Goodbye to the flat-rate TARI. Discounts for those who dispose of less waste and differentiate correctly. Here's how the new mechanism works, born over a decade ago but only now trying to take off.
Alarms via app, webcam, remote-controlled locks and artificial intelligence. But to really raise the security threshold you need attention, a little imagination and a few tricks.
Certified Electronic Mail becomes “European” also thanks to new security systems. Which close many loopholes, but unfortunately open others. Give it up? You can't. Staying safe? With a little attention it is possible.
Modern cars never break down and if anything they warn us in advance? That's only partly true. A few necessary precautions can keep us safe. Especially now, with the cold approaching
Blood pressure measurement is a crucial tool for monitoring cardiovascular health. Both home and healthcare devices, if not used correctly, can lead to inaccurate measurements, compromising any potential…
Never safe from breaches of our personal data and fraud attempts. But we can do a lot to deal with attacks. Here is an updated summary of the measures to activate the first simple precautions. And a dossier to delve deeper…
The government’s plan to bring fiber optic connections to “market failure” areas is not taking off. But technology is advancing and there is no shortage of solutions. Even for the most difficult areas. From cellular to satellite connections:…
No “recharging anxiety” of electric cars. Big savings in the city and (less) on state roads. The highway is not its strong point. And in any case it is worth choosing carefully between the three “families”: mini-hybrid, full and plug in.
Low prices and many, many offers from telephone operators to compete for the market. But there is no shortage of pitfalls. For example, "unlimited" data traffic that is not. Here's how we can choose the best contract while avoiding the pitfalls
The time to object to the inclusion of past data in the electronic health record is running out. What does this choice entail and how will it influence the Italian healthcare system?
This study arises from the desire to create a universally valid algorithm for the recognition of distorted or completely false information. The inspiration came from the observation of the dynamics of misinformation originating in chats between friends and acquaintances on WhatsApp
They attack us via email, with the well-known phishing technique. Or via SMS, with smishing. But the most insidious scam now comes from a simple phone call, thanks to the counterfeiting of the calling number. Everything suggests that on the other side there…
Sharing the energy produced and consumed within a limited community guarantees substantial economic benefits and is good for the environment. Especially if the Municipalities team up with private individuals.