Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Fiber-optic Cable

map of underwater cable system - TELEGEOGRAPHY
Computing & Technology / Articles

These underwater cables can improve tsunami detection

Telecom companies have long resisted letting scientific sensors piggyback on their subsea cables—until now.

These underwater cables can improve tsunami detection Read More
workers laying fiber optic cable - Photograph: ANDER GILLENEA/Getty Images
Articles / Computing & Technology

Undersea Cables Are Carrying Scientific Secrets

Rumbles and tides create tiny, detectable disturbances in fiber optics. The world’s cables could form a vast network for detecting earthquakes and tsunamis.

Undersea Cables Are Carrying Scientific Secrets Read More
Underwater fiber optic internet cable lying on the ocean floor. - Photograph: imaginima/Getty Images
Articles / CyberSecurity

The Most Vulnerable Place on the Internet

Underwater cables keep the internet online. When they congregate in one place, things get tricky.

The Most Vulnerable Place on the Internet Read More
5G Is Coming, and It’s Fortified With Fiber - Image: Daymon Gardner
Computing & Technology / Articles

5G Is Coming, and It’s Fortified With Fiber

5G will happen in the airy realm of radio waves. To get there, big telecoms have to harness underused parts of the spectrum. But there’s another crucial part underlying this system: lowly cable.

5G Is Coming, and It’s Fortified With Fiber Read More
How Google Is Cramming More Data Into Its New Atlantic Cable - Credit: Bill Gallery/SubCom
Computing & Technology / Articles

How Google Is Cramming More Data Into Its New Atlantic Cable

Google says the fiber-optic cable it’s building across the Atlantic Ocean will be the fastest of its kind. When the cable goes live next year, the company estimates it will transmit around 250 terabits per second, fast enough to zap all the contents of the Library of Congress from Virginia to France three times every second.

How Google Is Cramming More Data Into Its New Atlantic Cable Read More
How the Internet Travels Across Oceans - Graphics by Karl Russell, Troy Griggs and Blacki Migliozzi.
Computing & Technology / Articles

How the Internet Travels Across Oceans

The internet consists of tiny bits of code that move around the world, traveling along wires as thin as a strand of hair strung across the ocean floor. The data zips from New York to Sydney, from Hong Kong to London, in the time it takes you to read this word.

How the Internet Travels Across Oceans Read More
Computing & Technology / Articles

The Amazing World of Fiber Optic Communications

Explore the many aspects of Fiber Optic Cable & Submarine Cable Systems. Global networks of hair-thin strands of highly refined silicone over which most all our data travels. Go ahead, geek out a bit. You might learn something.

The Amazing World of Fiber Optic Communications Read More

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Considering the Impact of Technology on Society
  • Split Your Overwhelmed Teams
  • Mapping the Privacy Landscape for Central Bank Digital Currencies
  • A Turning Point for Cyber Insurance
  • CISA Cybersecurity Strategic Plan
  • Mapping California’s ‘Zombie’ Forests
  • CISA Develops Factsheet for Free Tools for Cloud Environments
  • ‘An Act of War’: Inside America’s Silicon Blockade Against China
  • The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
  • The inside story of New York City’s 34-year-old social network, ECHO

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (657)
    • Climate (23)
    • Computing & Technology (327)
    • CyberSecurity (234)
    • Web Resources (39)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (38)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (640)
    • Articles (546)
    • Books, Reports, Films & Images (67)
    • News & Information (30)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (55)
  • Artificial Intelligence Research (7)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (7)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (7)
  • Computer Crimes (5)
  • Computer Science Education (12)
  • Computer Security (17)
  • Coronavirus-Covid19 (15)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (11)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (31)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (12)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (22)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (10)
  • HTML (6)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (12)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (6)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (10)
  • Privacy & Personal Information (12)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (8)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (27)
  • SolarWinds (5)
  • Spyware (8)
  • Supply Chain Attack (5)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (6)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (8)
  • Trustworthy Systems (5)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

Featured Books

Book Cover - The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations"
Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime"
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back"
Book Cover - A Biography of the Pixel"
Book Cover - Steve Jobs"
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News"
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives"
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution"
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage"
Book Cover - A New History of Modern Computing: How the computer became universal"
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon"
Book Cover - Hackers: Heroes of the Computer Revolution"
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton"
Book Cover - We Have Root: Even More Advice from Schneier on Security"
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed."
Book Cover - Facebook: The Inside Story by Steven Levy"
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State"
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics"
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age"
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power"
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order"
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers"
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America"
Book Cover- Permanent Record"
Book Cover - The Perfect Weapon"
Book Cover - Dawn of the Code War"
Book Cover - Zucked"
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier"
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier"
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier"
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier"
Copyright © 2020-2023 Wallace Web Design, LLC