<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ingegneriainformaticaonline.it/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/07/sbocchi-lavorativi-laurea-in-ingegneria-informatica/</loc>
		<lastmod>2024-05-07T09:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/sbocchi-lavorativi-ingegneria-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/07/tipi-di-ingegneria-informatica/</loc>
		<lastmod>2024-05-07T09:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/tipi-ingegneria-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/07/ingegneria-informatica-online-i-vantaggi-e-gli-svantaggi/</loc>
		<lastmod>2024-05-07T17:42:54+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/ingegneria-informatica-online-vantaggi-svamtaggi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/04/30/le-migliori-universita-per-studiare-ingegneria-informatica-in-italia/</loc>
		<lastmod>2024-05-08T06:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/universita-ingegneria-informatica-italia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/30/lauree-magistrali-ingegneria-esistono/</loc>
		<lastmod>2024-06-10T07:06:51+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/lauree-magistrali-in-ingegneria.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/30/perche-studiare-ingegneria-informatica/</loc>
		<lastmod>2024-06-10T08:02:49+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/perche-studiare-ingegneria-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/30/ingegnere-informatico/</loc>
		<lastmod>2024-06-10T08:47:45+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/ingegnere-informatico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/05/30/intelligenza-artificiale-machine-learning/</loc>
		<lastmod>2024-06-10T09:52:40+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/05/intelligenza-artificiale-machine-learning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/06/24/studiare-ingegneria-e-difficile/</loc>
		<lastmod>2024-06-24T16:03:30+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/06/studiare-ingegneria-difficile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/06/24/ingegneria-meccanica-sbocchi-lavorativi/</loc>
		<lastmod>2024-06-24T16:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/06/ingegnere-meccanico-sbocchi-lavorativi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/06/24/ingegneria-elettronica-sbocchi-lavorativi/</loc>
		<lastmod>2024-06-24T16:51:05+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/06/ingegneria-elettronica-sbocchi-lavorativi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/06/24/ingegneria-civile-sbocchi-lavorativi/</loc>
		<lastmod>2024-06-24T16:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/06/ingegneria-civile-sbocchi-lavorativi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/06/24/ingegnere-o-architetto-le-differenze/</loc>
		<lastmod>2024-06-24T17:20:21+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/06/ingegnere-o-architetto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/07/07/ingegnere-dei-materiali-chi-e-cosa-fa/</loc>
		<lastmod>2024-08-07T12:55:40+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/07/ingegnere-dei-materiali.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/07/12/ingegnere-gestionale-chi-e-cosa-fa/</loc>
		<lastmod>2024-08-07T13:18:18+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/07/ingegnere-gestioale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/07/20/come-scrivere-una-tesi-di-laurea-in-ingegneria/</loc>
		<lastmod>2024-08-07T14:18:13+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/08/come-scrivere-tesi-laurea-ingegneria.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/07/20/laurea-in-ingegneria-e-abilitante/</loc>
		<lastmod>2024-08-09T09:12:17+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/07/laurea-ingegneria-abilitante.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/07/20/diventare-ingegnere-civile-o-edile/</loc>
		<lastmod>2024-08-09T10:30:43+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/07/ingegnere-civile-o-edile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/08/04/come-scrivere-una-relazione-tecnica/</loc>
		<lastmod>2024-09-04T15:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/08/come-scrivere-relazione-tecnica-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/08/06/cose-e-a-cosa-serve-ingegneria-dei-sistemi/</loc>
		<lastmod>2024-09-04T16:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/08/ingegneria-sistemi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/08/07/ingegneria-ambientale-cose-sbocchi-lavorativi/</loc>
		<lastmod>2024-09-07T08:45:11+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/08/ingegneria-ambientale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/08/22/scia-o-cila/</loc>
		<lastmod>2024-09-07T09:04:19+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/09/scia-o-cila.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/08/26/ingegnere-biomedico/</loc>
		<lastmod>2024-09-09T06:55:51+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/08/ingegnere-biomedico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/09/06/ingegneria-chimica-cose-e-a-cosa-serve/</loc>
		<lastmod>2024-10-06T08:24:45+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/ingegneria-chimica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/09/06/cose-lingegneria-aerospaziale/</loc>
		<lastmod>2024-10-06T13:09:38+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/ingegneria-aerospaziale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/09/09/certificazione-energetica-degli-edifici/</loc>
		<lastmod>2024-10-06T13:26:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/09/certificazione-energetica-edifici.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/09/25/cosa-sono-le-dichiarazioni-di-conformita-degli-impianti/</loc>
		<lastmod>2024-10-06T13:40:28+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/dichiarazione-conformita-impianti.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/09/15/calcolo-delle-strutture/</loc>
		<lastmod>2024-10-06T14:05:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/09/calcolo-delle-strutture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/cose-laerodinamica/</loc>
		<lastmod>2024-10-22T10:53:14+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/data-engineer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/biomeccanica-cose-e-a-cosa-serve/</loc>
		<lastmod>2024-10-22T11:01:03+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/training.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/cose-e-a-che-serve-il-cad/</loc>
		<lastmod>2024-10-22T11:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/pc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/come-diventare-ingegnere-minerario-studi-e-possibilita/</loc>
		<lastmod>2024-10-22T11:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/ingegnere-e-architetto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/i-principali-stili-di-architettura-nella-storia/</loc>
		<lastmod>2024-10-22T11:26:04+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/edificio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/metodi-di-analisi-strutturale-quali-sono/</loc>
		<lastmod>2024-10-22T11:32:20+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/Ingegneria-sismica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/sviluppatore-software-chi-e-e-cosa-fa/</loc>
		<lastmod>2024-10-22T11:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/web-developer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/10/22/cose-lurbanistica-e-di-cosa-si-occupa/</loc>
		<lastmod>2024-10-22T11:48:03+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/urbanistica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/20/cosa-sono-le-leggi-di-kirchhoff/</loc>
		<lastmod>2024-11-20T17:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/matematica2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/prima.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/seconda.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/20/crittografia-end-to-end-cose-e-come-funziona/</loc>
		<lastmod>2024-11-20T17:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/data-engineer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/20/effetto-doppler-cose-e-come-viene-usato-in-ingegneria-e-medicina/</loc>
		<lastmod>2024-11-20T17:50:03+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/suono.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/20/effetto-joule-cose/</loc>
		<lastmod>2024-11-20T17:57:07+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/circuito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/20/legge-di-gauss-teoria-e-applicazioni-nei-campi-elettrici-e-magnetici/</loc>
		<lastmod>2024-11-20T18:04:47+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/impiantistica.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/gauss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/20/legge-di-hooke-come-funziona-e-le-sue-applicazioni-nellingegneria-dei-materiali/</loc>
		<lastmod>2024-11-20T18:10:06+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/ingegnere.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/22/teorema-di-norton-principi-e-applicazioni-nei-circuiti-elettrici/</loc>
		<lastmod>2024-11-22T10:31:11+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/norton.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/11/22/effetto-peltier-cose-e-come-viene-usato-nella-termoelettricita/</loc>
		<lastmod>2024-11-22T10:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/termoelettricita.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/blockchain-cose-come-si-applica-funzione/</loc>
		<lastmod>2024-12-23T07:29:09+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/Blockchain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/cose-il-calcolo-parallelo-definizione-e-caratteristiche/</loc>
		<lastmod>2024-12-23T07:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/calcolo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/cosa-sono-i-sistemi-scada-e-come-vengono-usati-nellautomazione-industriale/</loc>
		<lastmod>2024-12-23T07:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/effetto-seebeck-il-principio-alla-base-dei-generatori-termoelettrici/</loc>
		<lastmod>2024-12-23T07:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/term.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/linguaggi-di-programmazione-per-ingegneria-quali-sono-i-piu-usati-e-perche/</loc>
		<lastmod>2024-12-23T08:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/linguaggio-python-cose-a-che-serve/</loc>
		<lastmod>2024-12-23T08:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/Python.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/teoria-dei-grafi-cose-applicazioni-nellingegneria-informatica-e-nelle-reti/</loc>
		<lastmod>2024-12-23T08:18:50+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/grafi.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2024/12/23/trigger-di-schmitt-come-funzionano-e-dove-vengono-utilizzati-nei-circuiti/</loc>
		<lastmod>2024-12-23T08:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/trigger-di-Schmitt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/cose-un-algoritmo-euristico-e-come-viene-utilizzato-nei-problemi-complessi/</loc>
		<lastmod>2025-01-22T10:12:14+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/algoritmo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/business-intelligence-cose-e-a-cosa-serve/</loc>
		<lastmod>2025-01-22T10:18:41+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/business-intelligence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/data-mining-tecniche-e-applicazioni-nellingegneria-informatica/</loc>
		<lastmod>2025-01-22T10:24:01+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/data-mining.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/docker-e-kubernetes-cosa-sono-differenze/</loc>
		<lastmod>2025-01-22T10:34:49+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/container.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/internet-delle-cose-iot-cose-esempi-applicazioni/</loc>
		<lastmod>2025-01-22T11:18:50+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/cose-il-linguaggio-r-e-come-viene-utilizzato-nellanalisi-dei-dati/</loc>
		<lastmod>2025-01-22T11:25:07+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/cose-il-framework-tensorflow-e-come-si-usa-per-sviluppare-algoritmi-di-ai/</loc>
		<lastmod>2025-01-22T11:37:43+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/AI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/01/22/cose-il-linguaggio-di-programmazione-julia/</loc>
		<lastmod>2025-01-22T11:48:09+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/come-funzionano-i-metamateriali-e-quali-sono-le-loro-applicazioni-ingegneristiche/</loc>
		<lastmod>2025-02-18T10:02:46+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/metamateriali.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/crittografia-quantistica-cose-e-perche-e-il-futuro-della-sicurezza-informatica/</loc>
		<lastmod>2025-02-18T10:08:27+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/il-grafene-caratteristiche-proprieta-e-applicazioni-nellindustria/</loc>
		<lastmod>2025-02-18T10:15:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/grafene.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/cose-il-paradigma-serverless-vantaggi-e-utilizzi/</loc>
		<lastmod>2025-02-18T10:20:15+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/Python.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/cose-un-pid-controller-e-come-viene-utilizzato-nei-sistemi-di-automazione/</loc>
		<lastmod>2025-02-18T10:26:02+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/PID.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/cose-la-programmazione-funzionale-e-quali-sono-i-suoi-vantaggi/</loc>
		<lastmod>2025-02-18T10:31:30+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/sistemi-di-riconoscimento-biometrico-cosa-sono-e-dove-vengono-utilizzati/</loc>
		<lastmod>2025-02-18T10:37:05+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/riconoscimento-biometrico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/02/18/cose-la-stampa-3d-metallica-e-come-sta-rivoluzionando-lingegneria/</loc>
		<lastmod>2025-02-18T10:47:07+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/metamateriali.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/24/come-e-fatto-e-come-funziona-un-transistor/</loc>
		<lastmod>2025-03-24T13:33:16+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/riconoscimento-biometrico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/24/come-funzionano-i-database-nosql-e-quando-utilizzarli/</loc>
		<lastmod>2025-03-24T13:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/24/deepfake-e-cybersecurity-come-riconoscere-e-contrastare-i-video-falsi/</loc>
		<lastmod>2025-03-24T13:42:41+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/24/cose-il-devops-e-perche-e-cosi-richiesto-nel-mondo-it/</loc>
		<lastmod>2025-03-24T13:48:06+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/devops.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/24/cose-e-come-funziona-il-modello-zero-trust/</loc>
		<lastmod>2025-03-24T13:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/25/framework-vs-librerie-quali-sono-le-differenze-e-come-scegliere/</loc>
		<lastmod>2025-03-25T07:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/container.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/25/cose-un-rpa-robotic-process-automation-e-perche-sta-rivoluzionando-il-lavoro/</loc>
		<lastmod>2025-03-25T08:26:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/PID.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/03/25/che-cose-e-a-che-serve-una-rete-per-la-distribuzione-dei-contenuti-cdn/</loc>
		<lastmod>2025-03-25T09:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/cdn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/22/ai-engineer-chi-e-cosa-fa-e-competenze/</loc>
		<lastmod>2025-04-22T11:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/AI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/22/chi-e-e-cosa-fa-un-database-administrator-dba/</loc>
		<lastmod>2025-04-22T11:39:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/data-mining.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/22/cloud-engineer-chi-e-cosa-fa-come-diventarlo/</loc>
		<lastmod>2025-04-22T11:47:45+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/Cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/22/codice-hash-cose-e-come-si-utilizza/</loc>
		<lastmod>2025-04-22T11:57:42+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/codice.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/24/come-diventare-full-stack-developer-studi-e-possibilita/</loc>
		<lastmod>2025-04-24T08:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/Python.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/24/informatica-forense-cose-sbocchi-lavorativi/</loc>
		<lastmod>2025-04-24T09:02:26+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/forensics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/24/cose-la-site-reliability-engineering/</loc>
		<lastmod>2025-04-24T09:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/Site-Reliability-Engineering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/04/24/cose-una-vpn-e-come-funziona-a-livello-tecnico/</loc>
		<lastmod>2025-04-24T09:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/business-intelligence-analyst-chi-e-e-cosa-fa/</loc>
		<lastmod>2025-05-22T08:07:53+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/Site-Reliability-Engineering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/come-diventare-app-developer-studi-e-possibilita/</loc>
		<lastmod>2025-05-22T08:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/app.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/come-diventare-consulente-it-studi-e-possibilita/</loc>
		<lastmod>2025-05-22T08:38:38+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/consulente.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/come-diventare-manager-della-transizione-digitale/</loc>
		<lastmod>2025-05-22T08:42:36+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/digital.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/come-diventare-programmatore-informatico-studi-e-possibilita/</loc>
		<lastmod>2025-05-22T08:46:41+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/programmatore-informatico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/cosa-si-studia-in-una-laurea-online-di-ingegneria-informatica/</loc>
		<lastmod>2025-05-22T08:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/Ingegneria-Informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/cyber-security-analyst-chi-e-e-cosa-fa/</loc>
		<lastmod>2025-05-22T08:54:12+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/05/22/net-developer-chi-e-cosa-fa-come-diventarlo/</loc>
		<lastmod>2025-05-22T08:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/developer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/cose-una-fpga-e-come-viene-programmata/</loc>
		<lastmod>2025-06-24T11:30:07+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/la-teoria-della-complessita-computazionale-spiegata-semplice/</loc>
		<lastmod>2025-06-24T11:40:39+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/06/calcolo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/che-cose-il-ciclo-di-vita-dello-sviluppo-software-sicuro-sdlc/</loc>
		<lastmod>2025-06-24T11:44:20+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/digital.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/cose-lingegneria-dellaffidabilita-dei-sistemi-sre/</loc>
		<lastmod>2025-06-24T11:52:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/forensics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/computer-vision-definizione-e-funzionamento/</loc>
		<lastmod>2025-06-24T11:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/06/ai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/cose-il-calcolo-edge-to-cloud-e-perche-e-strategico/</loc>
		<lastmod>2025-06-24T12:05:12+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/data-mining.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/che-cose-devsecops/</loc>
		<lastmod>2025-06-24T12:06:32+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/10/web-developer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/06/24/differenza-tra-ingegneria-informatica-e-scienze-informatiche/</loc>
		<lastmod>2025-06-24T12:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/Ingegneria-Informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/come-funziona-la-crittografia-omomorfica/</loc>
		<lastmod>2025-07-18T11:53:07+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/come-funziona-un-hypervisor-e-quali-tipi-esistono/</loc>
		<lastmod>2025-07-18T12:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/data-mining.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/come-funziona-un-sistema-di-load-balancing-e-perche-e-utile/</loc>
		<lastmod>2025-07-18T12:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/07/load.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/cosa-sono-i-microservizi-e-perche-stanno-sostituendo-i-monoliti/</loc>
		<lastmod>2025-07-18T12:16:33+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/digital-twin-cose-e-come-viene-usato-nellindustria/</loc>
		<lastmod>2025-07-18T12:24:26+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/programmatore-informatico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/che-cose-il-data-lake-e-come-si-differenzia-da-un-data-warehouse/</loc>
		<lastmod>2025-07-18T12:29:16+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/Site-Reliability-Engineering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/sistemi-distribuiti-principi-di-funzionamento-e-vantaggi/</loc>
		<lastmod>2025-07-18T12:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/07/tiktok.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/07/18/cosa-significa-infrastructure-as-code-iac-e-perche-e-cosi-importante/</loc>
		<lastmod>2025-07-18T13:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/container.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/18/architettura-a-tre-livelli-3-tier-come-funziona-e-quando-applicarla/</loc>
		<lastmod>2025-08-18T14:02:13+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/18/architetture-event-driven-come-funzionano-e-perche-usarle/</loc>
		<lastmod>2025-08-18T14:09:49+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/08/event.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/18/containerizzazione-differenze-tra-docker-e-kubernetes/</loc>
		<lastmod>2025-08-18T14:18:02+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/data-mining.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/18/graph-database-cosa-sono-e-quali-problemi-risolvono/</loc>
		<lastmod>2025-08-18T14:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/08/graph.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/19/honeypot-in-cybersecurity-cosa-sono-e-come-proteggono-le-reti/</loc>
		<lastmod>2025-08-19T10:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/19/intrusion-detection-system-ids-cose-e-come-funziona/</loc>
		<lastmod>2025-08-19T10:09:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/19/multi%e2%80%91cloud-e-hybrid-cloud-differenze-e-casi-duso/</loc>
		<lastmod>2025-08-19T10:20:24+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/forensics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/08/19/che-cose-una-data-pipeline-e-come-progettarla/</loc>
		<lastmod>2025-08-19T10:25:49+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/6g-cosa-aspettarsi-dopo-il-5g/</loc>
		<lastmod>2025-09-22T13:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/09/6G.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/cose-lai-spiegabile-xai/</loc>
		<lastmod>2025-09-22T13:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/09/ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/attacco-side-channel-cose-e-come-proteggersi/</loc>
		<lastmod>2025-09-22T13:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/che-cose-automl/</loc>
		<lastmod>2025-09-22T13:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/09/automated.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/chaos-engineering-cose-e-come-applicarlo-allingegneria-informatica/</loc>
		<lastmod>2025-09-22T13:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/Ingegneria-Informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/cyber-deception-technology-cose-e-a-che-serve/</loc>
		<lastmod>2025-09-22T13:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/che-cose-lidenta-federata/</loc>
		<lastmod>2025-09-22T13:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/forensics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/09/22/cose-la-lorawan/</loc>
		<lastmod>2025-09-22T14:02:39+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/digital.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/cose-un-attacco-brute-force-e-come-funziona/</loc>
		<lastmod>2025-10-21T12:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/forensics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/che-cose-chatgpt-e-come-funziona/</loc>
		<lastmod>2025-10-21T12:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/10/CHAT-GPT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/come-funziona-un-modello-text%e2%80%91to%e2%80%91image/</loc>
		<lastmod>2025-10-21T12:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/02/riconoscimento-biometrico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/edge-ai-cose-e-come-porta-lintelligenza-artificiale-vicino-ai-dispositivi/</loc>
		<lastmod>2025-10-21T13:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/09/ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/gemini-vs-chatgpt-differenze-tra-i-due-colossi-dellai/</loc>
		<lastmod>2025-10-21T13:10:42+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/10/ai-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/che-cose-un-llm/</loc>
		<lastmod>2025-10-21T13:16:17+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/06/calcolo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/prompt-engineering-guida-base-per-sfruttare-al-meglio-i-llm/</loc>
		<lastmod>2025-10-21T13:23:42+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/10/Prompt-Engineering.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/10/21/cose-la-threat-intelligence/</loc>
		<lastmod>2025-10-21T13:30:21+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/03/zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/cloud-architect-come-progettare-infrastrutture-sicure-e-scalabili/</loc>
		<lastmod>2025-11-17T13:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/11/data-engineer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/come-prepararsi-a-un-colloquio-tecnico-nel-settore-it/</loc>
		<lastmod>2025-11-17T13:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/11/colloquio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/cyber-kill-chain-le-7-fasi-di-un-attacco-informatico-spiegate/</loc>
		<lastmod>2025-11-17T13:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/11/cyber.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/feature-engineering-larte-di-insegnare-ai-modelli-cosa-imparare/</loc>
		<lastmod>2025-11-17T13:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/06/calcolo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/llm-open-source-i-migliori-modelli-alternativi-a-chatgpt-nel-2025/</loc>
		<lastmod>2025-11-17T13:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/10/CHAT-GPT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/quali-sono-le-migliori-soft-skill-per-ingegneri-informatici/</loc>
		<lastmod>2025-11-17T13:46:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/11/soft-skill.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/che-cose-la-retrieval-augmented-generation-rag/</loc>
		<lastmod>2025-11-17T13:50:56+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/09/ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/11/17/cose-il-social-engineering-e-perche-e-larma-piu-potente-degli-hacker/</loc>
		<lastmod>2025-11-17T13:55:32+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/che-cosa-sono-le-allucinazioni-dellintelligenza-artificiale/</loc>
		<lastmod>2025-12-19T10:48:49+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/programmatore-informatico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/coding-challenge-come-prepararsi-alle-selezioni-tecniche-per-sviluppatori/</loc>
		<lastmod>2025-12-19T10:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/12/coding.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/cose-il-credential-stuffing-e-perche-sta-crescendo-con-lai/</loc>
		<lastmod>2025-12-19T10:58:46+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/11/cyber.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/feature-store-cose-e-perche-serve-nel-machine-learning-moderno/</loc>
		<lastmod>2025-12-19T11:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/Cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/mapreduce-come-funziona-lalgoritmo-che-ha-trasformato-i-big-data/</loc>
		<lastmod>2025-12-19T11:18:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/04/Site-Reliability-Engineering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/memory-management-come-i-linguaggi-moderni-gestiscono-la-ram/</loc>
		<lastmod>2025-12-19T11:22:09+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/Ingegneria-Informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/cose-la-quantizzazione-nel-machine-learning/</loc>
		<lastmod>2025-12-19T11:25:32+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/12/AI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2025/12/19/tinyml-lintelligenza-artificiale-che-gira-su-microcontrollori/</loc>
		<lastmod>2025-12-19T11:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/12/intelligenza-artificiale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/01/22/seconda-laurea-in-ingegneria-come-prenderla/</loc>
		<lastmod>2026-01-22T08:42:44+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/01/seconda-laurea.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/01/22/quali-sono-le-materie-di-ingegneria-informatica/</loc>
		<lastmod>2026-01-22T08:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/01/materie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/01/22/piano-di-studi-in-ingegneria-informatica-cosa-prevede/</loc>
		<lastmod>2026-01-22T09:03:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/01/piani-studio.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/01/22/ingegneria-informatica-o-economia-quale-scegliere/</loc>
		<lastmod>2026-01-22T09:12:05+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/01/Ingegneria-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/01/22/chi-e-adatto-a-studiare-ingegneria/</loc>
		<lastmod>2026-01-22T09:21:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/Ingegneria-Informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/02/19/analisi-1-e-difficile-ecco-come-prepararsi-davvero/</loc>
		<lastmod>2026-02-19T11:18:01+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/02/Analisi-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/02/19/qual-e-lanno-piu-difficile-in-ingegneria/</loc>
		<lastmod>2026-02-19T11:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/02/Annoo-difficile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/02/19/esami-di-ingegneria-online-come-si-svolgono-davvero/</loc>
		<lastmod>2026-02-19T11:29:36+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/02/Esami-ing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/02/19/ingegneria-online-e-carriera-internazionale-cosa-sapere/</loc>
		<lastmod>2026-02-19T11:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/02/carriera.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/02/19/quanto-guadagna-un-ingegnere-informatico-una-panoramica-realistica/</loc>
		<lastmod>2026-02-19T11:39:52+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/12/intelligenza-artificiale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/03/16/fisica-1-ingegneria/</loc>
		<lastmod>2026-03-16T13:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/03/Fisica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/03/16/come-studiare-matematica/</loc>
		<lastmod>2026-03-16T13:43:09+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/03/matematica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/03/16/ingegneria-informatica-gestionale-civile/</loc>
		<lastmod>2026-03-16T13:51:28+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/03/ingegneria.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/03/16/laurea-in-ingegneria-online/</loc>
		<lastmod>2026-03-16T13:57:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/03/ingegneria2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/03/16/laurea-in-ingegneria-a-30-anni/</loc>
		<lastmod>2026-03-16T14:03:20+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/03/laurea-ing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/04/16/ingegneria-informatica-online-2026/</loc>
		<lastmod>2026-04-16T07:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/05/Ingegneria-Informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/04/16/ingegneria-informazione/</loc>
		<lastmod>2026-04-16T08:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/01/Ingegneria-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/04/16/ingegneria-informatica-online/</loc>
		<lastmod>2026-04-16T08:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2026/02/Esami-ing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/04/16/programmatore-ingegnere-informatico/</loc>
		<lastmod>2026-04-16T08:14:19+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2025/01/programmazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ingegneriainformaticaonline.it/2026/04/16/ingegnere-informatico-freelance/</loc>
		<lastmod>2026-04-16T08:22:38+00:00</lastmod>
		<image:image>
			<image:loc>https://ingegneriainformaticaonline.it/wp-content/uploads/2024/12/SCADA.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->