Computing & Technology

View All

Two Paths for Digital Disability Law

Digital accessibility has its roots in a decades-long legal movement.

Raising Robovoices

“If you just chain together automatic transcription, translation, and speech synthesis, you end up accumulating too many errors.”

Modern Tech Can’t Shield Your Secret Identity

Superheroes worry about having their identities revealed, while the rest of us in the real world worry about surveillance technologies and how they can be easily abused.

The Troubling Future for Facial Recognition Software

There is promising, if somewhat slow, progress on making facial recognition software less biased.

A Call to Action

We cannot put the genii back in the bottle, but we can ensure human control.

Technology’s Impact on Morality

Technology without morality is barbarous; morality without technology is impotent.—Freeman Dyson

CyberSecurity

View All

Cybersecurity as Illuminator for the Future of Computing Research

Security is still viewed by much of the computing research community in a narrow technical context, leading to results poorly aligned with motivating real-world needs.

Europe’s Move Against Google Analytics Is Just the Beginning

Austria’s data regulator has found that the use of Google Analytics is a breach of GDPR. In the absence of a new EU-US data deal, other countries may follow.

What is GDPR? The summary guide to GDPR compliance in the UK

General Data Protection Regulation, or GDPR, have overhauled how businesses process and handle data. Our need-to-know GDPR guide explains what the changes mean for you

The Future of Tech Is Here. Congress Isn’t Ready for It

In a conversation with WIRED, former representative Will Hurd talked AI, the metaverse, China, and how ill-prepared legislators are to grapple with any of it.

6 Ways to Delete Yourself From the Internet

You’ll never be able to get a clean slate—but you can significantly downsize your digital footprint.

The Most Vulnerable Place on the Internet

Underwater cables keep the internet online. When they congregate in one place, things get tricky.

Climate

View All

Hurricane Ian Is a Warning From the Future

Tropical storms are increasingly likely to batter the US as oceans warm—and will continue to wreak havoc so long as climate change remains unaddressed.

The Desert’s Fragile Skin Can’t Take Much More Heat

Climate change and human activity are destroying the layers of fungi, lichen, and bacteria that protect deserts from erosion.

If You Don’t Already Live in a Sponge City, You Will Soon

Less pavement and more green spaces help absorb water instead of funneling it all away—a win-win for people and urban ecosystems.

California’s Heat Wave Is a Big Moment for Batteries

Scorching temperatures in the Golden State are a test case for a more flexible energy grid.

The US agency in charge of developing fossil fuels has a new job: cleaning them up

The Office of Fossil Energy and Carbon Management has a new name, new leaders, and a new mandate to meet Joe Biden’s climate goals.

A River Runs Through It

Unearthing streams breathes life back into local communities.

Weather | Snow | Utah

View All

Winter Storm Elliott – December, 2022

The United States was hit by historically cold and windy Winter weather with a rare mid-latitude mid-continent cyclone, one that would undergo a process of rapid intensification called Bombogenesis, or Bomb Cyclogenesis. The event was termed “Winter Storm Elliott.” This …

A History of Avalanche Mitigation in the Cottonwood Canyons

Big and Little Cottonwood Canyon roads carve between steep mountains that are prone to avalanches in the winter. In fact, 57% of the 9-mile Little Cottonwood Canyon Road is in an avalanche runout zone. Still, recreationalists, residents, and canyon employees need to transport themselves up and down these canyons regularly and as safely as possible.

#Avalanche: In a world obsessed with social media, avalanche centers are relying more and more on the attention-grabbing platforms to better equip backcountry skiers

“Originally, we looked at social media very much as another way of disseminating the forecast,” said Ethan Greene, director of the CAIC. “We still do that, but have been using it more to engage people and try to get out information about current conditions as well as broader education out to people. It’s been a good way for people to ask questions, and we’ve done our best to address those questions.”

Avalanche Busters: A Historical Memoir of the Snowbird and Alta Ski Patrols

This historical memoir gives the reader a mesmerizing, behind-the-scenes view of the founding of Snowbird Ski and Summer Resort and discloses how the ski patrol worked on the avalanche-ridden mountain.

Colorado Avalanches – Cement Fill Avalanche on Highway 550

Cement Fill Avalanche on Highway 550 between Ouray and Silverton, Colorado on March 10, 2019. Stop-motion images from Silverton Avalanche School video on Facebook.

Avalanche Problems Toolbox

Use the nine “Avalanche Problems” to understand avalanche types. Learn to approach the mountain with an eye toward current avalanche conditions and avalanche problems to assist in making wise terrain choices.

Web Resources

View All

The anatomy of a WordPress theme

Yoast’s WordPress theme infographic.

Flexbox Tutorial by Sean Fioritto

This is an interactive video intro to flexbox and is comprised of 5 sections that walk through various parts of flexbox.

F.B. Purity – Clean Up and Customize Facebook

F.B. Purity is a browser extension / add-on that lets you clean up and customise Facebook. It filters out the junk you don’t want to see, leaving behind the stories and page elements you do wish to see. The list of story types that FBP hides is customizable to your taste.

WPBeginner – Beginner’s Guide for WordPress

At WPBeginner, our main goal is to provide cutting-edge helpful WordPress tutorials that are easy to understand for small businesses, bloggers, and non-techy WordPress website owners.

Auditing For Accessibility Problems With Firefox Developer Tools

The Firefox 70 Accessibility Inspector is an auditing facility to help identify and fix many common mistakes and practices to help improve site accessibility.

Internet Archive Wayback Machine

The Wayback Machine is a digital archive of the World Wide Web and other information on the Internet. It was launched in 2001 by the Internet Archive, a nonprofit organization based in San Francisco, California, United States.

Categorized Tag Cloud – All Categories

5G - 5th Generation Wireless - 50th Anniv. Moon Landing - Accessibility Systems & Tools - Accidental Humor - Active Measures - Activism - Ad Blocking - Advanced Persistent Threats (APT) - Adventure - Agile Software Development - Agrotechnology - Alternative Security Frameworks for HPC - Amazon Web Services - Ambient Intelligence - Animation - Antitrust - Apple Inc. - Approachable Programming - Artificial Intelligence - Artificial Intelligence Research - Artificial Olfaction - ASIC (Application-Specific Integrated Circuit) - Assistive Technology - Association for Computing Machinery's A.M. Turing Award - Attention Economy - Attestation - Audio & Video on the Web - Authentication - Autism at Work - Automated Vehicles - Automation - Autonomous Systems - Avalanche Awareness - Avalanche Awesomeness - Avalanche Control & Mitigation - Avalanche Education - Avalanche Hazard Forecasting - Avalanche Photos - Avalanche Problems - Avalanche Rescue - Avalanche Safety - Avalanche Types - Backcountry Travel & Safety - Backcountry Travels - Backdoor - Battery Technology - Behavioral Futures Markets - Behavioral Modification - Behavioral Surplus - Belarus - Bellingcat - Best Practices - Bias - Biomedical Computing Research - Biometrics - Birding - Bitcoin Network - Blizzard - Blockchain Technology - Blocking Tech Giants - Blogs - Bloomberg BusinessWeek - Bluetooth-based Wireless Beacons - Bombogenesis - Books - Border Gateway Protocol (BGP) - Bots - Branding - Breach Risk - Browser Plugins & Add-ons - Browser Stats - Bug Bounty Programs - Business & Organizational Transformation - Business Innovation - Canyon Traffic - Capture-the-Flag Hacking Events (CTFs) - Carbon Capture / Carbon Removal - Carbon Dioxide - Central Intelligence Agency (CIA) - Certificate Authorities - Channel Capacity (Shannon Limit) - Channel Polarization (Polar Codes) - Chief eXperince Officer (CXO) - Children's Books - Children - Protecting - China - China - Innovation - CISA (CyberSecurity & Infrastructure Security Agency) - CISA Security Tip - Civil Liberties - Classics - Clickbait - Climate - Climate Change - Climate Modelling - Climate Policy - Climate Research - Climatology - Cloud Computing - Coding - Coding Security - Collaborative Systems - Collusion Networks - Colorado Avalanches March 2019 - Colossal Ooops! - Computer Chip Manufacture - Computer Configuration - Computer Crimes - Computer Disposal - Computer Generated Imagery - Computer Graphics - Computer Networks - Security - Computers & Civilization - Computers and the Internet - Computer Science - Computer Security - Computer Viruses - Computing - Computing as a Profession - Computing Curricula - Computing Education - Computing News - Connectivity - Contact Tracing - Content Moderation - Content Strategy - Continuous Delivery - Conversational Search - Copyright and Digital Rights Management - Coronavirus-Covid19 - Credential Stealing - Credibility - Crowdsourced Content - Cryptobiotic Soil (Biocrust) - Cryptography - CSS - Culture - Cyber-Resilience - Cyber-Resilient Distributed Systems Design - Cyber-Social Systems - Cyber Attribution - CyberConflict - Cyber Crime - Cyber Identity - Cyber Incident Response - CyberInsecurity - Cyber Intelligence - Cyber Investigation - Cyber Reconnaissance & Countermeasures - Cyber Reconnaissance Techniques and Sources - Cyber Safety - CyberSecure Systems - CyberSecurity - CyberSecurity at Home - CyberSecurity at Work - CyberSecurity Education - CyberSecurity Engineering - CyberSecurity for Kids Online - CyberSecurity for Video Conferencing - Cybersecurity Knowledge - CyberSecurity News - Cybersecurity Research and Development - Cybersecurity Risk - CyberSecurity Workforce - Cyberspace Operations - Cyber Terrorism - Cyber Terrorism - Prevention - Cyber Warfare - Cyber Weapons - Daily Forecasts - Daily Updates - Database Systems - Data Brokers - Data Centers - Data Integrity - Data Management - Data Mining - Data Networks - Data Portability - Data Science - Data Storage Technology - Debugging - Decarbonize - Decryption Tools - Deepfake Detecting - Deepfakes / Digital Fakes - Deep Learning (DL) - Deep Learning Neural Network (DNN) - Defending Democracy - Defense Innovation Unit - Design - Design Patterns - Design Process - Detailed Observation - Developer Tools - Device-Independent Quantum Key Distribution - Digital Abuse - Digital Archive - Digital Authoritarianism - Digital Currency - Digital Democracy - Digital Identities - Digital Knowledge - Digital Library - Digital Media - Digital Millennium Copyright Act (DMCA) - Digital Permanence - Digital Revolution - Digital Spam - Disinformation (Coordinated Inauthentic Behavior) - Distributed Computing / Distributed Systems - Documentary - Documentation - Domestic Intelligence - Doxing - eCommerce - Economics - Educational - Election Security - Electric Vehicle Technology - Electronic and Information Warfare - Electronic Intelligence - Employment - Encryption - End-to-End Encryption - Entertainment - Environment & Technology - Environmental Impacts of Computing - Espionage - Cyber - Espionage - State-Sponsored - Ethics - Ethics of AI - eWaste - Extreme Automation - Extreme Ultraviolet Lithography - Facebook - Facebook - Social Aspects - Face Recognition - Facial Recognition - Fiber-optic Cable - File Systems - Filter Bubbles - Firefox Browser - Fire Related Weather - Fire Tornado - Fire Whirl - Flexbox - Flooding - Food Insecurity - Food Movement - Formal Methods - Fourth Industrial Revolution - FPGA (Field-Programmable Gate Array) - Free-Market Capitalism - Future of Work - Game Theory - General Data Protection Regulation (GDPR) - General Purpose Computers - Genetic Modification - Geography - Geopolitics - Geosciences - Going Dark - Google - Google (Firm) - Government Policy - Government Regulation - Government Services - Graphics & Images - Guidance - Hacker Culture - Hacker Ethic - Hackers & Hacking - Hacking for Hire - Hacktivism - Hardware Design - Hardware Security - Hardware Trojans - Heuristic Evaluation - High Performance Computing - Historical - Historical Analogy - History - Computing - History - Cyber - History - Facebook - History - Internet - History - Military - History - Silicon Valley - History - Utah Skiing - History - WSO - History - YouTube - Home Network Security - Honey Pot / Watering Hole - How Search Works - How Things Work - How To - How to Update - HTML - HTTP Standard - Huawei - Human-Automation Interaction - Human-centered Computing - Human Aspects of Security - Human Computer Interaction - Human Factors (Psychology) - Humanity - Human Mind - Human Psychology - Humor - Hurricanes / Tropical Cyclones - Identifiers - Identity Management - Identity Theft - Indistinguishability Obfuscation - Industrial Food - Influencers in Social Media - Informatics - Information Architecture - Information Communication Technology (ICT) - Information Integration - Information Integrity - Information Retrieval - Information Security - Information Technology - Information Theory - Information Warfare - Innovation - Insider Cyber Sabotage - Insider Threats - Instructional - Integrated Circuits - Intellectual Property - Intelligent Systems - Interaction Design - Interactive Analytics - International Governance - Internet - Government Policy - Internet Access - Internet Architecture - Internet Archive - Internet Backbone - Internet Censorship - Internet Censorship Circumvention - Internet Connectivity - Internet Education - Internet Governance - Internet Industry - Internet of Things (IoT) - Internet Policy - Internet Safety - Internet Security - Internet Speed Testing - Internet Standards - Internet Stats Trends and Demographics - Interviews - iOS (Apple Operating System) - Iran - Israel - IT - Social Aspects - IT - Technological Innovation - JavaScript - JavaScript Libraries - Just Plain Fun - Keen Insight - Key Escrow - Knowledge Graph - Knowledge Representation - Krebs-The Value of Series - Law & Policy - Law & Technology - Law Enforcement - Law of Armed Conflict - Leadership & Professionalism - Leaks (Disclosure of Information) - Learn to Code - Limiting Data Collection - Longitudinal Studies - Lorem Ipsum - Low Code & No Code Software Development Technoloies - Luxury Surveillance - Machine Learning - Malicious Links - Malware - Market Liability - Mathematics - Medical Applications of Computing Technology - Medical Records - Medical Technology - Medicine - Meltdown Vulnerability - Meme Culture - Metaverse - Meteorology - Methane - Microsoft - Microsoft Exchange Servers - Misinformation - Mobile & Tablet - Mobile Device Security - Mobile Phone Metadata - Money Laundering - Moon Dust Physics - Moore's Law - Mozilla - Multi-factor Authentication - Multilevel Security - Multiparty Computation - Music - National Security (US) - National Security Agency - National Security Policy - Natural Language Generation - Natural Language Processing - Navigation - Net Neutrality - Network Attack & Defense - Network Science - Network Security - Neural Networks - Neurodiversity Programs - NNg-UX - Non-Traditional Data Sources - North Korea - NSO - OAuth Access Tokens - OAuth Secure Delegated Access - Ocean Currents - Olfaction - Online Advertising - Online Harassment - Online Marketplaces - Online Social Networks - Open Architecture - Open Compute Project - Open Internet - Open Source Intelligence (OSINT) - Open Web Index - Opinion & Perspective - Orbital Traffic Control - Organizational Culture - Overcrowding - Packet Switching - Password Blacklists - Password Managers - Password Re-use - Passwords - Pegasus - Permafrost - Persistent Engagement - Personal Data - Personality Traits - Personal Security - Personas - Persuasive Design - Phishing - Photographs - Physical Protection - Podcast - Political Advertising - Political Interest - Politics & Government - Popular Culture - Post-Quantum Cryptographic Algorithms - Power Usage Efficiency - Precipitation Types - Prioritizing Cybersecurity - Privacy - Privacy & Data Protection - Privacy & Personal Information - Privacy - Right of - Privacy Policies - Problem Solving - Programming - Propaganda - Protecting Democracy - Psychology and Usability - Psychology and UX - Public-Interest Technologists - Public Infrastructure - Puzzles - Logic & Math - Quantum Computing - Quantum Cryptography - Quantum CyberSecurity - Quantum Resistance - Quantum Technologies - Quantum Vulnerability - Queueing Theory - Quick Reference - Ransomware - Ransomware Decryptors - Ransomware Q&A - Real-name Verification - Real-Time Communication (RTC) - Record Cold - Record Heat - Remote Work on the Web - Renewable / Sustainable Energy - Reporting Online Criminal Activity - Reputation Manipulation Services - Research Methods - Resource Public Key Infrastructure (RPKI) - Resources - Risk - Road Conditions - Robotics - Route Origin Validation (ROV) - Routing Attacks - Rusia - Russia - Safety Critical Systems - Sandworm - Science - Science Fiction - Search - Search Engine Optimization - Search Rank - Secure Systems - Securing My Business - Security - Security Advisories - Security Certification - Security Deception Software - Security Economics - Security Engineering - Security Guidance - Security News - Security of Hardware Optimizations - Security Posture - Security Testing - Security Tips - Security Training - Self-Driving Vehicle Technology - Series: WaPo - Behind the Firewall - Side Channels - Site Design - Site Reliability Engineering - SLaaP - Street Lamps as a Platform - Slacktivism - Smart Cities - Smartphone Apps - SMS (Short Message Service) - Snow Conditions - Snow Science - Snow Study - Social Bots - Social Control - Social Credit - Social Engineering - Social Interest - Social Justice - Social Media - Social Media in Avalanche Awareness & Forecasting - Social Media – Novel & Beneficial Uses - Software - Software Security - Space - Space Travel - Spectre Vulnerability - Speech Emotion Recognition - Speech Recognition - Speech Synthesis - Speech Translation - Spyware - Squarespace - STEM & STEAM Education - Stockpiling of Sensitive Data - Stockpiling of Vulnerabilities - Store-tracking Technology - Strategies to Mitigate Cyber Threats - Strategy - Street Art: Salt Lake - Supply Chain Attack - Supply Chain Risk - Surveillance - Surveillance - Electronic - Surveillance - Mass - Surveillance - Online - Surveillance - Video & Analytics - Surveillance Capitalism - Surveillance for Hire - System Representation - System Safety Engineering - Systems of Technological Governance - Targeted Surveillance Industry - Tech Impact on Youth - Tech Industry - Technological Achievement - Technology - Technology & Politics - Technology & Society - Technology & War - Technology Addiction / Excessive Use - Technology Employee Activism - Technology Policy - Technology Policy Activism - Technology Unions - Telegram - Templates - Terrorism - Prevention - Text Analysis - Theoretical Computer Science - The P vs. NP Problem - Three-dimensional (3D) Computer Imagery - TikTok - Time Series Forecasting - Tor Network (The Onion Router) - Tracking Cookies - Trends - Trust - Trusted Computing Base - Trusted Internet Connections - Trusted Platform Module - Trustworthy Behavior - Trustworthy Systems - Tutorials - U.S. Cyber Command - U.S. Dept. of Defense - Ukraine - Understanding Your World - United States - United States - Politics & Government - Urban Development - Urban Ecology - Urban Technology - User eXperience - User Interface - User Research - User Testing - Variety - Video - Virtual Black Box (VBB) Obfuscation - Virtual Desktops - Virtual Private Networks (VPN) - Visual Design - Visual Privacy - VKontakte - Vulnerabilities - Vulnerabilities Equities Process - War on Terrorism - Wasatch 100 - Water - Weather Forecasting - Weather Info - Weather Phenomena - Web Accessibility - Web Content Accessibility Guidelines - Web Design - Web Development - Webinars - Web Science - Web Search Engines - Web Standards - Web Tools - Web Usability - Wi-Fi - Wikipedia - Wildland Fires - Windows 11 Security - Windows Operating System - Winter Storm Elliott 2022 - Wiper - Wired - Wireless Communications - Women in Computing - WordPress - WordPress Resource - WordPress Security - WordPress Third-Party Plugins & Themes - Work From Home Securely - World Politics - WPA2 Enterprise - Writing for the Web - Youth & Technology - Youth in Cybersecurity - YouTube - Zero-Click / Interactionless Attacks - Zero-Day Exploits - Zoom Videoconferencing - Zuckerberg (Mark) - Influence -