{"id":722,"date":"2004-02-19T09:51:33","date_gmt":"2004-02-19T07:51:33","guid":{"rendered":"\/\/?p="},"modified":"2004-07-13T19:56:24","modified_gmt":"2004-07-13T17:56:24","slug":"fedora-security","status":"publish","type":"post","link":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/","title":{"rendered":"fedora security"},"content":{"rendered":"<p>su FedoraNews \u00e8 stato pubblicato un interessante <a href=\"http:\/\/fedoranews.org\/krishnan\/tutorial\/tripwire\/\">articolo<\/a> su Tripwire: <\/p>\n<blockquote><p>Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system activity, you can instruct Tripwire not to report the change to that file in future. If the change is not due to normal system activity, then it is a clear indication that something is wrong and you need to act immediately and fix the issue. Thus tripwire comes very handy to maintain the integrity of the system. <a href=\"http:\/\/fedoranews.org\/krishnan\/tutorial\/tripwire\/\">[&#8230;]<\/a><\/p><\/blockquote>\n<p>ciauz<\/p>\n","protected":false},"excerpt":{"rendered":"<p>su FedoraNews \u00e8 stato pubblicato un interessante articolo su Tripwire: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[5],"tags":[],"class_list":["post-722","post","type-post","status-publish","format-standard","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>fedora security - Fullo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"fedora security - Fullo\" \/>\n<meta property=\"og:description\" content=\"su FedoraNews \u00e8 stato pubblicato un interessante articolo su Tripwire: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Fullo\" \/>\n<meta property=\"article:published_time\" content=\"2004-02-19T07:51:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2004-07-13T17:56:24+00:00\" \/>\n<meta name=\"author\" content=\"Francesco Fullone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fullo\" \/>\n<meta name=\"twitter:site\" content=\"@fullo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesco Fullone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/\"},\"author\":{\"name\":\"Francesco Fullone\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"headline\":\"fedora security\",\"datePublished\":\"2004-02-19T07:51:33+00:00\",\"dateModified\":\"2004-07-13T17:56:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/\"},\"wordCount\":114,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"articleSection\":[\"tecnologia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/\",\"name\":\"fedora security - Fullo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\"},\"datePublished\":\"2004-02-19T07:51:33+00:00\",\"dateModified\":\"2004-07-13T17:56:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/02\\\/19\\\/fedora-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"fedora security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\",\"name\":\"Fullo\",\"description\":\"nulla e&#039; impossibile per chi non lo deve fare!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\",\"name\":\"Francesco Fullone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"width\":622,\"height\":622,\"caption\":\"Francesco Fullone\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.fullo.net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fullo\",\"https:\\\/\\\/x.com\\\/fullo\"],\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/author\\\/fullo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"fedora security - Fullo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/","og_locale":"en_US","og_type":"article","og_title":"fedora security - Fullo","og_description":"su FedoraNews \u00e8 stato pubblicato un interessante articolo su Tripwire: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system [&hellip;]","og_url":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/","og_site_name":"Fullo","article_published_time":"2004-02-19T07:51:33+00:00","article_modified_time":"2004-07-13T17:56:24+00:00","author":"Francesco Fullone","twitter_card":"summary_large_image","twitter_creator":"@fullo","twitter_site":"@fullo","twitter_misc":{"Written by":"Francesco Fullone","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/#article","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/"},"author":{"name":"Francesco Fullone","@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"headline":"fedora security","datePublished":"2004-02-19T07:51:33+00:00","dateModified":"2004-07-13T17:56:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/"},"wordCount":114,"commentCount":0,"publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"articleSection":["tecnologia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/","url":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/","name":"fedora security - Fullo","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/#website"},"datePublished":"2004-02-19T07:51:33+00:00","dateModified":"2004-07-13T17:56:24+00:00","breadcrumb":{"@id":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fullo.net\/blog\/2004\/02\/19\/fedora-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fullo.net\/blog\/"},{"@type":"ListItem","position":2,"name":"fedora security"}]},{"@type":"WebSite","@id":"https:\/\/www.fullo.net\/blog\/#website","url":"https:\/\/www.fullo.net\/blog\/","name":"Fullo","description":"nulla e&#039; impossibile per chi non lo deve fare!","publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fullo.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c","name":"Francesco Fullone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","url":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","width":622,"height":622,"caption":"Francesco Fullone"},"logo":{"@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1"},"sameAs":["http:\/\/www.fullo.net","https:\/\/www.linkedin.com\/in\/fullo","https:\/\/x.com\/fullo"],"url":"https:\/\/www.fullo.net\/blog\/author\/fullo\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OSc1-bE","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1728,"url":"https:\/\/www.fullo.net\/blog\/2005\/11\/04\/lucca-comics-change-getter\/","url_meta":{"origin":722,"position":0},"title":"Lucca Comics, change Getter!","author":"Francesco Fullone","date":"04\/11\/2005","format":false,"excerpt":"guarda due generazioni a confronto su flickrL'operazione Lucca Comics \u00e9 stata portata a compimento con successo. Ho trovato [anche se danneggiato :( ] un Getter Dragon da affiancare al Getter One comprato alla fiera di Faenza. Il prossimo passo sar\u00e0 finire la serie hero collection acquistando Mazinga Z ed il\u2026","rel":"","context":"In &quot;di tutto un po'&quot;","block_context":{"text":"di tutto un po'","link":"https:\/\/www.fullo.net\/blog\/category\/di-tutto-un-po\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":274,"url":"https:\/\/www.fullo.net\/blog\/2003\/06\/01\/phplinksphp-432-final\/","url_meta":{"origin":722,"position":1},"title":"php::Links(&#8216;php 4.32 final&#8217;)","author":"Francesco Fullone","date":"01\/06\/2003","format":false,"excerpt":"\u00e8 stata finalmente rilasciata la versione stabile di php 4.32, questa versione introduce parecchi bug-fix, soprattutto nelle GD e disabilita l'utilizzo della vecchia versione di queste ultime su windows. maggiori informazioni sono reperibili nel change-log ufficiale. ciuaz","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4482,"url":"https:\/\/www.fullo.net\/blog\/2025\/10\/21\/theory-of-change-ed-editoria\/","url_meta":{"origin":722,"position":2},"title":"Theory of Change ed editoria","author":"Francesco Fullone","date":"21\/10\/2025","format":false,"excerpt":"Ho impiegato 5 anni, innumerevoli workshop e corsi per arrivare a scrivere 3 libri utili a far capire ai miei clienti perch\u00e9 \u00e8 importante ragionare sulle giuste metriche per il sustainable IT. Spoiler: Studiare la Theory of Change per certificarmi come facilitatore per un workshop sulla sostenibilit\u00e0 mi ha fatto\u2026","rel":"","context":"In &quot;advisoring&quot;","block_context":{"text":"advisoring","link":"https:\/\/www.fullo.net\/blog\/category\/entrepreneurship\/advisoring\/"},"img":{"alt_text":"ToC Books","src":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/10\/toc-books.png?fit=1200%2C611&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/10\/toc-books.png?fit=1200%2C611&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/10\/toc-books.png?fit=1200%2C611&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/10\/toc-books.png?fit=1200%2C611&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/10\/toc-books.png?fit=1200%2C611&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4527,"url":"https:\/\/www.fullo.net\/blog\/2025\/11\/09\/theory-of-change-e-formazione-aziendale-costruire-il-futuro-a-ritroso\/","url_meta":{"origin":722,"position":3},"title":"Theory of Change e formazione aziendale: costruire il futuro a ritroso","author":"Francesco Fullone","date":"09\/11\/2025","format":false,"excerpt":"TL;DR: Mi hanno chiesto un catalogo di corsi per la trasformazione aziendale. Gli ho dato una Theory of Change. Perch\u00e9 la formazione non \u00e8 shopping, \u00e8 costruire il futuro a ritroso.","rel":"","context":"In &quot;advisoring&quot;","block_context":{"text":"advisoring","link":"https:\/\/www.fullo.net\/blog\/category\/entrepreneurship\/advisoring\/"},"img":{"alt_text":"Theory of Change e formazione aziendale: costruire il futuro a ritroso","src":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_iv8u4liv8u4liv8u.png?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_iv8u4liv8u4liv8u.png?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_iv8u4liv8u4liv8u.png?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_iv8u4liv8u4liv8u.png?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":4682,"url":"https:\/\/www.fullo.net\/blog\/2026\/05\/03\/le-sentinelle-i-kpi-che-ti-dicono-se-il-gioco-e-ancora-quello-che-pensavi\/","url_meta":{"origin":722,"position":4},"title":"Le sentinelle: i KPI che ti dicono se il gioco \u00e8 ancora quello che pensavi","author":"Francesco Fullone","date":"03\/05\/2026","format":false,"excerpt":"I KPI che usi quotidianamente ti dicono se stai vincendo. Non ti dicono se il gioco \u00e8 ancora quello che pensavi fosse. Su orizzonti medio-lunghi quella seconda informazione \u00e8 quella che ti salva, e quasi nessuno la costruisce esplicitamente. Si chiamano sentinel metrics, e nascono dalle assunzioni che la tua\u2026","rel":"","context":"In &quot;advisoring&quot;","block_context":{"text":"advisoring","link":"https:\/\/www.fullo.net\/blog\/category\/entrepreneurship\/advisoring\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2026\/05\/sentinel-metrics-scaled.png?fit=1200%2C654&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2026\/05\/sentinel-metrics-scaled.png?fit=1200%2C654&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2026\/05\/sentinel-metrics-scaled.png?fit=1200%2C654&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2026\/05\/sentinel-metrics-scaled.png?fit=1200%2C654&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2026\/05\/sentinel-metrics-scaled.png?fit=1200%2C654&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4543,"url":"https:\/\/www.fullo.net\/blog\/2025\/11\/26\/theory-of-change-e-unknown-unknowns\/","url_meta":{"origin":722,"position":5},"title":"Theory of Change e unknown unknowns","author":"Francesco Fullone","date":"26\/11\/2025","format":false,"excerpt":"TL;DR: Durante un workshop per costruire una ToC su sostenibilit\u00e0 digitale, mi \u00e8 stata fatta una domanda molto intelligente: \"E se cambia tutto?\" La risposta non \u00e8 nella precisione del piano, ma nel distinguere cosa non cambia mai (l'Impact) da cosa deve essere flessibile (tutto il resto). Gli unknown unknowns\u2026","rel":"","context":"In &quot;business design&quot;","block_context":{"text":"business design","link":"https:\/\/www.fullo.net\/blog\/category\/entrepreneurship\/business-design\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/unnamed2-scaled.png?fit=1200%2C670&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/unnamed2-scaled.png?fit=1200%2C670&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/unnamed2-scaled.png?fit=1200%2C670&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/unnamed2-scaled.png?fit=1200%2C670&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2025\/11\/unnamed2-scaled.png?fit=1200%2C670&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/comments?post=722"}],"version-history":[{"count":0,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/722\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/media?parent=722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/categories?post=722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/tags?post=722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}