Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Technology & Society

CTRL ALT DEL—Rebooting the Role of Technology in Geo-Politics
Articles / CyberSecurity

The Future of Tech Is Here. Congress Isn’t Ready for It

In a conversation with WIRED, former representative Will Hurd talked AI, the metaverse, China, and how ill-prepared legislators are to grapple with any of it.

The Future of Tech Is Here. Congress Isn’t Ready for It Read More
1961: IBM engineers give visitors from Ames Research Center a look at the future. - NASA AMES/INTERNET ARCHIVE
Computing & Technology / Articles

Where computing might go next

The future of computing depends in part on how we reckon with its past.

Where computing might go next Read More
Selman Design
Articles / Computing & Technology

The dangerous appeal of technology-driven futures

Technology doesn’t rule us. We direct it, but often by inaction.

The dangerous appeal of technology-driven futures Read More
Daniel Zender
Computing & Technology / Articles

Why prisoners like me need internet access

I haven’t been online in almost two decades. Being able to would help me prepare for life after my release.

Why prisoners like me need internet access Read More
Jim Selman - Credit: YouTube
Computing & Technology / Articles

Navigating in Real-Time Environments

“Navigating in Real-Time Environments” Communications of the ACM, December 2020, Vol. 63 No. 12, Pages 26-28 The profession of IT By Peter J. Denning “Jim Selman has been a professional leadership coach for over 30 years. He frequently encounters executives …

Navigating in Real-Time Environments Read More
Two opposing crowds - Illustration: Sam Whitney; Getty Images
Computing & Technology / Articles

Bad Algorithms Didn’t Break Democracy

And better ones won’t save it. To get past misinformation and tribal rancor online, we need to face why people really want misinformation and rancor.

Bad Algorithms Didn’t Break Democracy Read More
conceptual illustration of a young man drinking a beer, trapped inside a piece of amber - Peter Crowther
Computing & Technology / Articles

Why an internet that never forgets is especially bad for young people

As past identities become stickier for those entering adulthood, it’s not just individuals who will suffer. Society will too.

Why an internet that never forgets is especially bad for young people Read More
conceptual illustration of a mans face being obscured by his phone. Selman design
Computing & Technology / Articles

I asked my students to turn in their cell phones and write about living without them

Without their phones, most of my students initially felt lost, but after just two weeks the majority began to think that their cell phones were in fact limiting their relationships with other people.

I asked my students to turn in their cell phones and write about living without them Read More

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Cybersecurity as Illuminator for the Future of Computing Research
  • Two Paths for Digital Disability Law
  • Raising Robovoices
  • Modern Tech Can’t Shield Your Secret Identity
  • A Call to Action
  • The Troubling Future for Facial Recognition Software
  • Winter Storm Elliott – December, 2022
  • Technology’s Impact on Morality
  • Trust, Regulation, and Human-in-the-Loop AI: within the European region
  • How Facebook and Google fund global misinformation

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (606)
    • Climate (19)
    • Computing & Technology (301)
    • CyberSecurity (216)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (36)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (590)
    • Articles (501)
    • Books, Reports, Films & Images (62)
    • News & Information (29)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (50)
  • Artificial Intelligence Research (6)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (28)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (6)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (29)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (18)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (14)
  • Law & Policy (6)
  • Machine Learning (11)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (41)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

January 22-28, 2023 is Data Privacy Week

Mum’s the word…

National Cybersecurity Alliance - Data Privacy Week Logo

Featured Books

Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top