Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Articles

Articles from sources such as magazines, newspapers & blogs.


workers laying fiber optic cable - Photograph: ANDER GILLENEA/Getty Images
Computing & Technology / Articles

Undersea Cables Are Carrying Scientific Secrets

Rumbles and tides create tiny, detectable disturbances in fiber optics. The world’s cables could form a vast network for detecting earthquakes and tsunamis.

Undersea Cables Are Carrying Scientific Secrets Read More
Hurricane Ian with wind gusts blowing across Sarasota Bay - Photograph: Sean Rayford/Getty Images
Climate / Articles

Hurricane Ian Is a Warning From the Future

Tropical storms are increasingly likely to batter the US as oceans warm—and will continue to wreak havoc so long as climate change remains unaddressed.

Hurricane Ian Is a Warning From the Future Read More
CTRL ALT DEL—Rebooting the Role of Technology in Geo-Politics
Articles / CyberSecurity

The Future of Tech Is Here. Congress Isn’t Ready for It

In a conversation with WIRED, former representative Will Hurd talked AI, the metaverse, China, and how ill-prepared legislators are to grapple with any of it.

The Future of Tech Is Here. Congress Isn’t Ready for It Read More
person resting on bed with mobile phone - Photograph: Carol Yepes/Getty Images
Articles / CyberSecurity

6 Ways to Delete Yourself From the Internet

You’ll never be able to get a clean slate—but you can significantly downsize your digital footprint.

6 Ways to Delete Yourself From the Internet Read More
Underwater fiber optic internet cable lying on the ocean floor. - Photograph: imaginima/Getty Images
Articles / CyberSecurity

The Most Vulnerable Place on the Internet

Underwater cables keep the internet online. When they congregate in one place, things get tricky.

The Most Vulnerable Place on the Internet Read More
microbiotic soil - Photograph: William Dummitt/Getty Images
Climate / Articles

The Desert’s Fragile Skin Can’t Take Much More Heat

Climate change and human activity are destroying the layers of fungi, lichen, and bacteria that protect deserts from erosion.

The Desert’s Fragile Skin Can’t Take Much More Heat Read More
aerial of land - Courtesy of Los Angeles Department of Water and Power
Climate / Articles

If You Don’t Already Live in a Sponge City, You Will Soon

Less pavement and more green spaces help absorb water instead of funneling it all away—a win-win for people and urban ecosystems.

If You Don’t Already Live in a Sponge City, You Will Soon Read More
Photo illustration by Cristiana Couceiro
Articles / CyberSecurity

The Battle for the World’s Most Powerful Cyberweapon

A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware — a tool America itself purchased but is now trying to ban.

The Battle for the World’s Most Powerful Cyberweapon Read More
Image: Daniel Zender
Articles / CyberSecurity

Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem.

Zelle, the payments platform used by millions of customers, is a popular target of scammers. But banks have been reluctant to make fraud victims whole — despite owning the system.

Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem. Read More
North Korea on a map glitches with a 404 error code. - Illustration: Elena Lacey; Getty Images
Articles / CyberSecurity

North Korea Hacked Him. So He Took Down Its Internet

Disappointed with the lack of US response to the Hermit Kingdom’s attacks against US security researchers, one hacker took matters into his own hands.

North Korea Hacked Him. So He Took Down Its Internet Read More
This image may contain James Clapper Tie Accessories Accessory Human Person and Text
Articles / CyberSecurity

America’s Top Spy Talks Snowden Leaks and Our Ominous Future

America’s top spy and the future of surveillance.

America’s Top Spy Talks Snowden Leaks and Our Ominous Future Read More
A satellite eyes the moon. - Illustration: Elena Lacey
Articles / CyberSecurity

The Feds Want These Teams to Hack a Satellite—From Home

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

The Feds Want These Teams to Hack a Satellite—From Home Read More
An illustration showing the outline of a person walking, with various parts of their body "tracked" by Amazon devices - Tyler Comrie / The Atlantic
Articles / CyberSecurity

The Rise of ‘Luxury Surveillance’

Surveillance isn’t just imposed on people: Many of us buy into it willingly.

The Rise of ‘Luxury Surveillance’ Read More
August Pfluger - Photograph: Bill Clark/Getty Images
Articles / CyberSecurity

Autonomous Vehicles Join the List of US National Security Threats

Lawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.

Autonomous Vehicles Join the List of US National Security Threats Read More
Thin red metal wires surrounding a black hole in the center eye concept - Photograph: Sven Hagolani/Getty Images
Articles / CyberSecurity

Spyware Scandals Are Ripping Through Europe

The latest crisis that rocked the Greek government shows the bloc’s surveillance problem goes beyond the notorious NSO Group.

Spyware Scandals Are Ripping Through Europe Read More
a ball peeking out from the corner - Photograph: Serg Myshkovsky/Getty Images
Articles / CyberSecurity

Open Source Intelligence May Be Changing Old-School War

Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.

Open Source Intelligence May Be Changing Old-School War Read More
Illustration ebook graveyard
Computing & Technology / Articles

Digital Books wear out faster than Physical Books

Mega-publishers are saying electronic books do not wear out, but this is not true at all.

Digital Books wear out faster than Physical Books Read More
illustration of cameras surrounding a group of shadow figures denoted with facial recognition markers on a background of razor wire - Stephanie Arnett/MITTR | Unsplash
Articles / Computing & Technology

The world is moving closer to a new cold war fought with authoritarian tech

At the Shanghai Cooperation Organization summit, Iran, Turkey, and Myanmar promised tighter trade relationships with Russia and China.

The world is moving closer to a new cold war fought with authoritarian tech Read More
Photo of Frances Haugen
Computing & Technology / Articles

A Conversation with Facebook Whistleblower Frances Haugen

We are now in social media’s Big Tobacco moment. And that’s largely thanks to the courage of one woman: Frances Haugen.

A Conversation with Facebook Whistleblower Frances Haugen Read More
Photo of Hugh Halpern
Computing & Technology / Articles

An Update from Hugh Halpern, Director of the U.S. Government Publishing Office

What are some of the new initiatives from the U.S. Government Publishing Office? Director Hugh Halpern offers an update, which has been incorporated into our program for tonight’s Building Democracy’s Library event.

An Update from Hugh Halpern, Director of the U.S. Government Publishing Office Read More

Posts navigation

Previous 1 2 3 … 26 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Cybersecurity as Illuminator for the Future of Computing Research
  • Two Paths for Digital Disability Law
  • Raising Robovoices
  • Modern Tech Can’t Shield Your Secret Identity
  • A Call to Action
  • The Troubling Future for Facial Recognition Software
  • Winter Storm Elliott – December, 2022
  • Technology’s Impact on Morality
  • Trust, Regulation, and Human-in-the-Loop AI: within the European region
  • How Facebook and Google fund global misinformation

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (606)
    • Climate (19)
    • Computing & Technology (301)
    • CyberSecurity (216)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (36)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (590)
    • Articles (501)
    • Books, Reports, Films & Images (62)
    • News & Information (29)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (50)
  • Artificial Intelligence Research (6)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (28)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (6)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (29)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (18)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (14)
  • Law & Policy (6)
  • Machine Learning (11)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (41)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

January 22-28, 2023 is Data Privacy Week

Mum’s the word…

National Cybersecurity Alliance - Data Privacy Week Logo

Featured Books

Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top