Modalità di lettura

Nuova piramide alimentare made in Usa: cosa dice davvero la scienza su carne, grassi e cereali

Negli Stati Uniti è stata recentemente pubblicata una rivoluzione nelle linee guida nutrizionali federali che capovolge il tradizionale modello dietetico, ponendo le proteine e gli alimenti ricchi di nutrienti al centro dei pasti e relegando i cereali integrali “in fondo” alla vecchia piramide alimentare. E’ importante valutare criticamente i messaggi positivi e le possibili criticità di questo cambiamento.

I ‘pro’ delle nuove indicazioni

– Ridurre gli alimenti ultraprocessati è un obiettivo salutare. Molti studi scientifici concordano che un consumo elevato di alimenti ultraprocessati (ossia prodotti industriali ricchi di additivi, zuccheri e grassi poco salutari) si associa a un aumento del rischio di obesità, diabete di tipo 2 e malattie cardiovascolari. Invitare la popolazione a preferire cibi “veri”, preparati in casa, con ingredienti freschi, è un messaggio coerente con la promozione di una dieta salutare basata su alimenti minimamente lavorati.

– Valorizzare frutta, verdura e grassi “buoni”. Le linee guida mantengono il consiglio di includere 5 porzioni di frutta e verdura al giorno, insieme a grassi insaturi da olio d’oliva, avocado, frutti di mare e frutta secca. Indicazioni solide supportate da molte evidenze epidemiologiche.

– Moderazione degli zuccheri aggiunti. Ridurre lo zucchero aggiunto e le bevande zuccherate è un punto condivisibile e utile per contrastare le patologie metaboliche diffuse.

I ‘contro’ delle nuove indicazioni

– Ruolo eccessivo attribuito alla carne rossa e ai latticini interi. Posizionare in cima alla piramide alimentare bistecche, formaggi e latte intero senza distinguere chiaramente tra qualità e quantità può inviare messaggi fuorvianti. La ricerca suggerisce che un consumo elevato di carne rossa lavorata, ad esempio, è associato a un aumento del rischio di alcune malattie croniche. È fondamentale bilanciare le fonti proteiche, privilegiando anche pesce, legumi e carni bianche, e mantenere i grassi saturi sotto controllo. Chiara mano tesa nei confronti dei grandi produttori americani di carne rossa, latticini e formaggi.

– Ridimensionare i cereali integrali può non essere vantaggioso. Posizionare i cereali integrali “in fondo” è un cambiamento discutibile: cereali integrali ben scelti (come farro, avena, riso integrale) sono fonti importanti di fibre, micronutrienti e sostengono la salute intestinale e cardiometabolica. La loro marginalizzazione rischia di indebolire uno degli aspetti più solidi delle raccomandazioni nutrizionali basate sull’evidenza.

– Interpretazione dei grassi saturi e dei grassi “sani”. La nuova guida sembra promuovere grassi saturi (come il burro) a favore di alcuni oli di semi. Tuttavia, la comunità scientifica internazionale raccomanda di privilegiare grassi insaturi (olio d’oliva, frutta secca) per il benessere cardiovascolare, pur mantenendo i grassi saturi sotto una soglia moderata.

– Controversie sull’applicabilità e l’evidenza scientifica. Alcuni esperti nutrizionisti hanno sollevato dubbi sulla solidità scientifica di certe raccomandazioni, soprattutto quelle legate all’attribuzione di “peso” ai macronutrienti (proteine, grassi, carboidrati) senza un chiaro consenso internazionale. È fondamentale che le linee guida siano radicate su evidenze robuste e non su ideologie o pressioni politiche.

Le nuove linee guida americane contengono intuizioni valide, soprattutto nella lotta contro gli alimenti ultraprocessati e nel promuovere alimenti freschi e nutrienti. Tuttavia, alcune prescrizioni, come la centralità delle proteine animali e il minor ruolo attribuito ai cereali integrali, devono essere interpretate con cautela e adattate alle esigenze individuali e ai principi di una dieta equilibrata. Per chi si ispira alla dieta mediterranea, la chiave resta sempre la varietà, la qualità delle scelte alimentari e l’equilibrio tra nutrienti, piuttosto che l’adesione a modelli troppo rigidi.

L'articolo Nuova piramide alimentare made in Usa: cosa dice davvero la scienza su carne, grassi e cereali proviene da Il Fatto Quotidiano.

  •  

È Andrea Iervolino il capro espiatorio degli scandali sul tax credit cine-televisivo?

Il sistema mediale italiano sta vivendo una brutta fase: la vicenda della cessione delle maggiori testate giornalistiche del Gruppo Gedi (la Repubblica in primis) al gruppo greco Antenna della famiglia Kyriakou (nel cui capitale c’è al 30 % anche Mbc Group, il principale broadcaster del Medio Oriente) conferma quanto ormai la stampa quotidiana non sia ritenuta – da gruppi finanziari e industriali come Exor (controllato dalla famiglia Agnelli) – granché rilevante, nel nuovo ecosistema della comunicazione, ormai dominato da TikTok e piattaforme analoghe… E che dire delle nuove notizie relative all’uso ed abuso dello strumento del “tax credit” a favore del cinema e della fiction televisiva, mentre è iniziato a Montecitorio l’iter per una ipotetica nuova legge di settore?!

Grande effervescenza e grande confusione, ma al tempo stesso grande assenza di vera “politica culturale” (e mediale).

In questo scenario, emerge come emblematica la figura controversa del giovane produttore italo-canadese Andrea Iervolino, che spazia dal cinema all’editoria: ha sottoposto a Gedi una proposta di acquisto per il quotidiano La Stampa (che non interessa il gruppo greco Antenna), con un’offerta di 22,5 milioni di euro, confermando l’intenzione di entrare in modo deciso nel business della stampa, nel quale sta per affacciarsi anche attraverso un nuovo quotidiano affidato alla direzione di Rocco Casalino, il cui lancio in edicola era previsto per metà gennaio, ma slitta di qualche settimana…

Martedì 13 gennaio Andrea Iervolino ha ricevuto un’altra brutta sorpresa: il Direttore Generale del Cinema e Audiovisivo del Ministero della Cultura Giorgio Carlo Brugnoni ha firmato un decreto che esclude la Sipario Movies spa dai contributi del Mic per 5 anni (cinque), invocando la norma secondo la quale, in caso di “dichiarazioni mendaci” in sede di richiesta del credito di imposta, la società viene esclusa dai contributi pubblici per cinque anni.

Si tratta di una vicenda intricata che si trascina da quasi due anni. A fine aprile 2024 il Ministero della Cultura ha chiesto a Iervolino documenti su 38 produzioni tra il 2018 e il 2022, ed in quei mesi scoppiava una guerra interna alla società, con un furente scontro tra Iervolino e la sua allora socia Monika Bacardi nella Iervolino Lady Bacardi Entertainment (Ilbe), poi divenuta Sipario… Il 14 luglio 2025 il caso esplode: la Guardia di Finanza invia al pm romano Antonino Di Maio una informativa su Ilbe/Sipario e nelle stesse ore l’allora Direttore Generale Cinema del Mic, Nicola Borrelli, dimissionario, firma la revoca di 66 milioni di euro di “tax credit” a Sipario. E sempre lo stesso giorno la Sottosegretaria leghista Lucia Borgonzoni annunciava la mossa del Mic a mo’ di azione esemplare. Come scrivevano allora Nicola Borzi e Thomas Mackinson su il Fatto: “una tempistica che tradisce la logica politica: mostrarsi inflessibili dopo il caso di Francis Kaufmann, il killer di villa Pamphili che ha ricevuto 860mila euro di tax credit per film mai prodotti, usando Iervolino come capro espiatorio”…

A distanza di mesi, il Ministero continua a mantenere congelati i crediti di Iervolino, anche se, allo stato attuale dei fatti, sono soltanto in corso delle indagini, non esiste certo alcuna condanna, ma soltanto una contestazione dell’Agenzia delle Entrate nell’ordine di 744mila euro, ovvero una somma ben lontana da quei 66 milioni di euro della revoca integrale. Il Ministero ha invece deciso di rinnovare il blocco di tutti i crediti di Iervolino. Presunzione di innocenza? Bye bye. Certezza del diritto? Addio. Resta senza risposta anche l’interrogazione parlamentare Atto Camera A.C. n. 4/06603 di Alfredo Antoniozzi (Fratelli d’Italia).

In verità, secondo alcuni analisti Andrea Iervolino è di fatto divenuto il “capro espiatorio” dei non pochi produttori che hanno approfittato della gestione del “tax credit” non adeguatamente sottoposta a controlli: organizzando una grancassa su Iervolino, l’attenzione mediatica non è andata a verificare tante altre anomalie, a cominciare da quanto abbiano beneficiato del “tax credit” molte società di produzione controllate da multinazionali straniere, in primis la Fremantle del gruppo tedesco-lussemburghese Rtl ovvero Bertelsmann… In sostanza, il “caso Iervolino” ha consentito di alzare una cortina fumogena sulle tante magagne del credito d’imposta, sulle quali sta peraltro indagando la Procura di Roma attraverso più indagini.

La domanda che sorge spontanea è: perché soltanto Iervolino è stato “attenzionato”? E come commentare alcune notizie degli ultimi giorni: è stato il quotidiano La Verità (diretto da Maurizio Belpietro) ad aver acceso i riflettori su anomalie come gli 800mila euro di credito d’imposta concessi dal Mic per la produzione della serie tv Netflix “Io sono notizia” sul “giornalista” (pregiudicato) Fabrizio Corona? E sono stato io a porre per primo – su questo blog – il quesito se ha un senso (di politica culturale) la concessione di ben 8 milioni di euro di “tax credit” al film di Checco Zalone, “Buen Camino”.

La questione di fondo resta il deficit di un (buon) governo della “politica culturale” italiana: alle carenze di adeguati controlli amministrativi nelle procedure ministeriali, si associa la totale assenza di valutazioni di impatto (culturali e socio-economiche), che consentano di comprendere i risultati dell’intervento dello Stato… Martedì 13 in Commissione VII della Camera (presieduta da Federico Mollicone, FdI) è iniziato l’iter per una prospettata nuova legge sul cinema e l’audiovisivo: ad essere audite per prime – non a caso – le lobby grandi e piccole della produzione (Anica, Apa, Cna, Agici, Itaca…), ognuna delle quali ha implorato che lo Stato non riduca il proprio intervento.

Nessuno ha avuto il coraggio di chiedere (pretendere) analisi e studi e valutazioni… perché, se questa strumentazione tecnica venisse finalmente attivata, si andrebbero a scoprire tanti altarini e tante (altre) magagne, nella gestione di quei 700 milioni di euro di danari pubblici che lo Stato ha messo a disposizione nel 2025, pur ridotti a 610 milioni per l’anno 2026. Il problema vero non è il “quantum” dell’intervento dello Stato nel settore, ma il “come”.

L'articolo È Andrea Iervolino il capro espiatorio degli scandali sul tax credit cine-televisivo? proviene da Il Fatto Quotidiano.

  •  

Il pontificato di Prevost comincia adesso, finito il Giubileo

Il pontificato di Prevost comincia adesso. Chiusa la Porta Santa, e senza più la pletora degli appuntamenti giubilari, Leone XIV può dedicarsi ai grandi obiettivi del suo governo: il rilancio della curia nel suo ruolo di istituzione-guida di una realtà molto variegata comprendente un miliardo e quattrocento milioni di fedeli, la razionalizzazione delle riforme di papa Francesco, la ricucitura delle spaccature prodottesi durante la lunga guerra civile scatenata dagli ultraconservatori anti-Bergoglio, l’impegno a far sì che il cattolicesimo mantenga una capacità “attrattiva” (copyright Benedetto XIV) in un mondo in rapidissima trasformazione tecnologica, sociale e culturale.

Nei mesi passati Leone ha preso alcune decisioni importanti. Ha nominato a capo della commissione vaticana sugli abusi una personalità rigorosa come il vescovo Thibault Verny, già responsabile del medesimo organismo in Francia. Ha scelto come prefetto del dicastero dei Vescovi l’arcivescovo Filippo Iannone con una solida esperienza giuridica e gestionale: esprimendo la volontà di procedere con grande cura alla nomina dei futuri vescovi. Infine Prevost ha nominato suor Tiziana Merletti segretario del dicastero per i Religiosi (Istituti di vita consacrata), proseguendo la linea di Francesco: donne in funzioni apicali nella curia romana.

Non c’è dubbio che ora inizia la fase in cui Prevost comincerà gradualmente a scegliere la sua squadra ai vertici della curia. In cima ai suoi pensieri sta tuttavia l’urgenza di modellare una comunità ecclesiale capace di muoversi con convinzione e senza estreme divisioni nell’epoca attuale.

Il 6 gennaio è terminato il Giubileo, il 7 e l’8 gennaio Leone XIV ha riunito i cardinali di tutto il mondo in un concistoro straordinario, una “riunione di lavoro” che d’ora in poi avrà carattere annuale potendo anche durare tre-quattro giorni. L’iniziativa nasce da una precisa richiesta emersa durante le riunioni precedenti il conclave del maggio scorso. Proprio perché Francesco aveva ampliato in maniera considerevole il ventaglio dei paesi da cui provengono i porporati, costoro avevano domandato di partecipare di più alle scelte dei pontefici rimediando alla conduzione verticistica di Bergoglio.

La cosa notevole è che i temi scelti direttamente dai 170 cardinali presenti sono stati “Evangelizzazione e missionarietà della Chiesa” e “Sinodo e sinodalità”. In altre parole due temi fondamentali del pontificato bergogliano con un esplicito e insistito riferimento (sia da parte dei porporati sia da parte di Leone) al primo documento di indirizzo del governo di Francesco: l’esortazione apostolica Evangelii Gaudium. Mai era accaduto nei pontificati del passato che un nuovo papa ponesse in maniera così esplicita come base programmatica del suo governo un documento del predecessore. Segno che il progetto di una “Chiesa in uscita”, inclusiva, non clericale e fortemente partecipativa – quale è stato posto sul tavolo da Francesco – corrispondeva e corrisponde alle esigenze dei tempi.

Lo stesso vale per le tematiche relative a “Sinodo e sinodalità”, termini certamente ostici per l’uomo della strada ma che esprimono l’esigenza di trasformare la Chiesa cattolica da organismo centralizzato di tipo autoritario, quasi militaresco, in una comunità in cui decisioni e indirizzi e governo non vengono affidati esclusivamente a papi-monarchi e vescovi-principi ma sono frutto di un impegno comunitario a cui partecipano tutte le componenti del “popolo di Dio”: sacerdoti e religiosi, diaconi e laici, uomini e donne.

Che papa Leone imposti il suo pontificato su questo progetto, destinato a culminare nel 2028 (come auspicava Francesco) in una Assemblea ecclesiale mondiale è il segno più evidente della sconfitta in conclave delle forze conservatrici, che oggi annaspano in mancanza di valide idee-guida e di “rimproveri” da poter scagliare contro Leone, che nel suo agire rivela una forte spiritualità, un forte senso delle istituzioni, un forte desiderio di lavoro collegiale superando polarizzazioni. “Sono qui per ascoltare e per imparare a lavorare insieme”, ha detto Prevost aprendo il concistoro straordinario. Difficile quindi accusare il papa (come accadeva ai tempi di Bergoglio) di procedere “per strappi” e prendendo decisioni solitarie.

Una nuova riunione generale dei cardinali di tutto il mondo è già stata programmata per il 27-28 giugno. Probabilmente lo strumento andrà affinato. Questa volta è stato seguito il metodo degli ultimi sinodi. Venti tavoli a cui erano seduti i porporati (11 tavoli di cardinali non elettori, 9 tavoli di cardinali elettori). Tre minuti concessi ad ognuno per un intervento iniziale e altri tre minuti per un intervento di ritorno. Un’ottima maniera per conoscersi e per esprimersi tutti quanti, un metodo valido per setacciare i problemi ed arrivare ad una prima cernita, ma che non può sostituire la dinamica assembleare. La parola Chiesa viene dal greco “ekklesia”, l’assemblea, e sinodi e i grandi concili – a partire da quello di Nicea – sono stati il frutto di un dibattito, anche rovente, di fronte alla platea riunita dei votanti.

E’ una prima critica emersa nel mondo cattolico. Insieme alla richiesta che i documenti dei gruppi di lavoro siano resi pubblici. “Sinodo” è un’altra parola greca, significa camminare insieme e sempre più nel laicato cattolico è diffusa la richiesta di “conoscere insieme” ciò di cui si discute agli alti livelli.

L'articolo Il pontificato di Prevost comincia adesso, finito il Giubileo proviene da Il Fatto Quotidiano.

  •  

Deglobalizzazione? No, è solo una riorganizzazione: ecco come cambiano le catene produttive

Negli ultimi anni la parola deglobalizzazione è diventata una scorciatoia narrativa tanto comoda quanto pericolosa: l’idea che il mondo stia tornando indietro verso economie chiuse e catene produttive domestiche. Ma, a guardare bene, questa lettura è fuorviante: non stiamo assistendo alla fine della globalizzazione, bensì a una sua ricomposizione, ossia un riassetto delle interdipendenze, guidato soprattutto dalla distribuzione globalizzata delle catene del valore (Global Value Chains, GVC) e dall’impossibilità economica, tecnica e politica di riportarle principalmente dentro i confini nazionali.

Se la deglobalizzazione fosse un processo reale e strutturale, vedremmo almeno tre segnali robusti e persistenti: contrazione durevole del commercio internazionale, non solo rallentamenti ciclici; ritiro stabile degli investimenti transfrontalieri in attività produttive (non solo riallocazioni); accorciamento generalizzato delle filiere, con sostituzione domestica degli input e riduzione delle reti fornitrici.

Certo, è ancora presto per questo, ma intanto i dati e le analisi convenzionali più recenti raccontano altro: il commercio globale mostra capacità di resistenza e di adattamento rispetto ai terremoti politici in atto. Questo non significa che le multinazionali e i relativi investimenti non stiano subendo conseguenze, ma la reazione non è la “chiusura”, ovvero il “ritiro”, bensì una riorganizzazione e diversificazione delle filiere su larga scala.

L’Unctad descrive il 2024 come un anno di espansione record del commercio mondiale, trainato dai servizi. Riguardo agli Investimenti Diretti Esteri, sebbene l’Unctad sempre nello stesso anno ne segnali un calo, questo non indica un “ritorno all’autarchia” quanto una riorganizzazione e ricomposizione per aree e settori, con divergenze regionali.

In altri termini, le imprese e gli Stati non stanno abbandonando le filiere internazionali ma cercano di ridurre rischi (concentrazione, dipendenze critiche, vulnerabilità geopolitiche) reindirizzando flussi e investimenti verso paesi “affini” o più vicini.

Basti pensare che le catene produttive moderne sono il frutto di decenni di specializzazione, standardizzazione, logistica avanzata e divisione internazionale del lavoro. In moltissimi settori gli input critici sono prodotti in pochi paesi, la manifattura è modulare e distribuita, la progettazione, il software e la proprietà intellettuale viaggiano separati dall’assemblaggio, il valore è “scomposto” tra più giurisdizioni e società (con effetti anche fiscali e regolatori). Ragione per cui dati ancor più recenti, in particolare quelli relativi al primo semestre del 2025, mostrano non solo diversi segni negativi sugli Investimenti Diretti Esteri ma anche andamenti contrastanti che non consentono di trarre delle conclusioni più o meno significative per un fenomeno nel pieno della sua manifestazione, spinto anche dalle trasformazioni indotte dalla nuova industria tecnologica dell’IA.

Ciascuna potenza mondiale sta giocando le proprie carte, mosse e contromosse sono in corso di evoluzione e la riallocazione del capitale privato dipende e dipenderà principalmente da questo.

Ciò che deve preoccupare è che tanto maggiore è l’eterogeneità degli interventi dei governi, tanto maggiore è il rischio che un riassetto delle catene di produzione globale produca crisi sistemiche, paradossalmente non soltanto nei paesi meno “accomodanti”.

Le scelte dei governi saranno probabilmente, o meglio necessariamente, sempre più polarizzate. Da un lato verso un maggiore controllo pubblico dell’economia e un ridimensionamento del potere del capitale straniero come sta accadendo in Cina, basti pensare alla riforma del 2020 sul controllo delle holding nei settori strategici pur mantenendo l’apertura agli investimenti esteri. Il governo Usa sta invece seguendo la direzione di un allentamento dei vincoli regolatori sull’economia interna, mentre riguardo al commercio estero tenta di favorire gli interessi statunitensi non interferendo direttamente sulla proprietà privata ma con leve strategiche “esterne” come i dazi.

Questa polarizzazione sta mettendo a dura prova la governance politica europea. Negli ultimi anni i burocrati di Bruxelles hanno lavorato – si potrebbe dire ossessivamente – per portare a regime un sistema di regole molto dettagliato sul funzionamento e sul controllo delle grandi aziende, con la previsione di sistemi di monitoraggio dall’enorme valore politico. A ciò si aggiungano le regole sull’IA, che non piacciono per nulla agli Usa, oppure quelle sul lavoro nelle piattaforme tecnologiche, stavolta in un’ottica di maggiore tutela per i lavoratori.

In pratica, rispetto alle polarizzazioni in atto, l’Ue si trova a dovere fare i conti con un faticoso equilibrismo, che ancor prima di essere regolatorio è ideologico: se si vuol istituire un sistema di controllo pubblico sui movimenti di capitale e una maggiore difesa del lavoro, significa ammettere che l’approccio neoliberista seguito sino a ora sia stato fallimentare.

Ci sono tutti i presupposti per una tempesta perfetta, insomma.

Senza uno studio rigoroso sul reale funzionamento delle catene di produzione globale, ovvero delle multinazionali, il riassetto in corso della globalizzazione rischia di tradursi in una crisi sociale e politica profonda, perché i nuovi equilibri verranno decisi dalle filiere e dalle strategie societarie orientate a difendere i propri profitti, non dalle istituzioni.

Credo che il mio studio sulle multinazionali possa essere decisivo per leggere questo riassetto: gli indicatori oggi utilizzati—produttività, valore aggiunto, profitti, flussi commerciali—non colgono il funzionamento reale delle catene infragruppo e delle filiere globali, e senza nuovi indicatori capaci di misurare dove si formano davvero ricchezza e rischio, continueremo a scambiare per “crescita” ciò che può invece portare a una crisi.

L'articolo Deglobalizzazione? No, è solo una riorganizzazione: ecco come cambiano le catene produttive proviene da Il Fatto Quotidiano.

  •  

Il riarmo per l’Italia equivale a prepararsi ad una guerra sociale

di Francesca Carone*

Dopo il conflitto tra Russia e Ucraina e il sangue sparso su Gaza, ora l’America attacca il Venezuela. E il cerchio (forse) si chiude.
Nella narrazione corrente ci sono aggressori e aggrediti. In quella filosofico-religiosa di matrice cristiana ci sono buoni e cattivi, potenti e deboli che prosperano o soccombono (a seconda del lignaggio, della ricchezza, del ruolo sociale o semplicemente di pura fortuna) nelle democrazie e nelle moderne dittature e “democrature”.

Si dice tutto e il contrario di tutto. Putin e Zelensky sono i due attori bellici “interscambiabili”: nel gergo metaforico più elementare, sono “double face”: aggressori (russi) per alcuni, aggrediti (ucraini) per altri e viceversa, a seconda della narrazione filorussa o filoucraina. Poi ci sono alcune autorevoli voci che, attraverso fondate e incontrovertibili argomentazioni storiche, hanno osato illustrare le radici del conflitto russo-ucraino e l’affossamento dei negoziati, misteriosamente delegittimati ancora prima di nascere.

La democratura russa di Putin rimane tale nel panorama politico mondiale. Le mosse belliche dello zar sull’Ucraina sono tuttavia il risultato di azioni pregresse di natura storico-territoriale in cui è coinvolta anche l’Ucraina. A fronte della guerra intestina russo-ucraina, costellata da azioni di forza da entrambe le parti, l’unica soluzione rimanevano i cosiddetti negoziati per scongiurare una guerra che da diversi anni continua a mietere un numero altissimo di vittime innocenti.

Se nella narrazione cosiddetta filorussa la parola chiave è negoziato, nella narrazione filo-ucraina la parola chiave è riarmo: protagonista di questa propaganda bellico/difensiva il famoso slogan sdoganato dall’Europa (della Von der Leyen, della Kallas e di Mertz ): “Se l’Europa vuole evitare la guerra, deve prepararsi alla guerra”.

Ma prepararsi ad una guerra da scongiurare anche in un lontanissimo “Futuro”, per molte nazioni come l’Italia, significa prepararsi ad una guerra sociale in cui si riapre in modo inesorabile la forbice delle disuguaglianze, della povertà, del malessere e di una pericolosa instabilità generazionale collettiva che declina sempre più verso il disinteresse politico, verso la non partecipazione e quindi verso la perdita della “libertà”, come affermava Giorgio Gaber nel suo celebre brano, “Libertà è partecipazione”.

In Italia il numero di persone in povertà si è portato a livelli record. L’Italia, così come la Grecia, è l’unico Paese ad avere un segno rosso rispetto alla crescita degli stipendi; il reddito reale delle famiglie risulta in calo rispetto a vent’anni fa, con un impatto diretto sul potere d’acquisto. Nel 2024, quasi un italiano su 10 ha rinunciato a cure necessarie. Nel “Rapporto annuale 2025” dell’Istat, è il dato più alto degli ultimi anni: si passa infatti dal 6,3% nel 2019 al 9,9% di oggi con un balzo di oltre due punti nell’ultimo anno. Le cause sono le liste d’attesa lunghe e costi proibitivi, che colpiscono in modo diseguale a seconda del reddito, del territorio e del genere.

I dati relativi alla disoccupazione sono ancora fiacchi, soprattutto per il Mezzogiorno. Accanto alla disoccupazione cresce un fenomeno sempre più diffuso: “il lavoro povero”: secondo i dati dell’Istat del 2023, esiste “un’elevata percentuale di lavoratori che, nonostante siano occupati, rischiano di cadere in povertà a causa di retribuzioni orarie troppo basse, o perché svolgono lavori precari o a tempo parziale”. Sono i cosiddetti working poor: la Caritas conferma che a chiedere aiuto è “quasi un beneficiario su quattro” appartenente alla categoria del “lavoro povero”. A decretarne la diffusione è la stagnazione dei salari.

Il cosiddetto riarmo progettato e attuato dall’Europa e il corposo supporto economico elargito all’Ucraina dall’Italia definiscono le nuove priorità del nostro Paese. L’Italia, una nazione a vocazione democratica che sostiene l’uguaglianza e la partecipazione. E celebra il lavoro nel primo articolo della Costituzione può e deve restituire dignità, libertà e voce a tutti coloro che la stessa Costituzione difende e tutela nei sui articoli.

*Insegnante

L'articolo Il riarmo per l’Italia equivale a prepararsi ad una guerra sociale proviene da Il Fatto Quotidiano.

  •  

L’autorità della resistenza comincia sempre dai no: la lezione su gloria e potere dal Vangelo secondo Matteo

Nel Vangelo secondo Matteo si racconta una delle tentazioni alla quale sarebbe stato sottoposto Cristo. Di nuovo il diavolo lo condusse con sé sopra un monte altissimo e gli mostrò tutti i regni del mondo con la loro gloria e gli disse: “Tutte queste cose io ti darò, se, prostrandoti, mi adorerai”. I regni del mondo con la loro gloria. Il potere e la gloria non è solo il titolo del noto e straordinario romanzo dello scrittore inglese Graham Greene ma anche la cifra della storia umana contemporanea. Il potere del popolo per il popolo e con il popolo sono momenti particolari, squarci, feritoie di un mondo che passa in fretta di moda. Persino papa Leone, tutt’altro che scevro di potere, ha recentemente ricordato agli ambasciatori riuniti in Vaticano che anche “la guerra è tornata di moda e un fervore bellico sta dilagando”. Tutto gira attorno a due elementi citati, il potere e la gloria.

Se prostrandoti mi adorerai, afferma perentoriamente il diavolo, simbolo della divisione e della menzogna. Il potere adora la gloria e la gloria il potere. Uno cammina con l’altro da buoni compagni di destino o meglio di strategia. Proporre questo abbinamento è interpretato dal Vangelo come ‘demoniaco’ e cioè potenzialmente menzognero e divisivo. Sappiamo per esperienza personale e storica quanto il potere in realtà possieda chi l’esercita. Coloro che vivono nel e del potere e la gloria sono dei ‘posseduti’. Capiamo anche perché, nella gestione politica del potere, da ogni parte e con modalità differenti, si è sempre cercato di limitare o ‘controllare’ il potere. Non è vero che il potere logora solo chi non ce l’ha, come disse un noto politico. Il potere sempre corrompe e quello senza argini corrompe ‘assolutamente’. Sarebbe sufficiente pensare alle dittature, civili o militari.

Ciò succede perché si opera una scissione tra chi ha l’autorità, intesa come autorevolezza, legittimità e capacità di far crescere e migliorare gli altri e potere, definito come capacità di determinare la condotta di altri e ottenerne l’obbedienza. Lo slittamento o tentazione di tradurlo in dominazione di matrice necrofila appare fin troppo evidente e di fatto conseguente.

Se prostrandoti mi adorerai, afferma il divisore e menzognero simbolo del potere. Il potere è infatti tentato di prostrarsi ai demoni della gloria, dell’effimero impero del denaro o del successo di cui i cimiteri sono perenne testimonianza. Quando l’autorità si istituzionalizza diventa a sua volta espressione del potere. Lo stato, le religioni, l’amministrazione pubblica, i partiti, i sindacati, la scuola e financo la famiglia possono trasformarsi in potere e dunque attuare come mero strumento per dominare i ‘sudditi’.

Dal Vangelo citato conosciamo pure la risposta al tentatore. Dai segni del potere al potere dei segni. Solo Dio adorerai, risponde Cristo secondo la spiritualità biblica. Ciò significa ed esprime la scelta di non piegare le ginocchia davanti a nessun altro che non sia l’origine e la fonte della vita. Solo l’appartenenza alla gratuità radicale del trascendente assicura e libera da ogni sottomissione al potere della gloria. Non casualmente il Cristo dei vangeli non si è piegato dinnanzi a nessuna forma di potere, sociale, economico, politico e religioso. Erano infatti un tutt’uno con l’impero romano dominante. Etienne de La Boétie avrebbe forse evitato di scrivere il suo ‘Discorso sulla servitù volontaria’.

Possono prosperare tiranni, dittatori e furfanti resi ebbri dall’arroganza del potere solo perché c’è gente che piega le ginocchia davanti alla loro finta gloria. L’autorità della resistenza incomincia sempre dai no.

L'articolo L’autorità della resistenza comincia sempre dai no: la lezione su gloria e potere dal Vangelo secondo Matteo proviene da Il Fatto Quotidiano.

  •  

Chi era Marianne Weber, madre negletta della sociologia

Riletto oggi, "La Donna e la Cultura" non perde nulla in termini di attualità. Sostiene l’opportunità di una revisione fondativa del canone sociologico, che vada oltre l’incorporazione delle pensatrici di fine '800 come tessere di un mosaico che nei contenuti principali resta inalterato

  •  

Per Eglantyne Jebb e tutte le donne che sono scese in piazza nell'ultimo secolo

Ai primi del Novecento, la fondatrice di Save the Children ha reclamato uno spazio di azione pubblica, rivoluzionando il concetto di “prendersi cura” dell’infanzia. Non più atto caritatevole, ma investimento per creare società giuste, democratiche e sostenibili
  •  

L’importanza della prevenzione nelle malattie cardiovascolari

A giocare un ruolo fondamentale sono tutti quei fattori su cui è possibile intervenire. Un corretto stile di vita, un’alimentazione sana, un’adeguata attività fisica sono tutti insegnamenti che ci vengono dati sin dalla nascita, ma che possono davvero far la differenza e ridurre il rischio cardiovascolare
  •  

Welcoming PyTorch to the Linux Foundation

Today we are more than thrilled to welcome PyTorch to the Linux Foundation. Honestly, it’s hard to capture how big a deal this is for us in a single post but I’ll try. 

TL;DR — PyTorch is one of the most important and successful machine learning software projects in the world today. We are excited to work with the project maintainers, contributors and community to transition PyTorch to a neutral home where it can continue to enjoy strong growth and rapid innovation. We are grateful to the team at Meta, where PyTorch was incubated and grew into a massive ecosystem, for trusting the Linux Foundation with this crucial effort. The journey will be epic.

The AI Imperative, Open Source and PyTorch

Artificial Intelligence, Machine Learning, and Deep Learning are critical to present and future technology innovation. Growth around AI and ML communities and the code they generate has been nothing short of extraordinary. AI/ML is also a truly “open source-first” ecosystem. The majority of popular AI and ML tools and frameworks are open source. The community clearly values transparency and the ethos of open source. Open source communities are playing and will play a leading role in development of the tools and solutions that make AI and ML possible — and make it better over time. 

For all of the above reasons, the Linux Foundation understands that fostering open source in AI and ML is a key priority. The Linux Foundation already hosts and works with many projects that are either contributing directly to foundational AI/ML projects (LF AI & Data) or contributing to their use cases and integrating with their platforms. (e.g., LF Networking, AGL, Delta Lake, RISC-V, CNCF, Hyperledger). 

PyTorch extends and builds on these efforts. Obviously, PyTorch is one of the most important foundational platforms for development, testing and deployment of AI/ML and Deep Learning applications. If you need to build something in AI, if you need a library or a module, chances are there is something in PyTorch for that. If you peel back the cover of any AI application, there is a strong chance PyTorch is involved in some way. From improving the accuracy of disease diagnosis and heart attacks, to machine learning frameworks for self-driving cars, to image quality assessment tools for astronomers, PyTorch is there.

Originally incubated by Meta’s AI team, PyTorch has grown to include a massive community of contributors and users under their community-focused stewardship. The genius of PyTorch (and a credit to its maintainers) is that it is truly a foundational platform for so much AI/ML today, a real Swiss Army Knife. Just as developers built so much of the technology we know today atop Linux, the AI/ML community is building atop PyTorch – further enabling emerging technologies and evolving user needs. As of August 2022, PyTorch was one of the five-fastest growing open source software communities in the world alongside the Linux kernel and Kubernetes. From August 2021 through August 2022, PyTorch counted over 65,000 commits. Over 2,400 contributors participated in the effort, filing issues or PRs or writing documentation. These numbers place PyTorch among the most successful open source projects in history.  

Neutrality as a Catalyst

Projects like PyTorch that have the potential to become a foundational platform for critical technology benefit from a neutral home. Neutrality and true community ownership are what has enabled Linux and Kubernetes to defy expectations by continuing to accelerate and grow faster even as they become more mature. Users, maintainers and the community begin to see them as part of a commons that they can rely on and trust, in perpetuity. By creating a neutral home, the PyTorch Foundation, we are collectively locking in a future of transparency, communal governance, and unprecedented scale for all.

As part of the Linux Foundation, PyTorch and its community will benefit from our many programs and support communities like training and certification programs (we already have one in the works), to community research (like our Project Journey Reports) and, of course, community events. Working inside and alongside the Linux Foundation, the PyTorch community also has access to our LFX collaboration portal, enabling mentorships and helping the PyTorch community identify future leaders, find potential hires, and observe shared community dynamics. 

PyTorch has gotten to its current state through sound maintainership and open source community management. We’re not going to change any of the good things about PyTorch. In fact, we can’t wait to learn from Meta and the PyTorch community to improve the experiences and outcomes of other projects in the Foundation. For those wanting more insight about our plans for the PyTorch Foundation, I invite you to join Soumith Chintala (co-creator of PyTorch) and Dr. Ibrahim Haddad (Executive Director of the PyTorch Foundation) for a live discussion on Thursday entitled, PyTorch: A Foundation for Open Source AI/ML.

We are grateful for Meta’s trust in “passing us the torch” (pun intended). Together with the community, we can build something (even more) insanely great and add to the global heritage of invaluable technology that underpins the present and the future of our lives. Welcome, PyTorch! We can’t wait to get started!

The post Welcoming PyTorch to the Linux Foundation appeared first on Linux Foundation.

  •  

35 Podcasts Recommended by People You Can Trust

recommended podcasts from people you trust

Because of my position as Executive Producer and host of The Untold Stories of Open Source, I frequently get asked, “What podcasts do you listen to when you’re not producing your own.” Interesting question. However, my personal preference, This American Life, is more about how they create their shows, how they use sound and music to supplement the narration, and just in general, how Ira Glass does what he does. Only podcast geeks would be interested in that, so I reached out to my friends in the tech industry to ask them what THEY listen to.

The most surprising thing I learned was people professing to not listen to podcasts. “I don’t listen to podcasts, but if I had to choose one…”, kept popping up. The second thing was people in the industry need a break and use podcasts to escape from the mayhem of their day. I like the way Jennifer says it best, “Since much of my role is getting developers on board with security actions, I gravitate toward more psychology based podcasts – Adam Grant’s is amazing (it’s called WorkLife).”

Now that I think of it, same here. This American Life. Revisionist History. Radio Lab. The Moth. You get the picture. Escaping from the mayhem of the day.

Without further digression, here are the podcasts recommended by the people I trust, no particular order. No favoritism.

The Haunted Hacker

The Haunted Hacker

Hosted by Mike Jones and Mike LeBlanc

Mike Jones and Mike LeBlanc built the H4unt3d Hacker podcast and group from a really grass roots point of view. The idea was spawned over a glass of bourbon on the top of a mountain. The group consists of members from around the globe and from various walks of life, religions, backgrounds and is all inclusive. They pride themselves in giving back and helping people understand the cybersecurity industry and navigate through the various challenges one faces when they decide cybersecurity is where they belong.

“I think he strikes a great balance between newbie/expert, current events and all purpose security and it has a nice vibe” – Alan Shimel, CEO, Founder, TechStrong Group

Risky Biz Security Podcast

Risky Biz Security Podcast

Hosted by Patrick Gray

Published weekly, the Risky Business podcast features news and in-depth commentary from security industry luminaries. Hosted by award-winning journalist Patrick Gray, Risky Business has become a must-listen digest for information security professionals. We are also known to publish blog posts from time to time.

“My single listen-every-week-when-it-comes out is not that revolutionary: the classic Risky Biz security podcast. As a defender, I learn from the offense perspective, and they also aren’t shy about touching on the policy side.” – Allan Friedman, Cybersecurity and Infrastructure Security Agency

Security Weekly Podcast

Application Security Weekly

Hosted by Mike Shema, Matt Alderman, and John Kinsella

If you’re looking to understand DevOps, application security, or cloud security, then Application Security Weekly is your show! Mike, Matt, and John decrypt application development  – exploring how to inject security into the organization’s Software Development Lifecycle (SDLC); learn the tools, techniques, and processes necessary to move at the speed of DevOps, and cover the latest application security news.

“Easily my favorite hosts and content. Professional production, big personality host, and deeply technical co-host. Combined with great topics and guests.” – Larry Maccherone, Dev[Sec]Ops Transformation Architect, Contrast Security

Azure DevOps Podcast

Hosted by Jeffrey Palermo

The Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well.

“I am pretty focused on Microsoft Azure these days so on my list is Azure DevOps” – Bob Aiello CM Best Practices Founder, CTO, and Principal Consultant

Chaos Community Broadcast

Chaos Community Broadcast

Hosted by Community of Chaos Engineering Practitioners

We are a community of chaos engineering practitioners. Chaos Engineering is the discipline of experimenting on a system in order to build confidence in the system’s capability to withstand turbulent conditions in production.

“This is so good, it’s hardly even fair to compare it to other podcasts!” – Casey Rosenthal, CEO, Co-founder, Verica

Daily Beans Podcast

The Daily Beans. News. With Swearing

Hosted by Allison Gill (A.G.)

The Daily Beans is a women-owned and operated progressive news podcast for your morning commute brought to you by the webby award-winning hosts of Mueller, She Wrote. Get your social justice and political news with just the right amount of snark.

The Daily Beans covers political news without hype. The host is a lawyer and restricts her coverage to what can actually happen while other outlets are hyping every possibility under the sun including possibilities that get good ratings but will never happen. She mostly covers the former president’s criminal cases.” – Tom Limoncelli, Manager, Stack Overflow

Software Engineering Radio

Software Engineering Radio

Hosted by Community of Various Contributors

Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. Now a weekly show, we talk to experts from throughout the software engineering world about the full range of topics that matter to professional developers. All SE Radio episodes feature original content; we don’t record conferences or talks given in other venues.

The one that I love to keep tabs on is called Software Engineering Radio, published by the IEEE computer society. It is absolutely a haberdashery of new ideas, processes, lessons learned. It also ranges from very practical action oriented advice the whole way over to philosophical discussions that are necessary for us to drive innovation forward. Professionals from all different domains contribute. It’s not a platform for sales and marketing pitches!” – Tracy Bannon, Senior Principal/ Software Architect & DevOps Advisor, MITRE

Cybrary Podcast

Cybrary Podcast

Hosted by Various Contributors

Join thousands of other listeners to hear from the current leaders, experts, vendors, and instructors in the IT and Cybersecurity fields regarding DevSecOps, InfoSec, Ransomware attacks, the diversity and the retention of talent, and more. Gain the confidence, consistency, and courage to succees at work and in life.

Relaxed chat, full of good info, and they got right to the point. Would recommend.” – Wendy Nather, Head of Advisory CISOs, CISCO

Open Source Underdogs Podcast

Open Source Underdogs

Hosted by Michael Schwartz

Open Source Underdogs is the podcast for entrepreneurs about open source software. In each episode, we chat with a founder or leader to explore how they are building thriving businesses around open source software. Our goal is to demystify how entrepreneurs can stay true to their open source objectives while also building sustainable, profitable businesses that fuel innovation and ensure longevity.

Mike Schwartz’s podcast is my favourite. Really good insights from founders.” – Amanda Brock, CEO, OpenUK

Ten Percent Happier

Hosted by Dan Harris

Ten Percent Happier publishes a variety of podcasts that offer relatable wisdom designed to help you meet the challenges and opportunities in your daily life.

I listen to Ten Percent Happier as my go-to podcast. It helps me with mindfulness practice, provides a perspective on real-life situations, and makes me a kinder person. That is one of the most important traits we all need these days.” – Arun Gupta, Vice President and General Manager for Open Ecosystem, Intel

Making Sense Podcast

Making Sense

Hosted by Sam Harris

Sam Harris is the author of five New York Times best sellers. His books include The End of Faith, Letter to a Christian Nation, The Moral Landscape, Free Will, Lying, Waking Up, and Islam and the Future of Tolerance (with Maajid Nawaz). The End of Faith won the 2005 PEN Award for Nonfiction. His writing and public lectures cover a wide range of topics—neuroscience, moral philosophy, religion, meditation practice, human violence, rationality—but generally focus on how a growing understanding of ourselves and the world is changing our sense of how we should live.

Sam dives deep on topics rooted in our culture, business, and minds. The conversations are very approachable and rational. With some episodes reaching an hour or more, Sam gives topics enough space to cover the necessary angles.” – Derek Weeks, CMO, The Linux Foundation

Darknet Diaries

Darknet Diaries

Hosted by Jack Rhysider

Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences.

This is a podcast about hackers, breaches, shadow government activity, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network.

Darknet Diaries would be my recommendation. Provided insights into the world of hacking, data breaches and cyber crime. And Jack Rhysider is a good storyteller ” – Edwin Kwan, Head of Application Security and Advisory, Tyro Payments

Under the Skin

Under the Skin

Hosted by Russel Brand

Under the Skin asks: what’s beneath the surface – of the people we admire, of the ideas that define our times, of the history we are told. Speaking with guests from the world of academia, popular culture and the arts, they’ll teach us to see the ulterior truth behind or constructed reality. And have a laugh.

“He interviews influential people from all different backgrounds and covers everything from academia to tech to culture to spiritual issues” – Ashleigh Auld, Global Director Partner Marketing, Linnwood

Cyberwire Daily

Hosted by Dave Bittner

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

“I’d recommend the CyberWire daily podcast has got most relevant InfoSec news items and stories industry pros care about. XX” – Ax Sharma, Security Researcher, Tech Reporter, Sonatype

7 Minute Security Podcast

Hosted by Brian Johnson

7 Minute Security is a weekly audio podcast (once in a while with video!) released on Wednesdays and covering topics such Penetration testing, Blue teaming, and Building a career in security.

In 2013 I took on a new adventure to focus 100% on information security. There’s a ton to learn, so I wanted to write it all down in a blog format and share with others. However, I’m a family man too, and didn’t want this project to offset the work/family balance.

So I thought a podcast might fill in the gaps for stuff I can’t – or don’t have time to – write out in full form. I always loved the idea of a podcast, but the good ones are usually in a longer format, and I knew I didn’t have time for that either. I was inspired by the format of the 10 Minute Podcast and figured if it can work for comedy, maybe it can work for information security!

Thus, the 7 Minute Security blog and its child podcast was born.

7 Minute Security Podcast – because Brian makes the best jingles!” – Björn Kimminich, Product Group Lead Architecture Governance, Kuehne + Nagel (AG & Co.) KG

Continuous Delivery

Continuous Delivery

Hosted by Dave Farley

Explores ideas that help to produce Better Software Faster: Continuous Delivery, DevOps, TDD and Software Engineering.

Hosted by Dave Farley – a software developer who has done pioneering work in DevOps, CD, CI, BDD, TDD and Software Engineering. Dave has challenged conventional thinking and led teams to build world class software.

Dave is co-author of the award wining book – “Continuous Delivery”, and a popular conference speaker on Software Engineering. He built one of the world’s fastest financial exchanges, is a pioneer of BDD, an author of the Reactive Manifesto, and winner of the Duke award for open source software – the LMAX Disruptor.

Dave Farley’s videos are a treasure trove of knowledge that took me and others years to uncover when we were starting out. His focus on engineering and business outcomes rather than processes and frameworks is a breath of fresh air. If you only have time for one source of information, use his.Bryan Finster, Value Stream Architect, Defense Unicorns

The Prof G Show

The Prof G Show

Hosted by Scott Galloway

A fast and fluid weekly thirty minute show where Scott tears into the taxonomy of the tech business with unfiltered, data-driven insights, bold predictions, and thoughtful advice.

Very current very modern. Business and tech oriented. Talks about markets and economics and people and tech.” – Caroline Wong, Chief Strategy Officer, Cobalt

Open Source Security Podcast

Open Source Security Podcast

Hosted by Josh Bressers and Kurt Seifried

Open Source Security is a collaboration by Josh Bressers and Kurt Seifried. We publish the Open Source Security Podcast and the Open Source Security Blog.

We have a security tabletop game that Josh created some time ago. Rather than play a boring security tabletop exercise, what if had things like dice and fun? Take a look at the Dungeons and Data tabletop game

It has been something I’ve been listening to a lot lately with all of the focus on Software Supply Chain Security and Open Source Security. The hosts have very deep software and security backgrounds but keep the show light-hearted and engaging as well. ” – Chris Hughes, CISO, Co-Founder Aquia Inc

Pivot Podcast

Pivot

Hosted by Kara Swisher and Professor Scott Galloway

Every Tuesday and Friday, tech journalist Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. After all, with great power comes great scrutiny. From New York Magazine and the Vox Media Podcast Network.

As a rule, I don’t listen to tech podcasts much at all, since I write about tech almost all day. I check out podcasts about theater or culture — about as far away from my day job as I can get. However, I follow a ‘man-about-town’ guy named George Hahn on social media, who’s a lot of fun. Last year, he mentioned he’d be a guest host of the ‘Pivot’ podcast with Kara Swisher and Scott Galloway, so I checked out Pivot. It’s about tech but it’s also about culture, politics, business, you name it. So that’s become the podcast I dip into when I want to hear a bit about tech, but in a cocktail-party/talk show kind of way.” – Christine Kent, Communications Strategist, Christine Kent Communications

The Idealcast

The Idealcast

Hosted by Gene Kim

Conversations with experts about the important ideas changing how organizations compete and win. In The Idealcast, multiple award-winning CTO, researcher and bestselling author Gene Kim hosts technology and business leaders to explore the dangerous, shifting digital landscape. Listeners will hear insights and gain solutions to help their enterprises thrive in an evolving business world.

“I like this because it has a good balance of technical and culture/leadership content.” – Courtney Kissler, CTO, Zulily

Trustedsec Security Podcast

TrustedSec Security Podcast

Hosted by Dave Kennedy and Various Team Contributors

Our team records a regular podcast covering the latest security news and stories in an entertaining and informational discussion. Hear what our experts are thinking and talking about.

I LOVE LOVE LOVE the TrustedSec Security Podcast. Dave Kennedy’s team puts on a very nice and often deeply technical conversation every two weeks. The talk about timely topics from today’s headlines as well as jumping into purple team hackery which is a real treat to listen in and learn from.” – CRob Robinson, Director of Security Communications Intel Product Assurance and Security, Intel

Profound Podcast

Profound Podcast

Hosted by John Willis

Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming’s seminal work described in his New Economics book – System of Profound Knowledge ( SoPK ). We’ll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming’s ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and DevOps).

I don’t listen to podcasts much these days (found that consuming books via audible was more useful… but I guess it all depends on how emerging the topics are you are interested in). I only mention this as I am thin I recommendations. I’d go with John Willis’s Profound or Gene Kim’s Idealcast. Some overlap in (world class) guests but different interview approaches and perspectives.” – Damon Edwards, Sr. Director, Product PagerDuty

Security Now Podcast

Security Now

Hosted by Steve Gibson and Leo Laporte

Stay up-to-date and deepen your cybersecurity acumen with Security Now. On this long-running podcast, cybersecurity authority Steve Gibson and technology expert Leo Laporte bring their extensive and historical knowledge to explore digital security topics in depth. Each week, they take complex issues and break them down for clarity and big-picture understanding. And they do it all in an approachable, conversational style infused with their unique sense of humor. Listen and subscribe, and stay on top of the constantly changing world of Internet security. Security Now records every Tuesday afternoon and hits your podcatcher later that evening.

“The shows cover a wide range of security topics, from the basics of technologies such as DNSSec & Bitcoin, to in depth, tech analysis of the latest hacks hitting the news, The main host, Steve Gibson, is great at breaking down tech subjects over an audio . It’s running at over 800 episodes now, regular as clockwork every week, so you can rely on it. Funnily Steve Gibson has often reminded me of you – able to assess what’s going on with a subject, calmly find the important points, and describe them to the rest of us in way that’s engaging and relatable.medium – in a way you can follow and be interested in during your commute or flight.” – Gary Robinson, Chief Security Officer, Ulseka

The Jordan Harbinger Show Podcast

The Jordan Harbinger Show

Hosted by Jordan Harbinger

Today, The Jordan Harbinger Show has over 15 million downloads per month and features a wide array of guests like Kobe Bryant, Moby, Dennis Rodman, Tip “T.I.” Harris, Tony Hawk, Cesar Millan, Simon Sinek, Eric Schmidt, and Neil deGrasse Tyson, to name a few. Jordan continues to teach his skills, for free, at 6-Minute Networking. In addition to hosting The Jordan Harbinger Show, Jordan is a consultant for law enforcement, military, and security companies and is a member of the New York State Bar Association and the Northern California Chapter of the Society of Professional Journalists.

Excellent podcasts where he interviews people from literally every walk of life, how they have become successful, why they have failed (if they have) as well as great personal development coaching ideas.” – Jeff DeVerter, CTO, Products and Services, RackSpace

WorkLife Podcast

WorkLife with Adam Grant

Hosted by Adam Grant

Adam hosts WorkLife, a chart-topping TED original podcast. His TED talks on languishing, original thinkers, and givers and takers have been viewed more than 30 million times. His speaking and consulting clients include Google, the NBA, Bridgewater, and the Gates Foundation. He writes on work and psychology for the New York Times, has served on the Defense Innovation Board at the Pentagon, has been honored as a Young Global Leader by the World Economic Forum, and has appeared on Billions.

I don’t listen to many technical podcasts. I like Caroline Wongs and have listened to it a number of times (Humans of InfoSec) but since much of my role is getting developers on board with security actions, I gravitate toward more psychology based podcasts – Adam Grant’s is amazing (it’s called WorkLife).” – Jennifer Czaplewski, Senior Director, Cyber Security, Target

You know lately I have been listening to WorkLife with Adam Grant. Not a tech podcast but a management one.” – Paula Thrasher, Senior Director Infrastructure, PagerDuty

SRE Podcast

SRE Prodcast

Hosted by Core Team Members:  Betsy Beyer, MP English, Salim Virji, Viv

The Google Prodcast Team has gone through quite a few iterations and hiatuses over the years, and many people have had a hand in its existence. For the longest time, a handful of SREs produced the Prodcast for the listening pleasure of the other engineers here at Google.

We wanted to make something that would be of interest to folks across organizations and technical implementations. In his last act as part of the Prodcast, JTR put us in touch with Jennifer Petoff, Director of SRE Education, in order to have the support of the SRE organization behind us.

The SRE Prodcast is Google’s podcast about Site Reliability Engineering and production software. In Season 1, we discuss concepts from the SRE Book with experts at Google.” – Jennifer Petoff, Director, Program Management, Cloud Technical Education Google

Make Me Smart Podcast

Make Me Smart

Hosted by Kai Ryssdal And Kimberly Adams

Every weekday, Kai Ryssdal and Kimberly Adams break down the news in tech, the economy and culture. How do companies make money from disinformation? How can we tackle student debt? Why do 401(k)s exist? What will it take to keep working moms from leaving the workforce? Together, we dig into complex topics to help make today make sense

I literally learn 3 new things about topics i never would have tried to learn about.” – Kadi Grigg, Enablement Specialist, Sonatype

EconTalk

EconTalk

Hosted by Russ Roberts

Conversations for the Curious is an award-winning weekly podcast hosted by Russ Roberts of Shalem College in Jerusalem and Stanford’s Hoover Institution. The eclectic guest list includes authors, doctors, psychologists, historians, philosophers, economists, and more. Learn how the health care system really works, the serenity that comes from humility, the challenge of interpreting data, how potato chips are made, what it’s like to run an upscale Manhattan restaurant, what caused the 2008 financial crisis, the nature of consciousness, and more.

The only podcast I listen to is actually EconTalk, which has nothing to do with tech!” – Kelly Shortridge, Senior Principal, Product Technology, Fastly

Leading the Future of Work

Leading the Future of Work

Hosted by Jacob Morgan

The Future of Work With Jacob Morgan is a unique show that explores how the world of
work is changing, and what we need to do in order to thrive. Each week several episodes are
released which range from long-form interviews with the world’s top business leaders and
authors to shorter form episodes which provide a strategy or tip that listeners can apply to
become more successful.

The show is hosted by 4x best-selling author, speaker and futurist Jacob Morgan and the
goal is to give listeners the inspiration, the tools, and the resources they need to succeed
and grow at work and in life.

Episodes are not scripted which makes for fun, authentic, engaging, and educational
episodes filled with insights and practical advice.

It is hard for me to keep up with podcasts. The one I listen to regularly is “Leading The Future of Work” by Jacob Morgan. I know it is not technical, but I think it is extremely important for technical people to understand what the business thinks and is concerned about.” – Keyaan Williams, Managing Director, CLASS-LLC

Hacking Humans Podcast

Hacking Humans

Hosted by Dave Bittner and Joe Carrigan

Deception, influence, and social engineering in the world of cyber crime.

Join Dave Bittner and Joe Carrigan each week as they look behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world.

In case we needed any reminders that humanity is a scary place.” – Matt Howard, SVP and CMO, Virtu

Cloud Security Podcast

Cloud SecurityPodcast

Hosted by Ashish Rajan, Shilpi Bhattacharjee, and Various Contributors

Cloud Security Podcast is a WEEKLY Video and Audio Podcast that brings in-depth cloud security knowledge to you from the best and brightest cloud security experts and leaders in the industry each week over our LIVE STREAMs.

We are the FIRST podcast that carved the niche for Cloud Security in late 2019. As of 2021, the large cloud service providers (Azure, Google Cloud, etc.) have all followed suit and started their own cloud security podcasts. While we recommend you listen to their podcasts as well, we’re the ONLY VENDOR NEUTRAL podcast in the space and will preserve our neutrality indefinitely.

I really love Ashish’s cloud security podcast, listened to it for a while now. He gets really good people on it and it’s a nice laid back listen, too.” – Simon Maple, Field CTO, Snyk

DSO Overflow Podcast

DSO Overflow

Hosted by Glenn Wilson, Steve Giguere, Jessica Cregg

In depth conversations with influencers blurring the lines between Dev, Sec, and Ops!

We speak with professionals working in cyber security, software engineering and operations to talks about a number of DevSecOps topics. We discuss how organisations factor security into their product delivery cycles without compromising the value of doing DevOps and Agile.

One of my favourite meetups in London ‘DevSecOps London Gathering’ has a podcast where they invite their speakers https://dsolg.com/#podcast” – Stefania Chaplin, Solutions Architect UK&I, GitLab

Pardon the Interruption

Pardon the Interruption

Hosted by Tony Kornheiser and Mike Wilbon

Longtime sportswriters Tony Kornheiser and Mike Wilbon debate and discuss the hottest topics, issues and events in the world of sports in a provocative and fast-paced format.

Similar in format to Gene Siskel and Roger Ebert‘s At the Movies,[2][3] PTI is known for its humorous and often loud tone, as well as the “rundown” graphic which lists the topics yet to be discussed on the right-hand side of the screen. The show’s popularity has led to the creation of similar shows on ESPN and similar segments on other series, and the rundown graphic has since been implemented on the morning editions of SportsCenter, among many imitators.[4] – Wikipedia

I’m interested in sports, and Tony and Mike are well-informed, amusing, and opinionated. It also doesn’t hurt any that I’ve known them since they were at The Washington Post and I was freelancing there. What you see on television, or hear on their podcast, is exactly how they are in real life. This sincerity of personality is a big reason why they’ve become so successful.” – Steven Vaughan-Nichols, Technology and business journalist and analyst. Red Ventures

The post 35 Podcasts Recommended by People You Can Trust appeared first on Linux Foundation.

  •  

You want content? We’ve got your content right here!

ONE Summit LF Networking November 15-16

ONE Summit Agenda is now live!

This post originally appeared on LF Networking’s blog. The author, Heather Kirksey, is VP Community & Ecosystem. ONE Summit is the Linux Foundation Networking event that focuses on the networking and automation ecosystem that is transforming public and private sector innovation across 5G network edge, and cloud native solutions. Our family of open source projects address every layer of infrastructure needs from the user edge to the cloud/core. Attend ONE Summit to get the scoop on hot topics for 2022!

Today LF Networking announced our schedule for ONE Summit, and I have to say that I’m extraordinarily excited. I’m excited because it means we’re growing closer to returning to meeting in-person, but more importantly I was blown away by the quality of our speaking submissions. Before I talk more about the schedule itself, I want to say that this quality is all down to you: You sent us a large number of thoughtful, interesting, and innovative ideas; You did the work that underpins the ideas; You did the work to write them up and submit them. The insight, lived experience, and future-looking thought processes humbled me with its breadth and depth. You reminded me why I love this ecosystem and the creativity within open source. We’ve all been through a tough couple of years, but we’re still here innovating, deploying, and doing work that improves the world. A huge shout out to everyone across every company, community, and project that made the job of choosing the final roster just so difficult.

Now onto the content itself. As you’ve probably heard, we’ve got 5 tracks: Industry 4.0, Security and Privacy, The New Networking Stack, Operationalizing Deployment, and Emerging Technologies and Business Models:

  • “Industry 4.0” looks at the confluence of edge and networking technologies that enable technology to uniquely improve our interactions with the physical world, whether that’s agriculture, manufacturing, robotics, or our homes. We’ve got a great line-up focused both on use cases and the technologies that enable them.
  • “Security and Privacy” are the most important issues with which we as global citizens and we as an ecosystem struggle. Far from being an afterthought, security is front and center as we look at zero-trust and vulnerability management, and which technologies and policies best serve enterprises and consumers.
  • Technology is always front and center for open source groups and our “New Networking Stack” track dives deep into the technologies and components we will all use as we build the infrastructure of the future. In this track we have a number of experts sharing their best practices, as well as ideas for forward-looking usages.
  • In our “Operationalizing Deployment” track, we learn from the lived experience of those taking ideas and turning them into workable reality. We ask questions like,  How do you bridge cultural divides? How do you introduce and truly leverage DevOps? How do you integrate compliance and reference architectures? How do you not only deploy but bring in Operations? How do you automate and how to you use tools to accomplish digital transformation in our ecosystem(s)?
  • Not just content focusing only on today’s challenges and success, we look ahead with “Emerging Technologies and Business Models.” Intent, Metaverse, MASE, Scaling today’s innovation to be tomorrow’s operations, new takes on APIs – these are the concepts that will shape us in the next 5-10 years; we  talk about how we start approaching and understanding them?

Every talk that made it into this program has unique and valuable insight, and I’m so proud to be part of the communities that proposed them. I’m also honored to have worked with one of the best Programming Committees in open source events ever. These folks took so much time and care to provide both quantitative and qualitative input that helped shape this agenda. Please be sure to thank them for their time because they worked hard to take the heart of this event to the next level. If you want to be in the room and in the hallway with these great speakers, there is only ONE place to be. Early bird registration ends soon, so don’t miss out and register now!

And please don’t forget to sponsor. Creating a space for all this content does cost money, and we can’t do it without our wonderful sponsors. If you’re still on the fence, please consider how amazing these sessions are and the attendee conservations they will spark. We may not be the biggest conference out there, but we are the most focused on decision makers and end users and the supply chains that enable them. You won’t find a more engaged and thoughtful audience anywhere else.

The post You want content? We’ve got your content right here! appeared first on Linux Foundation.

  •  

Is it time for an OSPO in your organization?

Is your organization consuming open source software, or is it starting to contribute to open source projects? If so, perhaps it’s time for you to start an OSPO: an open source program office.

At the LF, we’re dedicating resources to improving your understanding of all things open source, such as our Guide to Enterprise Open Source and the Evolution of the Open Source Program Office, published the last year. 

In a new Linux Foundation Research report, A Deep Dive into Open Source Program Offices, published in partnership with the TODO Group, authored by Dr. Ibrahim Haddad, Ph.D, showcases the many forms of OSPOs, their maturity models, responsibilities, and challenges they face in open source enterprise adoption, and also their staffing requirements are discussed in detail. 

“The past two decades have accelerated open source software adoption and increased involvement in contributing to existing projects and creating new projects. Software is where a lot of value lies and the vast majority of software developed is open source software providing access to billions of dollars worth of external R&D. If your organization relies on open source software for products or services and does not have a formalized OSPO yet ​​to manage all aspects of working with open source, please consider this report a call to establish your OPSO and drive for leadership in the open source areas that are critical to your products and services.”Ibrahim Haddad, Ph.D., General Manager, LF AI & Data Foundation

Here are some of the report’s important lessons:

An OSPO can help you manage and track your company’s use of open source software and assist you when interacting with other stakeholders. It can also serve as a clearinghouse for information about open source software and its usage throughout your organization.

Your OSPO is the central nervous system for an organization’s open source strategy and provides governance, oversight, and support for all things related to open source.

OSPOs create and maintain an inventory of your open source software (OSS) assets and track and manage any associated risks. The OSPO also guides how to best use open source software within the organization and can help coordinate external contributions to open source projects.

To be effective, the OSPO needs to have a deep understanding of the business and the technical aspects of open source software. It also needs to work with all levels of the organization, from executives to engineers.

An OSPO is designed to:

  • Be the center of competency for an organization’s open source operations and structure,
  • Place a strategy and set of policies on top of an organization’s open source efforts.

This can include creating policies for code use, distribution, selection, auditing, and other areas; training developers; ensuring legal compliance, and promoting and building community engagement to benefit the organization strategically.

An organization’s OSPO can take many different forms, but typically it is a centralized team that reports to the company’s executive level. The size of the team will depend on the size and needs of the organization, and how it is adopted also will undergo different stages of maturity.

When starting, an OSPO might just be a single individual or a very small team. As the organization’s use of open source software grows, the OSPO can expand to include more people with different specialties. For example, there might be separate teams for compliance, legal, and community engagement.

This won’t be the last we have to say about the OSPO in 2022. There are further insights in development, including a qualitative study on the OSPO’s business value across different sectors, and the TODO group’s publication of the 2022 OSPO Survey results will take place during OSPOCon in just a few weeks. 

There is no board template to build an OSPO. Its creation and growth can vary depending on the organization’s size, culture, industry, or even its milestones.

That’s why I keep seeing more and more open source leaders finding critical value in building connections with other professionals in the industry. OSPOCon is an excellent networking and learning space where those working (or willing to work) in open source program offices that rely on open source technologies come together to learn and share best practices, experiences, and tools to overcome challenges they face.” Ana Jiménez, OSPO Program Manager at TODO Group

Join us there and be sure to read the report today to gain key insights into forming and running an OSPO in your organization. 

The post Is it time for an OSPO in your organization? appeared first on Linux Foundation.

  •  

Addressing Cybersecurity Challenges in Open Source Software: What you need to know

by Ashwin Ramaswami

June 2022 saw the publication of Addressing Cybersecurity Challenges in Open Source Software, a joint research initiative launched by the Open Source Security Foundation in collaboration with Linux Foundation Research and Snyk. The research dives into security concerns in the open source ecosystem. If you haven’t read it, this article will give you the report’s who, what, and why, summarizing its key takeaways so that it can be relevant to you or your organization.

Who is the report for?

This report is for everyone whose work touches open source software. Whether you’re a user of open source, an OSS developer, or part of an OSS-related institution or foundation, you can benefit from a better understanding of the state of security in the ecosystem.

Open source consumers and users: It’s very likely that you rely on open source software as dependencies if you develop software. And if you do, one important consideration is the security of the software supply chain. Security incidents such as log4shell have shown how open source supply chain security touches nearly every industry. Even industries and organizations that have traditionally not focused on open source software now realize the importance of ensuring their OSS dependencies are secure. Understanding the state of OSS security can help you to manage your dependencies intelligently, choose them wisely, and keep them up to date.

Open source developers and maintainers: People and organizations that develop or maintain open source software need to ensure they use best practices and policies for security. For example, it can be valuable for large organizations to have open source security policies. Moreover, many OSS developers also use other open source software as dependencies, making understanding the OSS security landscape even more valuable. Developers have a unique role to play in leading the creation of high-quality code and the respective governance frameworks and best practices around it.

Institutions: Institutions such as open source foundations, funders, and policymaking groups can benefit from this report by understanding and implementing the key findings of the research and their respective roles in improving the current state of the OSS ecosystem. Funding and support can only go to the right areas if priorities are informed by the problems the community is facing now, which the research assists in identifying.

What are the major takeaways?

The data from this report was collected by conducting a worldwide survey of:

  • Individuals who contribute to, use, or administer OSS;
  • Maintainers, core contributors, and occasional contributors to OSS;
  • Developers of proprietary software who use OSS; and
  • Individuals with a strong focus on software supply chain security

The survey also included data collected from several major package ecosystems by using Snyk Open Source, a static code analysis (SCA) tool free to use for individuals and open source maintainers.

Here are the major takeaways and recommendations from the report:

  • Too many organizations are not prepared to address OSS security needs: At least 34% of organizations did not have an OSS security policy in place, suggesting these organizations may not be prepared to address OSS security needs.
  • Small organizations must prioritize developing an OSS security policy: Small organizations are significantly less likely to have an OSS security policy. Such organizations should prioritize developing this policy and having a CISO and OSPO (Open Source Program Office).
  • Using additional security tools is a leading way to improve OSS security: Security tooling is available for open source security across the software development lifecycle. Moreover, organizations with an OSS security policy have a higher frequency of security tool use than those without an OSS security policy.
  • Collaborate with vendors to create more intelligent security tools: Organizations consider that one of the most important ways to improve OSS security across the supply chain is adding greater intelligence to existing software security tools, making it easier to integrate OSS security into existing workflows and build systems.
  • Implementing best practices for secure software development is the other leading way to improve OSS security: Understanding best practices for secure software development, through courses such as the OpenSSF’s Secure Software Development Fundamentals Courses, has been identified repeatedly as a leading way to improve OSS supply chain security.
  • Use automation to reduce your attack surface: Infrastructure as Code (IaC) tools and scanners allow automating CI/CD activities to eliminate threat vectors around manual deployments.
  • Consumers of open source software should give back to the communities that support them: The use of open source software has often been a one-way street where users see significant benefits with minimal cost or investment. For larger open source projects to meet user expectations, organizations must give back and close the loop by financially supporting OSS projects they use.

Why is this important now?

Open source software is a boon: its collaborative and open nature has allowed society to benefit from various innovative, reliable, and free software tools. However, these benefits only last when users contribute back to open source software and when users and developers exercise due diligence around security. While the most successful open source projects have gotten such support, other projects have not – even as open source use has continued to be more ubiquitous.

Thus, it is more important than ever to be aware of the problems and issues everyone faces in the OSS ecosystem. Some organizations and open source maintainers have strong policies and procedures for handling these issues. But, as this report shows, other organizations are just facing these issues now.

Finally, we’ve seen the risks of not maintaining proper security practices around OSS dependencies. Failure to update open source dependencies has led to costs as high as $425 million. Given these risks, a little investment in strong security practices and awareness around open source – as outlined in the report’s recommendations – can go a long way.

We suggest you read the report – then see how you or your organization can take the next step to keep yourself secure!

The post Addressing Cybersecurity Challenges in Open Source Software: What you need to know appeared first on Linux Foundation.

  •