Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Articles

Articles from sources such as magazines, newspapers & blogs.


check mark and x symbols
Computing & Technology / Articles

Informing California Privacy Regulations with Evidence from Research

This story provides a case study of how academic researchers can refocus their research to answer policymakers’ questions.

Informing California Privacy Regulations with Evidence from Research Read More
two mirrored face images, illustration - Credit: Getty Images
Computing & Technology / Articles

What To Do About Deepfakes

Research and development of synthetic media will be better served if technical experts see themselves as part of the solution, and not the problem.

What To Do About Deepfakes Read More
clean face and bearded face on front and back of a bust - Credit: Svetlana Pasechnaya
Computing & Technology / Articles

Science Is Not Another Opinion

Different communities can and do evolve different statements of scientific facts based on the same evidence.

Science Is Not Another Opinion Read More
Skyscrapers in the Moscow-City business center in Moscow on April 29. (Maxim Shemetov/Reuters)
Articles / CyberSecurity

Hacking Russia was off-limits. The Ukraine war made it a free-for-all

Experts anticipated a Moscow-led cyber-assault; instead, unprecedented attacks by hacktivists and criminals have wreaked havoc in Russia

Hacking Russia was off-limits. The Ukraine war made it a free-for-all Read More
Articles / CyberSecurity

How Democracies Spy on Their Citizens

The inside story of the world’s most notorious commercial spyware and the big tech companies waging war against it.

How Democracies Spy on Their Citizens Read More
Articles / CyberSecurity

The Pegasus Project

Working with new data from the journalism nonprofit Forbidden Stories and human rights group Amnesty International, OCCRP and 16 media partners around the world worked to uncover who might have fallen victim to Pegasus, and tell their stories.

The Pegasus Project Read More
Electrical powerlines on pylons in Ukraine - Photograph: Joseph Sywenkyj/Bloomberg/Getty Images
Articles / CyberSecurity

Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine

The attack was the first in five years to use Sandworm’s Industroyer malware, which is designed to automatically trigger power disruptions.

Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine Read More
Aerial view of civilians walking around destroyed residential neighborhood in Borodianka Ukraine - Photograph: Anastasia Vlasova/Getty Images
Computing & Technology / Articles

The Race to Archive Social Posts That May Prove Russian War Crimes

Painstaking new techniques for archiving social media posts could provide crucial evidence in future prosecutions.

The Race to Archive Social Posts That May Prove Russian War Crimes Read More
U.S. President Joe Biden delivers remarks on developments in Ukraine and Russia to reporters - Photograph: Drew Angerer/Getty Images
Articles / CyberSecurity

How Russia’s Invasion Triggered a US Crackdown on Its Hackers

The Biden White House is using “all of the levers of national power” to counter—or preempt—cyberattacks by Russia’s most dangerous hacker groups.

How Russia’s Invasion Triggered a US Crackdown on Its Hackers Read More
Joy Buolamwini of the Massachusetts Institute of Technology Media Lab.
Computing & Technology / Articles

Can the Biases in Facial Recognition Be Fixed; Also, Should They?

Many facial recognition systems used by law enforcement are shot through with biases. Can anything be done to make them fair and trustworthy?

Can the Biases in Facial Recognition Be Fixed; Also, Should They? Read More
scissors and paper clips on text of Section 230 - Credit: Andrij Borys Associates, Shutterstock
Computing & Technology / Articles

The Push for Stricter Rules for Internet Platforms

Considering the origins, interpretations, and possible changes to Communications Decency Act § 230 amid an evolving online environment.

The Push for Stricter Rules for Internet Platforms Read More
Apple M1 chip on a black background - Courtesy of Apple
Computing & Technology / Articles

How Apple’s Monster M1 Ultra Chip Keeps Moore’s Law Alive

By combining two processors into one, the company has squeezed a surprising amount of performance out of silicon.

How Apple’s Monster M1 Ultra Chip Keeps Moore’s Law Alive Read More
Billboard that says Move to Miami with a yellow convertible Lamborghini with Mayor Suarez's head a robot flamingo... - Illustrations by Alvaro Dominguez; Getty Images; Portraits by Flaminia Fanale
Computing & Technology / Articles

Welcome to Miami, Where All Your Memes Come True!

The city is trying to lure in Silicon Valley types, hyping the promise of sun, sand, and seed rounds. Does it want Silicon Valley’s problems too?

Welcome to Miami, Where All Your Memes Come True! Read More
Russian soldiers sitting on a tank - Photograph: Sefa Karacan/Getty Images
Articles / CyberSecurity

Russia Is Leaking Data Like a Sieve

Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.

Russia Is Leaking Data Like a Sieve Read More
How Bellingcat uncovered Russias secret network of assassins - Bellingcat / Getty Images / WIRED
Articles / CyberSecurity

How Bellingcat uncovered Russia’s secret network of assassins

From Sergei Skripal to Alexei Navalny, Russia’s attempts to silence its enemies have been forensically exposed. At the centre of these revelations has been investigative unit Bellingcat

How Bellingcat uncovered Russia’s secret network of assassins Read More
Rescuers carry a wounded person on the stretcher as they respond to shelling in central Kharkiv, northeastern Ukraine, on March 1, 2022. - (Photo by Vyacheslav Madiyevskyy/Ukrinform/NurPhoto)
Computing & Technology / Articles

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine

With more videos and images coming to light each day, Bellingcat and members of its Global Authentication Project have begun to log and map these incidents on an interactive TimeMap.

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine Read More
Orca Plant - Photograph: Tanya Houghton
Climate / Articles

The Quest to Trap Carbon in Stone—and Beat Climate Change

On a barren lava plateau in Iceland, a new facility is sucking in air and stashing the carbon dioxide in rock. The next step: Build 10,000 more.

The Quest to Trap Carbon in Stone—and Beat Climate Change Read More
orca plant in iceland - AP Images
Climate / Articles

UN climate report: Carbon removal is now “essential”

Removing the greenhouse gas from the air will likely be necessary, along with radical emissions cuts, to keep temperatures from rising 2˚C.

UN climate report: Carbon removal is now “essential” Read More
Ukrainian soldier standing on top of a seized Russian military tank in the woods - Photograph: Metin Aktas/Getty Images
Computing & Technology / Articles

As Russia Plots Its Next Move, an AI Listens to the Chatter

With vast amounts of data becoming available to intelligence analysts, new tools will help them sift and interpret it all—but they will introduce new risks, too.

As Russia Plots Its Next Move, an AI Listens to the Chatter Read More
battery stress testing - Winni Wintermeyer
Computing & Technology / Articles

Novel lithium-metal batteries will drive the switch to electric cars

A new type of battery could finally make electric cars as convenient and cheap as gas ones.

Novel lithium-metal batteries will drive the switch to electric cars Read More

Posts navigation

1 2 … 21 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Science Is Not Another Opinion
  • Informing California Privacy Regulations with Evidence from Research
  • What To Do About Deepfakes
  • Hacking Russia was off-limits. The Ukraine war made it a free-for-all
  • The Pegasus Project
  • How Democracies Spy on Their Citizens
  • Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine
  • How Russia’s Invasion Triggered a US Crackdown on Its Hackers
  • The Race to Archive Social Posts That May Prove Russian War Crimes
  • The Push for Stricter Rules for Internet Platforms

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (517)
    • Climate (11)
    • Computing & Technology (243)
    • CyberSecurity (192)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (35)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (501)
    • Articles (419)
    • Books, Reports, Films & Images (56)
    • News & Information (27)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (39)
  • Artificial Intelligence Research (5)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (5)
  • China (24)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (9)
  • Computer Chip Manufacture (5)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (10)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (16)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cyber Warfare (15)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (22)
  • Ethics of AI (12)
  • Facebook (11)
  • Geopolitics (9)
  • Government Policy (10)
  • Government Regulation (8)
  • Guidance (17)
  • Hackers & Hacking (29)
  • Hacking for Hire (8)
  • Historical (8)
  • History – Computing (11)
  • History – Internet (12)
  • History – Silicon Valley (6)
  • How To (6)
  • HTML (5)
  • Human Psychology (5)
  • Internet – Government Policy (7)
  • Internet Access (5)
  • Internet Censorship (10)
  • Internet Connectivity (5)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (11)
  • Law & Policy (6)
  • Machine Learning (9)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (14)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (11)
  • Open Source Intelligence (OSINT) (10)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (6)
  • Privacy (26)
  • Privacy & Data Protection (6)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (39)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (5)
  • Social Media (24)
  • Spyware (7)
  • Surveillance – Electronic (11)
  • Surveillance – Online (12)
  • Surveillance Capitalism (5)
  • Technological Achievement (8)
  • Technology & Society (7)
  • Technology Policy (6)
  • Ukraine (27)
  • Understanding Your World (6)
  • User eXperience (5)
  • Weather Phenomena (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (6)
  • Zero-Click / Interactionless Attacks (5)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-22 Wallace Web Design, LLC

 

Featured Books

Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2022 Wallace Web Design, LLC
Scroll to Top