Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Geopolitics

Silhouette of a person standing in front of the Kremlin's Spasskaya tower and St Basil's cathedral at sunset in Moscow.. - Photograph: Getty Images
Computing & Technology / Articles

Russia Is Facing a Tech Worker Exodus

With founders and developers scrambling for the exit, the Russian tech scene is taking a major hit.

Russia Is Facing a Tech Worker Exodus Read More
Collage of images of people wearing Ukrainian flags taking pictures rubble in Kyiv and the ICC flag - Photo-Illustration: Sam Whitney; Getty Images
Computing & Technology / Articles

What Russia Is Doing to Ukraine Must Be Preserved—Not Just Seen

Images of crimes against humanity are in danger of being lost. Fortunately, best practices exist, and the international community needs to implement them.

What Russia Is Doing to Ukraine Must Be Preserved—Not Just Seen Read More
Book Cover - Countdown to Zero Day
CyberSecurity / Books, Reports, Films & Images

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Read More
blue shield hovering over desert landscape, illustration - Credit: Andrij Borys Associates, Shutterstock
Articles / CyberSecurity

Cyber Security Research in the Arab Region: A Blooming Ecosystem with Global Ambitions

In this article, we will survey the main initiatives related to cyber security in the Arab region, report on the evolution of the cyber security posture, and point to possible Pan-Arab and international collaboration avenues in cyber security research.

Cyber Security Research in the Arab Region: A Blooming Ecosystem with Global Ambitions Read More
The Apple data center in Guiyang as seen in a satellite image. Apple plans to store the personal data of its Chinese customers there on computer servers run by a state-owned Chinese firm. - Credit: CNES/AIRBUS
Computing & Technology / Articles

Censorship, Surveillance and Profits: A Hard Bargain for Apple in China

“Censorship, Surveillance and Profits: A Hard Bargain for Apple in China” The New York Times, May 17, 2021 (Updated June 17, 2021) Technology By Jack Nicas, Raymond Zhong and Daisuke Wakabayashi “Apple built the world’s most valuable business on top of …

Censorship, Surveillance and Profits: A Hard Bargain for Apple in China Read More
Cloud in sky with Chinese flag - Illustration: Alvaro Dominguez; Getty Images
Computing & Technology / Articles

Inside the Feds’ Battle Against Huawei

How Washington went to war against the Chinese smartphone giant, and how the runaway conflict could spell the end of a single, global internet.

Inside the Feds’ Battle Against Huawei Read More
Book cover - The Hacker and the State
CyberSecurity / Books, Reports, Films & Images

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

Few national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Read More
Sean McFate - Photo: Stephen Voss
Computing & Technology / Articles

Why America isn’t equipped for the new rules of war

…ultimately wars are politics and there is no technological solution to it. There is no missile that will fix the political circumstances on the ground of Syria or Taiwan. But that’s how we think. That’s why we struggle.

Why America isn’t equipped for the new rules of war Read More
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Computing & Technology / Books, Reports, Films & Images

Tools and Weapons: The Promise and the Peril of the Digital Age

When your technology changes the world, you bear a responsibility to help address the world you have helped create.

Tools and Weapons: The Promise and the Peril of the Digital Age Read More

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Can Generative AI Bots Be Trusted?
  • Computer Science Education Week 2023
  • Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
  • Using Algorithms to Deliver Disaster Aid
  • DeepMind AI accurately forecasts weather — on a desktop computer
  • The U.S. v. Google: The Case That Will Determine the Future of Tech
  • Standards to Secure the Sensors That Power IoT
  • Making Connections
  • Let Us Not Put All Our Eggs in One Basket
  • Security by Labeling

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (670)
    • Climate (24)
    • Computing & Technology (337)
    • CyberSecurity (236)
    • Web Resources (39)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (39)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (653)
    • Articles (559)
    • Books, Reports, Films & Images (67)
    • News & Information (30)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (58)
  • Artificial Intelligence Research (7)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (7)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (7)
  • Computer Crimes (5)
  • Computer Science Education (13)
  • Computer Security (17)
  • Coronavirus-Covid19 (15)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (11)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (32)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (8)
  • Government Policy (12)
  • Government Regulation (12)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (23)
  • History – Internet (16)
  • History – Silicon Valley (8)
  • How To (10)
  • HTML (6)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (7)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (13)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (6)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (10)
  • Privacy & Personal Information (12)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (8)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (27)
  • SolarWinds (5)
  • Spyware (8)
  • Supply Chain Attack (5)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (6)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (8)
  • Trustworthy Systems (5)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Forecasting (5)
  • Weather Phenomena (6)
  • Web Accessibility (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

December 4-10, 2023 is Computer Science Education Week

Logo - CSEdWeek

Featured Books

Book Cover - The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations"
Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime"
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back"
Book Cover - A Biography of the Pixel"
Book Cover - Steve Jobs"
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News"
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives"
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution"
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage"
Book Cover - A New History of Modern Computing: How the computer became universal"
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon"
Book Cover - Hackers: Heroes of the Computer Revolution"
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton"
Book Cover - We Have Root: Even More Advice from Schneier on Security"
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed."
Book Cover - Facebook: The Inside Story by Steven Levy"
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State"
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics"
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age"
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power"
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order"
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers"
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America"
Book Cover- Permanent Record"
Book Cover - The Perfect Weapon"
Book Cover - Dawn of the Code War"
Book Cover - Zucked"
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier"
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier"
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier"
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier"
Copyright © 2020-2023 Wallace Web Design, LLC