Computing & Technology

View All

These underwater cables can improve tsunami detection

Telecom companies have long resisted letting scientific sensors piggyback on their subsea cables—until now.

A Data-Driven Exploration of the Race between Human Labor and Machines in the 21st Century

Technology can automate and substitute for some human tasks, but it can also augment human intelligence and complement specific types of tasks in ways that boost demand for occupations in which those tasks are performed.

It Takes a Community: The Open Source Challenge

REYNOLD XIN: Open source is not necessarily about free software. Instead, it has more to do with the inherent interest companies have in building ecosystems and communities that will help them lower their cost of hiring new employees and then ramping them up.

Toward Justice in Computer Science through Community, Criticality, and Citizenship

Computer science education cannot fix its internal injustices and external harms to society if it aims only to broaden participation. Instead, institutional change is required.

Information: ‘I’ vs. ‘We’ vs. ‘They’

Assessments concerning privacy can hardly be completely neutral and may underlie some cultural bias.

Two Paths for Digital Disability Law

Digital accessibility has its roots in a decades-long legal movement.


View All

Hidden Malware Ratchets Up Cybersecurity Risks

What if cybercriminals could hide pernicious payloads in places where commercial cybersecurity software were unable to detect it? Unfortunately, this approach is both possible and increasingly viable.

The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime

A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.

Cybersecurity as Illuminator for the Future of Computing Research

Security is still viewed by much of the computing research community in a narrow technical context, leading to results poorly aligned with motivating real-world needs.

Europe’s Move Against Google Analytics Is Just the Beginning

Austria’s data regulator has found that the use of Google Analytics is a breach of GDPR. In the absence of a new EU-US data deal, other countries may follow.

What is GDPR? The summary guide to GDPR compliance in the UK

General Data Protection Regulation, or GDPR, have overhauled how businesses process and handle data. Our need-to-know GDPR guide explains what the changes mean for you


View All

Hurricane Ian Is a Warning From the Future

Tropical storms are increasingly likely to batter the US as oceans warm—and will continue to wreak havoc so long as climate change remains unaddressed.

The Desert’s Fragile Skin Can’t Take Much More Heat

Climate change and human activity are destroying the layers of fungi, lichen, and bacteria that protect deserts from erosion.

If You Don’t Already Live in a Sponge City, You Will Soon

Less pavement and more green spaces help absorb water instead of funneling it all away—a win-win for people and urban ecosystems.

California’s Heat Wave Is a Big Moment for Batteries

Scorching temperatures in the Golden State are a test case for a more flexible energy grid.

The US agency in charge of developing fossil fuels has a new job: cleaning them up

The Office of Fossil Energy and Carbon Management has a new name, new leaders, and a new mandate to meet Joe Biden’s climate goals.

A River Runs Through It

Unearthing streams breathes life back into local communities.

Weather | Snow | Utah

View All

Avalanches in Big & Little Cottonwood Canyon Early April 2023

During the last week of March and first week of April, Big & Little Cottonwood Canyons saw an epic snow cycle the likes of which have never been seen before. Little Cottonwood Canyon (“LCC”) closed due to avalanche danger on Sunday April 2, 2023. The canyon generally did not open again until Saturday April 8. (There were two brief periods when the canyon was open to the public to downhill travel only, so that people who needed/wanted could leave. Otherwise, the general public was prohibited from going up or down the canyon during the period April 1-8.

Wasatch Backcountry Skiing Map, 4th Ed.

The Wasatch Backcountry Skiing Map is a full-color paper map that compliments the website, Android app, and iOS app. The map includes the names of almost 1,000 backcountry locations in the Central Wasatch.

Winter Storm Elliott – December, 2022

The United States was hit by historically cold and windy Winter weather with a rare mid-latitude mid-continent cyclone, one that would undergo a process of rapid intensification called Bombogenesis, or Bomb Cyclogenesis. The event was termed “Winter Storm Elliott.” This …

A History of Avalanche Mitigation in the Cottonwood Canyons

Big and Little Cottonwood Canyon roads carve between steep mountains that are prone to avalanches in the winter. In fact, 57% of the 9-mile Little Cottonwood Canyon Road is in an avalanche runout zone. Still, recreationalists, residents, and canyon employees need to transport themselves up and down these canyons regularly and as safely as possible.

#Avalanche: In a world obsessed with social media, avalanche centers are relying more and more on the attention-grabbing platforms to better equip backcountry skiers

“Originally, we looked at social media very much as another way of disseminating the forecast,” said Ethan Greene, director of the CAIC. “We still do that, but have been using it more to engage people and try to get out information about current conditions as well as broader education out to people. It’s been a good way for people to ask questions, and we’ve done our best to address those questions.”

Avalanche Busters: A Historical Memoir of the Snowbird and Alta Ski Patrols

This historical memoir gives the reader a mesmerizing, behind-the-scenes view of the founding of Snowbird Ski and Summer Resort and discloses how the ski patrol worked on the avalanche-ridden mountain.

Web Resources

View All

The anatomy of a WordPress theme

Yoast’s WordPress theme infographic.

Flexbox Tutorial by Sean Fioritto

This is an interactive video intro to flexbox and is comprised of 5 sections that walk through various parts of flexbox.

F.B. Purity – Clean Up and Customize Facebook

F.B. Purity is a browser extension / add-on that lets you clean up and customise Facebook. It filters out the junk you don’t want to see, leaving behind the stories and page elements you do wish to see. The list of story types that FBP hides is customizable to your taste.

WPBeginner – Beginner’s Guide for WordPress

At WPBeginner, our main goal is to provide cutting-edge helpful WordPress tutorials that are easy to understand for small businesses, bloggers, and non-techy WordPress website owners.

Auditing For Accessibility Problems With Firefox Developer Tools

The Firefox 70 Accessibility Inspector is an auditing facility to help identify and fix many common mistakes and practices to help improve site accessibility.

Internet Archive Wayback Machine

The Wayback Machine is a digital archive of the World Wide Web and other information on the Internet. It was launched in 2001 by the Internet Archive, a nonprofit organization based in San Francisco, California, United States.

Categorized Tag Cloud – All Categories

5G - 5th Generation Wireless 50th Anniv. Moon Landing Accessibility Systems & Tools Accidental Humor Active Measures Activism Ad Blocking Advanced Persistent Threats (APT) Adventure Agile Software Development Agrotechnology Alternative Security Frameworks for HPC Amazon Web Services Ambient Intelligence Animation Antitrust Apple Inc. Approachable Programming Artificial Intelligence Artificial Intelligence Research Artificial Olfaction ASIC (Application-Specific Integrated Circuit) Assistive Technology Association for Computing Machinery's A.M. Turing Award Attention Economy Attestation Audio & Video on the Web Authentication Autism at Work Automated Vehicles Automation Autonomous Systems Avalanche Awareness Avalanche Awesomeness Avalanche Control & Mitigation Avalanche Education Avalanche Hazard Forecasting Avalanche Photos Avalanche Problems Avalanche Rescue Avalanche Safety Avalanche Types Backcountry Travel & Safety Backcountry Travels Backdoor Battery Technology Behavioral Futures Markets Behavioral Modification Behavioral Surplus Belarus Bellingcat Best Practices Bias Biomedical Computing Research Biometrics Birding Bitcoin Network Blizzard Blockchain Technology Blocking Tech Giants Blogs Bloomberg BusinessWeek Bluetooth-based Wireless Beacons Bombogenesis Books Border Gateway Protocol (BGP) Bots Branding Breach Risk Browser Plugins & Add-ons Browser Stats Bug Bounty Programs Business & Organizational Transformation Business Innovation Canyon Traffic Capture-the-Flag Hacking Events (CTFs) Carbon Capture / Carbon Removal Carbon Dioxide Central Intelligence Agency (CIA) Certificate Authorities Channel Capacity (Shannon Limit) Channel Polarization (Polar Codes) Chief eXperince Officer (CXO) Children's Books Children - Protecting China China - Innovation CISA (CyberSecurity & Infrastructure Security Agency) CISA Security Tip Civil Liberties Classics Clickbait Climate Climate Change Climate Modelling Climate Policy Climate Research Climatology Cloud Computing Coding Coding Security Collaborative Systems Collusion Networks Colorado Avalanches March 2019 Colossal Ooops! Computer Chip Manufacture Computer Configuration Computer Crimes Computer Disposal Computer Generated Imagery Computer Graphics Computer Networks - Security Computers & Civilization Computers and the Internet Computer Science Computer Science Education Computer Security Computer Viruses Computing Computing as a Profession Computing Curricula Computing News Connectivity Contact Tracing Content Moderation Content Strategy Continuous Delivery Conversational Search Copyright and Digital Rights Management Coronavirus-Covid19 Credential Stealing Credibility Crowdsourced Content Cryptobiotic Soil (Biocrust) Cryptography CSS Culture Cyber-Resilience Cyber-Resilient Distributed Systems Design Cyber-Social Systems Cyber Attribution CyberConflict Cyber Crime Cyber Identity Cyber Incident Response CyberInsecurity Cyber Intelligence Cyber Investigation Cyber Reconnaissance & Countermeasures Cyber Reconnaissance Techniques and Sources Cyber Safety CyberSecure Systems CyberSecurity CyberSecurity at Home CyberSecurity at Work CyberSecurity Education CyberSecurity Engineering CyberSecurity for Kids Online CyberSecurity for Video Conferencing Cybersecurity Knowledge CyberSecurity News Cybersecurity Research and Development Cybersecurity Risk CyberSecurity Workforce Cyberspace Operations Cyber Terrorism Cyber Terrorism - Prevention Cyber Warfare Cyber Weapons Daily Forecasts Daily Updates Database Systems Data Brokers Data Centers Data Integrity Data Management Data Mining Data Networks Data Portability Data Science Data Storage Technology Debris Flows Debugging Decarbonize Decryption Tools Deepfake Detecting Deepfakes / Digital Fakes Deep Learning (DL) Deep Learning Neural Network (DNN) Defending Democracy Defense Innovation Unit Design Design Patterns Design Process Detailed Observation Developer Tools Device-Independent Quantum Key Distribution Digital Abuse Digital Archive Digital Authoritarianism Digital Currency Digital Democracy Digital Identities Digital Knowledge Digital Library Digital Media Digital Millennium Copyright Act (DMCA) Digital Permanence Digital Revolution Digital Spam Disinformation (Coordinated Inauthentic Behavior) Distributed Computing / Distributed Systems Documentary Documentation Domestic Intelligence Doxing eCommerce Economics Educational Election Security Electric Vehicle Technology Electronic and Information Warfare Electronic Intelligence Employment Encryption End-to-End Encryption Entertainment Environment & Technology Environmental Impacts of Computing Espionage - Cyber Espionage - State-Sponsored Ethics Ethics of AI eWaste Extreme Automation Extreme Ultraviolet Lithography Facebook Facebook - Social Aspects Face Recognition Facial Recognition Fiber-optic Cable File Systems Filter Bubbles Firefox Browser Fire Related Weather Fire Tornado Fire Whirl Flexbox Flooding Food Insecurity Food Movement Formal Methods Fourth Industrial Revolution FPGA (Field-Programmable Gate Array) Free-Market Capitalism Future of Work Game Theory General Data Protection Regulation (GDPR) General Purpose Computers Genetic Modification Geography Geopolitics Geosciences Going Dark Google Google (Firm) Government Policy Government Regulation Government Services Graphics & Images Guidance Hacker Culture Hacker Ethic Hackers & Hacking Hacking for Hire Hacktivism Hardware Design Hardware Security Hardware Trojans Heuristic Evaluation High Performance Computing Historical Historical Analogy History - Computing History - Cyber History - Facebook History - Internet History - Military History - Silicon Valley History - Utah Skiing History - WSO History - YouTube Home Network Security Honey Pot / Watering Hole How Search Works How Things Work How To How to Update HTML HTTP Standard Huawei Human-Automation Interaction Human-centered Computing Human Aspects of Security Human Computer Interaction Human Factors (Psychology) Humanity Human Mind Human Psychology Humor Hurricanes / Tropical Cyclones Identifiers Identity Management Identity Theft Impacts of Automation Indistinguishability Obfuscation Industrial Food Influencers in Social Media Informatics Information Architecture Information Communication Technology (ICT) Information Integration Information Integrity Information Retrieval Information Security Information Sovereignty Information Technology Information Theory Information Warfare Innovation Insider Cyber Sabotage Insider Threats Instructional Integrated Circuits Intellectual Property Intelligent Systems Interaction Design Interactive Analytics International Governance Internet - Government Policy Internet Access Internet Architecture Internet Archive Internet Backbone Internet Censorship Internet Censorship Circumvention Internet Connectivity Internet Education Internet Governance Internet Industry Internet of Things (IoT) Internet Policy Internet Safety Internet Security Internet Speed Testing Internet Standards Internet Stats Trends and Demographics Interviews iOS (Apple Operating System) Iran Israel IT - Social Aspects IT - Technological Innovation JavaScript JavaScript Libraries Just Plain Fun Keen Insight Key Escrow Knowledge Graph Knowledge Representation Krebs-The Value of Series Law & Policy Law & Technology Law Enforcement Law of Armed Conflict Leadership & Professionalism Leaks (Disclosure of Information) Learn to Code Limiting Data Collection Longitudinal Studies Lorem Ipsum Low Code & No Code Software Development Technoloies Luxury Surveillance Machine Learning Malicious Links Malware Maps Market Liability Mathematics Medical Applications of Computing Technology Medical Records Medical Technology Medicine Meltdown Vulnerability Meme Culture Metaverse Meteorology Methane Microsoft Microsoft Exchange Servers Misinformation Mobile & Tablet Mobile Device Security Mobile Phone Metadata Money Laundering Moon Dust Physics Moore's Law Mozilla Mud Flows Multi-factor Authentication Multilevel Security Multiparty Computation Music National Security (US) National Security Agency National Security Policy Natural Language Generation Natural Language Processing Navigation Net Neutrality Network Attack & Defense Network Science Network Security Neural Networks Neurodiversity Programs NNg-UX Non-Traditional Data Sources North Korea NSO OAuth Access Tokens OAuth Secure Delegated Access Ocean Currents Olfaction Online Advertising Online Harassment Online Marketplaces Online Social Networks Open Architecture Open Compute Project Open Internet Open Source Open Source Community Open Source Intelligence (OSINT) Open Source Software Open Web Index Opinion & Perspective Orbital Traffic Control Organizational Culture Overcrowding Packet Switching Password Blacklists Password Managers Password Re-use Passwords Pegasus Permafrost Persistent Engagement Personal Data Personality Traits Personal Security Personas Persuasive Design Phishing Photographs Physical Protection Podcast Political Advertising Political Interest Politics & Government Popular Culture Post-Quantum Cryptographic Algorithms Power Usage Efficiency Precipitation Types Prioritizing Cybersecurity Privacy Privacy & Data Protection Privacy & Personal Information Privacy - Right of Privacy Policies Problem Solving Programming Propaganda Protecting Democracy Psychology and Usability Psychology and UX Public-Interest Technologists Public Infrastructure Puzzles - Logic & Math Quantum Computing Quantum Cryptography Quantum CyberSecurity Quantum Resistance Quantum Technologies Quantum Vulnerability Queueing Theory Quick Reference Ransomware Ransomware Decryptors Ransomware Q&A Rapid Technological Changes Real-name Verification Real-Time Communication (RTC) Record Cold Record Heat Remote Work on the Web Renewable / Sustainable Energy Reporting Online Criminal Activity Reputation Manipulation Services Research Methods Resource Public Key Infrastructure (RPKI) Resources Risk Road Conditions Robotics Route Origin Validation (ROV) Routing Attacks Rusia Russia Safety Critical Systems Sandworm Science Science Fiction Search Search Engine Optimization Search Rank Secure Systems Securing My Business Security Security Advisories Security Certification Security Deception Software Security Economics Security Engineering Security Guidance Security News Security of Hardware Optimizations Security Posture Security Testing Security Tips Security Training Self-Driving Vehicle Technology Series: WaPo - Behind the Firewall Side Channels Site Design Site Reliability Engineering SLaaP - Street Lamps as a Platform Slacktivism Smart Cities Smartphone Apps SMS (Short Message Service) Snow Conditions Snow Science Snow Study Social Bots Social Control Social Credit Social Engineering Social Interest Social Justice Social Media Social Media in Avalanche Awareness & Forecasting Social Media – Novel & Beneficial Uses Software Software Security Space Space Travel Spectre Vulnerability Speech Emotion Recognition Speech Recognition Speech Synthesis Speech Translation Spyware Squarespace STEM & STEAM Education Stockpiling of Sensitive Data Stockpiling of Vulnerabilities Store-tracking Technology Strategies to Mitigate Cyber Threats Strategy Street Art: Salt Lake Supply Chain Attack Supply Chain Risk Surveillance Surveillance - Electronic Surveillance - Mass Surveillance - Online Surveillance - Video & Analytics Surveillance Capitalism Surveillance for Hire System Representation System Safety Engineering Systems of Technological Governance Targeted Surveillance Industry Tech Impact on Youth Tech Industry Technological Achievement Technology Technology & Politics Technology & Society Technology & War Technology Addiction / Excessive Use Technology Employee Activism Technology Policy Technology Policy Activism Technology Unions Telegram Templates Terrorism - Prevention Text Analysis Theoretical Computer Science The P vs. NP Problem Three-dimensional (3D) Computer Imagery TikTok Time Series Forecasting Tor Network (The Onion Router) Tracking Cookies Trends Trust Trusted Computing Base Trusted Internet Connections Trusted Platform Module Trustworthy Behavior Trustworthy Systems Tutorials U.S. Cyber Command U.S. Dept. of Defense Ukraine Understanding Your World United States United States - Politics & Government Urban Development Urban Ecology Urban Technology User eXperience User Interface User Research User Testing Variety Video Virtual Black Box (VBB) Obfuscation Virtual Desktops Virtual Private Networks (VPN) Visual Design Visual Privacy VKontakte Vulnerabilities Vulnerabilities Equities Process War on Terrorism Wasatch 100 Water Weather Forecasting Weather Info Weather Phenomena Web Accessibility Web Content Accessibility Guidelines Web Design Web Development Webinars Web Science Web Search Engines Web Standards Web Tools Web Usability Wi-Fi Wikipedia Wildland Fires Windows 11 Security Windows Operating System Winter Storm Elliott 2022 Wiper Wired Wireless Communications Women in Computing WordPress WordPress Resource WordPress Security WordPress Third-Party Plugins & Themes Work From Home Securely World Politics WPA2 Enterprise Writing for the Web Youth & Technology Youth in Cybersecurity YouTube Zero-Click / Interactionless Attacks Zero-Day Exploits Zoom Videoconferencing Zuckerberg (Mark) - Influence