{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"andreafortuna.org","crawled_at":"2026-03-20T15:40:02.18507Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":9934,"rendered_text_length":10457,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":1202,"li_count":25,"tr_count":0,"th_count":0,"structure_score":2.0799999237060547,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"cloudflare-pages","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":595,"total_html_bytes":19685,"useful_text_bytes":9934,"token_bloat_ratio":2,"images_total":0,"images_with_alt":0,"multimodal_pct":0,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":755,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Andrea Fortuna | Cybersecurity expert, software developer, experienced digital forensic analyst, musician","meta_description":"Cybersecurity expert, software developer, experienced digital forensic analyst, musician","crawl_blocked":false,"ai_readiness_score":68,"sub_bot_access":100,"sub_rendering":99,"sub_structure":26,"sub_schema":2,"sub_tech_stack":75,"extractability_score":53,"crawl_cost_score":10,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":53,"acri_extractability":92,"acri_semantic_structure":38,"acri_content_integrity":74,"acri_retrieval_robustness":22,"acri_grade":"D","h2_texts":"Windows 11 quietly introduced a new execution artifact investigators should start checking | Introducing DFIR Toolkit: Privacy-First DFIR utilities that run entirely in your browser | Cloud repatriation: when moving workloads back on premises is a strategic choice, not a retreat | MalHunt gets a major overhaul: Volatility3, smarter YARA handling, and better error recovery | Ten problems every Volatility2 analyst will hit when migrating to Volatility3 | Face ID vs. Android Face Unlock: A Security Comparison | Audit-Proofing your NIS2 training plan: a strategic guide | Privileged access management: risks and best practices for zero trust implementations | CERT-EU's cyber threat intelligence framework: a common language for European digital defence | The end of security as we knew it: what Claude Code Security really means","tranco_rank":726777,"category":"education","title_length":105,"meta_desc_length":88,"has_canonical":true,"canonical_url":"https://andreafortuna.org/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":21,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Andrea Fortuna","og_description":"Cybersecurity expert, software developer, experienced digital forensic analyst, musician","twitter_card":"summary","ttfb_ms":595,"dom_node_count":188,"html_payload_kb":19.2,"has_hsts":true,"has_csp":false,"cache_control":"public, max-age=0, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://andreafortuna.org/sitemap.xml","internal_links":44,"external_links":3,"tracker_scripts":2,"tracker_domains":"googletagmanager.com | googlesyndication.com","tracker_token_pct":0,"global_score":69,"seo_pillar":30,"geo_pillar":78,"perf_pillar":80,"arch_pillar":93,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-04-02T21:14:19.592502Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"This text describes the author's professional journey and personal interests, focusing on engineering leadership, cybersecurity, and music creation.","target_audience":"Engineering managers, cybersecurity professionals, software developers, musicians, vegan enthusiasts, animal lovers.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Diverse technical skills and experience across multiple programming languages and cybersecurity domains.","content_depth_score":3}},"percentile":62,"similar_domains":[{"domain":"gku.ac.in","acri_score":78,"ai_readiness_score":78,"tech_stack":"proprietary","category":"education","token_bloat_ratio":1.7999999523162842,"schema_count":1,"distance":11.810000014305114,"page_title":"Best Private University in Punjab, India- Guru Kashi University","h1_text":""},{"domain":"univ-avignon.fr","acri_score":78,"ai_readiness_score":80,"tech_stack":"wordpress","category":"education","token_bloat_ratio":1.7000000476837158,"schema_count":1,"distance":11.839999985694885,"page_title":"Accueil - Avignon Université","h1_text":"Avignon Université"},{"domain":"deakincollege.edu.au","acri_score":78,"ai_readiness_score":85,"tech_stack":"wordpress","category":"education","token_bloat_ratio":2.799999952316284,"schema_count":1,"distance":11.989999985694885,"page_title":"Home - Deakin College","h1_text":"Deakin College"},{"domain":"net-s.pl","acri_score":78,"ai_readiness_score":86,"tech_stack":"proprietary","category":"education","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":12.139999985694885,"page_title":"Sklep internetowy NET-S.pl Komputery, notebooki, agd, rtv, zabawki, narzędzia, switche, routery, dyski twarde, drukarki. Mamy zawsze niskie ceny !","h1_text":""},{"domain":"studyqa.com","acri_score":78,"ai_readiness_score":80,"tech_stack":"proprietary","category":"education","token_bloat_ratio":3.5,"schema_count":1,"distance":12.2,"page_title":"StudyQA — a search platform for academic programs and universities around the globe.","h1_text":"Academic Program Finder"}]}
