Computing & Technology

View All

Why Tech Bros and Politicians Can’t Really Connect

There are two ways to compute, and two ways to see the world. It’s batch vs. loop—and we need them to reconcile.

Lost in Afghanistan: Can the World Take ICT4D Seriously?

The CHI and ICT4D community has extensively highlighted the importance of a responsible exit strategy for avoiding software and hardware suppliers’ hostage situations.

The Rise of the Chatbots

How do we keep track of the truth when bots are becoming increasingly skilled liars?

Unleashing the Power of Deep Learning

To achieve local AI, we need to change how we think about designing both our processing hardware and our deep learning software.

Breaking Up a Digital Monopoly

Our proposal rests on the notion that distribution of public discourse and other acquired content serves the common good of the community of content providers and consumers.

Are You Being Tracked by an AirTag? Here’s How to Check

If you’re worried that one of Apple’s trackers is following you without consent, try these tips.


View All

Standards to Secure the Sensors That Power IoT

Yet as IoT adoption increases, IoT sensors and devices also are becoming more popular targets for cybercriminals.

Security by Labeling

Consumer cybersecurity can no longer be ignored.

A Turning Point for Cyber Insurance

Going forward cyber-insurance providers will thrive by succeeding in: rewarding security; generating knowledge; and punishing insecurity.

CISA Cybersecurity Strategic Plan

The Cybersecurity and Infrastructure Security Agency’s (CISA) 2023-2025 Strategic Plan is the agency’s first, comprehensive strategic plan since CISA was established in 2018. This is a major milestone for the agency.

CISA Develops Factsheet for Free Tools for Cloud Environments

CISA has developed and published a factsheet, Free Tools for Cloud Environments, to help businesses transitioning into a cloud environment identify proper tools and techniques necessary for the protection of critical assets and data security.

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Why do nations break into one another’s most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn’t the full story.


View All

The Trillion-Dollar Auction to Save the World

Ocean creatures soak up huge amounts of humanity’s carbon mess. Should we value them like financial assets?

Let Us Not Put All Our Eggs in One Basket

But what about the overall environmental impacts of this growing infrastructure and the huge number of short-lived devices connected to it, or the indirect impacts on other sectors?

Mapping California’s ‘Zombie’ Forests

In California’s ‘zombie’ forests, conifers have become mismatched to a warming climate.

Our House Is On Fire: The Climate Emergency and Computing’s Responsibility

We will most likely never do better than a best guess at computing’s carbon footprint, but given uncertainties it would be safer and more responsible to act on the assumption that higher estimates could be closer to the truth—especially since the pace of warming has exceeded our expectations at every point. But in big-picture terms, the difference between 1.8% and 3.9% does not fundamentally change our mission: computing’s emissions must be reduced urgently and drastically. How are we going to achieve this?

Extreme Heat Is a Disease for Cities. Treat It That Way

The “urban heat island effect” creates extra-hot temperatures that kill. But cities can prescribe powerful treatments, like green spaces and reflective roofs.

Hidden beneath the surface

Digging deep into a humble lake in Canada, scientists found a spot on Earth like no other — and a record that could redefine our history of the planet

Weather | Snow | Utah

View All

DeepMind AI accurately forecasts weather — on a desktop computer

The machine-learning model takes less than a minute to predict future weather worldwide more precisely than other approaches.

Avalanches in Big & Little Cottonwood Canyon Early April 2023

During the last week of March and first week of April, Big & Little Cottonwood Canyons saw an epic snow cycle the likes of which have never been seen before. Little Cottonwood Canyon (“LCC”) closed due to avalanche danger on Sunday April 2, 2023. The canyon generally did not open again until Saturday April 8. (There were two brief periods when the canyon was open to the public to downhill travel only, so that people who needed/wanted could leave. Otherwise, the general public was prohibited from going up or down the canyon during the period April 1-8.

Wasatch Backcountry Skiing Map, 4th Ed.

The Wasatch Backcountry Skiing Map is a full-color paper map that compliments the website, Android app, and iOS app. The map includes the names of almost 1,000 backcountry locations in the Central Wasatch.

Winter Storm Elliott – December, 2022

The United States was hit by historically cold and windy Winter weather with a rare mid-latitude mid-continent cyclone, one that would undergo a process of rapid intensification called Bombogenesis, or Bomb Cyclogenesis. The event was termed “Winter Storm Elliott.” This …

A History of Avalanche Mitigation in the Cottonwood Canyons

Big and Little Cottonwood Canyon roads carve between steep mountains that are prone to avalanches in the winter. In fact, 57% of the 9-mile Little Cottonwood Canyon Road is in an avalanche runout zone. Still, recreationalists, residents, and canyon employees need to transport themselves up and down these canyons regularly and as safely as possible.

#Avalanche: In a world obsessed with social media, avalanche centers are relying more and more on the attention-grabbing platforms to better equip backcountry skiers

“Originally, we looked at social media very much as another way of disseminating the forecast,” said Ethan Greene, director of the CAIC. “We still do that, but have been using it more to engage people and try to get out information about current conditions as well as broader education out to people. It’s been a good way for people to ask questions, and we’ve done our best to address those questions.”

Web Resources

View All

Color Blind Accessibility Manifesto

A study conducted in 2021 by Web Accessibility In Mind illustrated that 83% of the Internet’s top one million homepages failed to meet minimum color contrast requirements. That means about 860,000 of the most visited pages on the Internet aren’t designed with people with Color Vision Deficiency in mind.

The anatomy of a WordPress theme

Yoast’s WordPress theme infographic.

Flexbox Tutorial by Sean Fioritto

This is an interactive video intro to flexbox and is comprised of 5 sections that walk through various parts of flexbox.

F.B. Purity – Clean Up and Customize Facebook

F.B. Purity is a browser extension / add-on that lets you clean up and customise Facebook. It filters out the junk you don’t want to see, leaving behind the stories and page elements you do wish to see. The list of story types that FBP hides is customizable to your taste.

WPBeginner – Beginner’s Guide for WordPress

At WPBeginner, our main goal is to provide cutting-edge helpful WordPress tutorials that are easy to understand for small businesses, bloggers, and non-techy WordPress website owners.

Auditing For Accessibility Problems With Firefox Developer Tools

The Firefox 70 Accessibility Inspector is an auditing facility to help identify and fix many common mistakes and practices to help improve site accessibility.

Categorized Tag Cloud – All Categories

5G - 5th Generation Wireless 50th Anniv. Moon Landing Accessibility Systems & Tools Accidental Humor Active Measures Activism Ad Blocking Advanced Persistent Threats (APT) Adventure Agile Software Development Agrotechnology Alternative Security Frameworks for HPC Amazon Web Services Ambient Intelligence Animation Antitrust Apple Inc. Approachable Programming Artificial Intelligence Artificial Intelligence Research Artificial Intelligence – Novel & Beneficial Uses Artificial Olfaction ASIC (Application-Specific Integrated Circuit) Assistive Technology Association for Computing Machinery's A.M. Turing Award Attention Economy Attestation Audio & Video on the Web Augmented Reality Authentication Autism at Work Automated Vehicles Automation Autonomous Systems Avalanche Awareness Avalanche Awesomeness Avalanche Control & Mitigation Avalanche Education Avalanche Hazard Forecasting Avalanche Photos Avalanche Problems Avalanche Rescue Avalanche Safety Avalanche Types Backcountry Travel & Safety Backcountry Travels Backdoor Battery Technology Behavioral Futures Markets Behavioral Modification Behavioral Surplus Belarus Bellingcat Best Practices Bias Biomedical Computing Research Biometrics Birding Bitcoin Network Blizzard Blockchain Technology Blocking Tech Giants Blogs Bloomberg BusinessWeek Bluetooth-based Wireless Beacons Bombogenesis Books Border Gateway Protocol (BGP) Bots Brain-computer Interfaces Branding Breach Risk Browser Plugins & Add-ons Browser Stats Bug Bounty Programs Business & Organizational Transformation Business Innovation Canyon Traffic Capture-the-Flag Hacking Events (CTFs) Carbon Capture / Carbon Removal Carbon Credits Carbon Dioxide Central Intelligence Agency (CIA) Certificate Authorities Channel Capacity (Shannon Limit) Channel Polarization (Polar Codes) Chatbot ChatGPT Chief eXperince Officer (CXO) Children's Books Children - Protecting China China - Innovation CISA (CyberSecurity & Infrastructure Security Agency) CISA Security Tip Civil Liberties Classics Clickbait Climate Climate Change Climate Change & Computing’s Responsibility Climate Modelling Climate Policy Climate Record Climate Research Climatology Cloud Computing Cloud Security Coding Coding Security Collaborative Systems Collusion Networks Colorado Avalanches March 2019 Colossal Ooops! Community Cyber Defense Computer Chip Manufacture Computer Configuration Computer Crimes Computer Disposal Computer Generated Imagery Computer Graphics Computer Networks - Security Computers & Civilization Computers and the Internet Computer Science Computer Science Education Computer Security Computer Viruses Computing Computing as a Profession Computing Curricula Computing News Connectivity Consumer Labelling Contact Tracing Content Moderation Content Strategy Continuous Delivery Conversational Search Copyright and Digital Rights Management Coronavirus-Covid19 Credential Stealing Credibility Crowdsourced Content Cryptobiotic Soil (Biocrust) Cryptography CSS Culture Cyber-Physical Systems Cyber-Resilience Cyber-Resilient Distributed Systems Design Cyber-Social Systems Cyber Attribution CyberConflict Cyber Crime Cyber Identity Cyber Incident Response CyberInsecurity Cyber Insurance Cyber Intelligence Cyber Investigation Cyber Reconnaissance & Countermeasures Cyber Reconnaissance Techniques and Sources Cyber Safety CyberSecure Systems CyberSecurity CyberSecurity at Home CyberSecurity at Work Cybersecurity Clinics CyberSecurity Education CyberSecurity Engineering CyberSecurity for Kids Online CyberSecurity for Video Conferencing Cybersecurity Knowledge CyberSecurity News Cybersecurity Research and Development Cybersecurity Risk CyberSecurity Workforce Cyberspace Operations Cyber Terrorism Cyber Terrorism - Prevention Cyber Warfare Cyber Weapons Daily Forecasts Daily Updates Database Systems Data Brokers Data Centers Data Integrity Data Management Data Mining Data Networks Data Portability Data Science Data Storage Technology Debris Flows Debugging Decarbonize Deceptive Environments Decryption Tools Deepfake Detecting Deepfakes / Digital Fakes Deep Learning (DL) Deep Learning Neural Network (DNN) Defending Democracy Defense Innovation Unit Design Design Patterns Design Process Detailed Observation Developer Tools Device-Independent Quantum Key Distribution Digital Abuse Digital Archive Digital Authoritarianism Digital Currency/Money Digital Democracy Digital Identities Digital Knowledge Digital Library Digital Media Digital Millennium Copyright Act (DMCA) Digital Permanence Digital Revolution Digital Spam Disinformation (Coordinated Inauthentic Behavior) Disruptive Innovation Distributed Computing / Distributed Systems Documentary Documentation Domestic Intelligence Doxing eCommerce Economics Educational Election Security Electric Vehicle Technology Electronic and Information Warfare Electronic Intelligence Embedded Systems Employment Encryption End-to-End Encryption Entertainment Environment & Technology Environmental Impacts of Computing Espionage - Cyber Espionage - State-Sponsored Ethics Ethics of AI eWaste Extreme Automation Extreme Ultraviolet Lithography Facebook Facebook - Social Aspects Face Recognition Facial Recognition Fiber-optic Cable File Systems Filter Bubbles Firefox Browser Fire Related Weather Fire Tornado Fire Whirl Firmware Flexbox Flooding Food Insecurity Food Movement Forest Health Formal Methods Fourth Industrial Revolution FPGA (Field-Programmable Gate Array) Free-Market Capitalism Future of Work Game Theory General Data Protection Regulation (GDPR) General Purpose Computers Genetic Modification Geography Geopolitics Geosciences Going Dark Google Google (Firm) Government Policy Government Regulation Government Services GPT Graphics & Images Guidance Hacker Culture Hacker Ethic Hackers & Hacking Hacking for Hire Hacktivism Hardware Design Hardware Security Hardware Trojans Heuristic Evaluation High Performance Computing Historical Historical Analogy History - Artificial Intelligence History - Computing History - Cyber History - Facebook History - Internet History - Military History - Silicon Valley History - Utah Skiing History - WSO History - YouTube Home Network Security Honey Pot / Watering Hole How Search Works How Things Work How To How to Update HTML HTTP Standard Huawei Human-Automation Interaction Human-centered Computing Human Aspects of Security Human Computer Interaction Human Factors (Psychology) Humanity Human Mind Human Psychology Humor Hurricanes / Tropical Cyclones Identifiers Identity Management Identity Theft Impacts of Automation Indistinguishability Obfuscation Industrial Food Influencers in Social Media Informatics Information and Communication Technologies for Development (ICT4D) Information Architecture Information Communication Technology (ICT) Information Integration Information Integrity Information Retrieval Information Security Information Sovereignty Information Technology Information Theory Information Warfare Innovation Insider Cyber Sabotage Insider Threats Instructional Integrated Circuits Intellectual Property Intelligent Systems Interaction Design Interactive Analytics International Governance Internet - Government Policy Internet Access Internet Architecture Internet Archive Internet Backbone Internet Censorship Internet Censorship Circumvention Internet Connectivity Internet Education Internet Governance Internet Industry Internet of Things (IoT) Internet Policy Internet Safety Internet Security Internet Speed Testing Internet Standards Internet Stats Trends and Demographics Interviews iOS (Apple Operating System) Iran Israel IT - Social Aspects IT - Technological Innovation JavaScript JavaScript Libraries Just Plain Fun Keen Insight Key Escrow Knowledge Graph Knowledge Representation Krebs-The Value of Series Large Language Model (LLM) Law & Policy Law & Technology Law Enforcement Law of Armed Conflict Leadership & Professionalism Leaks (Disclosure of Information) Learn to Code Limiting Data Collection Limitless Growth: Is it a Good Idea? Longitudinal Studies Lorem Ipsum Low Code & No Code Software Development Technoloies Luxury Surveillance Machine Learning Malicious Links Malware Maps Market Liability Mathematics Medical Applications of Computing Technology Medical Records Medical Technology Medicine Meltdown Vulnerability Meme Culture Metaverse Meteorology Methane Microsoft Microsoft Exchange Servers Misinformation Mobile & Tablet Mobile Device Security Mobile Phone Metadata Money Laundering Moon Dust Physics Moore's Law Mozilla Mud Flows Multi-factor Authentication Multilevel Security Multiparty Computation Music National Security (US) National Security Agency National Security Policy Natural Language Generation Natural Language Processing Navigation Net Neutrality Network Attack & Defense Network Science Network Security Neural Networks Neurodiversity Programs NNg-UX Non-Fungible Token (NFT) Non-Traditional Data Sources North Korea NSO OAuth Access Tokens OAuth Secure Delegated Access Ocean Currents Olfaction Online Advertising Online Harassment Online Marketplaces Online Shopping Online Social Networks Open Architecture Open Compute Project Open Internet Open Source Open Source Community Open Source Intelligence (OSINT) Open Source Software Open Web Index Opinion & Perspective Orbital Traffic Control Organizational Culture Overcrowding Packet Switching Passkeys Password Blacklists Password Managers Password Re-use Passwords Pegasus Permafrost Persistent Engagement Personal Data Personality Traits Personal Security Personas Persuasive Design Phishing Photographs Physical Protection Podcast Political Advertising Political Interest Politics & Government Popular Culture Post-Quantum Cryptographic Algorithms Power Usage Efficiency Precipitation Types Prioritizing Cybersecurity Privacy Privacy & Data Protection Privacy & Personal Information Privacy - Right of Privacy Policies Problem Solving Programming Propaganda Protecting Democracy Psychology and Usability Psychology and UX Public-Interest Technologists Public Infrastructure Puzzles - Logic & Math Quantum Computing Quantum Cryptography Quantum CyberSecurity Quantum Resistance Quantum Technologies Quantum Vulnerability Queueing Theory Quick Reference Ransomware Ransomware Decryptors Ransomware Q&A Rapid Technological Changes Real-name Verification Real-Time Communication (RTC) Record Cold Record Heat Remote Work on the Web Renewable / Sustainable Energy Reporting Online Criminal Activity Reputation Manipulation Services Research Methods Resource Public Key Infrastructure (RPKI) Resources Risk Road Conditions Robotics Route Origin Validation (ROV) Routing Attacks Rusia Russia Safety Critical Systems Sandworm Science Science Fiction Search Search Engine Optimization Search Rank Secure Systems Securing My Business Security Security Advisories Security Certification Security Deception Software Security Dilemma Security Economics Security Engineering Security Guidance Security News Security of Hardware Optimizations Security Posture Security Standards Security Testing Security Tips Security Tools Security Training Self-Driving Vehicle Technology Series: WaPo - Behind the Firewall Side Channels Site Design Site Reliability Engineering SLaaP - Street Lamps as a Platform Slacktivism Smart Cities Smartphone Apps SMS (Short Message Service) Snow Conditions Snow Science Snow Study Social Bots Social Control Social Credit Social Engineering Social Interest Social Justice Social Media Social Media in Avalanche Awareness & Forecasting Social Media – Novel & Beneficial Uses Social Responsibility Socioeconomics Sociopolitical Software Software Product Liability Software Security SolarWinds Space Space Travel Spectre Vulnerability Speech Emotion Recognition Speech Recognition Speech Synthesis Speech Translation Spyware Squarespace STEM & STEAM Education Stockpiling of Sensitive Data Stockpiling of Vulnerabilities Store-tracking Technology Strategies to Mitigate Cyber Threats Strategy Street Art: Salt Lake Supply Chain Attack Supply Chain Risk Surveillance Surveillance - Electronic Surveillance - Mass Surveillance - Online Surveillance - Video & Analytics Surveillance Capitalism Surveillance for Hire System Representation System Safety Engineering Systems of Technological Governance Targeted Surveillance Industry Team Management Tech Impact on Youth Tech Industry Technological Achievement Technology Technology & Politics Technology & Society Technology & War Technology Addiction / Excessive Use Technology Employee Activism Technology in Utah Technology Policy Technology Policy Activism Technology Unions Telegram Templates Terrorism - Prevention Text Analysis Theoretical Computer Science The P vs. NP Problem Three-dimensional (3D) Computer Imagery TikTok Time Series Forecasting Tor Network (The Onion Router) Tracking Cookies Trends Trust Trusted Computing Base Trusted Internet Connections Trusted Platform Module Trustworthy Behavior Trustworthy Systems Tutorials U.S. Cyber Command U.S. Dept. of Defense Ukraine Understanding Your World United States United States - Politics & Government Urban Development Urban Ecology Urban Heat Island Urban Technology User eXperience User Interface User Research User Testing Variety Vehicle Data Collection Video Virtual Black Box (VBB) Obfuscation Virtual Desktops Virtual Private Networks (VPN) Virtual Reality Visual Design Visual Privacy VKontakte Vulnerabilities Vulnerabilities Equities Process War on Terrorism Wasatch 100 Water Weather Forecasting Weather Info Weather Phenomena Web3 Web Accessibility Web Content Accessibility Guidelines Web Design Web Development Webinars Web Science Web Search Engines Web Standards Web Tools Web Usability Wi-Fi Wikipedia Wildland Fires Windows 11 Security Windows Operating System Winter Storm Elliott 2022 Wiper Wired Wireless Communications Women in Computing WordPress WordPress Resource WordPress Security WordPress Third-Party Plugins & Themes Work From Home Securely World Politics WPA2 Enterprise Writing for the Web Youth & Technology Youth in Cybersecurity YouTube Zero-Click / Interactionless Attacks Zero-Day Exploits Zoom Videoconferencing Zuckerberg (Mark) - Influence