+WEB RESOURCES ON THE INTERNET - Compiled by Betty C. Jung

http://www.bettycjung.net/Web1.htm


Web Resources

Social Media Web Development Web Resources

Goodies for Techies & Wannabe Techies


Search Betty C. Jung's Web site

Custom Search

Search the Entire Internet

Custom Search



Analytics

  • The Ultimate Google Analytics Glossary
  • 3 “Hidden” Google Analytics Reports For Retailers Marketingland.com 6/2015
  • The 5 Most Meaningful Google Analytics Reports for Social Media Marketers Bufferapp.com
  • Top 5 Most Useful Reports in Google Analytics
  • 5 Must-Know Google Analytics Strategies To Measure SEO Success
  • 5 things Google Analytics won't tell you (and what you can do about it)
  • 6 Things I Learned from Analyzing the Most Shared Blog Posts from Top Content Marketers
  • 14 eyebrow-raising things Google knows about you Some are fascinating, others are frightening -- but here's how to find out what Google has on you. 12/2016
  • Guide to Google Analytics Site Speed Metrics Lunametreics.com 2015
  • Seven Google Analytics tips for beginners econsultancy.com
  • 7 Ways Google Analytics can Measure the Results of your Content 4/2016
  • 8 Steps for Eliminating Bad Data in Google Analytics
  • Ten Hidden Gems In Google Analytics: Do Smarter Web Data Analysis!
  • 15 Google Analytics Tips to Speed Up Your Website Data Analysis & Optimization Kissmetrics.com
  • A Data-Driven Guide to Creating Viral Content [New Infographic] 8/2015
  • A Look Into: Cohort Analysis in Google Analytics 2015
  • Avoid the Facepalm: 5 Common Mistakes in Your Google Analytics Tracking Code Lunametrics.com
  • Back to Basics: What Content Marketers Need to Know About Google Analytics Marketingland.com 4/2015
  • Big Data Data
  • Getting Valuable Marketing Data Out of Google Analytics (Infographic) Kissmetrics.com
  • Hit Counters: The Analytics Tool of the Early Web Priceonomics.com
  • How Does Google Analytics Collect Information? 6/2016
  • How to Answer 11 Common Marketing Questions Using Analytics Hubspot.com 6/2015
  • How To Increase Content Marketing Leads With 13 Cool Analytics Tips
  • How To Leverage The Google Search Analytics API Searchenglinand.com
  • How to Rid Your Website of Six Common Google Analytics Headaches Moz.com 2015
  • Mind your analytics, or you could soon be in ethical hot water
  • Mini-glossary: Business intelligence and analytics terms you should know Techrepublic.com 7/2015
  • The Anatomy of a Shareable, Linkable & Popular Post: A Study of Our Marketing Blog
  • The Essential Marketing & Sales Metrics Your Team Should Track 9/2015
  • The FTC is worried about algorithmic transparency, and you should be too
  • Understanding Users in Google Analytics
  • Using the Google Analytics Site Search reports
  • Misuses of 4 Google Analytics Metrics Debunked Moz.com
  • The Beginner’s Guide to Mobile App Analytics4/2016
  • Using the New Cohort Analysis in Google Analytics
  • Your Step-by-Step Guide to A/B Testing with Google Analytics Crazyegg.com

  • Artificial Intelligence (AI)/Robots

    Online trends
    Graphic source: http://www.marketingcharts.com/online/ai-iot-among-top-trends-seen-affecting-the-user-experience-over-the-next-5-years-74274/attachment/usertesting-most-important-future-ux-trends-feb2017/

    AI
    Graphic source: http://www.techrepublic.com/article/infographic-many-companies-lack-skills-to-implement-and-support-ai-and-machine-learning/

    Deep Neural Networks
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    Machine Intelligence 3.0
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    AI ecosystem
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    AI related technologies
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    Country Automation
    Map source: http://www.businessinsider.com/robots-will-steal-your-job-citi-ai-increase-unemployment-inequality-2016-2

    Technology job threat, by job title
    Graphic source: http://www.businessinsider.com/emolument-data-on-the-threat-of-robots-ai-artificial-intelligence-automation-to-jobs-2016-10

    Technology job threat, by education
    Graphic source: http://www.businessinsider.com/emolument-data-on-the-threat-of-robots-ai-artificial-intelligence-automation-to-jobs-2016-10

    Speech Technologies
    Graphic source: http://www.zdnet.com/article/how-we-learned-to-talk-to-computers-and-how-they-learned-to-answer-back/

    A timeline of developments in computers and robotics.
    Source:LiveScience

    Jobs that can be computerized
    Graphic source: https://www.weforum.org/agenda/2016/12/stephen-hawking-this-will-be-the-impact-of-automation-and-ai-on-jobs


    Biometric Data


    Blogging


    Browsers/Usage Resources


    Cell Phones

    Addictive behaviors
    Graphic source: https://blog.hubspot.com/marketing/content-creation-short-attention-spans

    Cellphone addiction
    Graphic source: https://blog.hubspot.com/marketing/best-infographics-2016

    Smartphone Addiction & Other Mental Health Issues

    Health & Safety Issues

    Statistics

    Technology

    Phone security
    Graphic source: http://www.zdnet.com/article/apple-winning-the-enterprise-security-race-samsung-makes-push/


    (The) Cloud


    Computer Resources

    c|net PC Pitsop.com Programs and Info for a Newbie or Oldie V2.1 Spychecker ZDNet


    Computers/Internet


    Cybercrime/Data Breaches

    Thanksgiving 2016 Web Application Attacks
    Graphic source: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q4-2016-state-of-the-internet-security-report.pdf
    Costliest Cybercrime types
    Graphic source: http://www.nbcnews.com/tech/security/yahoo-mega-breach-exposes-more-1-billion-accounts-n696141
    Common Cybercrime types
    Graphic source: http://www.nbcnews.com/tech/security/yahoo-mega-breach-exposes-more-1-billion-accounts-n696141
    Largest Data Breaches (12/2016)
    largest data breaches
    Graphic source: http://www.nbcnews.com/tech/security/yahoo-mega-breach-exposes-more-1-billion-accounts-n696141
    Birth and Rebirth of a Data Breach
    Data Breach
    Graphic source: http://www.zdnet.com/article/phishing-remains-a-data-breach-weapon-of-choice-says-verizon/
    How Long It Takes to Get Compromised with a Phishing Attack

    Phishing Attack
    Graphic source: http://www.zdnet.com/article/phishing-remains-a-data-breach-weapon-of-choice-says-verizon/

    IT Spending
    Source: https://www.sans.org/reading-room/whitepapers/analyst/security-spending-trends-36697
    Data Breaches, by type of Breach
    Graphic source: http://www.cnbc.com/2016/12/15/how-yahoos-1-billion-account-breach-stacks-up-with-biggest-hacks-ever.html


    Cybersecurity


    Dark Web; Dark Data

    Dark Web Content Dark Web Content
    Graphic source:http://www.techrepublic.com/article/the-light-side-of-the-dark-web/

    Dark Web Services

    Dark Web Service
    Graphic source: http://www.zdnet.com/article/dark-web-trading-which-country-specializes-in-what/


    Digital Overload/Electronic Addiction


    DDoS (Distributed Denial of Service

    DDoS vectors
    Graphic source: http://www.zdnet.com/article/todays-leading-causes-of-ddos-attacks/

    How the 10/21/2016 Mirai Botnet Dyn DDoS Attack Looked Like

    10/21/2016 Mirai Botnet DDoS attack
    Map source: http://www.computerworld.com/article/3135774/security/researchers-blame-dyn-ddos-attack-on-script-kiddies-targeting-video-game-company.html">

    Miraibotnet
    Graphic source: http://blog.level3.com/security/grinch-stole-iot/

    Global Distribution of Mirai Bots
    Map source: http://blog.level3.com/security/grinch-stole-iot/


    Document/File Converter


    Doing Research on the Internet - Tutorials


    Drones


    E-Mail


    Emotion Recognition


    E-readers


    Facial Recognition

    Facial Recognition
    Map source: http://www.computerworld.com/article/3132409/security/half-of-us-adults-are-profiled-in-police-facial-recognition-databases.html


    Fixing the Computer

    computer fight
    Graphic source: http://www.smosh.com/smosh-pit/photos/funny-gifs-unexpected-twist-endings

    http://www.geekologie.com/2009/07/22/computer-hardware-2.jpg

    Portable Toolbox


    Free Firewall

    ZoneAlarm

    Free Internet Service Providers

    Freedom List


    Graphics Resource Page


    Identity Theft


    Information Quality


    Instruction



    Internet

    Internet Pinging away
    Map source: http://gizmodo.com/what-is-dns-and-why-does-it-make-the-internet-break-1788065317

    Internet Map
    Map source: http://www.vox.com/xpress/2014/9/20/6661175/the-population-of-the-internet-in-one-map

    Global internet use
    Chart source: http://www.zdnet.com/article/only-40-percent-of-the-global-population-ever-connected-to-the-internet-report/


    Internet Use


    Internet of Things

    IoT
    Graphic source: http://www.zdnet.com/article/infographic-companies-are-using-iot-to-monitor-environments-and-improve-products/

    IoT Security Concerns
    Graphic source: http://www.zdnet.com/article/internet-of-things-finding-a-way-out-of-the-security-nightmare/

    IOT security
    Graphic source: https://www.helpnetsecurity.com/2016/09/15/iot-test-strategy/

    IoT
    Graphic source: http://www.techrepublic.com/article/internet-of-things-five-truths-you-need-to-know-to-succeed/

    Internet of Things
    Graphic source: http://www.zdnet.com/article/internet-of-things-big-security-worry-says-hp/

    IoT 2020
    Graphic source: http://www.businessinsider.com/iot-ecosystem-internet-of-things-forecasts-and-business-opportunities-2016-2

    Video Analytics IoT
    Graphic source: http://www.mckinsey.com/industries/high-tech/our-insights/video-meets-the-internet-of-things

    IoT in various settings
    Graphic source:http://www.mckinsey.com/industries/high-tech/our-insights/video-meets-the-internet-of-things


    Internet Safety and Security


    Machine Learning


    Mobile Apps


    Net Neutrality


    Newgroups Sites

    Apicviewer Freeware

    New Technologies


    Notification Services

    Change Detection.Com Google Alert


    Operating Systems

    Endof sales chart
    Graphic source: http://www.zdnet.com/article/microsoft-sets-end-of-sales-date-for-windows-7-pcs/?tag=nl.e589&s_cid=e589&ttag=e589&ftag=TREc64629f

    Opt-Out Sites

    Phishing

    Phishing
    Graphic source: http://www.techrepublic.com/article/infographic-how-to-identify-and-avoid-phishing-attacks/
    Phishing
    Graphic source: http://www.zdnet.com/article/phishing-would-you-fall-for-one-of-these-scam-emails/

    Phishing
    Graphic source: http://www.verizonenterprise.com/resources/reports/rp_data-breach-digest-2017-perspective-is-reality_xg_en.pdf


    Privacy Concerns


    Remote Hacking & Spying

  • FBI & NHTSA say car hacking is real, offer tips to keep you safe
  • FTC Issues Warning Letters to App Developers Using ‘Silverpush’ Code 3/2016
  • FTC reads the riot act to Android developers building apps that can spy on users' television habits 3/2016
  • Motor Vehicles Increasingly Vulnerable to Remote Exploits FBI.gov
  • SilverPush ‘Redefining TV advertising’ is simply spying on users - FTC 3/2016
  • SilverPush Says It’s Using “Audio Beacons” For An Unusual Approach To Cross-Device Ad Targeting 3/2016

  • Ransomware

    Ransomware by org
    Graphic created from source: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ISTR2016_Ransomware_and_Businesses.pdf
    Industries Targeted by Ransomware

    http://www.zdnet.com/article/a-massive-locky-ransomware-campaign-is-targeting-hospitals/

    Ransomware amounts
    Graphic source: http://www.computerworld.com/article/3103489/security/almost-half-of-us-businesses-hit-by-ransomware-says-study.html

    Ransomware
    Graphic source: http://www.techrepublic.com/article/infographic-the-5-phases-of-a-ransomware-attack/
    Ransomware
    Graphic source: http://www.techrepublic.com/article/infographic-the-5-phases-of-a-ransomware-attack/


    RSS


    Screensavers/Desktop Themes/Wallpapers


    Search Engines

    googlealgorithmchanges.png
    Graphic source: http://blog.hubspot.com/marketing/google-algorithm-visual-history-infographic

    14 Special Google Searches That Show Instant Answers howtogeek.com

    Search Engine Optimization (SEO)


    Skins


    ENTER> Software and Plug-Ins Page

    Software Help


    Spam Control


    Stereo


    Technical Assistance


    Technology


    Telnet


    3D Printing


    Utilities


    Video Editors


    Virtual Reality


    Virus Scans and Spyware Removal


    Voice Assistants


    Web Presence


    Wi-Fi

    WAP is "Wireless Application Protocol" that lets people access the Net using wireless devices like mobile phones and other gadgets. Eventually all wireless tools will come equipped with WAP as standard issue. These wireless net-surfers cannot access HTML-driven sites. Their devices can read sites using WML - "Wireless Markup Language." So, you need to develop WAP cards rather than Web pages to reach these people.


    Windows 10


    Windows Registry & Etc.


    Links

    Betty's Home Page
    Site Map

    Annotated Internet Bibliography Cool & Useful Sites A to Z Index Web Resources Index


    TheFreeSite.com!

    PUBLISHED ON THE WEB: February 23, 2000; February 23, 2001; Web and Web2 merged 1/17/2004
    Updated: 3/20/2017 R2,481
    Comments, suggestions, dead link reports:

    Counter


    Back to Top

    © Copyright 1999 - 2017 Betty C. Jung
    All rights reserved.