nSHIELD meeting in Florence: group picture

nSHIELD meeting in Florence: group picture

Image | Posted on by | Tagged | Leave a comment

Dal vinile ai valvolari – Il fascino del vintage [guest post]

Il vissuto da sempre affascina. Certo il moderno é bello, l’ultima moda fa sempre tendenza, ma poi quando apriamo il baule dei ricordi, sia esso fisico o immaginario, non possiamo non rimanere incantati, anzi, quasi paralizzati dalla catena di emozioni che proviamo.

E così quando prendiamo in mano un disco in vinile é come viaggiare nel tempo, agli anni del boom economico, al tempo in cui le cose erano più semplici, più reali e perché no anche più spensierate. Erano gli anni in cui si scopriva la libertà, di una scampagnata, di una gonna corta, di un bacio ascoltando la musica di un Juke Box.

E anche l’ingombro aveva un suo fascino, un 45 giri non si poteva certo stivare nel taschino di una camicia ma non aveva paragone l’esperienza di poggiare correttamente la puntina del giradischi all’inizio della traccia. Ci si sentiva come un direttore d’orchestra che alza le braccia al cielo per dare il via all‘intera orchestra.

Forse per questo in questa epoca dominata dalla hi-tech sentiamo così forte il richiamo al vinile, la riscoperta della bellezza di un qualcosa di manuale come estrarre il disco, poggiarlo sul giradischi e posare la puntina all’inizio della traccia.

Non si tratta semplicemente di ascoltare la musica ma di esserne parte, di diventare uno degli esecutori della stessa. Ma esecutori quasi nel senso letterario, tanto che chi aveva un minimo di conoscenza di elettronica si dilettava nel costruirsi in casa un apparecchio a valvole in grado di riprodurre i suoni.

Erano anni in cui l’inventiva faceva da padroni, complice anche un portafoglio spesso e volentieri quasi vuoto. Altro che transistor, altro che bobine. Erano gli anni delle puntine e delle valvole, di giradischi e di apparecchi valvolari.

Ed é interessante vedere come oggi, a decenni di distanza, anni in cui la tecnologia ha fatto passi da gigante giungendo laddove neppure i film di fantascienza dell’epoca erano giunti, ancora non si sia potuto affermare che tali tecnologie sono superate, roba vecchia. Non é solo questione di fascino, ma di soluzioni tecniche, di qualità del suono che tuttora resta di altissimi livelli.

Certo forse non saranno versatili come certi apparecchi moderni ma per chi ama l’eccellenza e perché no, l’abbandonarsi a qualche ricordo vissuto o semplicemente raccontato, questi strumenti assumono un rango superiore all’oggetto vintage: diventano cult.

 

Contributo scritto da hifiprestige.it

 

Posted in Uncategorized | 1 Comment

Achieved DGSA (Dangerous Goods Safety Advisor) certification…

… according to ADR 2013:

http://en.wikipedia.org/wiki/European_Agreement_concerning_the_International_Carriage_of_Dangerous_Goods_by_Road

Posted in Work | Tagged , , , , | Leave a comment

Majority Voting: from Politics to Computers… and back?

Majority Voting: from Politics to Computers…

… and back?

by Francesco Flammini, IEEE Senior Member

Voting and computer dependability

I am quite sure most of the readers know well about the unreliability of first computers, when ‘bugs’ could be real insects and not programmers’ faults. Well, after many years, most computers continue to be quite unreliable, mainly due to the increasing complexity which is often not well mastered by software engineers. One may probably tolerate hang-ups, blue screens, and even wrong results when running software on personal computers without getting too angry and frustrated; however, nobody would even think to accept the risk of bugs causing accidents in brake-by-wire or any other critical control systems. That is why the latter are developed and tested in a way which is significantly different, more rigorous and time consuming, while the same effort would not be justified for non-critical systems. But there are situations in which you may still have faults regardless of how much effort you put in the software development: think for instance to cosmic radiation, which may cause bit flips in condenser-based memories, or compiler faults, which are out of your control. In those and other situations, engineers rely upon redundancy, that is the use of more modules performing the same task, and diversity, that is the differentiation of programmers and development tools in order to avoid the same faults to show up in different modules. Redundancy can be spatial, with modules operating in parallel, or temporal, with modules operating sequentially. In any case, the output of modules in compared in order to check if they agree on the same results. In other words, a concept is employed which is similar to the one used in politics when an important decision has to be made by checking the opinions of different people: just a few in case they are well experienced and educated on the matter, a lot more in case there are few warranties about their knowledge and skills. Well, democratic decision making may be imitated to fuse decisions coming from different (or differently installed) sensors, processors, or any other computing devices. A basic knowledge of probability theory ensures that if:

  • A and B are different individuals called to provide an answer to a non-opinable question
  • A and B do not significantly influence each other
  • A and B are not completely ignorant about the subject

the probability that they are both wrong is (very) low, that is (much) lower that the probability of A or B being wrong singularly. It is rather intuitive that the same concept can be extended to larger populations of individuals. After all, there are few doubts about which is the most valuable help in “Who wants to be a millionnaire?”…

Formally speaking, in majority voting among M individuals, a decision is taken according to the fact that the condition represented by the following formula is satified (YES) or not (NO):

Where:

  • Xiis a boolean value representing the decision of the generic individual, which can be ‘1’ for ‘YES’ and ‘0’ for ‘NO’
  • K, M are positive integers with M > 2 and K = [M / 2] + 1 (the ‘[ ]’ operator indicates the integer part of the division)
  • wi is the weight associated to ‘reputation’ and such that

Now, majority voting is exactly the concept used in the so called N-modular redundant computer architectures, where different processors, electrically segregated and running diversely developed programs, run in parallel and their results are compared in order to reach an agreement on which output can be considered correct with a certain, quantifiable level of dependability.

Voting and people dependability

Are there any differences among reaching a consensus with majority voting in computer systems and with human beings? Well, the answer is yes: in the Web 2.0 era, the assumption that people do not influence each other seems not realistic. In fact, discussions on Facebook and other social networks have been shown to be able to relevantly bias opinions. Furthermore, in politics the answer to important questions is often not merely correct or wrong, but it is related to taking the right (i.e. most saviour) decision considering the context, the expected long term consequences as well as the well-being of the highest number of citizens. However, intuition suggests that web-driven majority voting could still provide some of the advantages mentioned above for computer systems.

First of all, let’s say that – on average – people trust computers more than they trust politicians. From an engineering point of view, perhaps the reason lies in the fact that – though coming from different parties – governments are often affected by the so called ‘common mode failures’: they tend to be made up by people sharing the same will to get a ‘return on the investment’ and featuring limited technical skills. The cost for the society of having thousands of them instead of hundreds (or tens, depending on the case) would be overly high. In fact, the costs associated to politicians tend to be quite high, and the general trend is toward reduction.

Now, a quite obvious question raises: since we do not trust so much politicians, as citizens shouldn’t we govern our countries and cities by ourselves? After all, in all those years we have raised our average level of education and developed all the enabling technologies. Unfortunately, so far it seems that e-voting is considered mostly a mean to securely substitute the traditional ballot with an electronic one. Not many socio-technical studies address the issue of distributed agreement involving a large number of heterogenous individuals as a standard mechanism to support governments in everyday decision making.

Nobody would even think of being governed by shy and solitary geniuses, due to their limited social and communicative skills; however, it is a pity people like them will never play an active role in politics. Depending on their expertise, their opinion could be essential, much more than the ones of less educated individuals. I would say their judgement should be weighted even more. Wouldn’t it be meritocracy at its essence?

I think we should go further in developing a better way for involving smart people in politics, allowing them to participate in the decision making process of local authorities and to join extended experts committees on the base of their resume. And all without the stress of elections, commuting or changing jobs. The enabling and secure ICT tools are already there or may be developed quite easily. The still open issue is how to combine and organize those tools in a way to optimise the decision making process in local and central governments, improving the quality of politics and reducing the costs for the citizens.

Call it e-democracy, e-government, e-participation or direct democracy, all the related paradigms have something to do with ensemble-based voting in decision making, which is the simplest way for achieving a reliable result out of possibly unreliable sources. Just like in safety-critical computers.

References

[1]  Parhami, B.: A taxonomy of voting schemes for data fusion and dependable computation. In: Reliability Engineering and System Safety, Vol. 52, No. 2, May 1996: pp. 139-151

[2]  Polikar, R.: Ensemble based systems in decision making. In: IEEE Circuits and Systems Magazine, Vol. 6, No. 3, Third Quarter 2006: pp. 21-45

[3]  Rios Insua, D., French, S. (Eds.): e-Democracy. Springer, Advances in Group Decision and Negotiation, Vol. 5, 1st Edition, 2010

[4]  Wikipedia entry on ‘Computer’ and ‘Bugs’: http://en.wikipedia.org/wiki/Computer#Bugs

Posted in Computer e Internet, Notizie e politica, Ricerca | Leave a comment

Impianto Hi-Fi: quale scegliere

Date un’occhiata qui.

Posted in Hi-Fi, Musica | Tagged , , , , , | Leave a comment

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues (CRC Press / Taylor & Francis)

K13920_v3aFinally available!

 

Posted in Uncategorized | Leave a comment

The New SHIELD Architectural Framework on ERCIM News

http://ercim-news.ercim.eu/en93/ri/the-new-shield-architectural-framework

Posted in Ricerca | Leave a comment

IJCCBS included in SCOPUS

After careful evaluation, the International Journal of Critical Computer-Based Systems (IJCCBS) has been finally accepted for inclusion in SCOPUS.

Posted in Ricerca | Leave a comment

Critical Infrastructure Security book review by Michael Greenberg

Excerpts from the CIS Book Review by Michael Greenberg (*) on the Wiley journal Risk Analysis (Vol. 32, No. 8, 2012):

[…] Critical Infrastructure Security provides “the most up to date compendium of critical infrastructure” literature.

The contributors are government, private, and university experts from Europe and North America; several are Society for Risk Analysis (SRA) members.

[…] the book contains five parts and 19 chapters. “Fundamentals of Security Risk and Vulnerability Assessment” are addressed in Part I, which contains chapters about models and vulnerability assessment. Part II offers four chapters about modeling and simulation tools, including game theory and graphical simulation tools. Part III focuses on cyber security and supervisory control and data acquisition (SCADA) systems, and Part IV has five chapters about monitoring and surveillance technologies. The last four chapters, Part V, are about integrating security systems and using alarms.”

“The book is a handy reference, especially for cyber security, sensors, and several other subareas. Some of the chapters are particularly well done. My favorites were vulnerability assessment, game theory, information technology risks, intelligent video surveillance, terahertz for weapon, and explosive detection.”

If I was teaching a course about critical infrastructure […], I would then pick from among the following books, each of which has a focus on a specific area, such as cyber security, structures, and so on. Critical Infrastructure Security fits into this last set of books, with the clear advantage of presenting recent advancements […]”

(*) Dr. Michael Greenberg, Professor and Director of the National Center for Neighborhood and Brownfields Redevelopment of Rutgers University; Director of the National Center for Transportation Security Excellence, and Associate Dean of the Faculty of the Bloustein School of Planning and Public Policy, Rutgers University, New Jersey (USA). Dr. Greenberg studies urban environmental, health and neighborhood redevelopment policies.

http://userpages.umbc.edu/~earickso/Profiles/greenberg.html

Posted in Libri | Leave a comment

Formal Methods for Intelligent Transportation Systems – A track at ISOLA’12

http://ercim-news.ercim.eu/en92/jea/formal-methods-for-intelligent-transportation-systems-a-track-at-isola12

Posted in Fiere / Convegni | Tagged , | Leave a comment