The Wizard of the Wasatch (WoW)

The Wizard of the Wasatch (WoW)

Bob Athey is the Wizard of the Wasatch. His website is “Snow and avalanche conditions in the Wasatch range including photos, diagrams, snow pit graphs and trip reports in winter. Images of wildflowers, goats and other wildlife, changing season leaves, and trip reports from hikes and runs in the summer and fall.”

Spend some time poking around his site. You’ll be well rewarded for your efforts. Here too is a collection of articles and videos featuring the WoW.

Read More
A List Apart – Illustration by Dougal MacPherson

From URL to Interactive

When we think about it, our whole industry depends on our faith in a handful of “black boxes” few of us fully understand: browsers. We hand over our HTML, CSS, JavaScript, cross our fingers, and hope they render the experience we have in our heads. But knowing how they work can really get you out of a jam when things go wrong. That’s why we’ve assembled a handful of incredibly knowledgeable authors to take us under the hood in this four-part series. Join us on this trip across the web, into the often foggy valley between code and experience.

Read More
Adding Custom Code

Adding Custom Code

One of the things that you can do to customize your website is to add custom code. This resource will provide you with information you need to get started. If you are not comfortable with HTML, CSS and/or JavaScript coding then take a look at a couple of the other resources I’ve listed: Learning Web Design (book) and W3Schools.com which provides a wealth of info on those forms of coding.

Read More
Daniel A. Reed

The Shifting World of Net Neutrality

Communications of the ACM, April 2018
By Daniel A. Reed

“Then there is the woefully obsolete nature of the governing law – the Communications Act of 1934. Yes, you read that right – 1934! There have been updates, most recently the Telecommunications Act of 1996, but twenty years is a geologic eon at Internet speed.”

Read More

Hey Google, What’s a Moonshot?: How Silicon Valley Mocks Apollo

Communications of the ACM, January 2019
By Thomas Haigh

“Letting Silicon Valley steal the term “moonshot” for projects with quite different management styles, success criteria, scales, and styles of innovation hurts our collective ability to understand just what NASA achieved 50 years ago and why nothing remotely comparable is actually under way today at Google, or anywhere else.”

Read More
A Transportation Security Administration (TSA) screener uses a biometric facial recognition scanner on a traveler at Washington Dulles International Airport.

Being Recognized Everywhere

Communications of the ACM, February 2019
By Logan Kugler

“A core challenge for democratic governments will be continued adherence to the rule of law, where restrictions on individual liberty that flow from use of this technology must be justified by necessity, legitimate purpose, and use of the least restrictive means available.”

Read More

Tony’s Law

Communications of the ACM, February 2019
By Dror G. Feitelson

“Someone did not tighten the lid, and the ants got into the honey again. This can be prevented by placing the honey jar in a saucer of water, but it is a nuisance, occupies more counter space, and one must remember to replenish the water. So we try at least to remember to tighten the lid.

In the context of security, the software industry does not always tighten the lid. In some cases it fails to put the lid on at all, leaving the honey exposed and inviting.”

Read More
The Real Super Tour, Photo: Kennan Harvey

The Real Super Tour

“A hard climbing philosopher, Josh is also a believer. “There’s nothing more pure and simple,” he states, “than launching into a big climb in the middle of winter. No other people, no mechanical sounds, no artificial colors; just rock and snow and breathing and the immensity of the mountains. A horizontal length of testy and mercurial ridgeline to be navigated before we can have some hot food and some rest. Doesn’t get much better than that.” It occurred to us that when you don’t have any protection, both ends of the rope are sharp, both partners are equal.”

Read More
I AM Dangerous (Danger, dangerous, stupid: Not all the same)

I AM Dangerous (Danger, dangerous, stupid: Not all the same)

Molly Absolon, writing for the Mountainside column of the Jackson Hole News & Guide, writes about being dangerous. She writes of her reaction to an essay that Drew Hardesty wrote titled “I AM Dangerous.” Drew Hardesty is a forecaster for the Utah Avalanche Center in the winter and a Grand Teton National Park climbing ranger in the summer. Drew had recently sent her an essay he’d written about danger. “The essay went on to explore the notion of danger, and, in the end, Drew embraced the idea that we are dangerous if we spend our lives in the mountains engaging in potentially risky behavior.”

Read More
A view of the F.B.I. National Crime Information Center in Washington in 1967. In the 1960s, lawmakers began to question the government’s gathering of Americans’ data. Photo: Bettmann, via Getty Images

The End of Privacy Began in the 1960s

The New York Times, Dec. 5, 2018
Opinion by Margaret O’Mara

“In the fall of 1965, President Lyndon Johnson’s administration announced a plan to consolidate hundreds of federal databases into one centralized National Data Bank. It was meant as an efficiency move to make the Great Society even greater.”

Read More