.0)</span></span>
</div>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Le varie attività svolte da questo gruppo, grazie alle quali ha ottenuto sempre più visibilità, sono diverse, quale ad esempio quello del 2010 quando il sito di WikiLeaks pubblicò documenti diplomatici segreti del governo americano, e questultimo a causa di ciò fece forti pressioni per interrompere tali pubblicazioni, ovviamente ciò attirò lattenzione di anonymous che iniziò a sostenere il sito, iniziando a lanciare attacchi DDoS contro siti quali Amazon.com, PayPal, MasterCard, Visa e la banca svizzera i quali avevano dimostrato un comportamento anti-WikiLeaks, perché stopparono lafflusso di donazioni al sito.</p>
<p>
 Un altro evento molto importante fu quando il sito Megaupload venne chiuso dallFBI, e in seguito a ciò anonymous rese impossibile laccesso a siti governativi americani, scatenando quella che fu chiamata W W W W (World Wide Web War), ovvero uno degli attacchi da parte del gruppo più grande e importante realizzato sul web.
</p>
<p>
Infine uno degli eventi più recenti è stato quello contro lo Stato Islamico, infatti gli anonymous hanno bloccato e sospeso tutti gli account social di coloro che avessero a che fare con lorganizzazione dellISIS, a causa di azioni terroristiche condotte da quest&#8217;ultima, e tuttora danno la caccia agli esponenti del movimento per arrestarlo.
</p>
<p>
Fonti: <a href="https://www.youtube.com/watch?v=YJmRqgBE_t8">www.youtube.com</a></div>
<div class="highlight"><pre><code class="language-" data-lang="">&lt;div class="MsoNormal" style="text-align:justify;"&gt;
&lt;p&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:justify;"&gt;
&lt;div style="text-align:center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear:both;text-align:center;"&gt;
&lt;a href="https://www.youtube.com/embed/LiFrjbjASk4?feature=player_embedded"&gt;https://www.youtube.com/embed/LiFrjbjASk4?feature=player_embedded&lt;/a&gt;
&lt;/div&gt;
&lt;div style="text-align:center;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:justify;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt;We are Anonymous.&lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt; We are legion.&lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt; We do not forgive. &lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt;We do not forget. &lt;/span&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US" style="background:white;font-family:Arial, sans-serif;font-size:10pt;"&gt;Expect us&lt;/span&gt;!
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;div class="MsoNormal" style="text-align:center;"&gt;
&lt;span lang="EN-US"&gt;                                                                                                        Gabriele Corso&lt;/span&gt;
&lt;/div&gt;
</code></pre></div>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/73">
@ -271,72 +385,6 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/87">
Ci presentiamo
</a>
</h1>
<span class="post-date">04 Apr 2015</span>
<p><span style="font-family: inherit;">Salve a tutti,</span></p>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">siamo tre studenti della facolta` di ingegneria del Politecnico di Torino ed abbiamo aperto questo blog come strumento di giudizio per il corso di </span><a href="http://rivoluzionedigitale.polito.it/" target="_blank" rel="nofollow"><span style="font-family: inherit;">Rivoluzione Digitale</span></a><span style="font-family: inherit;">.</span><br /> <span style="font-family: inherit;"><br /> </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Aprire un blog per noi e` un gesto molto significativo: siamo nati nel 1995 percio` possiamo essere considerati “nativi digitali” ed abbiamo assistito ad una sempre piu` larga, per certe prospettive globale espansione del mondo di internet e dei computer e toccato con mano le conseguenze che questa espansione ha avuto sulla societa`. </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Sia che si pensi alle BBS degli anni 70 o ai social networks di oggi il Web e` stato ed e` tutt&#8217;ora in gran parte il prodotto dei contenuti degli utenti che ogni volta che compiono un azione online lasciano tracce digitali e anche inconsapevolmente permettono l&#8217;espansione del mondo digitale.</span>
</div>
<p>&nbsp;</p>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Il blog e` lo strumento che noi nativi digitali consapevoli abbiamo scelto per lasciare la nostra impronta in rete con lo stesso spirito con cui si accende una lanterna cinese, con la consapevolezza che ogni strumento di comunicazione e attivismo e` un piccolo passo verso un mondo piu&#8217; democratico.</span>
</div>
<p>&nbsp;</p>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">I temi che ci proponiamo di trattare riguardano il mondo del digitale ma con particolare attenzione all&#8217;anonimato e alla privacy, parole che per alcuni non hanno piu` senso nel mondo del Web 2.0.</span><br /> <span style="font-family: inherit;"><br /> </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Per noi queste due parole invece sono sempre piu` rilevanti, anzi fondamentali per costituire l&#8217;identita` di un cittadino digitale, di un netizen non miope e ben attento agli abusi da parte dei poteri forti nell&#8217;era digitale.</span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Ci opponiamo alle parole dell&#8217;onorevole Tiziano Motti che sostiene che: “L&#8217;anonimato in rete e&#8217; il contrario della democrazia che la rete stessa offre”, anzi crediamo che sia un presupposto necessario per una societa` libera e condizione necessaria per un uso autonomo e partecipativo della rete.</span><br /> <span style="font-family: inherit;"><br /> </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Siate liberi di contattarci sul profilo twitter del gruppo <span lang="en-US"><a href="https://twitter.com/caughtin_thenet">@caughtin_thenet</a>o anche sui nostri profili personali <a href="https://twitter.com/EugenioCorso">@EugenioCorso</a> <a href="https://twitter.com/GabrieleCorso95">@GabrieleCorso95</a> e <a href="https://twitter.com/FrancescoMecca">@FrancescoMecca</a> .</span></span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;"><span lang="en-US">Siamo disponibili via email all&#8217;indirizzo pescewanda3 [at] gmail.com : </span><span lang="en-US">e` possibile usare la <a href="http://caught-in-thenet.blogspot.it/2015/03/chiave-pgp.html" target="_blank">nostra chiave PGP</a> per scriverci.</span></span>
</div>
<p>&nbsp;</p>
<div style="line-height: 100%; margin-bottom: 0;" align="RIGHT">
<span style="font-family: inherit;">Francesco Mecca, Eugenio Corso, Gabriele Corso</span>
</div>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,72 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/87">
Ci presentiamo
</a>
</h1>
<span class="post-date">04 Apr 2015</span>
<p><span style="font-family: inherit;">Salve a tutti,</span></p>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">siamo tre studenti della facolta` di ingegneria del Politecnico di Torino ed abbiamo aperto questo blog come strumento di giudizio per il corso di </span><a href="http://rivoluzionedigitale.polito.it/" target="_blank" rel="nofollow"><span style="font-family: inherit;">Rivoluzione Digitale</span></a><span style="font-family: inherit;">.</span><br /> <span style="font-family: inherit;"><br /> </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Aprire un blog per noi e` un gesto molto significativo: siamo nati nel 1995 percio` possiamo essere considerati “nativi digitali” ed abbiamo assistito ad una sempre piu` larga, per certe prospettive globale espansione del mondo di internet e dei computer e toccato con mano le conseguenze che questa espansione ha avuto sulla societa`. </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Sia che si pensi alle BBS degli anni 70 o ai social networks di oggi il Web e` stato ed e` tutt&#8217;ora in gran parte il prodotto dei contenuti degli utenti che ogni volta che compiono un azione online lasciano tracce digitali e anche inconsapevolmente permettono l&#8217;espansione del mondo digitale.</span>
</div>
<p>&nbsp;</p>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Il blog e` lo strumento che noi nativi digitali consapevoli abbiamo scelto per lasciare la nostra impronta in rete con lo stesso spirito con cui si accende una lanterna cinese, con la consapevolezza che ogni strumento di comunicazione e attivismo e` un piccolo passo verso un mondo piu&#8217; democratico.</span>
</div>
<p>&nbsp;</p>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">I temi che ci proponiamo di trattare riguardano il mondo del digitale ma con particolare attenzione all&#8217;anonimato e alla privacy, parole che per alcuni non hanno piu` senso nel mondo del Web 2.0.</span><br /> <span style="font-family: inherit;"><br /> </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Per noi queste due parole invece sono sempre piu` rilevanti, anzi fondamentali per costituire l&#8217;identita` di un cittadino digitale, di un netizen non miope e ben attento agli abusi da parte dei poteri forti nell&#8217;era digitale.</span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Ci opponiamo alle parole dell&#8217;onorevole Tiziano Motti che sostiene che: “L&#8217;anonimato in rete e&#8217; il contrario della democrazia che la rete stessa offre”, anzi crediamo che sia un presupposto necessario per una societa` libera e condizione necessaria per un uso autonomo e partecipativo della rete.</span><br /> <span style="font-family: inherit;"><br /> </span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;">Siate liberi di contattarci sul profilo twitter del gruppo <span lang="en-US"><a href="https://twitter.com/caughtin_thenet">@caughtin_thenet</a>o anche sui nostri profili personali <a href="https://twitter.com/EugenioCorso">@EugenioCorso</a> <a href="https://twitter.com/GabrieleCorso95">@GabrieleCorso95</a> e <a href="https://twitter.com/FrancescoMecca">@FrancescoMecca</a> .</span></span>
</div>
<div style="line-height: 100%; margin-bottom: 0;">
<span style="font-family: inherit;"><span lang="en-US">Siamo disponibili via email all&#8217;indirizzo pescewanda3 [at] gmail.com : </span><span lang="en-US">e` possibile usare la <a href="http://caught-in-thenet.blogspot.it/2015/03/chiave-pgp.html" target="_blank">nostra chiave PGP</a> per scriverci.</span></span>
</div>
<p>&nbsp;</p>
<div style="line-height: 100%; margin-bottom: 0;" align="RIGHT">
<span style="font-family: inherit;">Francesco Mecca, Eugenio Corso, Gabriele Corso</span>
</div>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/90">

View file

@ -32,6 +32,25 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2017/05/07/latestage_handbrake/">
Late Stage Capitalism meets FOSS
</a>
</h1>
<span class="post-date">07 May 2017</span>
<p><img src="/wp-content/uploads/2017/hn_handbrake_hack.jpg" alt="brainwashing"></p>
<p><a href="http://archive.is/XA3rj">source</a></p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2017/03/20/spazio-digitale-rant-facebook__eng/">
@ -280,235 +299,6 @@ Pierre aking his soul came to the packs and drove up his father-in-law women.
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/11/10/machine-learning-intro/">
Capire il Machine Learning (parte 1)
</a>
</h1>
<span class="post-date">10 Nov 2016</span>
<p>Questo è il primo di una serie di post che hanno l&#39;obbiettivo di fornire una breve e generale introduzione al mondo del machine learning e delle intelligenze artificiali più in generale.
Mi auguro che questa breve introduzione al mondo dell&#39;apprendimento automatico sia una sorta di vaccino contro il sensazionalismo mediatico e la disinformazione che negli ultimi anni fanno da contorno al progresso in questo settore.</p>
<h2 id="non-c-39-risultato-senza-algoritmo">Non c&#39;è risultato senza algoritmo</h2>
<p>Nelle scienze informatiche un algoritmo è un insieme di istruzioni che partendo da uno stato iniziale (input) permette di arrivare ad uno stato finale (output) attraverso una serie di step logici.
Ogni algoritmo utilizza una logica propria e specifica per il problema di cui si occupa.
Nel caso del machine learning l&#39;algoritmo non viene progettato in base al tipo di problema bensì vengono utilizzati algoritmi generici adattabili attraverso dei parametri.
L&#39;algoritmo di machine learning analizza i vari parametri e i dati che riceve &quot;in pasto&quot; al fine di raggiungere lo stato di output ottimale.
L&#39;output ottimale è la migliore approssimazione di un risultato teorico che si raggiunge nella fase di &quot;training&quot;.</p>
<h2 id="la-macchina-impara">La macchina impara</h2>
<p>Nella fase di allenamento o di apprendimento, il &quot;training&quot;, si possono adottare due tecniche differenti: apprendimento con supervisione ( <strong>supervised learning</strong> ) e apprendimento senza supervisione ( <strong>unsupervised learning</strong> ).</p>
<h4 id="supervised-learning">Supervised Learning</h4>
<p>Immaginiamo di dover valutare il prezzo di un&#39;automobile usata senza essere esperti in materia.
Noi abbiamo questi dati:</p>
<table><thead>
<tr>
<th>PREZZO ORIGINALE</th>
<th style="text-align: center">Km percorsi</th>
<th style="text-align: center">stato di usura</th>
<th style="text-align: right">PREZZO FINALE</th>
</tr>
</thead><tbody>
<tr>
<td>50 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: right">40 000</td>
</tr>
<tr>
<td>30 000</td>
<td style="text-align: center">150 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: right">8 000</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">80 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: right">15 000</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: right">...</td>
</tr>
</tbody></table>
<p>Dalla tabella possiamo dedurre la caratteristica fondamentale del <strong>supervised learning</strong>: abbiamo due vettori (serie di dati) di input (prezzo originale) e di output (prezzo finale) che hanno una correlazione certa e valida.</p>
<p>Possiamo dedurre intuitivamente quale sarà il prezzo dell&#39;ultima auto se analizziamo i dati precedenti.
Questo è quello che succede nel caso del <strong>supervised learning</strong>.
Un algoritmo di machine learning che utilizza il <strong>supervised learning</strong> estrapolerà la relazione fra i vari dati e in questo modo potrà ottenere un determinato output partendo dai dati di input.
Possiamo capire già da ora che nel caso ci fossero dati che &quot;inquinano&quot; il nostro data set, come ad esempio il colore dell&#39;auto, l&#39;algoritmo non sarà capace di fare un&#39;analisi corretta.</p>
<p>La precisione della soluzione dipende dalla quantità di dati e dall&#39;influenza che questi hanno nella situazione reale.</p>
<h1 id="unsupervised-learning">Unsupervised Learning</h1>
<p>Nel caso di unsupervised learning ci troviamo di fronte agli stessi dati ma senza la possibilità di conoscere il prezzo finale.</p>
<table><thead>
<tr>
<th>PREZZO ORIGINALE</th>
<th style="text-align: center">Km percorsi</th>
<th style="text-align: right">stato di usura</th>
</tr>
</thead><tbody>
<tr>
<td>50 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: right">lieve</td>
</tr>
<tr>
<td>30 000</td>
<td style="text-align: center">150 000</td>
<td style="text-align: right">notevole</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">80 000</td>
<td style="text-align: right">lieve</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: right">notevole</td>
</tr>
</tbody></table>
<p>Non siamo capaci di stabilire il prezzo finale attraverso l&#39;unsupervised learning, ma possiamo stabilire dei pattern fra i vari dati.
Non c&#39;è nessun tipo di feedback (il prezzo finale) che possa aiutarci a capire se il risultato sia giusto ma possiamo analizzare le notevoli relazioni fra i dati.</p>
<h1 id="machine-learning-e-intelligenza">Machine Learning e intelligenza</h1>
<p>Concentriamoci sul <strong>supervised learning</strong>.
Nel caso della vendita dell&#39;automobile, abbiamo un semplice problema con una soluzione lineare di questo tipo:
<em>prezzo finale</em> = <em>prezzo originale</em> + <em>km percorsi</em> + stato di usura</p>
<p>Ovviamente ogni incognita nella nostra equazione influisce diversamente sul prezzo finale e quindi possiamo riscriverla come:
<em>prezzo finale</em> = A *<em>prezzo originale</em> + B *<em>km percorsi</em> + C * stato di usura</p>
<p>Se pensiamo ad un algoritmo possiamo ragionare in questo modo:</p>
<div class="highlight"><pre><code class="language-" data-lang="">funzione: calcola_prezzo_auto:
parametri: prezzo_originale, km_percorsi, stato_usura
variabili: prezzo_finale = 0
prezzo finale = prezzo_originale * 0.804246
prezzo finale = prezzo_finale + km_percorsi * -0.000125
prezzo finale = prezzo_finale + stato_usura * -2500
</code></pre></div>
<p>I valori di quelle costanti, stabilite casualmente nell&#39;esempio, sono chiamate <em>pesi</em> e servono a stimare il prezzo finale.
Una volta stabiliti i pesi, il nostro algoritmo di supervised learning applica questi pesi ai dati originali e ne valuta l&#39;errore:</p>
<table><thead>
<tr>
<th>PREZZO ORIGINALE</th>
<th style="text-align: center">Km percorsi</th>
<th style="text-align: center">stato di usura</th>
<th style="text-align: center">PREZZO FINALE</th>
<th style="text-align: right">PREZZO STIMATO</th>
</tr>
</thead><tbody>
<tr>
<td>50 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: center">40 000</td>
<td style="text-align: right">374888</td>
</tr>
<tr>
<td>30 000</td>
<td style="text-align: center">150 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: center">8 000</td>
<td style="text-align: right">16000</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">80 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: center">15 000</td>
<td style="text-align: right">13492</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: center">...</td>
<td style="text-align: right">10988</td>
</tr>
</tbody></table>
<p>Una volta valutato l&#39;errore e la distanza dal prezzo finale, l&#39;algoritmo di machine learning modifica i pesi di conseguenza e ripete la procedura fino ad arrivare al risultato che più si avvicina ai dati iniziali.
<img src="/wp-content/uploads/2016/reteneurale1.jpg" alt="rete1">
Ci sono varie funzioni che stimano l&#39;errore e permettono di correggere i pesi o metodi che restringono lo spazio di ricerca fino a convergere alla soluzione, ovvero i pesi cercati.</p>
<h2 id="reti-neurali">Reti Neurali</h2>
<p>Ora, come possiamo immaginare, il prezzo di un&#39;auto ha molti fattori che si aggiungono a quelli elencati nell&#39;esempio.
Non solo, ma molti problemi non hanno una soluzione lineare, ovvero una soluzione che si può semplicemente esprimere attraverso una funzione che aggiunge e moltiplica i valori una sola volta.</p>
<p>Possiamo arricchire l&#39;esempio dell&#39;automobile immaginando di avere più set di pesi e di ripetere il procedimento più volte:</p>
<div class="highlight"><pre><code class="language-" data-lang="">|---------------------------------------------------|
| PREZZO_ORIG * peso A1 -----&gt; |
| KM_PERCORSI * peso B1 -----&gt; |
| STATO_USURA * peso C1 -----&gt; |
| PREZZO FINALE STIMATO 1|
|---------------------------------------------------|
| --------------------------------------------------|
| PREZZO_ORIG * peso A2 -----&gt; |
| KM_PERCORSI * peso B2 -----&gt; |
| STATO_USURA * peso C2 -----&gt; |
| PREZZO FINALE STIMATO 2|
|---------------------------------------------------|
| --------------------------------------------------|
| PREZZO_ORIG * peso A3 -----&gt; |
| KM_PERCORSI * peso B3 -----&gt; |
| STATO_USURA * peso C3 -----&gt; |
| PREZZO FINALE STIMATO 3|
|---------------------------------------------------|
</code></pre></div>
<p>E ora immaginiamo di combinare ogni PREZZO FINALE STIMATO in un&#39;ultimo risultato:</p>
<div class="highlight"><pre><code class="language-" data-lang="">| --------------------------------------------------|
| PREZZO_1 * peso X -----&gt; |
| PREZZO_2 * peso Y -----&gt; |
| PREZZO_3 * peso Z -----&gt; |
| PREZZO FINALE DEF |
|---------------------------------------------------|
</code></pre></div>
<p>Questa é, seppur molto basica, una rete neurale.
Proviamo a visualizzarla in un&#39;immagine dove i box arancioni sono i nodi di input e i rossi sono i nodi &quot;nascosti&quot; e temporanei.</p>
<p><img src="/wp-content/uploads/2016/reteneurale2.jpg" alt="rete2"></p>
<p>In una rete neurale (<em>neural networks</em>) abbiamo:</p>
<ul>
<li><p>i neuroni: la funzione di stima e i set di pesi;</p></li>
<li><p>le catene: i collegamenti fra neuroni che permettono di valutare il prezzo più volte.</p></li>
</ul>
<p>Nel prossimo <a href="/pescewanda/2016/11/11/machine-learning-PARTE2">post</a> cercherò di approfondire il concetto di rete neurale con degli esempi di applicazioni concrete.</p>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,235 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/11/10/machine-learning-intro/">
Capire il Machine Learning (parte 1)
</a>
</h1>
<span class="post-date">10 Nov 2016</span>
<p>Questo è il primo di una serie di post che hanno l&#39;obbiettivo di fornire una breve e generale introduzione al mondo del machine learning e delle intelligenze artificiali più in generale.
Mi auguro che questa breve introduzione al mondo dell&#39;apprendimento automatico sia una sorta di vaccino contro il sensazionalismo mediatico e la disinformazione che negli ultimi anni fanno da contorno al progresso in questo settore.</p>
<h2 id="non-c-39-risultato-senza-algoritmo">Non c&#39;è risultato senza algoritmo</h2>
<p>Nelle scienze informatiche un algoritmo è un insieme di istruzioni che partendo da uno stato iniziale (input) permette di arrivare ad uno stato finale (output) attraverso una serie di step logici.
Ogni algoritmo utilizza una logica propria e specifica per il problema di cui si occupa.
Nel caso del machine learning l&#39;algoritmo non viene progettato in base al tipo di problema bensì vengono utilizzati algoritmi generici adattabili attraverso dei parametri.
L&#39;algoritmo di machine learning analizza i vari parametri e i dati che riceve &quot;in pasto&quot; al fine di raggiungere lo stato di output ottimale.
L&#39;output ottimale è la migliore approssimazione di un risultato teorico che si raggiunge nella fase di &quot;training&quot;.</p>
<h2 id="la-macchina-impara">La macchina impara</h2>
<p>Nella fase di allenamento o di apprendimento, il &quot;training&quot;, si possono adottare due tecniche differenti: apprendimento con supervisione ( <strong>supervised learning</strong> ) e apprendimento senza supervisione ( <strong>unsupervised learning</strong> ).</p>
<h4 id="supervised-learning">Supervised Learning</h4>
<p>Immaginiamo di dover valutare il prezzo di un&#39;automobile usata senza essere esperti in materia.
Noi abbiamo questi dati:</p>
<table><thead>
<tr>
<th>PREZZO ORIGINALE</th>
<th style="text-align: center">Km percorsi</th>
<th style="text-align: center">stato di usura</th>
<th style="text-align: right">PREZZO FINALE</th>
</tr>
</thead><tbody>
<tr>
<td>50 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: right">40 000</td>
</tr>
<tr>
<td>30 000</td>
<td style="text-align: center">150 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: right">8 000</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">80 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: right">15 000</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: right">...</td>
</tr>
</tbody></table>
<p>Dalla tabella possiamo dedurre la caratteristica fondamentale del <strong>supervised learning</strong>: abbiamo due vettori (serie di dati) di input (prezzo originale) e di output (prezzo finale) che hanno una correlazione certa e valida.</p>
<p>Possiamo dedurre intuitivamente quale sarà il prezzo dell&#39;ultima auto se analizziamo i dati precedenti.
Questo è quello che succede nel caso del <strong>supervised learning</strong>.
Un algoritmo di machine learning che utilizza il <strong>supervised learning</strong> estrapolerà la relazione fra i vari dati e in questo modo potrà ottenere un determinato output partendo dai dati di input.
Possiamo capire già da ora che nel caso ci fossero dati che &quot;inquinano&quot; il nostro data set, come ad esempio il colore dell&#39;auto, l&#39;algoritmo non sarà capace di fare un&#39;analisi corretta.</p>
<p>La precisione della soluzione dipende dalla quantità di dati e dall&#39;influenza che questi hanno nella situazione reale.</p>
<h1 id="unsupervised-learning">Unsupervised Learning</h1>
<p>Nel caso di unsupervised learning ci troviamo di fronte agli stessi dati ma senza la possibilità di conoscere il prezzo finale.</p>
<table><thead>
<tr>
<th>PREZZO ORIGINALE</th>
<th style="text-align: center">Km percorsi</th>
<th style="text-align: right">stato di usura</th>
</tr>
</thead><tbody>
<tr>
<td>50 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: right">lieve</td>
</tr>
<tr>
<td>30 000</td>
<td style="text-align: center">150 000</td>
<td style="text-align: right">notevole</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">80 000</td>
<td style="text-align: right">lieve</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: right">notevole</td>
</tr>
</tbody></table>
<p>Non siamo capaci di stabilire il prezzo finale attraverso l&#39;unsupervised learning, ma possiamo stabilire dei pattern fra i vari dati.
Non c&#39;è nessun tipo di feedback (il prezzo finale) che possa aiutarci a capire se il risultato sia giusto ma possiamo analizzare le notevoli relazioni fra i dati.</p>
<h1 id="machine-learning-e-intelligenza">Machine Learning e intelligenza</h1>
<p>Concentriamoci sul <strong>supervised learning</strong>.
Nel caso della vendita dell&#39;automobile, abbiamo un semplice problema con una soluzione lineare di questo tipo:
<em>prezzo finale</em> = <em>prezzo originale</em> + <em>km percorsi</em> + stato di usura</p>
<p>Ovviamente ogni incognita nella nostra equazione influisce diversamente sul prezzo finale e quindi possiamo riscriverla come:
<em>prezzo finale</em> = A *<em>prezzo originale</em> + B *<em>km percorsi</em> + C * stato di usura</p>
<p>Se pensiamo ad un algoritmo possiamo ragionare in questo modo:</p>
<div class="highlight"><pre><code class="language-" data-lang="">funzione: calcola_prezzo_auto:
parametri: prezzo_originale, km_percorsi, stato_usura
variabili: prezzo_finale = 0
prezzo finale = prezzo_originale * 0.804246
prezzo finale = prezzo_finale + km_percorsi * -0.000125
prezzo finale = prezzo_finale + stato_usura * -2500
</code></pre></div>
<p>I valori di quelle costanti, stabilite casualmente nell&#39;esempio, sono chiamate <em>pesi</em> e servono a stimare il prezzo finale.
Una volta stabiliti i pesi, il nostro algoritmo di supervised learning applica questi pesi ai dati originali e ne valuta l&#39;errore:</p>
<table><thead>
<tr>
<th>PREZZO ORIGINALE</th>
<th style="text-align: center">Km percorsi</th>
<th style="text-align: center">stato di usura</th>
<th style="text-align: center">PREZZO FINALE</th>
<th style="text-align: right">PREZZO STIMATO</th>
</tr>
</thead><tbody>
<tr>
<td>50 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: center">40 000</td>
<td style="text-align: right">374888</td>
</tr>
<tr>
<td>30 000</td>
<td style="text-align: center">150 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: center">8 000</td>
<td style="text-align: right">16000</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">80 000</td>
<td style="text-align: center">lieve</td>
<td style="text-align: center">15 000</td>
<td style="text-align: right">13492</td>
</tr>
<tr>
<td>20 000</td>
<td style="text-align: center">120 000</td>
<td style="text-align: center">notevole</td>
<td style="text-align: center">...</td>
<td style="text-align: right">10988</td>
</tr>
</tbody></table>
<p>Una volta valutato l&#39;errore e la distanza dal prezzo finale, l&#39;algoritmo di machine learning modifica i pesi di conseguenza e ripete la procedura fino ad arrivare al risultato che più si avvicina ai dati iniziali.
<img src="/wp-content/uploads/2016/reteneurale1.jpg" alt="rete1">
Ci sono varie funzioni che stimano l&#39;errore e permettono di correggere i pesi o metodi che restringono lo spazio di ricerca fino a convergere alla soluzione, ovvero i pesi cercati.</p>
<h2 id="reti-neurali">Reti Neurali</h2>
<p>Ora, come possiamo immaginare, il prezzo di un&#39;auto ha molti fattori che si aggiungono a quelli elencati nell&#39;esempio.
Non solo, ma molti problemi non hanno una soluzione lineare, ovvero una soluzione che si può semplicemente esprimere attraverso una funzione che aggiunge e moltiplica i valori una sola volta.</p>
<p>Possiamo arricchire l&#39;esempio dell&#39;automobile immaginando di avere più set di pesi e di ripetere il procedimento più volte:</p>
<div class="highlight"><pre><code class="language-" data-lang="">|---------------------------------------------------|
| PREZZO_ORIG * peso A1 -----&gt; |
| KM_PERCORSI * peso B1 -----&gt; |
| STATO_USURA * peso C1 -----&gt; |
| PREZZO FINALE STIMATO 1|
|---------------------------------------------------|
| --------------------------------------------------|
| PREZZO_ORIG * peso A2 -----&gt; |
| KM_PERCORSI * peso B2 -----&gt; |
| STATO_USURA * peso C2 -----&gt; |
| PREZZO FINALE STIMATO 2|
|---------------------------------------------------|
| --------------------------------------------------|
| PREZZO_ORIG * peso A3 -----&gt; |
| KM_PERCORSI * peso B3 -----&gt; |
| STATO_USURA * peso C3 -----&gt; |
| PREZZO FINALE STIMATO 3|
|---------------------------------------------------|
</code></pre></div>
<p>E ora immaginiamo di combinare ogni PREZZO FINALE STIMATO in un&#39;ultimo risultato:</p>
<div class="highlight"><pre><code class="language-" data-lang="">| --------------------------------------------------|
| PREZZO_1 * peso X -----&gt; |
| PREZZO_2 * peso Y -----&gt; |
| PREZZO_3 * peso Z -----&gt; |
| PREZZO FINALE DEF |
|---------------------------------------------------|
</code></pre></div>
<p>Questa é, seppur molto basica, una rete neurale.
Proviamo a visualizzarla in un&#39;immagine dove i box arancioni sono i nodi di input e i rossi sono i nodi &quot;nascosti&quot; e temporanei.</p>
<p><img src="/wp-content/uploads/2016/reteneurale2.jpg" alt="rete2"></p>
<p>In una rete neurale (<em>neural networks</em>) abbiamo:</p>
<ul>
<li><p>i neuroni: la funzione di stima e i set di pesi;</p></li>
<li><p>le catene: i collegamenti fra neuroni che permettono di valutare il prezzo più volte.</p></li>
</ul>
<p>Nel prossimo <a href="/pescewanda/2016/11/11/machine-learning-PARTE2">post</a> cercherò di approfondire il concetto di rete neurale con degli esempi di applicazioni concrete.</p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/07/07/pres-berk/">
@ -521,101 +750,6 @@ dfu-programmer atmega16u2 reset
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/05/15/genetic-alg/">
Interpolation using a genetic algorithm
</a>
</h1>
<span class="post-date">15 May 2016</span>
<p>This weekend I was in Milan to get a visa and I had the opportunity to work with a friend, Michele, on genetic algorithms.
It was the first time I dig up in such field and it was very exciting.
In this post I want to explain some bits of our work.</p>
<h2 id="a-brief-introduction-to-ga">A brief introduction to GA</h2>
<p>A genetic algorithm is a search/optimization algorithm that uses an heuristic approach to reduce the search space and evolve gradually to a solution.</p>
<h4 id="population">Population</h4>
<p>It is an algorithm that has its root in the theory of natural selectioni by Charles Darwin.
The main components of a GA are:</p>
<ul>
<li>the population, that concentrate all the available solutions at a given time;</li>
<li>the fitness function, that gives an approximation of the quality of the solution codified by a given member of the population.</li>
</ul>
<p>In a GA the first thing to do is to generate a population.</p>
<p>A population is a group of objects with given attributes, usually a string, and they contains in some form the solution (usually inside a string); the first population is randomly generated and contains a big number of solutions, but not every solution (this is not a bruteforce approach).</p>
<p>After this step the fitness functions evaluates the quality of every solution that a given member carries: the evaluation should be considered from a bottom up point of view.</p>
<h4 id="reproduction">Reproduction</h4>
<p>Now, as in Darwin&#39;s theory of evolution, the member of the population are going to &quot;reproduce&quot;: two members are going to be coupled to generate a new member of the second generation and every child member will contain a solution that is the product of the original genes of their parent members.</p>
<p>This time the reproduction of the population into a second one is not entirely random. The fitness function gives us an approximation of the quality of every gene that a member carries and by the rule of the &quot;survival by the fittest&quot; the probability that a member is going to reproduce with another one is proportional to the quality of its genes.</p>
<p>When we have a second generation of members we can recur on our GA and generate a third generation. From this point we can recur until we converge to a solution that is common to every member, or at least that is suited to our needs.</p>
<h4 id="mutation">Mutation</h4>
<p>Actually, in some cases, a mutation function can be added, so that, like in real world, some times the genes are &quot;scrambled&quot; indipendently from the fitness function.</p>
<p>There is more to a GA, for example we could talk about possible ways of storing the genes inside a member or when to use mutation, anyway I want to stop here and continue with an analysis of my problem.</p>
<h2 id="interpolating-a-function-using-a-ga">Interpolating a function using a GA</h2>
<p>Me and Michele decided to spend some time developing a little python script to explore GA capabilities and we decided to interpolate some points on a cartesian plane.</p>
<p>Our program, that is available <a href="http://francescomecca.eu:3000/pesceWanda/interpol_genetica">here</a> uses a class to define the various members of the population and a string for the genes, a class as well for the points on the plane.</p>
<p>The fitness function is not as precise as it should be because this is only a proof of concept:</p>
<figure class="highlight"><pre><code class="language-python" data-lang="python"><span class="n">mutationProbability</span> <span class="o">=</span> <span class="mf">0.1</span>
<span class="n">rangeLimit</span> <span class="o">=</span> <span class="mi">5</span>
<span class="k">def</span> <span class="nf">fitness</span><span class="p">(</span><span class="n">item</span><span class="p">,</span> <span class="n">pointList</span><span class="p">,</span> <span class="n">n</span><span class="p">):</span>
<span class="n">value</span> <span class="o">=</span> <span class="mi">0</span>
<span class="k">for</span> <span class="n">p</span> <span class="ow">in</span> <span class="n">pointList</span><span class="p">:</span>
<span class="n">y</span> <span class="o">=</span> <span class="mi">0</span>
<span class="k">for</span> <span class="n">i</span> <span class="ow">in</span> <span class="nb">range</span><span class="p">(</span><span class="n">n</span><span class="p">):</span>
<span class="n">y</span> <span class="o">+=</span> <span class="n">item</span><span class="o">.</span><span class="n">gene</span><span class="p">[</span><span class="n">i</span><span class="p">]</span> <span class="o">*</span> <span class="nb">pow</span><span class="p">(</span><span class="n">p</span><span class="o">.</span><span class="n">x</span><span class="p">,</span> <span class="n">i</span><span class="p">)</span>
<span class="n">result</span> <span class="o">=</span> <span class="mi">1</span> <span class="o">-</span> <span class="p">(</span><span class="nb">abs</span> <span class="p">(</span><span class="n">p</span><span class="o">.</span><span class="n">y</span> <span class="o">-</span> <span class="n">y</span><span class="p">)</span> <span class="o">/</span> <span class="n">rangeLimit</span><span class="p">)</span>
<span class="k">if</span> <span class="n">result</span> <span class="o">&lt;</span> <span class="mi">0</span><span class="p">:</span>
<span class="n">result</span> <span class="o">=</span> <span class="mi">0</span>
<span class="n">value</span> <span class="o">+=</span> <span class="n">result</span>
<span class="k">return</span> <span class="n">value</span> <span class="o">/</span> <span class="n">n</span></code></pre></figure>
<p>item is just a member of the population, poinList is the list of points and n is the number of points (n - 1 is the grade of the function).</p>
<div class="highlight"><pre><code class="language-" data-lang="">for i in range(n):
y += item.gene[i] * pow(p.x, i)
</code></pre></div>
<p>this piece of code gives us the value of the function encoded in the genes in the points of pointList;</p>
<div class="highlight"><pre><code class="language-" data-lang="">result = 1 - (abs (p.y - y) / rangeLimit)
if result &lt; 0:
result = 0
</code></pre></div>
<p>while here the script stores 1 - the previous result because if the GA has yield a good result there should be distance = 0 from the function evaluated and the points; If this is the case, the fitness function should attribute the highest possible reproduction probability for that member.
At the end the fitness function returns the total value over the number of points evaluated.</p>
<p>As you can see this fitness function is by no means an optimal one. The reproduction probability is higher for functions that crosses some points and are really distant from others rather than for functions that are closer to every point but crosses none.
Anyway for simple cases the GA yields good results, as an example for points (0 0), (1 4), (2 9) one of the member with the highest reproduction probability has this function in its genes:</p>
<div class="highlight"><pre><code class="language-" data-lang="">-0.0487839869993989 * x^0 + 4.600339125358671 * x^1 + -0.2780958075230644 * x^2
</code></pre></div>
<p>that crosses this points: (0 -0.0488), (1 4.2735), (2 8.0395) given 80 iterations, initial population of 600 members and a two digit approximation.</p>
<p>For a more precise computation a higher population size and a really high number of iterations should be used.</p>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,101 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/05/15/genetic-alg/">
Interpolation using a genetic algorithm
</a>
</h1>
<span class="post-date">15 May 2016</span>
<p>This weekend I was in Milan to get a visa and I had the opportunity to work with a friend, Michele, on genetic algorithms.
It was the first time I dig up in such field and it was very exciting.
In this post I want to explain some bits of our work.</p>
<h2 id="a-brief-introduction-to-ga">A brief introduction to GA</h2>
<p>A genetic algorithm is a search/optimization algorithm that uses an heuristic approach to reduce the search space and evolve gradually to a solution.</p>
<h4 id="population">Population</h4>
<p>It is an algorithm that has its root in the theory of natural selectioni by Charles Darwin.
The main components of a GA are:</p>
<ul>
<li>the population, that concentrate all the available solutions at a given time;</li>
<li>the fitness function, that gives an approximation of the quality of the solution codified by a given member of the population.</li>
</ul>
<p>In a GA the first thing to do is to generate a population.</p>
<p>A population is a group of objects with given attributes, usually a string, and they contains in some form the solution (usually inside a string); the first population is randomly generated and contains a big number of solutions, but not every solution (this is not a bruteforce approach).</p>
<p>After this step the fitness functions evaluates the quality of every solution that a given member carries: the evaluation should be considered from a bottom up point of view.</p>
<h4 id="reproduction">Reproduction</h4>
<p>Now, as in Darwin&#39;s theory of evolution, the member of the population are going to &quot;reproduce&quot;: two members are going to be coupled to generate a new member of the second generation and every child member will contain a solution that is the product of the original genes of their parent members.</p>
<p>This time the reproduction of the population into a second one is not entirely random. The fitness function gives us an approximation of the quality of every gene that a member carries and by the rule of the &quot;survival by the fittest&quot; the probability that a member is going to reproduce with another one is proportional to the quality of its genes.</p>
<p>When we have a second generation of members we can recur on our GA and generate a third generation. From this point we can recur until we converge to a solution that is common to every member, or at least that is suited to our needs.</p>
<h4 id="mutation">Mutation</h4>
<p>Actually, in some cases, a mutation function can be added, so that, like in real world, some times the genes are &quot;scrambled&quot; indipendently from the fitness function.</p>
<p>There is more to a GA, for example we could talk about possible ways of storing the genes inside a member or when to use mutation, anyway I want to stop here and continue with an analysis of my problem.</p>
<h2 id="interpolating-a-function-using-a-ga">Interpolating a function using a GA</h2>
<p>Me and Michele decided to spend some time developing a little python script to explore GA capabilities and we decided to interpolate some points on a cartesian plane.</p>
<p>Our program, that is available <a href="http://francescomecca.eu:3000/pesceWanda/interpol_genetica">here</a> uses a class to define the various members of the population and a string for the genes, a class as well for the points on the plane.</p>
<p>The fitness function is not as precise as it should be because this is only a proof of concept:</p>
<figure class="highlight"><pre><code class="language-python" data-lang="python"><span class="n">mutationProbability</span> <span class="o">=</span> <span class="mf">0.1</span>
<span class="n">rangeLimit</span> <span class="o">=</span> <span class="mi">5</span>
<span class="k">def</span> <span class="nf">fitness</span><span class="p">(</span><span class="n">item</span><span class="p">,</span> <span class="n">pointList</span><span class="p">,</span> <span class="n">n</span><span class="p">):</span>
<span class="n">value</span> <span class="o">=</span> <span class="mi">0</span>
<span class="k">for</span> <span class="n">p</span> <span class="ow">in</span> <span class="n">pointList</span><span class="p">:</span>
<span class="n">y</span> <span class="o">=</span> <span class="mi">0</span>
<span class="k">for</span> <span class="n">i</span> <span class="ow">in</span> <span class="nb">range</span><span class="p">(</span><span class="n">n</span><span class="p">):</span>
<span class="n">y</span> <span class="o">+=</span> <span class="n">item</span><span class="o">.</span><span class="n">gene</span><span class="p">[</span><span class="n">i</span><span class="p">]</span> <span class="o">*</span> <span class="nb">pow</span><span class="p">(</span><span class="n">p</span><span class="o">.</span><span class="n">x</span><span class="p">,</span> <span class="n">i</span><span class="p">)</span>
<span class="n">result</span> <span class="o">=</span> <span class="mi">1</span> <span class="o">-</span> <span class="p">(</span><span class="nb">abs</span> <span class="p">(</span><span class="n">p</span><span class="o">.</span><span class="n">y</span> <span class="o">-</span> <span class="n">y</span><span class="p">)</span> <span class="o">/</span> <span class="n">rangeLimit</span><span class="p">)</span>
<span class="k">if</span> <span class="n">result</span> <span class="o">&lt;</span> <span class="mi">0</span><span class="p">:</span>
<span class="n">result</span> <span class="o">=</span> <span class="mi">0</span>
<span class="n">value</span> <span class="o">+=</span> <span class="n">result</span>
<span class="k">return</span> <span class="n">value</span> <span class="o">/</span> <span class="n">n</span></code></pre></figure>
<p>item is just a member of the population, poinList is the list of points and n is the number of points (n - 1 is the grade of the function).</p>
<div class="highlight"><pre><code class="language-" data-lang="">for i in range(n):
y += item.gene[i] * pow(p.x, i)
</code></pre></div>
<p>this piece of code gives us the value of the function encoded in the genes in the points of pointList;</p>
<div class="highlight"><pre><code class="language-" data-lang="">result = 1 - (abs (p.y - y) / rangeLimit)
if result &lt; 0:
result = 0
</code></pre></div>
<p>while here the script stores 1 - the previous result because if the GA has yield a good result there should be distance = 0 from the function evaluated and the points; If this is the case, the fitness function should attribute the highest possible reproduction probability for that member.
At the end the fitness function returns the total value over the number of points evaluated.</p>
<p>As you can see this fitness function is by no means an optimal one. The reproduction probability is higher for functions that crosses some points and are really distant from others rather than for functions that are closer to every point but crosses none.
Anyway for simple cases the GA yields good results, as an example for points (0 0), (1 4), (2 9) one of the member with the highest reproduction probability has this function in its genes:</p>
<div class="highlight"><pre><code class="language-" data-lang="">-0.0487839869993989 * x^0 + 4.600339125358671 * x^1 + -0.2780958075230644 * x^2
</code></pre></div>
<p>that crosses this points: (0 -0.0488), (1 4.2735), (2 8.0395) given 80 iterations, initial population of 600 members and a two digit approximation.</p>
<p>For a more precise computation a higher population size and a really high number of iterations should be used.</p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/05/03/satoshisignature/">
@ -316,33 +411,6 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/04/10/lifehacks/">
Lifehacks
</a>
</h1>
<span class="post-date">10 Apr 2016</span>
<ul>
<li><p>Even though you may be nervous about talking to random people, the worst you can get is &quot;Go away&quot;.</p></li>
<li><p>Do not buy your girlfriend or wife flowers in an attempt to make nice after you pissed her off. Every
time she looks at the flowers, she will just be reminded that you pissed her off, unless she has the
memory span of a goldfish.</p></li>
<li><p>To keep lettuce fresh for days longer, wrap it in paper towels instead of inside a plastic bag, it
works very well.</p></li>
<li><p>Cubes of sugar in biscuit barrels help the biscuits stay crisp.</p></li>
<li><p>To clear your sinuses, eat a lot of wasabi. It will hurt tons, but your sinuses clear almost
instantaneously.</p></li>
</ul>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,33 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/04/10/lifehacks/">
Lifehacks
</a>
</h1>
<span class="post-date">10 Apr 2016</span>
<ul>
<li><p>Even though you may be nervous about talking to random people, the worst you can get is &quot;Go away&quot;.</p></li>
<li><p>Do not buy your girlfriend or wife flowers in an attempt to make nice after you pissed her off. Every
time she looks at the flowers, she will just be reminded that you pissed her off, unless she has the
memory span of a goldfish.</p></li>
<li><p>To keep lettuce fresh for days longer, wrap it in paper towels instead of inside a plastic bag, it
works very well.</p></li>
<li><p>Cubes of sugar in biscuit barrels help the biscuits stay crisp.</p></li>
<li><p>To clear your sinuses, eat a lot of wasabi. It will hurt tons, but your sinuses clear almost
instantaneously.</p></li>
</ul>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/04/02/buridan_donkey/">
@ -276,75 +303,6 @@ perl-cleaner --all</pre>
<p>This will remove all perl-core packages that virtual/perl-* packages will bring back if needed.</p>
<p style="text-align: right;">
Francesco Mecca
</p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/177">
56 secondi di celebrita`
</a>
</h1>
<span class="post-date">31 Aug 2015</span>
<p><a href="http://www.mantellini.it/2015/08/26/state-al-riparo/" target="_blank" rel="http://www.mantellini.it/2015/08/26/state-al-riparo/"><img class="aligncenter wp-image-178 size-full" src="http://francescomecca.eu/wp-content/uploads/2015/08/Schermata-2015-08-26-alle-22.29.31.jpg" alt="" width="644" height="533" srcset="http://francescomecca.eu/wp-content/uploads/2015/08/Schermata-2015-08-26-alle-22.29.31-300x248.jpg 300w, http://francescomecca.eu/wp-content/uploads/2015/08/Schermata-2015-08-26-alle-22.29.31.jpg 644w" sizes="(max-width: 644px) 100vw, 644px" /></a></p>
<p>Dura 56 secondi il video di Vester Lee Flanagan che testimonia l&#8217;omicidio in prima persona di due giornalisti in Virginia durante un live broadcast televisivo. Durante l&#8217;inseguimento nel quale si e` tolto la vita Flanagan ha caricato su Twitter e Facebook il video dell&#8217;uccisione in prima persona.</p>
<p>Twitter e Facebook hanno tempestivamente censurato il video e rimosso l&#8217;account dell&#8217;omicida ed alcune emittenti televisive (come SkyTg24) hanno scelto allo stesso modo di non pubblicare il video in diretta.</p>
<h3 id="to-publish-or-not-to-publish">To publish or not to publish?</h3>
<p>E` quindi una decisione giusta quella di non pubblicare il video?</p>
<p><a href="https://stevebuttry.wordpress.com/2015/08/26/media-should-avoid-indulging-attention-seeking-killers/" target="_blank">Steve Buttry sul suo blog</a> si esprime in questo modo:</p>
<blockquote>
<p>1) Someone who attacks during a live telecast is seeking attention. Obviously you need to report the attack, but I would not broadcast the attack or make it available online.</p>
<p>[&#8230;]</p>
<p>4) I see no ethical justification for publishing videos shot by the killer. That is the ultimate in attention-seeking behavior.</p>
<p>5) You can report the mental health issues, gun access issues and other issues that a story presents without publicizing or profiling the killer.</p>
<p>6) My focus would be on the people who were killed or injured. They warrant media attention, not the person who was seeking it.</p>
</blockquote>
<p>1)Una persona che attacca durante una trasmissione in diretta e` alla ricerca di attenzione. Naturalmente si deve rendere noto l&#8217;atto, ma io non lo trasmetterei ne lo pubblicherei online.</p>
<p>[&#8230;]</p>
<p>4) Non vedo giustificazioni etiche per pubblicare il video: e` l&#8217;esempio piu` eclatante di ricerca di attenzioni.</p>
<p>5) Puoi discutere sui problemi mentali, la questione relativa al facile accesso alle armi e tutti gli altri problemi di questa storia senza mostrare o pubblicizzare il killer.</p>
<p>6) Io mi concentrerei sulle persone ferite o uccise. Loro meritano l&#8217;attenzione dei media, non la persona che la cercava.</p>
<h3 id="famoso-in-un-istante">Famoso in un istante</h3>
<p>E` ovvio che Flanagan stesse cercando i suoi 15 minuti di fama con <a href="http://www.theguardian.com/us-news/2015/aug/27/virginia-shooting-in-an-instant-vester-flanagan-broadcast-death-to-the-world" target="_blank">questo atto</a>, ma a mio parere non ci sarebbe riuscito se non sfruttando nuovi strumenti quali lo smartphone e i social network. Molto difficilmente sarebbe riuscito 20 anni fa utilizzando i media tradizionali a filmarsi in prima persona in una situazione del genere e a rendere cosi` tante persone testimoni del suo gesto.</p>
<p>Per questo non mi trovo d&#8217;accordo con Steve Buttry che afferma che il video non andrebbe reso disponibile online. i nuovi media hanno un ruolo diverso nella condivisione dei contenuti e soprattutto nel mantenimento della memoria storica. Un video del genere non aggiunge alcun valore investigativo o giornalistico al caso ma puo` ritenersi utile per analisi differenti, in primis psicologiche, ed ha sicuramente un valore storico (da quanto conosco e` il primo video in prima persona di un omicidio con queste dinamiche).</p>
<h3 id="lo-specchio-nero">Lo specchio nero</h3>
<p>Chi come me e` un grande fan della serie TV <a href="https://en.wikipedia.org/wiki/Black_Mirror_%28TV_series%29" target="_blank">Black Mirror</a> avra` sicuramente ricordato il primo episodio della serie: National Anthem.</p>
<p>Questo episodio e` un&#8217;analisi sottile e dettagliata della natura umana, che di fronte ad eventi che suscitano un cosi` grande clamore sospendono ogni giudizio morale e dimenticano il motivo per cui si trovano a guardare cio` che hanno di fronte.</p>
<p>Allo stesso modo trovo miserevole poter assistere a giornalisti ed emittenti televisive che per attirare spettatori nelle proprie reti mostrano il video integrale.</p>
<p>Come in National Anthem chi ha perpetrato il crimine non ci ha costretto ad essere complici del suo gesto.</p>
<p style="text-align: right;">
Francesco Mecca
</p>

View file

@ -32,6 +32,75 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/177">
56 secondi di celebrita`
</a>
</h1>
<span class="post-date">31 Aug 2015</span>
<p><a href="http://www.mantellini.it/2015/08/26/state-al-riparo/" target="_blank" rel="http://www.mantellini.it/2015/08/26/state-al-riparo/"><img class="aligncenter wp-image-178 size-full" src="http://francescomecca.eu/wp-content/uploads/2015/08/Schermata-2015-08-26-alle-22.29.31.jpg" alt="" width="644" height="533" srcset="http://francescomecca.eu/wp-content/uploads/2015/08/Schermata-2015-08-26-alle-22.29.31-300x248.jpg 300w, http://francescomecca.eu/wp-content/uploads/2015/08/Schermata-2015-08-26-alle-22.29.31.jpg 644w" sizes="(max-width: 644px) 100vw, 644px" /></a></p>
<p>Dura 56 secondi il video di Vester Lee Flanagan che testimonia l&#8217;omicidio in prima persona di due giornalisti in Virginia durante un live broadcast televisivo. Durante l&#8217;inseguimento nel quale si e` tolto la vita Flanagan ha caricato su Twitter e Facebook il video dell&#8217;uccisione in prima persona.</p>
<p>Twitter e Facebook hanno tempestivamente censurato il video e rimosso l&#8217;account dell&#8217;omicida ed alcune emittenti televisive (come SkyTg24) hanno scelto allo stesso modo di non pubblicare il video in diretta.</p>
<h3 id="to-publish-or-not-to-publish">To publish or not to publish?</h3>
<p>E` quindi una decisione giusta quella di non pubblicare il video?</p>
<p><a href="https://stevebuttry.wordpress.com/2015/08/26/media-should-avoid-indulging-attention-seeking-killers/" target="_blank">Steve Buttry sul suo blog</a> si esprime in questo modo:</p>
<blockquote>
<p>1) Someone who attacks during a live telecast is seeking attention. Obviously you need to report the attack, but I would not broadcast the attack or make it available online.</p>
<p>[&#8230;]</p>
<p>4) I see no ethical justification for publishing videos shot by the killer. That is the ultimate in attention-seeking behavior.</p>
<p>5) You can report the mental health issues, gun access issues and other issues that a story presents without publicizing or profiling the killer.</p>
<p>6) My focus would be on the people who were killed or injured. They warrant media attention, not the person who was seeking it.</p>
</blockquote>
<p>1)Una persona che attacca durante una trasmissione in diretta e` alla ricerca di attenzione. Naturalmente si deve rendere noto l&#8217;atto, ma io non lo trasmetterei ne lo pubblicherei online.</p>
<p>[&#8230;]</p>
<p>4) Non vedo giustificazioni etiche per pubblicare il video: e` l&#8217;esempio piu` eclatante di ricerca di attenzioni.</p>
<p>5) Puoi discutere sui problemi mentali, la questione relativa al facile accesso alle armi e tutti gli altri problemi di questa storia senza mostrare o pubblicizzare il killer.</p>
<p>6) Io mi concentrerei sulle persone ferite o uccise. Loro meritano l&#8217;attenzione dei media, non la persona che la cercava.</p>
<h3 id="famoso-in-un-istante">Famoso in un istante</h3>
<p>E` ovvio che Flanagan stesse cercando i suoi 15 minuti di fama con <a href="http://www.theguardian.com/us-news/2015/aug/27/virginia-shooting-in-an-instant-vester-flanagan-broadcast-death-to-the-world" target="_blank">questo atto</a>, ma a mio parere non ci sarebbe riuscito se non sfruttando nuovi strumenti quali lo smartphone e i social network. Molto difficilmente sarebbe riuscito 20 anni fa utilizzando i media tradizionali a filmarsi in prima persona in una situazione del genere e a rendere cosi` tante persone testimoni del suo gesto.</p>
<p>Per questo non mi trovo d&#8217;accordo con Steve Buttry che afferma che il video non andrebbe reso disponibile online. i nuovi media hanno un ruolo diverso nella condivisione dei contenuti e soprattutto nel mantenimento della memoria storica. Un video del genere non aggiunge alcun valore investigativo o giornalistico al caso ma puo` ritenersi utile per analisi differenti, in primis psicologiche, ed ha sicuramente un valore storico (da quanto conosco e` il primo video in prima persona di un omicidio con queste dinamiche).</p>
<h3 id="lo-specchio-nero">Lo specchio nero</h3>
<p>Chi come me e` un grande fan della serie TV <a href="https://en.wikipedia.org/wiki/Black_Mirror_%28TV_series%29" target="_blank">Black Mirror</a> avra` sicuramente ricordato il primo episodio della serie: National Anthem.</p>
<p>Questo episodio e` un&#8217;analisi sottile e dettagliata della natura umana, che di fronte ad eventi che suscitano un cosi` grande clamore sospendono ogni giudizio morale e dimenticano il motivo per cui si trovano a guardare cio` che hanno di fronte.</p>
<p>Allo stesso modo trovo miserevole poter assistere a giornalisti ed emittenti televisive che per attirare spettatori nelle proprie reti mostrano il video integrale.</p>
<p>Come in National Anthem chi ha perpetrato il crimine non ci ha costretto ad essere complici del suo gesto.</p>
<p style="text-align: right;">
Francesco Mecca
</p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/171">
@ -351,99 +420,6 @@
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/102">
La Rivoluzione Digitale nella Professione dell&#8217;Avvocato
</a>
</h1>
<span class="post-date">07 Jul 2015</span>
<h4 id="premessa"><span style="font-size: large;">Premessa</span></h4>
<p>Con lavvento dellinformatizzazione e` notevolmente mutata la modalita` con cui lavvocato svolge la propria professione; sinteticamente si puo` arrivare ad affermare che al di la` della partecipazione alle udienze e il ricevimento dei clienti, tutta lattivita` si puo` svolgere con il computer nel proprio studio, senza alzarsi dalla poltrona.</p>
<p>Per quanto mi riguarda vorrei premettere che io sono un avvocato dipendente di un ente pubblico (lINAIL) e pertanto unico mio cliente e` lIstituto che io difendo sia in ambito giudiziario (cause legali) che extragiudiziario (composizione bonaria delle liti).</p>
<p>Lavvento dellinformatica ha modificato il modo di lavorare nella sua globalita`, vediamo pertanto le singole fasi dellattivita`.</p>
<table class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;" cellspacing="0" cellpadding="0" align="center">
<tr>
<td style="text-align: center;">
<a style="margin-left: auto; margin-right: auto;" href="http://francescomecca.eu/wp-content/uploads/2015/08/8e3ff-hammer-620011_1280.jpg"><img src="http://francescomecca.eu/wp-content/uploads/2015/08/8e3ff-hammer-620011_1280.jpg?w=300" alt="" width="400" height="300" border="0" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align: center;">
Immagine Pubblico Dominio, fonte <a href="https://pixabay.com/" target="_blank">Pixabay</a>
</td>
</tr>
</table>
<h4 id="ricerche-giurisprudenziali"><span style="font-size: large;">Ricerche Giurisprudenziali</span></h4>
<p>p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 0); line-height: 120%; orphans: 2; widows: 2; }p.western { font-family: &#8220;Times New Roman&#8221;,serif; font-size: 12pt; }p.cjk { font-family: &#8220;Times New Roman&#8221;,serif; font-size: 12pt; }p.ctl { font-family: &#8220;Times New Roman&#8221;,serif; font-size: 12pt; }a:link { color: rgb(0, 0, 255); } Allorche` mi viene sottoposto un caso da esaminare devo effettuare ricerche sullo stato della giurisprudenza (esame delle pronunce dei Tribunali che hanno trattato casi analoghi) al fine di inquadrare giuridicamente la questione: in passato le ricerche venivano effettuate sfogliando le varie riviste giuridiche cartacee (pubblicate per lo piu` con raccolte che uscivano con cadenza trimestrale o addirittura annuale) dopo aver estrapolato dagli indici tutte le sentenze emesse su quel determinato argomento: la ricerca effettuata in questo modo richiedeva molto tempo dovendo passare in rassegna una molteplicità di riviste (generalmente la ricerca si effettua su un arco di tempo decennale) ed inoltre si era nellimpossibilita` di esaminare la giurisprudenza piu` recente; dal punto di vista pratico e logistico lavvocato doveva disporre di grandi librerie per conservare le riviste cartacee. Debbo pero` riconoscere che la ricerca cartacea offriva la possibilità di venire a conoscenza di sentenze emesse su altri argomenti (che rivestivano interesse per altre pratiche: cio` comporta un grande arricchimento professionale) in quanto passando in rassegna gli indici lattenzione cadeva anche su altre fattispecie.</p>
<p>Ora la ricerca viene fatta digitalmente, si consultano le varie banche dati online e inserendo la parola chiave (argomento o riferimenti normativi o anche autorita` giudiziaria) si viene subito in contatto con numerosissime sentenze. In questo modo la ricerca e` piu` veloce, puo` essere agevolmente fatta su archi temporali molto lunghi ma soprattutto si possono conoscere sentenze emesse di recente in quanto la pubblicazione non passa attraverso la stampa; tra laltro per un avvocato è molto importante conoscere le ultime sentenze in senso temporale in quanto e` utilissimo aggiornarsi sugli indirizzi giurisprudenziali più recenti. Ce` anche un altro aspetto dal punto di vista pratico: non e` piu` necessario avere i grandi spazi richiesti dalle librerie (tale fatto non e` da sottovalutare viste le peculiarita` del mercato immobiliare).</p>
<p>Il limite della ricerca telematica (rispetto alla ricerca cartacea) e` costituito dal fatto che la ricerca si rivela molto piu` specifica, e` molto più circoscritta e quindi non si viene “casualmente ” a conoscenza di sentenze che riguardano altre fattispecie; cio` secondo il mio parere e` un aspetto negativo, che mi fa un po` rimpiangere la ricerca cartacea, perche` in quel caso, come ho precisato sopra, si raccoglievano molti stimoli (forse oggi si privilegia il fattore tempo?).</p>
<h4 id="posta-email-e-pec"><span style="font-size: large;">Posta, email e PEC</span></h4>
<p>Unaltra grande rivoluzione si e` verificata nellambito della corrispondenza che lavvocato deve tenere con il cliente e con la controparte.</p>
<p>Mentre prima tutte le lettere e diffide venivano inoltrate mediante il servizio postale richiedendo quindi la necessita` di recarsi presso lUfficio stesso e, sostenere il costo della spedizione ed attendere il recapito della corrispondenza ora tale attivita` viene svolta con l&#8217;email, cosicche` non si esce dallo studio, non si sostengono costi ed inoltre il recapito e` immediato e anche la risposta puo` sopraggiungere immediatamente: e` evidente la facilita` di comunicazione! A cio` si aggiunga che ora con lintroduzione della PEC le mail hanno le stesso valore delle raccomandate postali. Io ritengo che tale sistema innovativo sia importantissimo in quanto velocizza le comunicazioni ed abbatte i costi, eliminando anche i rischi dei disguidi postali (materiale perdita della corrispondenza). A cio` si aggiunga anche che avendo tutta la corrispondenza come archivio digitale la successiva consultazione della stessa puo` avvenire in modo agevole ed immediato.</p>
<h4 id="processo-telematico"><span style="font-size: large;">Processo Telematico</span></h4>
<p>Ora (dal primo gennaio 2015) anche gli uffici Giudiziari hanno preso atto dellattivita` informatica permettendo la possibilita` di formare fascicoli digitali. Tutte le cause possono essere introdotte telematicamente cosicche` lavvocato puo` depositare atti e comunicarli alla controparte senza uscire dal proprio studio. Allo stesso modo riceve le comunicazione dagli uffici del Tribunale (la cancelleria) e gli atti dei colleghi. In questo modo per depositare un atto non ci si deve piu` materialmente recare in Tribunale ed essere legati agli orari di apertura dellUfficio, in quanto la legge permette che lavvocato trasmetta latto entro le ore 24 del giorno di scadenza , con la conseguenza che i tempi si sono dilatati, anche se in effetti non e` consigliabile fare un atto allultimo minuto in quanto talvolta (per lo meno come si sta verificando in questa prima fase) la trasmissione telematica non va a buon fine, cosicche` si puo` incorrere in decadenze. Anche in questo caso tutte le attivita` sono velocizzate e soprattutto mi arrivano immediatamente le comunicazioni del Tribunale, il che` nella mia attivita` non e` di poco conto.</p>
<h4 id="acquisizione-documentazione"><span style="font-size: large;">Acquisizione Documentazione</span></h4>
<p>Un altro aspetto molto importante che ha agevolato lattivita` legale e` quello che riguarda il reperimento della documentazione necessaria per la corretta e completa istruzione della pratica.</p>
<p>Nel momento in cui lavvocato ha necessita` di visionare e/o allegare un documento, lo richiede al cliente o agli uffici preposti (es: uffici finanziari, enti locali, camere di commercio&#8230;) a mezzo mail e sollecitamente la controparte glielo puo` trasmettere telematicamente: il cliente non deve recarsi dallavvocato per portare il documento ne` lavvocato deve accedere ai vari uffici (come al catasto per richiedere una visura). Pensate in una grande citta` quanto tempo (e costi) richiedono tali attivita`, ora ogni cosa puo` essere fatta indipendentemente dal luogo in cui ci si trova!</p>
<h4 id="indagini-sui-social-network"><span style="font-size: large;">Indagini sui Social Network</span></h4>
<p>Ora lavvocato puo` raccogliere notizie anche solo digitando nomi e fatti sui motori di ricerca: in questo modo vengo a conoscenza di indirizzi, recapiti telefonici e altre notizie che riguardano il soggetto e/o il fatto che mi interessa. Nello specifico premetto che la mia attivita` si esplica anche nellesame di pratiche che riguardano il riconoscimento di eventi lesivi come infortuni sul lavoro. Precisamente determinate categorie di lavoratori possono chiedere allINAIL il riconoscimento di eventi lesivi come infortuni sul lavoro con conseguenti erogazioni economiche e sanitarie dal parte dellINAIL in loro favore. Facciamo lesempio che un lavoratore denunci una lesione come conseguente allesplicamento della propria attivita` lavorativa adducendo una descrizione del fatto: e` capitato che facendo un riscontro su Facebook il soggetto raccontava di essersi fatto male mentre giocava a calcetto: in questo caso levento non viene riconosciuto e addirittura si potrebbe presentare una denuncia per truffa. Recentemente gli organi di informazione hanno divulgato il caso di quel signore che usufruiva dei permessi INPS per assistere il genitore invalido mentre scriveva su Facebook che in quei medesimi giorni era allestero per seguire i campionati sportivi!</p>
<p>Quindi cio` che voglio dire e` che laccesso ai social network costituisce in sistema per reperire informazioni e/o riscontri circa fatti denunciati dagli utenti, raccogliendo così elementi utili per esaminare compiutamente una pratica e arrivare così ad una piu` puntuale decisione legale.</p>
<table class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;" cellspacing="0" cellpadding="0" align="center">
<tr>
<td style="text-align: center;">
<a style="margin-left: auto; margin-right: auto;" href="http://francescomecca.eu/wp-content/uploads/2015/08/06143-privacy-policy-510739_1280.jpg"><img src="http://francescomecca.eu/wp-content/uploads/2015/08/06143-privacy-policy-510739_1280.jpg?w=300" alt="" width="400" height="291" border="0" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align: center;">
Immagine Pubblico Dominio, fonte <a href="https://pixabay.com/" target="_blank">Pixabay</a>
</td>
</tr>
</table>
<p>Cio` che ho messo in evidenza sono gli aspetti e le novita` piu` eclatanti introdotte dalla informatizzazione e che a mio parere sono molto positivi  (soprattutto per tutti gli aspetti di velocizzazione ed efficienza che pongono in essere) permettendo anche di svolgere lattivita` legale con maggiore approfondimento (avendo a disposizione di fatto piu` strumenti) e maggiore tempestivita`, considerando anche in questambito le potenzialita` della ulteriore strumentazione informatica di cui il professionista puo` dotarsi.</p>
<div style="text-align: right;">
Avv. Emanuela Andreozzi
</div>
<div style="text-align: right;">
Avvocatura Regionale INAIL delle Marche
</div>
<p>&nbsp; </p>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,99 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/102">
La Rivoluzione Digitale nella Professione dell&#8217;Avvocato
</a>
</h1>
<span class="post-date">07 Jul 2015</span>
<h4 id="premessa"><span style="font-size: large;">Premessa</span></h4>
<p>Con lavvento dellinformatizzazione e` notevolmente mutata la modalita` con cui lavvocato svolge la propria professione; sinteticamente si puo` arrivare ad affermare che al di la` della partecipazione alle udienze e il ricevimento dei clienti, tutta lattivita` si puo` svolgere con il computer nel proprio studio, senza alzarsi dalla poltrona.</p>
<p>Per quanto mi riguarda vorrei premettere che io sono un avvocato dipendente di un ente pubblico (lINAIL) e pertanto unico mio cliente e` lIstituto che io difendo sia in ambito giudiziario (cause legali) che extragiudiziario (composizione bonaria delle liti).</p>
<p>Lavvento dellinformatica ha modificato il modo di lavorare nella sua globalita`, vediamo pertanto le singole fasi dellattivita`.</p>
<table class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;" cellspacing="0" cellpadding="0" align="center">
<tr>
<td style="text-align: center;">
<a style="margin-left: auto; margin-right: auto;" href="http://francescomecca.eu/wp-content/uploads/2015/08/8e3ff-hammer-620011_1280.jpg"><img src="http://francescomecca.eu/wp-content/uploads/2015/08/8e3ff-hammer-620011_1280.jpg?w=300" alt="" width="400" height="300" border="0" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align: center;">
Immagine Pubblico Dominio, fonte <a href="https://pixabay.com/" target="_blank">Pixabay</a>
</td>
</tr>
</table>
<h4 id="ricerche-giurisprudenziali"><span style="font-size: large;">Ricerche Giurisprudenziali</span></h4>
<p>p { margin-bottom: 0.1in; direction: ltr; color: rgb(0, 0, 0); line-height: 120%; orphans: 2; widows: 2; }p.western { font-family: &#8220;Times New Roman&#8221;,serif; font-size: 12pt; }p.cjk { font-family: &#8220;Times New Roman&#8221;,serif; font-size: 12pt; }p.ctl { font-family: &#8220;Times New Roman&#8221;,serif; font-size: 12pt; }a:link { color: rgb(0, 0, 255); } Allorche` mi viene sottoposto un caso da esaminare devo effettuare ricerche sullo stato della giurisprudenza (esame delle pronunce dei Tribunali che hanno trattato casi analoghi) al fine di inquadrare giuridicamente la questione: in passato le ricerche venivano effettuate sfogliando le varie riviste giuridiche cartacee (pubblicate per lo piu` con raccolte che uscivano con cadenza trimestrale o addirittura annuale) dopo aver estrapolato dagli indici tutte le sentenze emesse su quel determinato argomento: la ricerca effettuata in questo modo richiedeva molto tempo dovendo passare in rassegna una molteplicità di riviste (generalmente la ricerca si effettua su un arco di tempo decennale) ed inoltre si era nellimpossibilita` di esaminare la giurisprudenza piu` recente; dal punto di vista pratico e logistico lavvocato doveva disporre di grandi librerie per conservare le riviste cartacee. Debbo pero` riconoscere che la ricerca cartacea offriva la possibilità di venire a conoscenza di sentenze emesse su altri argomenti (che rivestivano interesse per altre pratiche: cio` comporta un grande arricchimento professionale) in quanto passando in rassegna gli indici lattenzione cadeva anche su altre fattispecie.</p>
<p>Ora la ricerca viene fatta digitalmente, si consultano le varie banche dati online e inserendo la parola chiave (argomento o riferimenti normativi o anche autorita` giudiziaria) si viene subito in contatto con numerosissime sentenze. In questo modo la ricerca e` piu` veloce, puo` essere agevolmente fatta su archi temporali molto lunghi ma soprattutto si possono conoscere sentenze emesse di recente in quanto la pubblicazione non passa attraverso la stampa; tra laltro per un avvocato è molto importante conoscere le ultime sentenze in senso temporale in quanto e` utilissimo aggiornarsi sugli indirizzi giurisprudenziali più recenti. Ce` anche un altro aspetto dal punto di vista pratico: non e` piu` necessario avere i grandi spazi richiesti dalle librerie (tale fatto non e` da sottovalutare viste le peculiarita` del mercato immobiliare).</p>
<p>Il limite della ricerca telematica (rispetto alla ricerca cartacea) e` costituito dal fatto che la ricerca si rivela molto piu` specifica, e` molto più circoscritta e quindi non si viene “casualmente ” a conoscenza di sentenze che riguardano altre fattispecie; cio` secondo il mio parere e` un aspetto negativo, che mi fa un po` rimpiangere la ricerca cartacea, perche` in quel caso, come ho precisato sopra, si raccoglievano molti stimoli (forse oggi si privilegia il fattore tempo?).</p>
<h4 id="posta-email-e-pec"><span style="font-size: large;">Posta, email e PEC</span></h4>
<p>Unaltra grande rivoluzione si e` verificata nellambito della corrispondenza che lavvocato deve tenere con il cliente e con la controparte.</p>
<p>Mentre prima tutte le lettere e diffide venivano inoltrate mediante il servizio postale richiedendo quindi la necessita` di recarsi presso lUfficio stesso e, sostenere il costo della spedizione ed attendere il recapito della corrispondenza ora tale attivita` viene svolta con l&#8217;email, cosicche` non si esce dallo studio, non si sostengono costi ed inoltre il recapito e` immediato e anche la risposta puo` sopraggiungere immediatamente: e` evidente la facilita` di comunicazione! A cio` si aggiunga che ora con lintroduzione della PEC le mail hanno le stesso valore delle raccomandate postali. Io ritengo che tale sistema innovativo sia importantissimo in quanto velocizza le comunicazioni ed abbatte i costi, eliminando anche i rischi dei disguidi postali (materiale perdita della corrispondenza). A cio` si aggiunga anche che avendo tutta la corrispondenza come archivio digitale la successiva consultazione della stessa puo` avvenire in modo agevole ed immediato.</p>
<h4 id="processo-telematico"><span style="font-size: large;">Processo Telematico</span></h4>
<p>Ora (dal primo gennaio 2015) anche gli uffici Giudiziari hanno preso atto dellattivita` informatica permettendo la possibilita` di formare fascicoli digitali. Tutte le cause possono essere introdotte telematicamente cosicche` lavvocato puo` depositare atti e comunicarli alla controparte senza uscire dal proprio studio. Allo stesso modo riceve le comunicazione dagli uffici del Tribunale (la cancelleria) e gli atti dei colleghi. In questo modo per depositare un atto non ci si deve piu` materialmente recare in Tribunale ed essere legati agli orari di apertura dellUfficio, in quanto la legge permette che lavvocato trasmetta latto entro le ore 24 del giorno di scadenza , con la conseguenza che i tempi si sono dilatati, anche se in effetti non e` consigliabile fare un atto allultimo minuto in quanto talvolta (per lo meno come si sta verificando in questa prima fase) la trasmissione telematica non va a buon fine, cosicche` si puo` incorrere in decadenze. Anche in questo caso tutte le attivita` sono velocizzate e soprattutto mi arrivano immediatamente le comunicazioni del Tribunale, il che` nella mia attivita` non e` di poco conto.</p>
<h4 id="acquisizione-documentazione"><span style="font-size: large;">Acquisizione Documentazione</span></h4>
<p>Un altro aspetto molto importante che ha agevolato lattivita` legale e` quello che riguarda il reperimento della documentazione necessaria per la corretta e completa istruzione della pratica.</p>
<p>Nel momento in cui lavvocato ha necessita` di visionare e/o allegare un documento, lo richiede al cliente o agli uffici preposti (es: uffici finanziari, enti locali, camere di commercio&#8230;) a mezzo mail e sollecitamente la controparte glielo puo` trasmettere telematicamente: il cliente non deve recarsi dallavvocato per portare il documento ne` lavvocato deve accedere ai vari uffici (come al catasto per richiedere una visura). Pensate in una grande citta` quanto tempo (e costi) richiedono tali attivita`, ora ogni cosa puo` essere fatta indipendentemente dal luogo in cui ci si trova!</p>
<h4 id="indagini-sui-social-network"><span style="font-size: large;">Indagini sui Social Network</span></h4>
<p>Ora lavvocato puo` raccogliere notizie anche solo digitando nomi e fatti sui motori di ricerca: in questo modo vengo a conoscenza di indirizzi, recapiti telefonici e altre notizie che riguardano il soggetto e/o il fatto che mi interessa. Nello specifico premetto che la mia attivita` si esplica anche nellesame di pratiche che riguardano il riconoscimento di eventi lesivi come infortuni sul lavoro. Precisamente determinate categorie di lavoratori possono chiedere allINAIL il riconoscimento di eventi lesivi come infortuni sul lavoro con conseguenti erogazioni economiche e sanitarie dal parte dellINAIL in loro favore. Facciamo lesempio che un lavoratore denunci una lesione come conseguente allesplicamento della propria attivita` lavorativa adducendo una descrizione del fatto: e` capitato che facendo un riscontro su Facebook il soggetto raccontava di essersi fatto male mentre giocava a calcetto: in questo caso levento non viene riconosciuto e addirittura si potrebbe presentare una denuncia per truffa. Recentemente gli organi di informazione hanno divulgato il caso di quel signore che usufruiva dei permessi INPS per assistere il genitore invalido mentre scriveva su Facebook che in quei medesimi giorni era allestero per seguire i campionati sportivi!</p>
<p>Quindi cio` che voglio dire e` che laccesso ai social network costituisce in sistema per reperire informazioni e/o riscontri circa fatti denunciati dagli utenti, raccogliendo così elementi utili per esaminare compiutamente una pratica e arrivare così ad una piu` puntuale decisione legale.</p>
<table class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;" cellspacing="0" cellpadding="0" align="center">
<tr>
<td style="text-align: center;">
<a style="margin-left: auto; margin-right: auto;" href="http://francescomecca.eu/wp-content/uploads/2015/08/06143-privacy-policy-510739_1280.jpg"><img src="http://francescomecca.eu/wp-content/uploads/2015/08/06143-privacy-policy-510739_1280.jpg?w=300" alt="" width="400" height="291" border="0" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align: center;">
Immagine Pubblico Dominio, fonte <a href="https://pixabay.com/" target="_blank">Pixabay</a>
</td>
</tr>
</table>
<p>Cio` che ho messo in evidenza sono gli aspetti e le novita` piu` eclatanti introdotte dalla informatizzazione e che a mio parere sono molto positivi  (soprattutto per tutti gli aspetti di velocizzazione ed efficienza che pongono in essere) permettendo anche di svolgere lattivita` legale con maggiore approfondimento (avendo a disposizione di fatto piu` strumenti) e maggiore tempestivita`, considerando anche in questambito le potenzialita` della ulteriore strumentazione informatica di cui il professionista puo` dotarsi.</p>
<div style="text-align: right;">
Avv. Emanuela Andreozzi
</div>
<div style="text-align: right;">
Avvocatura Regionale INAIL delle Marche
</div>
<p>&nbsp; </p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/9">
@ -307,148 +400,6 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/19">
Guida pratica a LUKS
</a>
</h1>
<span class="post-date">01 Jun 2015</span>
<blockquote>
<div style="text-align: left;">
<i>&#8220;When privacy is outlawed, only outlaws will have privacy&#8221;</i>
</div>
</blockquote>
<p style="text-align: right;">
<a href="https://en.wikipedia.org/wiki/Phil_Zimmermann">Phil Zimmerman </a>
</p>
<p style="text-align: left;">
Questa e` una guida pratica alluso di LUKS su Linux.
</p>
<p style="text-align: left;">
LUKS e` un acronimo che sta per Linux Unified Key Setup ed e` il formato standard per il disk-encryption, creato nel 2004, si distingue da molti altri formati crittografici per la particolareggiata documentazione e soprattutto per esser stato sottoposto ad auditing, ovvero il processo di controllo del codice sorgente per verificarne lintegrita`, lefficacia e la robustezza degli algoritmi e lassenza di backdoor o bug software critici.
</p>
<p style="text-align: left;">
Il primo passo per utilizzare LUKS e` installarlo sulla propria distribuzione, o controllare se e` gia` presente.
</p>
<h2 style="text-align: left;">
Preparare la partizione
</h2>
<p style="text-align: left;">
In questo esempio la partizione /dev/sda1 viene formattata e sovrascritta.
</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup -y -v luksFormat /dev/sda1
WARNING!
========
This will overwrite data on /dev/sda1 irrevocably.
Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase:
Verify passphrase:
Command successful.</pre>
<p>In questo post useremo i parametri di default che sono:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup -v cipher aes-xts-plain64 key-size 256 hash sha1 iter-time 1000 use-urandom verify-passphrase luksFormat /dev/sda1</pre>
<p>ed equivalgono al precedente; se si vuole adottare un livello di sicurezza maggiore e personalizzata si puo` eseguire</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup benchmark</pre>
<p>e scegliere il cypher e lalgoritmo che si preferisce. Si ricorda che il numero relativo alla dimensione della chiave e` la meta` di quello usato da LUKS, ovvero 512 bit in questo caso.</p>
<p>Il prossimo comando inizializza il volume dopo aver inserito la chiave per il volume. Il terzo argomento e` il nome che si vuole scegliere per la partizione.</p>
<p>La password scelta non puo` esser in nessun modo recuperata.</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup luksOpen /dev/sda1 testvolume
Enter passphrase for /dev/sda1:</pre>
<p style="text-align: left;">
Ora /dev/sda1 correttemente inizializzato viene mappato su /dev/mapper/testvolume. Per verificare lo stato del volume:
</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup -v status testvolume
/dev/mapper/testvolume is active.
type: LUKS1
cipher: aes-cbc-essiv:sha256
keysize: 512 bits
device: /dev/sda1
offset: 4096
sectors size: 419426304
sectors mode: read/write
Command successful.</pre>
<h2 style="text-align: left;">
Formattare la partizione
</h2>
<p>Ora ci si deve assicurare che in caso di unanalisi esterna ogni dato venga visto come una serie random di zero ed uno senza valore e assicurarsi che non ci sia un leak di informazioni relative alluso del disco:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># dd if=/dev/zero of=/dev/mapper/testvolume</pre>
<p>Poi creare un filesystem, in questo caso ext4</p>
<pre class="wp-code-highlight prettyprint linenums:1"># mkfs.ext4 /dev/mapper/testvolume</pre>
<h2 style="text-align: left;">
Montare e chiudere il disco
</h2>
<p>Per montare da /dev/mapper il disco e poterlo utilizzare digitare:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># mount /dev/mapper/testvolume /mnt/testvolume</pre>
<p>e per chiudere il volume in maniera sicura:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># umount /mnt/testvolume
# cryptsetup luksClose testvolume</pre>
<h2 style="text-align: left;">
Cambiare password
</h2>
<p>LUKS supporta anche piu` di una password per volume quindi si procede aggiungendo una nuova password:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup luksAddKey /dev/sda1
Enter any passphrase:
Enter new passphrase for key slot:
Verify passphrase:</pre>
<p>e poi rimuovendo quella precedente:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup luksRemoveKey /dev/sda1</pre>
<p>Oppure in alternativa si puo` utilizzare</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup luksChangekey /dev/sda1</pre>
<p>Se si volesse rendere completamente inaccessibile il volume basta rimuovere la chiave attraverso il comando:</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup luksErase /dev/sda</pre>
<p style="text-align: left;">
questa opzione non richiede password ed e` irreversibile.
</p>
<p style="text-align: right;">
Francesco Mecca
</p>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,148 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/19">
Guida pratica a LUKS
</a>
</h1>
<span class="post-date">01 Jun 2015</span>
<blockquote>
<div style="text-align: left;">
<i>&#8220;When privacy is outlawed, only outlaws will have privacy&#8221;</i>
</div>
</blockquote>
<p style="text-align: right;">
<a href="https://en.wikipedia.org/wiki/Phil_Zimmermann">Phil Zimmerman </a>
</p>
<p style="text-align: left;">
Questa e` una guida pratica alluso di LUKS su Linux.
</p>
<p style="text-align: left;">
LUKS e` un acronimo che sta per Linux Unified Key Setup ed e` il formato standard per il disk-encryption, creato nel 2004, si distingue da molti altri formati crittografici per la particolareggiata documentazione e soprattutto per esser stato sottoposto ad auditing, ovvero il processo di controllo del codice sorgente per verificarne lintegrita`, lefficacia e la robustezza degli algoritmi e lassenza di backdoor o bug software critici.
</p>
<p style="text-align: left;">
Il primo passo per utilizzare LUKS e` installarlo sulla propria distribuzione, o controllare se e` gia` presente.
</p>
<h2 style="text-align: left;">
Preparare la partizione
</h2>
<p style="text-align: left;">
In questo esempio la partizione /dev/sda1 viene formattata e sovrascritta.
</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup -y -v luksFormat /dev/sda1
WARNING!
========
This will overwrite data on /dev/sda1 irrevocably.
Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase:
Verify passphrase:
Command successful.</pre>
<p>In questo post useremo i parametri di default che sono:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup -v cipher aes-xts-plain64 key-size 256 hash sha1 iter-time 1000 use-urandom verify-passphrase luksFormat /dev/sda1</pre>
<p>ed equivalgono al precedente; se si vuole adottare un livello di sicurezza maggiore e personalizzata si puo` eseguire</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup benchmark</pre>
<p>e scegliere il cypher e lalgoritmo che si preferisce. Si ricorda che il numero relativo alla dimensione della chiave e` la meta` di quello usato da LUKS, ovvero 512 bit in questo caso.</p>
<p>Il prossimo comando inizializza il volume dopo aver inserito la chiave per il volume. Il terzo argomento e` il nome che si vuole scegliere per la partizione.</p>
<p>La password scelta non puo` esser in nessun modo recuperata.</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup luksOpen /dev/sda1 testvolume
Enter passphrase for /dev/sda1:</pre>
<p style="text-align: left;">
Ora /dev/sda1 correttemente inizializzato viene mappato su /dev/mapper/testvolume. Per verificare lo stato del volume:
</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup -v status testvolume
/dev/mapper/testvolume is active.
type: LUKS1
cipher: aes-cbc-essiv:sha256
keysize: 512 bits
device: /dev/sda1
offset: 4096
sectors size: 419426304
sectors mode: read/write
Command successful.</pre>
<h2 style="text-align: left;">
Formattare la partizione
</h2>
<p>Ora ci si deve assicurare che in caso di unanalisi esterna ogni dato venga visto come una serie random di zero ed uno senza valore e assicurarsi che non ci sia un leak di informazioni relative alluso del disco:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># dd if=/dev/zero of=/dev/mapper/testvolume</pre>
<p>Poi creare un filesystem, in questo caso ext4</p>
<pre class="wp-code-highlight prettyprint linenums:1"># mkfs.ext4 /dev/mapper/testvolume</pre>
<h2 style="text-align: left;">
Montare e chiudere il disco
</h2>
<p>Per montare da /dev/mapper il disco e poterlo utilizzare digitare:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># mount /dev/mapper/testvolume /mnt/testvolume</pre>
<p>e per chiudere il volume in maniera sicura:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># umount /mnt/testvolume
# cryptsetup luksClose testvolume</pre>
<h2 style="text-align: left;">
Cambiare password
</h2>
<p>LUKS supporta anche piu` di una password per volume quindi si procede aggiungendo una nuova password:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup luksAddKey /dev/sda1
Enter any passphrase:
Enter new passphrase for key slot:
Verify passphrase:</pre>
<p>e poi rimuovendo quella precedente:</p>
<pre class="wp-code-highlight prettyprint linenums:1"># cryptsetup luksRemoveKey /dev/sda1</pre>
<p>Oppure in alternativa si puo` utilizzare</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup luksChangekey /dev/sda1</pre>
<p>Se si volesse rendere completamente inaccessibile il volume basta rimuovere la chiave attraverso il comando:</p>
<pre class="wp-code-highlight prettyprint linenums:1">#cryptsetup luksErase /dev/sda</pre>
<p style="text-align: left;">
questa opzione non richiede password ed e` irreversibile.
</p>
<p style="text-align: right;">
Francesco Mecca
</p>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/23">
@ -886,50 +1028,6 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/37">
Google afferma di essere pronta a dare agli utenti android più controllo sulla privacy
</a>
</h1>
<span class="post-date">09 May 2015</span>
<div style="text-align:center;">
articolo tradotto da <a href="http://www.bloomberg.com/news/articles/2015-05-07/google-said-ready-to-give-android-users-more-privacy-controls" target="_blank">bloomberg.com</a>
</div>
<p>Google inc. sta progettando di dare ai suoi utenti android più controllo riguardo a quali informazioni le applicazioni possono accedere, hanno affermato le persone che si occupano di ciò.</p>
<p>Il sistema operativo android di Google è impostato per dare agli utenti una scelta più dettagliata a quali contenuti possono accedere le app, secondo le richieste delle persone, che hanno chiesto di non essere identificate affinchè la faccenda rimanga privata. Questo potrebbe includere foto, contatti o la posizione. Un annuncio del cambiamento, che metterebbe Android più in linea con l&#8217; iOS Apple Inc., è previsto per la conferenza degli sviluppatori di Google in San Francisco questo mese, ha detto una delle persone.</p>
<div class="separator" style="clear:both;text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/02c33-googlelogo.jpg" style="margin-left:1em;margin-right:1em;"><img border="0" height="160" src="http://francescomecca.eu/wp-content/uploads/2015/08/02c33-googlelogo.jpg?w=300" width="320" /></a>
</div>
<div style="text-align:center;">
<span style="font-size:x-small;">immagine presa da <a href="http://www.slidetomac.com/il-nuovo-os-x-10-10-3-yosemite-rendera-piu-semplice-la-configurazione-degli-account-google-con-verifica-a-due-passaggi-89725.html" target="_blank">slidetomac.com</a></span>
</div>
<p>La Mountain View, società con sede in California l&#8217;anno scorso ha semplificato come le persone siano informate su ciò a cui un app sta accedendo. Sono gli utenti a decidere se l&#8217;app può essere scaricata. La nuova impostazione da la possibilità all&#8217;utente di scegliere a cosa può accedere un&#8217;app.</p>
<p>Google sta aggiungendo alcune funzionalità per i propri servizi di telefonia mobile che cerca di attirare gli utenti che sempre più vanno su Internet tramite i loro dispositivi wireless. L&#8217;Android ha avuto l&#8217;81% del mercato mondiale degli smartphone mentre l&#8217;Apple il 15%, secondo <a href="http://www.gartner.com/newsroom/id/2996817" target="_blank">Gartner Inc.</a></p>
<p>La pressione su Android cresce in alcune parti del mondo. Nei cinque paesi più gandi d&#8217;Europa, la sua quota è scesa al 69 per cento nel primo trimestre dal 72 per cento rispetto all&#8217;anno precedente, secondo <a href="http://www.kantarworldpanel.com/global/News/Android-Switchers-Drive-iOS-Growth-in-Europes-Big-Five-Countries" target="_blank">Kantar worldpanel.com</a>. La quota per iOS è salita al 20,3 per cento dal 18,6 per cento, Kantar ha riferito.</p>
<div style="text-align:right;">
Eugenio Corso
</div>
<div>
</div>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -32,6 +32,50 @@
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/37">
Google afferma di essere pronta a dare agli utenti android più controllo sulla privacy
</a>
</h1>
<span class="post-date">09 May 2015</span>
<div style="text-align:center;">
articolo tradotto da <a href="http://www.bloomberg.com/news/articles/2015-05-07/google-said-ready-to-give-android-users-more-privacy-controls" target="_blank">bloomberg.com</a>
</div>
<p>Google inc. sta progettando di dare ai suoi utenti android più controllo riguardo a quali informazioni le applicazioni possono accedere, hanno affermato le persone che si occupano di ciò.</p>
<p>Il sistema operativo android di Google è impostato per dare agli utenti una scelta più dettagliata a quali contenuti possono accedere le app, secondo le richieste delle persone, che hanno chiesto di non essere identificate affinchè la faccenda rimanga privata. Questo potrebbe includere foto, contatti o la posizione. Un annuncio del cambiamento, che metterebbe Android più in linea con l&#8217; iOS Apple Inc., è previsto per la conferenza degli sviluppatori di Google in San Francisco questo mese, ha detto una delle persone.</p>
<div class="separator" style="clear:both;text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/02c33-googlelogo.jpg" style="margin-left:1em;margin-right:1em;"><img border="0" height="160" src="http://francescomecca.eu/wp-content/uploads/2015/08/02c33-googlelogo.jpg?w=300" width="320" /></a>
</div>
<div style="text-align:center;">
<span style="font-size:x-small;">immagine presa da <a href="http://www.slidetomac.com/il-nuovo-os-x-10-10-3-yosemite-rendera-piu-semplice-la-configurazione-degli-account-google-con-verifica-a-due-passaggi-89725.html" target="_blank">slidetomac.com</a></span>
</div>
<p>La Mountain View, società con sede in California l&#8217;anno scorso ha semplificato come le persone siano informate su ciò a cui un app sta accedendo. Sono gli utenti a decidere se l&#8217;app può essere scaricata. La nuova impostazione da la possibilità all&#8217;utente di scegliere a cosa può accedere un&#8217;app.</p>
<p>Google sta aggiungendo alcune funzionalità per i propri servizi di telefonia mobile che cerca di attirare gli utenti che sempre più vanno su Internet tramite i loro dispositivi wireless. L&#8217;Android ha avuto l&#8217;81% del mercato mondiale degli smartphone mentre l&#8217;Apple il 15%, secondo <a href="http://www.gartner.com/newsroom/id/2996817" target="_blank">Gartner Inc.</a></p>
<p>La pressione su Android cresce in alcune parti del mondo. Nei cinque paesi più gandi d&#8217;Europa, la sua quota è scesa al 69 per cento nel primo trimestre dal 72 per cento rispetto all&#8217;anno precedente, secondo <a href="http://www.kantarworldpanel.com/global/News/Android-Switchers-Drive-iOS-Growth-in-Europes-Big-Five-Countries" target="_blank">Kantar worldpanel.com</a>. La quota per iOS è salita al 20,3 per cento dal 18,6 per cento, Kantar ha riferito.</p>
<div style="text-align:right;">
Eugenio Corso
</div>
<div>
</div>
</div>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/44">
@ -395,43 +439,6 @@ L&#8217;opera si trova a Berlino.</p>
</br>
<hr>
</br>
<span> </span>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/55">
Javascript attacca la cache del processore
</a>
</h1>
<span class="post-date">23 Apr 2015</span>
<p>Lo scorso febbraio 4 ricercatori della Columbia University hanno ideato un attacco <a href="https://en.wikipedia.org/wiki/Side-channel_attack">side channel</a> in grado di penetrare la cache dei processori intel piu` recenti di qualsiasi OS.<br>
L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza la cache di terzo livello del processore. Il pdf tecnico e` disponibile a questo <a href="http://arxiv.org/abs/1502.07373">indirizzo</a>.</p>
<p>Di seguito una breve spiegazione dell&#8217;attacco.<br>
&#8211; Attacco side channel: i dati vengono estratti da fenomeni fisici correlati al funzionamento del terminale: ritardi nella risposta, consumo della cpu,voltaggio e altro se misurati in maniera molto precisa e in correlazione ad eventi esterni permettono di capire che informazioni stava processando la CPU.</p>
<div>
-Requisiti: un qualsiasi fra i browser piu` popolari, un processore intel 32 o 64 bit, almeno qualche minuto sulla pagina infetta.</p>
<p>
-Come avviene l&#8217;attacco: il codice Javascript permette al vettore di occupare una piccola parte di cache di cache e poi va a misurare il ritardo in una nuova lettura e controllando se altri processi la stanno usando. Se questa azione viene compiuta per tutte le &#8220;linee&#8221; della cache senza interruzioni permette di avere dati relativi all&#8217;utilizzo della CPU. Con analizi avanzate si possono stabilire a partire daqueste informazioni in alcuni casi i movimenti del mouse, l&#8217;accesso alle risorse, i tasti premuti.
</p>
</div>
<div>
-Come evitare l&#8217;infezione: non permettere al browser di attivare i javascript e evitare di tenere aperte pagine web mentre si compiono azioni sensibili, questi due sono gli unici metodi al momento. I ricercatori hanno deciso di non rilasciare alcun proof of concepit prima del rilascio di patch per i browser.
<div style="text-align:right;">
Francesco Mecca
</div>
</div>
</div>
</br>
<hr>
</br>
<span> </span>
</div>

View file

@ -83,6 +83,15 @@ Finally I put a link to the archive, my github page and the atom feed on the sid
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -120,15 +129,6 @@ Finally I put a link to the archive, my github page and the atom feed on the sid
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -192,6 +192,39 @@ Finally I put a link to the archive, my github page and the atom feed on the sid
@ -407,45 +440,6 @@ Finally I put a link to the archive, my github page and the atom feed on the sid

View file

@ -67,6 +67,15 @@ The bot can be added to your contact list by simply searching for <a href="http:
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -104,15 +113,6 @@ The bot can be added to your contact list by simply searching for <a href="http:
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -212,6 +212,59 @@ The bot can be added to your contact list by simply searching for <a href="http:
@ -567,69 +620,6 @@ The bot can be added to your contact list by simply searching for <a href="http:

View file

@ -51,6 +51,15 @@ instantaneously.</p></li>
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -88,15 +97,6 @@ instantaneously.</p></li>
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -160,6 +160,39 @@ instantaneously.</p></li>
@ -375,45 +408,6 @@ instantaneously.</p></li>

View file

@ -45,6 +45,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -82,15 +91,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -99,6 +99,51 @@
<h4>Similar Posts</h4>
<ul>
<li class="relatedPost">
<a href="/pescewanda/2018/10/24/eduhack_coventry/">eLearning in the age of Social Networks, the EduHack Platform
</a>
</li>
@ -132,9 +177,6 @@
<h4>Similar Posts</h4>
<ul>
<li class="relatedPost">
<a href="/pescewanda/2018/03/27/addio-reddit/">Addio Reddit
@ -378,45 +420,6 @@

View file

@ -90,6 +90,15 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -127,15 +136,6 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -235,6 +235,59 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
@ -628,78 +681,6 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
<li class="relatedPost">
<a href="/pescewanda/2016/11/10/machine-learning-intro/">Capire il Machine Learning (parte 1)
</a>
</li>
</ul>

View file

@ -132,6 +132,15 @@ Ogni altra prova è discutibile e non necessaria.</p>
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -169,15 +178,6 @@ Ogni altra prova è discutibile e non necessaria.</p>
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -295,6 +295,69 @@ Ogni altra prova è discutibile e non necessaria.</p>
@ -720,81 +783,6 @@ Ogni altra prova è discutibile e non necessaria.</p>

View file

@ -115,6 +115,15 @@ At the end, I ask, why would you choose anything else than the easiest and most
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -152,15 +161,6 @@ At the end, I ask, why would you choose anything else than the easiest and most
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -260,6 +260,59 @@ At the end, I ask, why would you choose anything else than the easiest and most
@ -615,69 +668,6 @@ At the end, I ask, why would you choose anything else than the easiest and most

View file

@ -119,6 +119,15 @@ Anyway for simple cases the GA yields good results, as an example for points (0
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -156,15 +165,6 @@ Anyway for simple cases the GA yields good results, as an example for points (0
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -264,6 +264,59 @@ Anyway for simple cases the GA yields good results, as an example for points (0
@ -637,78 +690,6 @@ Anyway for simple cases the GA yields good results, as an example for points (0
<li class="relatedPost">
<a href="/pescewanda/2016/11/10/machine-learning-intro/">Capire il Machine Learning (parte 1)
</a>
</li>

View file

@ -47,6 +47,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -84,15 +93,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -156,6 +156,39 @@
@ -371,45 +404,6 @@

View file

@ -108,6 +108,15 @@ dfu-programmer atmega16u2 reset
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -145,15 +154,6 @@ dfu-programmer atmega16u2 reset
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -271,6 +271,69 @@ dfu-programmer atmega16u2 reset
@ -743,90 +806,6 @@ dfu-programmer atmega16u2 reset
<li class="relatedPost">
<a href="/pescewanda/2016/11/10/machine-learning-intro/">Capire il Machine Learning (parte 1)
</a>
</li>
</ul>

View file

@ -135,6 +135,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -172,15 +181,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -298,6 +298,69 @@
@ -723,81 +786,6 @@

View file

@ -297,6 +297,15 @@ What if, when the person walks into a mall, we record the time, the location, th
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -334,15 +343,6 @@ What if, when the person walks into a mall, we record the time, the location, th
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -496,6 +496,89 @@ What if, when the person walks into a mall, we record the time, the location, th
@ -1061,105 +1144,6 @@ What if, when the person walks into a mall, we record the time, the location, th

View file

@ -253,6 +253,15 @@ Proviamo a visualizzarla in un&#39;immagine dove i box arancioni sono i nodi di
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -290,15 +299,6 @@ Proviamo a visualizzarla in un&#39;immagine dove i box arancioni sono i nodi di
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -434,6 +434,79 @@ Proviamo a visualizzarla in un&#39;immagine dove i box arancioni sono i nodi di
@ -947,107 +1020,6 @@ Proviamo a visualizzarla in un&#39;immagine dove i box arancioni sono i nodi di

View file

@ -88,6 +88,15 @@ Pierre aking his soul came to the packs and drove up his father-in-law women.
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -125,15 +134,6 @@ Pierre aking his soul came to the packs and drove up his father-in-law women.
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -269,6 +269,79 @@ Pierre aking his soul came to the packs and drove up his father-in-law women.
@ -782,107 +855,6 @@ Pierre aking his soul came to the packs and drove up his father-in-law women.

View file

@ -83,6 +83,15 @@ Questi pattern corrispondono alle caratteristiche proprie di un oggetto (quali p
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -120,15 +129,6 @@ Questi pattern corrispondono alle caratteristiche proprie di un oggetto (quali p
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -264,6 +264,79 @@ Questi pattern corrispondono alle caratteristiche proprie di un oggetto (quali p
@ -777,107 +850,6 @@ Questi pattern corrispondono alle caratteristiche proprie di un oggetto (quali p

View file

@ -83,6 +83,15 @@ Attraverso la dissipazione l&#39;opera, che fissata nel momento aveva acquisito
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -120,15 +129,6 @@ Attraverso la dissipazione l&#39;opera, che fissata nel momento aveva acquisito
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -228,6 +228,59 @@ Attraverso la dissipazione l&#39;opera, che fissata nel momento aveva acquisito
@ -612,79 +665,6 @@ Attraverso la dissipazione l&#39;opera, che fissata nel momento aveva acquisito

View file

@ -92,6 +92,15 @@ I divided my time between irc and mailing lists. I felt the obligation to archiv
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -129,15 +138,6 @@ I divided my time between irc and mailing lists. I felt the obligation to archiv
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -255,6 +255,69 @@ I divided my time between irc and mailing lists. I felt the obligation to archiv
@ -701,93 +764,6 @@ I divided my time between irc and mailing lists. I felt the obligation to archiv

View file

@ -43,6 +43,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -80,15 +89,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/03/20/spazio-digitale-rant-facebook__eng/">-->
<!--Some shallow thoughts from my tiny virtual space-->
<!--<small>20 Mar 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -97,6 +97,69 @@
<h4>Similar Posts</h4>
<ul>
@ -652,93 +715,6 @@

View file

@ -87,6 +87,15 @@
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -124,15 +133,6 @@
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/03/20/spazio-digitale-rant-facebook__eng/">-->
<!--Some shallow thoughts from my tiny virtual space-->
<!--<small>20 Mar 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -268,6 +268,79 @@
@ -763,107 +836,6 @@

View file

@ -215,6 +215,15 @@ GND [ ] [x] GND
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -252,15 +261,6 @@ GND [ ] [x] GND
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/03/20/spazio-digitale-rant-facebook__eng/">-->
<!--Some shallow thoughts from my tiny virtual space-->
<!--<small>20 Mar 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -342,6 +342,49 @@ GND [ ] [x] GND
@ -651,65 +694,6 @@ GND [ ] [x] GND

View file

@ -69,6 +69,15 @@ Ho interessi di nicchia e Reddit mi permetteva di riunirmi con persone dall&#39;
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -106,15 +115,6 @@ Ho interessi di nicchia e Reddit mi permetteva di riunirmi con persone dall&#39;
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/03/20/spazio-digitale-rant-facebook__eng/">-->
<!--Some shallow thoughts from my tiny virtual space-->
<!--<small>20 Mar 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -123,6 +123,71 @@ Ho interessi di nicchia e Reddit mi permetteva di riunirmi con persone dall&#39;
<h4>Similar Posts</h4>
<ul>
<li class="relatedPost">
<a href="/pescewanda/2018/10/24/eduhack_coventry/">eLearning in the age of Social Networks, the EduHack Platform
</a>
</li>
@ -606,79 +671,8 @@ Ho interessi di nicchia e Reddit mi permetteva di riunirmi con persone dall&#39;
</ul>

View file

@ -231,6 +231,15 @@ Fra le varie motivazioni c&#39;è il fatto che questo rifletta più realisticame
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/10/24/eduhack_coventry/">-->
<!--eLearning in the age of Social Networks, the EduHack Platform-->
<!--<small>24 Oct 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
@ -268,15 +277,6 @@ Fra le varie motivazioni c&#39;è il fatto che questo rifletta più realisticame
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/03/20/spazio-digitale-rant-facebook__eng/">-->
<!--Some shallow thoughts from my tiny virtual space-->
<!--<small>20 Mar 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
@ -331,6 +331,69 @@ Fra le varie motivazioni c&#39;è il fatto che questo rifletta più realisticame
@ -840,93 +903,6 @@ Fra le varie motivazioni c&#39;è il fatto che questo rifletta più realisticame

View file

@ -0,0 +1,942 @@
<!DOCTYPE html>
<html lang="en-us">
<head>
<meta charset="UTF-8">
<title>Caught in the Net</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="theme-color" content="#157878">
<link rel="stylesheet" href="/css/normalize.css">
<!--<link href='https://fonts.googleapis.com/css?family=Open+Sans:400,700' rel='stylesheet' type='text/css'>-->
<link rel="stylesheet" href="/fonts/opensans.css">
<link rel="stylesheet" href="/css/cayman.css">
</head>
<body>
<section class="page-header">
<h1 class="project-name">Caught in the Net</h1>
<h2 class="project-tagline">La rete ti cattura ma libera il pensiero</h2>
<a class="btn" href="/">Home</a>
<a class="btn" href="/about/">About me</a>
<a class="btn" href="/contattami/">Contact me</a>
<a class="btn" href="/archive/">Archive</a>
<a class="btn" href="/feed.xml">RSS</a>
<a class="btn" href="http://francescomecca.eu/git/pesceWanda">Personal Git</a>
<a class="btn" href="https://github.com/FraMecca">Github</a>
<a class="btn" href="/curriculum/CV_Mecca_Francesco.pdf">Curriculum</a>
</section>
<section class="main-content">
<div class="post">
<h1 class="post-title">eLearning in the age of Social Networks, the EduHack Platform</h1>
<span class="post-date">24 Oct 2018</span>
<p>Tomorrow I am giving this <a href="http://conf.owlteh.org/contributions/published/elearning-in-the-age-of-social-networks-the-eduhack-model/">talk</a> at the <a href="https://www.conf.owlteh.org/">OWLTEH Conference 2018</a> at the Coventry University.</p>
<p>This is what I am going to talk about.</p>
<h1 id="in-the-beginning-there-was-the-lms">In the beginning there was the LMS</h1>
<p>Learning Management Systems appeared on the market around the beginning of 2000.</p>
<p>Since then they have been the foundation of the modern education sector, ranging from the basic functionalities of activity tracking, grades and analytics for the students (and in some cases the parents) to complex environments for remote education or even experimental pedagogies (e.g. <a href="https://fare.polito.it">FARE</a> that provides hospitalized students means to access the physical class and labs).</p>
<p>In the last five years commercial LMS reduced the pace of their progress, while providing better accessibility and decentralization.</p>
<p>The core of their principle hasn&#39;t changed. In this talk I am going to highlight their problems and outline a vision for a different approach that is supported by modern technologies.</p>
<h2 id="the-problem-of-traditional-lms">The problem of traditional LMS</h2>
<p>The design of a Learning Management System is based mainly around closed structures, such as very strict roles management and access management.</p>
<p>In a scenario where a professor might want to bring a domain expert during classes and online, a traditional LMS doesn&#39;t provide any kind of facilities for things such a role (in terms of login rights, rights towards other users, moderation capabilities).</p>
<p>There are many corner cases that lack a general method that allows users to expand the features of an LMS, especially when an institution lacks the technical means to bring development to such platforms.</p>
<p>Moreover, traditional LMS are highly gerarchic and foster an epistemology of &quot;possession&quot;: learners are defined by the content that they &quot;possess&quot;, the course they subscribed to, the material they downloaded. The educator is forced to be an authoritative source of knowledge that needs to direct the activity of the learners by having students pull the knowledge through an online portal. The flow is unidirectional and content centric.</p>
<p>In my experience instructors create delivery-centered pedagogies because LMS lacks the flexibility to be adapted to learners, especially when they are used by a variety of instructors (e.g.: all of the professors of a UNI). While this model better reflects the traditional classroom I would argue that modern users are not used to this kind of dynamics in modern online communities.</p>
<p>You can learn more about the friction in the usage of traditional LMS in the following papers:</p>
<ul>
<li><p>Rubin, Fernandes, Avgerinou, &amp; Moore, 2010</p></li>
<li><p>Naveh, Tubin, &amp; Pliskin, 2010</p></li>
<li><p>Parry, 2009; Sanchez-Franco, 2010</p></li>
<li><p>Beebe et al., 2010</p></li>
</ul>
<h2 id="hacking-education-with-digital-pedagogies">Hacking Education with Digital Pedagogies</h2>
<p>What happens when education gets &quot;hacked&quot; and transitions in the digital world?
This is what we envision within the realms of the EduHack project:</p>
<ul>
<li><p>&quot;Content to consume&quot; becomes &quot;content to consume to produce content&quot;: learners become knowledge builders because producing intellectual outputs is the logical continuation to learning.</p></li>
<li><p>The environment goes from content centric to learner centric: teachers must be comfortable with the fluidity of such new roles.</p></li>
<li><p>The distribution of information goes from knowledge-push to knowledge-pull: learners actively seek out educational material and gets rewarded.</p></li>
</ul>
<p>In the academia the closest study in this direction has been:
eLearning 2 0 and new literacies are social practices lagging behind, W.-Y. Lim et al.</p>
<h3 id="what-do-we-gain-with-osns">What do we gain with OSNs</h3>
<p>In the Web 2.0 landscape and in particular for younger generations, Online Social Networks (OSNs) have strong potential for building and mantaining strong connections and create an informal learning environment that collects and puts into actions the ideas that I have described.
I wont rehash widely known statistics, but it must be said that nowadays OSNs, in particular Facebook, Youtube and Twitter have a high rate of penetration towards students of upper secondary and post secondary education. For younger students OSNs are their primary means of communication while dominating their usage of the internet overall.</p>
<ul>
<li><p>Using Social Networks Technology to Enhance Learning in Higher Education: a Case Study using Facebook.</p></li>
<li><p>Web-Based Learning Platforms integratins Social Networking for Design Educations at High Schols in China.</p></li>
<li><p>Using online social networking for teaching and learning: Facebook use at the University of Cape Town.</p></li>
</ul>
<h2 id="case-studies-facebook-as-an-alternative-lms">Case studies: Facebook as an alternative LMS</h2>
<p>Different case studies analyzed the possible uses of Facebook as a social LMS.
The following is a list of the positive and negative results of such studies grouped by User Experience Design (UX), Behavior of the users and Quantitative Participation.</p>
<h4 id="ux">UX</h4>
<p>Advantages:</p>
<ol>
<li><p>Photos and discussions are presented better than traditional LMS.</p></li>
<li><p>User&#39;s walls, private messages and comments are considered just communication tools.</p></li>
<li><p>Users reported that the technologies used for sharing class related material was familiar.</p></li>
<li><p>Educators reported that Facebook was useful to answer questions in bulk.</p></li>
<li><p>Educators reported that given the capabilities above, they saved a lot of time that otherwise would have been spent dealing with class related communications and questions.</p></li>
</ol>
<p>Disadvantages:</p>
<ol>
<li><p>Users where skeptical in writing long essays.</p></li>
<li><p>Friction when used as a formal learning platform.</p></li>
<li><p>Private platforms have issues related to accessibilities and language. Communication was done in english even if that wasn&#39;t the case before;</p></li>
<li><p>Facebook doesn&#39;t support a wiki system.</p></li>
<li><p>There are no tools for group management.</p></li>
<li><p>There are no tools for sending bulk messages and group notifications.</p></li>
<li><p>No capabilities for deletion and archival of material.</p></li>
<li><p>No support for common multimedia (such as powerpoint slides or pdf).</p></li>
<li><p>Maximum characters limit for posts.</p></li>
</ol>
<h4 id="behavior-of-the-users">Behavior of the users</h4>
<p>Advantages:</p>
<ol>
<li><p>Users reached to older students and befriended them.</p></li>
<li><p>Users reported that they felt less pressure online.</p></li>
<li><p>Educators found that boldlier students asked more questions because of absense of face to face shyness.</p></li>
<li><p>Students avoided to befriend educators and lecturers in order to hide their private lives.</p></li>
<li><p>During the research period, no student befriended the interviewed lecturers.</p></li>
<li><p>Students did not accept friend requests from lecturers.</p></li>
<li><p>Students help each other in answering questions</p></li>
<li><p>Six people from prior classes idependently requested to join the group</p></li>
<li><p>Constant and more accurate feedback for teachers</p></li>
<li><p>Constant communication for teachers</p></li>
<li><p>They got to know classmates better</p></li>
<li><p>In heavily moderated OSNs, few users find disappropriate contents.</p></li>
<li><p>In a comparison Facebook&#39;s discussion were more numerous than Moodle&#39;s discussions even when people were not allowed to be friends</p></li>
</ol>
<p>Disadvantages:</p>
<ol>
<li><p>Addiction</p></li>
<li><p>Students reported difficulties to get used to the new online persona.</p></li>
<li><p>Miscommunication: many prefer face to face interaction to express views. This maybe because they are used to it in traditional classrooms.</p></li>
<li><p>Some people say that they don&#39;t feel safe on FB (this is even more common when interviewing master students).</p></li>
<li><p>Some students worry that their personal life could be discovered and misjudged by tutors.</p></li>
</ol>
<h4 id="quantitative-participation">Quantitative Participation</h4>
<p>Advantages:</p>
<ol>
<li><p>Overall the students are more responsive to issues and questions raised in classes.</p></li>
<li><p>There is a higher number of ongoing discussions in any period.</p></li>
<li><p>Users log to Facebook for class related activities also during vacations (while the university LMS was almost not used).</p></li>
<li><p>Very active participation: more than 90% of the students used Facebook outside of classes for study related activities.</p></li>
<li><p>Improved discussion outside of classes.</p></li>
<li><p>Students post class related material.</p></li>
<li><p>Creation of many User Generated Content.</p></li>
</ol>
<p>There are no relevant reported challenges regarding participation and usage patterns.</p>
<h2 id="where-do-we-go-from-here">Where do we go from here?</h2>
<p>I want to highlight some other threats that an OSN such as Facebook poses to the Open Web.</p>
<ul>
<li><p>The issue of privacy: forcing students to use a service that mines and sells their data is <strong>unethical</strong>.</p></li>
<li><p>Identity pollution: the open web is based on the principle of pseudoanonimity, users should be capable of build a prism of different online identity for different communities and environments.</p></li>
<li><p>Studies report Facebook as more appropriate for younger students, but younger people have higher rates of addiction to OSNs as well.</p></li>
<li><p>Addicted OSNs users have a lower GPA.</p></li>
<li><p>20% of college students reported being stalked on OSNs.</p></li>
</ul>
<p>While the reported results about learners and educators participation in the usage of OSNs as LMS is astounding, forcing students to signup and give away their sensible data to private services is debatable and could be considered unethical.</p>
<h1 id="the-eduhack-model">The EduHack model</h1>
<p>We need to develop a new LMS that is respectful of the Open Web standards without providing any friction to the users.</p>
<p>For this reasons, as part of the EduHack Project, we are developing the EduHack Knowledge Sharing Platform.</p>
<p>The EduHack Knowledge Sharing Platform was born around the assumption that many of the advantages in terms of user engagement and group dynamics</p>
<p>provided by OSNs could be replicated by adopting their widely known design patterns and replicating closely the UX.</p>
<p>At the core of the platform there are the founding principles of the Open Web.</p>
<p>For this reason no data is collected of mined. Users are provided with an account that could be separated from their different online persona.</p>
<h4 id="a-platform-for-collaborative-learning">A platform for collaborative learning</h4>
<p>The EduHack Knowledge Sharing Platform is divided into two parts.</p>
<p>The personal area is user centric and provides a window into the activities of the user in the form of multimedia blogposts.</p>
<p>The user can create and manage different roles for external editors to his private area. By default no other user is allowed to post a &quot;story&quot; in his personal area, but other users can be added as team members and can manage group works in different blogs.</p>
<p>Learners are expected to create and remix what they learned (e.g. from online classes or MOOCs).</p>
<p>The public area is modelled after the UX of Reddit and it is divided into diffent sections (e.g.: mathematics, IT, discrete phisics, etc...), each providing a wiki.</p>
<p>Learners can subscribe to different sections or different users and be notified of new content or interactions.</p>
<p>Every user is allowed to post a link, an essay or any other widely adopted multimedia artifact to any section. Every user can positively vote and comment every post made. Comments can be positively voted as well.</p>
<p>Comments and content can be ordered by a custom algorithm (Wilson score interval) or chronologically.</p>
<p>Educators have a custom flair, can create new sections and moderate them. Moderation consists in changing links, removing posts or comments. Vote cannot be altered.</p>
<h2 id="conclusions">Conclusions</h2>
<p>The EduHack Knowledge Sharing Platform is an ongoing effort to evolve LMS and augment them with social features and modern group dynamics.</p>
<p>The UX is modeled after a widely used social network without sacrificing consolidated approaches from traditional LMS.</p>
<p>We want to provide with this model an ethically sound framework for user centric, knowledge-pull pedagogies.</p>
</div>
<!--<div class="related">-->
<!--<related-posts />-->
<!--<h2>Related Posts</h2>-->
<!--<ul class="related-posts">-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/07/27/dtldr/">-->
<!--Un articolo per r/italyinformatica-->
<!--<small>27 Jul 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2018/03/27/addio-reddit/">-->
<!--Addio Reddit-->
<!--<small>27 Mar 2018</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/10/02/minidoxguide/">-->
<!--Minidox, a guide for the Europeans and the Scrooges-->
<!--<small>02 Oct 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/09/vaporwave/">-->
<!--Cyber-utopia and vaporwave-->
<!--<small>09 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--<li>-->
<!--<h3>-->
<!--<a href="/pescewanda/2017/05/07/latestage_handbrake/">-->
<!--Late Stage Capitalism meets FOSS-->
<!--<small>07 May 2017</small>-->
<!--</a>-->
<!--</h3>-->
<!--</li>-->
<!---->
<!--</ul>-->
<!--</div>-->
<h4>Similar Posts</h4>
<ul>
<li class="relatedPost">
<a href="/pescewanda/2018/03/27/addio-reddit/">Addio Reddit
</a>
</li>
</ul>
<footer class="site-footer">
<!--<span class="site-footer-owner"><a href="http://francescomecca.eu">Caught in the Net</a> is maintained by <a href="contattami">Francesco Mecca</a>.</span>-->
<span> CC BY-SA 4.0 International.</br> </span>
<span class="site-footer-credits"><a href="https://jekyllrb.com">Jekyll</a>, <a href="https://github.com/jasonlong/cayman-theme">Cayman theme</a>.</span>
</footer>
</section>
</body>
</html>