Computing & Technology

View All

Deep Learning Speeds MRI Scans

Facebook, the Palo Alto, CA-based online social network, has teamed up with radiologists at New York University’s Langone Medical Center in Manhattan to develop an artificial intelligence (AI)-based imaging accelerator for MRI scanners.

Everything VPN Is New Again

The growing number of end-user devices and a new layer of virtualization in datacenters has subtly but profoundly changed how the VPN abstraction fits into networking.

Battery Day

Batteries are a part of everyday life; without them, the world would be a much different place. Your cellphone, flashlight, tablet, laptops, drones, cars, and other devices would not be portable and operational without batteries.

Five Nonobvious Remote Work Techniques

Here are my top five favorite techniques Stack Overflow uses to make remote work successful on a social level.

Lessons from a genocide can prepare humanity for climate apocalypse

The bad news is that our slow-motion ecological catastrophe demands new ways of thinking. The good news? We’ve faced the end of the world before.

Software Professionals, Malpractice Law, and Codes of Ethics

Most legal scholars agree the list of professions includes medicine and law. Beyond that there is little consensus as to who else qualifies.

CyberSecurity

View All

The SolarWinds Hack

The SolarWinds affair is simply another incident in a long pattern of intrusions.

Implementing Insider Defenses

Classical approaches to cyber-security—isolation, monitoring, and the like—are a good starting point for defending against attacks, regardless of perpetrator. But implementations of those approaches in hardware and/or software can invariably be circumvented by insiders, individuals who abuse privileges and access their trusted status affords.

CISA Releases Guidance: IPv6 Considerations for TIC 3.0

These documents cover enhancing the Trusted Internet Connections (TIC) program to fully support the implementation of IPv6 in federal IT systems. This information is also applicable to the private business sector and those interested in improving Internet security.

Better Security Through Obfuscation

Last year, three mathematicians published a viable method for hiding the inner workings of software. The paper was a culmination of close to two decades of work by multiple teams around the world to show that concept could work. The quest now is to find a way to make indistinguishability obfuscation (iO) efficient enough to become a practical reality.

Fixing the Internet

Aftab Siddiqui, senior manager of Internet technology at the Internet Society, says the initial BGP protocol was conceived by experts at research institutions, defense organizations, and equipment vendors. “When they designed [BGP], it was based on the premise that everybody trusts each other,” Siddiqui says. “Fast-forward 30 years, I’m pretty sure we cannot claim that anymore.”

Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2021

In honor of Cybersecurity Awareness Month 2021, the National Cyber Security Alliance and CybSafe have launched the world’s first Cybersecurity Attitudes & Behaviors Report. The research report is the first of its kind. It examines cybersecurity attitudes and behaviors of the general public, shedding light on one of the most important aspects of cyber risk – the human factor.

Web Resources

View All

F.B. Purity – Clean Up and Customize Facebook

F.B. Purity is a browser extension / add-on that lets you clean up and customise Facebook. It filters out the junk you don’t want to see, leaving behind the stories and page elements you do wish to see. The list of story types that FBP hides is customizable to your taste.

WPBeginner – Beginner’s Guide for WordPress

At WPBeginner, our main goal is to provide cutting-edge helpful WordPress tutorials that are easy to understand for small businesses, bloggers, and non-techy WordPress website owners.

Auditing For Accessibility Problems With Firefox Developer Tools

The Firefox 70 Accessibility Inspector is an auditing facility to help identify and fix many common mistakes and practices to help improve site accessibility.

Internet Archive Wayback Machine

The Wayback Machine is a digital archive of the World Wide Web and other information on the Internet. It was launched in 2001 by the Internet Archive, a nonprofit organization based in San Francisco, California, United States.

Documentation Is Automation

Automation is putting process into code. A bullet list in a process document is code if it is treated that way.

Cringeworthy Words to Cut from Online Copy

Nielsen Norman Group, January 17, 2016
Writing for the Web
By Hoa Loranger

“Summary: The right words can make or break trust; they affect your tone of voice and how people perceive your site.”

Weather | Snow | Utah

View All

Lessons from a genocide can prepare humanity for climate apocalypse

The bad news is that our slow-motion ecological catastrophe demands new ways of thinking. The good news? We’ve faced the end of the world before.

Suppressing fires has failed. Here’s what California needs to do instead.

It’s time to reverse a century of fire-management policy. That will require sweeping regulatory reforms, and tons of money.

Summer Heat 2020

It is now normal for each Summer to in one way or another be hotter than the one prior. As a result there will be remarkable occurrences a few of which I’m cataloguing here.

California Fires – Late August, 2020

A large number of fires were started by lightning strikes in California over the weekend of August 15-16, 2020. They resulted from a storm system that moved along the coast of California and produced copious amounts of dry lightning through primarily northern California around the greater San Fransisco Bay area. I’m including a number of articles, imagery and videos to document the resulting series of fires and the impact the resulting smoke has had on the upper western United States.

A History of Avalanche Mitigation in the Cottonwood Canyons

Big and Little Cottonwood Canyon roads carve between steep mountains that are prone to avalanches in the winter. In fact, 57% of the 9-mile Little Cottonwood Canyon Road is in an avalanche runout zone. Still, recreationalists, residents, and canyon employees need to transport themselves up and down these canyons regularly and as safely as possible.

#Avalanche: In a world obsessed with social media, avalanche centers are relying more and more on the attention-grabbing platforms to better equip backcountry skiers

“Originally, we looked at social media very much as another way of disseminating the forecast,” said Ethan Greene, director of the CAIC. “We still do that, but have been using it more to engage people and try to get out information about current conditions as well as broader education out to people. It’s been a good way for people to ask questions, and we’ve done our best to address those questions.”

Street Art

View All

Street Art from Mural Fest in South Salt Lake, Utah

Mural Fest celebrates urban beautification and artistic talent using the powerful tool of public art. The visual impact of bold, creative designs embodies the energy of the innovative businesses and creative communities in the Creative Industries Zone.