Computing & Technology

View All

How to Use AI to Talk to Whales—and Save Life on Earth

With ecosystems in crisis, engineers and scientists are teaming up to decipher what animals are saying. Their hope: By truly listening to nature, humans will decide to protect it.

Everyone Wants Ukraine’s Battlefield Data

The scale of the fighting and the sheer number of weapons systems and high-tech sensors deployed have created a vast amount of data about how battles are fought and how people and machines behave under fire. For businesses that want to build the next generation of weapons, or train systems that will be useful in future conflicts, that is a resource of incalculable value.

The AI Detection Arms Race Is On

And college students are developing the weapons, quickly building tools that identify AI-generated text—and tools to evade detection. … There’s no stopping AI writing; the only option is to work with it.

New Threats to Society from Free-Speech Social Media Platforms

Understanding emerging threats from social media platforms.

The Fight to Repair

How the battle over the right to repair is tipping in favor of consumers.

What OpenAI Really Wants

The young company sent shock waves around the world when it released ChatGPT. But that was just the start. The ultimate goal: Change everything. Yes. Everything.

8 Google Employees Invented Modern AI. Here’s the Inside Story

They met by chance, got hooked on an idea, and wrote the “Transformers” paper—the most consequential tech breakthrough in recent history.

Inside the messy ethics of making war with machines

AI is making its way into decision-making in battle. Who’s to blame when something goes wrong?

Andrew Ng: How to be an innovator

Tips for aspiring innovators on trying, failing, and the future of AI.

2023 Innovator of the Year: As AI models are released into the wild, Sharon Li wants to ensure they’re safe

Li’s research could prevent AI models from failing catastrophically when they encounter unfamiliar scenarios.


View All

80 years later, GCHQ releases new images of Nazi code-breaking computer

GCHQ unveils new docs on Colossus, a 1943 marvel that let allies “read Hitler’s mind.”

Resources for Cybersecurity Clinics

CISA released this Resource Guide for Cybersecurity Clinics to outline ways CISA can partner with and support cybersecurity clinics and their clients.

CISA and NSA Release Cybersecurity Information Sheets on Cloud Security Best Practices

Cybersecurity Information Sheets (CSIs) to provide organizations with recommended best practices and/or mitigations to improve the security of their cloud environment(s)

CISA Releases Microsoft 365 Secure Configuration Baselines and SCuBAGear Tool

CISA has published the finalized Microsoft 365 Secure Configuration Baselines, designed to bolster the security and resilience of organizations’ Microsoft 365 (M365) cloud services.

How to Be More Anonymous Online

Being fully anonymous is next to impossible—but you can significantly limit what the internet knows about you by sticking to a few basic rules.

Standards to Secure the Sensors That Power IoT

Yet as IoT adoption increases, IoT sensors and devices also are becoming more popular targets for cybercriminals.

Security by Labeling

Consumer cybersecurity can no longer be ignored.

A Turning Point for Cyber Insurance

Going forward cyber-insurance providers will thrive by succeeding in: rewarding security; generating knowledge; and punishing insecurity.

CISA Cybersecurity Strategic Plan

The Cybersecurity and Infrastructure Security Agency’s (CISA) 2023-2025 Strategic Plan is the agency’s first, comprehensive strategic plan since CISA was established in 2018. This is a major milestone for the agency.

CISA Develops Factsheet for Free Tools for Cloud Environments

CISA has developed and published a factsheet, Free Tools for Cloud Environments, to help businesses transitioning into a cloud environment identify proper tools and techniques necessary for the protection of critical assets and data security.

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Why do nations break into one another’s most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn’t the full story.

Lamboozling Attackers: A New Generation of Deception

Imagine a world in which developers and operators of systems exploit attackers as much as attackers exploit defenders. By leveraging system-design knowledge and modern computing to deploy deception environments, software engineering teams can successfully bamboozle attackers for fun and profit while deepening systems resilience.


View All

The Carbon Footprint of Artificial Intelligence

Looking for ways to cut the release of greenhouse gases attributable to AI use, at a time that usage is very likely to grow.

The Catholic cartographer who wants to help the church fight climate change

The Catholic Church is one of the world’s largest landowners. Using public data and GIS, Molly Burhans is trying to make it a better steward.

The Trillion-Dollar Auction to Save the World

Ocean creatures soak up huge amounts of humanity’s carbon mess. Should we value them like financial assets?

Let Us Not Put All Our Eggs in One Basket

But what about the overall environmental impacts of this growing infrastructure and the huge number of short-lived devices connected to it, or the indirect impacts on other sectors?

Mapping California’s ‘Zombie’ Forests

In California’s ‘zombie’ forests, conifers have become mismatched to a warming climate.

Our House Is On Fire: The Climate Emergency and Computing’s Responsibility

We will most likely never do better than a best guess at computing’s carbon footprint, but given uncertainties it would be safer and more responsible to act on the assumption that higher estimates could be closer to the truth—especially since the pace of warming has exceeded our expectations at every point. But in big-picture terms, the difference between 1.8% and 3.9% does not fundamentally change our mission: computing’s emissions must be reduced urgently and drastically. How are we going to achieve this?

Extreme Heat Is a Disease for Cities. Treat It That Way

The “urban heat island effect” creates extra-hot temperatures that kill. But cities can prescribe powerful treatments, like green spaces and reflective roofs.

Hidden beneath the surface

Digging deep into a humble lake in Canada, scientists found a spot on Earth like no other — and a record that could redefine our history of the planet

Hurricane Ian Is a Warning From the Future

Tropical storms are increasingly likely to batter the US as oceans warm—and will continue to wreak havoc so long as climate change remains unaddressed.

The Desert’s Fragile Skin Can’t Take Much More Heat

Climate change and human activity are destroying the layers of fungi, lichen, and bacteria that protect deserts from erosion.

Weather | Snow | Utah

View All

Weather forecasting is having an AI moment

Using AI to predict weather has a big advantage: it’s fast. Traditional forecasting models are big, complex computer algorithms based on atmospheric physics and take hours to run. AI models can create forecasts in just seconds.

National Weather Service Glossary

The National Weather Service glossary contains information on more than 2000 terms, phrases and abbreviations used by the NWS.

DeepMind AI accurately forecasts weather — on a desktop computer

The machine-learning model takes less than a minute to predict future weather worldwide more precisely than other approaches.

Avalanches in Big & Little Cottonwood Canyon Early April 2023

During the last week of March and first week of April, Big & Little Cottonwood Canyons saw an epic snow cycle the likes of which have never been seen before. Little Cottonwood Canyon (“LCC”) closed due to avalanche danger on Sunday April 2, 2023. The canyon generally did not open again until Saturday April 8. (There were two brief periods when the canyon was open to the public to downhill travel only, so that people who needed/wanted could leave. Otherwise, the general public was prohibited from going up or down the canyon during the period April 1-8.

Wasatch Backcountry Skiing Map, 4th Ed.

The Wasatch Backcountry Skiing Map is a full-color paper map that compliments the website, Android app, and iOS app. The map includes the names of almost 1,000 backcountry locations in the Central Wasatch.

Winter Storm Elliott – December, 2022

The United States was hit by historically cold and windy Winter weather with a rare mid-latitude mid-continent cyclone, one that would undergo a process of rapid intensification called Bombogenesis, or Bomb Cyclogenesis. The event was termed “Winter Storm Elliott.” This …

A History of Avalanche Mitigation in the Cottonwood Canyons

Big and Little Cottonwood Canyon roads carve between steep mountains that are prone to avalanches in the winter. In fact, 57% of the 9-mile Little Cottonwood Canyon Road is in an avalanche runout zone. Still, recreationalists, residents, and canyon employees need to transport themselves up and down these canyons regularly and as safely as possible.

Web Resources

View All

The Design of Everyday Things

“This is a starter kit for good design. It is intended to be enjoyable and informative for everyone: everyday people, technical people, designers, and nondesigners.”

Color Blind Accessibility Manifesto

A study conducted in 2021 by Web Accessibility In Mind illustrated that 83% of the Internet’s top one million homepages failed to meet minimum color contrast requirements. That means about 860,000 of the most visited pages on the Internet aren’t designed with people with Color Vision Deficiency in mind.

The anatomy of a WordPress theme

Yoast’s WordPress theme infographic.

Flexbox Tutorial by Sean Fioritto

This is an interactive video intro to flexbox and is comprised of 5 sections that walk through various parts of flexbox.

F.B. Purity – Clean Up and Customize Facebook

F.B. Purity is a browser extension / add-on that lets you clean up and customise Facebook. It filters out the junk you don’t want to see, leaving behind the stories and page elements you do wish to see. The list of story types that FBP hides is customizable to your taste.

WPBeginner – Beginner’s Guide for WordPress

At WPBeginner, our main goal is to provide cutting-edge helpful WordPress tutorials that are easy to understand for small businesses, bloggers, and non-techy WordPress website owners.

Auditing For Accessibility Problems With Firefox Developer Tools

The Firefox 70 Accessibility Inspector is an auditing facility to help identify and fix many common mistakes and practices to help improve site accessibility.

Internet Archive Wayback Machine

The Wayback Machine is a digital archive of the World Wide Web and other information on the Internet. It was launched in 2001 by the Internet Archive, a nonprofit organization based in San Francisco, California, United States.

Categorized Tag Cloud – All Categories

5G - 5th Generation Wireless 50th Anniv. Moon Landing Accessibility Systems & Tools Accidental Humor Active Measures Activism Ad Blocking Advanced Persistent Threats (APT) Adventure Agile Software Development Agrotechnology Algorithms Alternative Security Frameworks for HPC Amazon Web Services Ambient Intelligence Animation Antitrust Apple Inc. Approachable Programming Artificial General Intelligence (AGI) Artificial Intelligence Artificial Intelligence & Ecology Artificial Intelligence (AI) Safety Artificial Intelligence Research Artificial Intelligence – Novel & Beneficial Uses Artificial Olfaction ASIC (Application-Specific Integrated Circuit) ASML Assistive Technology Association for Computing Machinery's A.M. Turing Award Attention Economy Attestation Audio & Video on the Web Augmented Reality Authentication Autism at Work Automated Vehicles Automation Autonomous Systems Avalanche Awareness Avalanche Awesomeness Avalanche Control & Mitigation Avalanche Education Avalanche Hazard Forecasting Avalanche Photos Avalanche Problems Avalanche Rescue Avalanche Safety Avalanche Types Backcountry Travel & Safety Backcountry Travels Backdoor Battery Technology Behavioral Futures Markets Behavioral Modification Behavioral Surplus Belarus Bellingcat Best Practices Bias Biomedical Computing Research Biometrics Birding Bitcoin Network Blizzard Blockchain Technology Blocking Tech Giants Blogs Bloomberg BusinessWeek Bluetooth-based Wireless Beacons Bombogenesis Books Border Gateway Protocol (BGP) Bots Brain-computer Interfaces Branding Breach Risk Browser Plugins & Add-ons Browser Stats Bug Bounty Programs Business & Organizational Transformation Business Innovation Canyon Traffic Capture-the-Flag Hacking Events (CTFs) Carbon Capture / Carbon Removal Carbon Credits Carbon Dioxide Central Intelligence Agency (CIA) Certificate Authorities Channel Capacity (Shannon Limit) Channel Polarization (Polar Codes) Chatbot ChatGPT Chief eXperince Officer (CXO) Children's Books Children - Protecting China China - Innovation CISA (CyberSecurity & Infrastructure Security Agency) CISA Security Tip Civil Liberties Classics Clickbait Climate Climate Change Climate Change & Computing’s Responsibility Climate Modelling Climate Policy Climate Record Climate Research Climatology Cloud Computing Cloud Security Coding Coding Security Collaborative Systems Collusion Networks Colorado Avalanches March 2019 Colossal Ooops! Community Cyber Defense Computer Chip Manufacture Computer Configuration Computer Crimes Computer Disposal Computer Generated Imagery Computer Graphics Computer Networks - Security Computers & Civilization Computers and the Internet Computer Science Computer Science Education Computer Security Computer Viruses Computing Computing as a Profession Computing Curricula Computing News Connectivity Consumer Labelling Contact Tracing Content Moderation Content Strategy Continuous Delivery Conversational Search Copyright and Digital Rights Management Coronavirus-Covid19 Countering Societal Threats Credential Stealing Credibility Crowdsourced Content Cryptobiotic Soil (Biocrust) Cryptography CSS Culture Cyber-Physical Systems Cyber-Resilience Cyber-Resilient Distributed Systems Design Cyber-Social Systems Cyber Attribution CyberConflict Cyber Crime Cyber Identity Cyber Incident Response CyberInsecurity Cyber Insurance Cyber Intelligence Cyber Investigation Cyber Reconnaissance & Countermeasures Cyber Reconnaissance Techniques and Sources Cyber Safety CyberSecure Systems CyberSecurity CyberSecurity at Home CyberSecurity at Work Cybersecurity Clinics CyberSecurity Education CyberSecurity Engineering CyberSecurity for Kids Online CyberSecurity for Video Conferencing Cybersecurity Knowledge CyberSecurity News Cybersecurity Research and Development Cybersecurity Risk CyberSecurity Workforce Cyberspace Operations Cyber Terrorism Cyber Terrorism - Prevention Cyber Warfare Cyber Weapons Daily Forecasts Daily Updates Data as Valuable Database Systems Data Brokers Data Centers Data Integrity Data Management Data Mining Data Networks Data Portability Data Science Data Storage Technology Debris Flows Debugging Decarbonize Deceptive Environments Decision Making Decryption Tools Deepfake Detecting Deepfakes / Digital Fakes Deep Learning (DL) Deep Learning Neural Network (DNN) Defending Democracy Defense Innovation Unit Design Design Patterns Design Process Detailed Observation Detecting GPT Generated Content Detection Tools Developer Tools Device-Independent Quantum Key Distribution Digital Abuse Digital Archive Digital Authoritarianism Digital Currency/Money Digital Democracy Digital Identities Digital Knowledge Digital Library Digital Media Digital Millennium Copyright Act (DMCA) Digital Permanence Digital Revolution Digital Spam Disinformation (Coordinated Inauthentic Behavior) Disruptive Innovation Distributed Computing / Distributed Systems Documentary Documentation Domestic Intelligence Doxing Drones eCommerce Economics Educational Election Security Electric Vehicle Technology Electromagnetic Spectrum Electronic and Information Warfare Electronic Intelligence Embedded Systems Employment Encryption End-to-End Encryption Entertainment Environment & Technology Environmental Impacts of Computing Espionage - Cyber Espionage - State-Sponsored Ethics Ethics of AI eWaste Extreme Automation Extreme Ultraviolet Lithography Facebook Facebook - Social Aspects Face Recognition Facial Recognition Fact-Checking Fiber-optic Cable File Systems Filter Bubbles Firefox Browser Fire Related Weather Fire Tornado Fire Whirl Firmware Flexbox Flooding Food Insecurity Food Movement Forest Health Formal Methods Fourth Industrial Revolution FPGA (Field-Programmable Gate Array) Free-Market Capitalism Future of Work Game Theory General Data Protection Regulation (GDPR) General Purpose Computers Genetic Modification Geographic Information System (GIS) Mapping Geography Geopolitics Geosciences Glossary Going Dark Google Google (Firm) Government Policy Government Regulation Government Services GPT Graphics & Images Guidance Hacker Culture Hacker Ethic Hackers & Hacking Hacking for Hire Hacktivism Hardware Design Hardware Security Hardware Trojans Heuristic Evaluation High Performance Computing Historical Historical Analogy History - Artificial Intelligence History - Computing History - Cyber History - Facebook History - Internet History - Military History - Photographic History - Silicon Valley History - Utah Skiing History - WSO History - YouTube Home Network Security Honey Pot / Watering Hole How Search Works How Things Work How To How to Update HTML HTTP Standard Huawei Human-Automation Interaction Human-centered Computing Human Aspects of Security Human Computer Interaction Human Factors (Psychology) Humanity Human Mind Human Psychology Humor Hurricanes / Tropical Cyclones Identifiers Identity Management Identity Theft Impacts of Automation Indistinguishability Obfuscation Industrial Food Influencers in Social Media Informatics Information and Communication Technologies for Development (ICT4D) Information Architecture Information Communication Technology (ICT) Information Integration Information Integrity Information Retrieval Information Security Information Sovereignty Information Technology Information Theory Information Warfare Innovation Insider Cyber Sabotage Insider Threats Instructional Integrated Circuits Intellectual Property Intelligent Systems Interaction Design Interactive Analytics International Governance Internet - Government Policy Internet Access Internet Architecture Internet Archive Internet Backbone Internet Censorship Internet Censorship Circumvention Internet Connectivity Internet Education Internet Governance Internet Industry Internet of Things (IoT) Internet Policy Internet Safety Internet Security Internet Speed Testing Internet Standards Internet Stats Trends and Demographics Interviews iOS (Apple Operating System) Iran Israel IT - Social Aspects IT - Technological Innovation JavaScript JavaScript Libraries Just Plain Fun Keen Insight Key Escrow Knowledge Graph Knowledge Representation Krebs-The Value of Series Large Language Model (LLM) Law & Policy Law & Technology Law Enforcement Law of Armed Conflict Leadership & Professionalism Leaks (Disclosure of Information) Learn to Code Limiting Data Collection Limitless Growth: Is it a Good Idea? Longitudinal Studies Lorem Ipsum Low Code & No Code Software Development Technoloies Luxury Surveillance Machine Learning Malicious Links Malware Mapping (Cartography) Maps Market Liability Mathematics Medical Applications of Computing Technology Medical Records Medical Technology Medicine Meltdown Vulnerability Meme Culture Metaverse Meteorology Methane Microsoft Microsoft Exchange Servers Military / Defense Misinformation Mobile & Tablet Mobile Device Security Mobile Phone Metadata Money Laundering Moon Dust Physics Moore's Law Mozilla Mud Flows Multi-factor Authentication Multilevel Security Multiparty Computation Music National Security (US) National Security Agency National Security Policy Natural Language Generation Natural Language Processing Navigation Net Neutrality Network Attack & Defense Network Science Network Security Neural Networks Neurodiversity Programs NNg-UX Non-Fungible Token (NFT) Non-Traditional Data Sources North Korea NSO OAuth Access Tokens OAuth Secure Delegated Access Ocean Currents Olfaction Online Advertising Online Harassment Online Marketplaces Online Shopping Open Architecture Open Compute Project Open Internet Open Source Open Source Community Open Source Intelligence (OSINT) Open Source Software Open Web Index Opinion & Perspective Orbital Traffic Control Organizational Culture Overcrowding Packet Switching Passkeys Password Blacklists Password Managers Password Re-use Passwords Pegasus Permafrost Persistent Engagement Personal Data Personality Traits Personal Security Personas Persuasive Design Phishing Photographs Photolithography Physical Protection Podcast Political Advertising Political Interest Politics & Government Popular Culture Post-Quantum Cryptographic Algorithms Power Usage Efficiency Precipitation Types Prioritizing Cybersecurity Privacy Privacy & Data Protection Privacy & Personal Information Privacy - Right of Privacy Policies Problem Solving Programming Propaganda Protecting Democracy Psychology and Usability Psychology and UX Public-Interest Technologists Public Infrastructure Puzzles - Logic & Math Quantum Computing Quantum Cryptography Quantum CyberSecurity Quantum Resistance Quantum Technologies Quantum Vulnerability Questioning Technology Queueing Theory Quick Reference Ransomware Ransomware Decryptors Ransomware Q&A Rapid Technological Changes Real-name Verification Real-Time Communication (RTC) Record Cold Record Heat Remote Work on the Web Renewable / Sustainable Energy Reporting Online Criminal Activity Reputation Manipulation Services Research Methods Resource Public Key Infrastructure (RPKI) Resources Right to Repair Risk Road Conditions Robotics Route Origin Validation (ROV) Routing Attacks Rusia Russia Safety Critical Systems Sandworm Science Science Fiction Search Search Engine Optimization Search Rank Secure Systems Securing My Business Security Security Advisories Security Certification Security Deception Software Security Dilemma Security Economics Security Engineering Security Guidance Security News Security of Hardware Optimizations Security Posture Security Standards Security Testing Security Tips Security Tools Security Training Self-Driving Vehicle Technology Series: WaPo - Behind the Firewall Side Channels Site Design Site Reliability Engineering SLaaP - Street Lamps as a Platform Slacktivism Smart Cities Smartphone Apps SMS (Short Message Service) Snow Conditions Snow Science Snow Study Social Bots Social Control Social Credit Social Engineering Social Interest Social Justice Social Media Social Media in Avalanche Awareness & Forecasting Social Media – Novel & Beneficial Uses Social Responsibility Socioeconomics Sociopolitical Software Software Product Liability Software Security SolarWinds Space Space Travel Spectre Vulnerability Speech Emotion Recognition Speech Recognition Speech Synthesis Speech Translation Spyware Squarespace STEM & STEAM Education Stockpiling of Sensitive Data Stockpiling of Vulnerabilities Store-tracking Technology Strategies to Mitigate Cyber Threats Strategy Street Art: Salt Lake Supply Chain Attack Supply Chain Risk Surveillance Surveillance - Electronic Surveillance - Mass Surveillance - Online Surveillance - Video & Analytics Surveillance Capitalism Surveillance for Hire System Representation System Safety Engineering Systems of Technological Governance Targeted Surveillance Industry Team Management Tech Impact on Youth Tech Industry Technological Achievement Technology Technology & Politics Technology & Society Technology & War Technology Addiction / Excessive Use Technology Employee Activism Technology in Utah Technology Policy Technology Policy Activism Technology Unions Telegram Templates Terrorism - Prevention Text Analysis Theoretical Computer Science The P vs. NP Problem Three-dimensional (3D) Computer Imagery TikTok Time Series Forecasting Tor Network (The Onion Router) Tracking Cookies Trends Trust Trusted Computing Base Trusted Internet Connections Trusted Platform Module Trustworthy Behavior Trustworthy Systems Tutorials U.S. Cyber Command U.S. Dept. of Defense Ukraine Understanding Your World United States United States - Politics & Government Urban Development Urban Ecology Urban Heat Island Urban Technology User eXperience User Interface User Research User Testing Variety Vehicle Data Collection Video Virtual Black Box (VBB) Obfuscation Virtual Desktops Virtual Private Networks (VPN) Virtual Reality Visual Design Visual Privacy VKontakte Vulnerabilities Vulnerabilities Equities Process War on Terrorism Wasatch 100 Water Weather Forecasting Weather Info Weather Phenomena Web3 Web Accessibility Web Content Accessibility Guidelines Web Design Web Development Webinars Web Science Web Search Engines Web Standards Web Tools Web Usability Wi-Fi Wikipedia Wildland Fires Windows 11 Security Windows Operating System Winter Storm Elliott 2022 Wiper Wired Wireless Communications Women in Computing WordPress WordPress Resource WordPress Security WordPress Third-Party Plugins & Themes Work From Home Securely World Politics WPA2 Enterprise Writing for the Web Youth & Technology Youth in Cybersecurity YouTube Zero-Click / Interactionless Attacks Zero-Day Exploits Zoom Videoconferencing Zuckerberg (Mark) - Influence