+WEB RESOURCES ON THE INTERNET - Compiled by Betty C. Jung


Web Resources

Social Media Web Development Web Resources

Goodies for Techies & Wannabe Techies

Search Betty C. Jung's Web site

Custom Search

Search the Entire Internet

Custom Search


  • The Ultimate Google Analytics Glossary
  • 3 “Hidden” Google Analytics Reports For Retailers Marketingland.com 6/2015
  • The 5 Most Meaningful Google Analytics Reports for Social Media Marketers Bufferapp.com
  • Top 5 Most Useful Reports in Google Analytics
  • 5 Must-Know Google Analytics Strategies To Measure SEO Success
  • 5 things Google Analytics won't tell you (and what you can do about it)
  • 6 Things I Learned from Analyzing the Most Shared Blog Posts from Top Content Marketers
  • 14 eyebrow-raising things Google knows about you Some are fascinating, others are frightening -- but here's how to find out what Google has on you. 12/2016
  • Guide to Google Analytics Site Speed Metrics Lunametreics.com 2015
  • Seven Google Analytics tips for beginners econsultancy.com
  • 7 Ways Google Analytics can Measure the Results of your Content 4/2016
  • 8 Steps for Eliminating Bad Data in Google Analytics
  • Ten Hidden Gems In Google Analytics: Do Smarter Web Data Analysis!
  • 15 Google Analytics Tips to Speed Up Your Website Data Analysis & Optimization Kissmetrics.com
  • A Data-Driven Guide to Creating Viral Content [New Infographic] 8/2015
  • A Look Into: Cohort Analysis in Google Analytics 2015
  • Avoid the Facepalm: 5 Common Mistakes in Your Google Analytics Tracking Code Lunametrics.com
  • Back to Basics: What Content Marketers Need to Know About Google Analytics Marketingland.com 4/2015
  • Big Data Data
  • Getting Valuable Marketing Data Out of Google Analytics (Infographic) Kissmetrics.com
  • Hit Counters: The Analytics Tool of the Early Web Priceonomics.com
  • How Does Google Analytics Collect Information? 6/2016
  • How to Answer 11 Common Marketing Questions Using Analytics Hubspot.com 6/2015
  • How To Increase Content Marketing Leads With 13 Cool Analytics Tips
  • How To Leverage The Google Search Analytics API Searchenglinand.com
  • How to Rid Your Website of Six Common Google Analytics Headaches Moz.com 2015
  • Mind your analytics, or you could soon be in ethical hot water
  • Mini-glossary: Business intelligence and analytics terms you should know Techrepublic.com 7/2015
  • The Anatomy of a Shareable, Linkable & Popular Post: A Study of Our Marketing Blog
  • The Essential Marketing & Sales Metrics Your Team Should Track 9/2015
  • The FTC is worried about algorithmic transparency, and you should be too
  • Understanding Users in Google Analytics
  • Using the Google Analytics Site Search reports
  • Misuses of 4 Google Analytics Metrics Debunked Moz.com
  • The Beginner’s Guide to Mobile App Analytics4/2016
  • Using the New Cohort Analysis in Google Analytics
  • Your Step-by-Step Guide to A/B Testing with Google Analytics Crazyegg.com

  • Artificial Intelligence (AI)/Robots

    Online trends
    Graphic source: http://www.marketingcharts.com/online/ai-iot-among-top-trends-seen-affecting-the-user-experience-over-the-next-5-years-74274/attachment/usertesting-most-important-future-ux-trends-feb2017/

    Graphic source: http://www.techrepublic.com/article/infographic-many-companies-lack-skills-to-implement-and-support-ai-and-machine-learning/

    Deep Neural Networks
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    Machine Intelligence 3.0
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    AI ecosystem
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    AI related technologies
    Graphic source: http://www.zdnet.com/article/inside-the-black-box-understanding-ai-decision-making/

    Country Automation
    Map source: http://www.businessinsider.com/robots-will-steal-your-job-citi-ai-increase-unemployment-inequality-2016-2

    Technology job threat, by job title
    Graphic source: http://www.businessinsider.com/emolument-data-on-the-threat-of-robots-ai-artificial-intelligence-automation-to-jobs-2016-10

    Technology job threat, by education
    Graphic source: http://www.businessinsider.com/emolument-data-on-the-threat-of-robots-ai-artificial-intelligence-automation-to-jobs-2016-10

    Speech Technologies
    Graphic source: http://www.zdnet.com/article/how-we-learned-to-talk-to-computers-and-how-they-learned-to-answer-back/

    A timeline of developments in computers and robotics.

    Jobs that can be computerized
    Graphic source: https://www.weforum.org/agenda/2016/12/stephen-hawking-this-will-be-the-impact-of-automation-and-ai-on-jobs

    Biometric Data



    Browsers/Usage Resources

    Cell Phones

    Graphic source: http://www.livescience.com/16376-texting-cellphones-iphone-infographic.html

    Addictive behaviors
    Graphic source: https://blog.hubspot.com/marketing/content-creation-short-attention-spans

    Cellphone addiction
    Graphic source: https://blog.hubspot.com/marketing/best-infographics-2016

    Smartphone Addiction & Other Mental Health Issues

    Health & Safety Issues



    Phone security
    Graphic source: http://www.zdnet.com/article/apple-winning-the-enterprise-security-race-samsung-makes-push/

    (The) Cloud

    Computer Resources

    c|net PC Pitsop.com Programs and Info for a Newbie or Oldie V2.1 Spychecker ZDNet


    Cybercrime/Data Breaches

    Cybersecurity Breach Types
    Graphic source: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf">
    Thanksgiving 2016 Web Application Attacks
    Graphic source: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q4-2016-state-of-the-internet-security-report.pdf
    Costliest Cybercrime types
    Graphic source: http://www.nbcnews.com/tech/security/yahoo-mega-breach-exposes-more-1-billion-accounts-n696141
    Common Cybercrime types
    Graphic source: http://www.nbcnews.com/tech/security/yahoo-mega-breach-exposes-more-1-billion-accounts-n696141
    Largest Data Breaches (12/2016)
    largest data breaches
    Graphic source: http://www.nbcnews.com/tech/security/yahoo-mega-breach-exposes-more-1-billion-accounts-n696141
    Birth and Rebirth of a Data Breach
    Data Breach
    Graphic source: http://www.zdnet.com/article/phishing-remains-a-data-breach-weapon-of-choice-says-verizon/
    How Long It Takes to Get Compromised with a Phishing Attack

    Phishing Attack
    Graphic source: http://www.zdnet.com/article/phishing-remains-a-data-breach-weapon-of-choice-says-verizon/

    IT Spending
    Source: https://www.sans.org/reading-room/whitepapers/analyst/security-spending-trends-36697
    Data Breaches, by type of Breach
    Graphic source: http://www.cnbc.com/2016/12/15/how-yahoos-1-billion-account-breach-stacks-up-with-biggest-hacks-ever.html


    Dark Web; Dark Data

    Dark Web Content Dark Web Content
    Graphic source:http://www.techrepublic.com/article/the-light-side-of-the-dark-web/

    Dark Web Services

    Dark Web Service
    Graphic source: http://www.zdnet.com/article/dark-web-trading-which-country-specializes-in-what/

    Digital Overload/Electronic Addiction

    DDoS (Distributed Denial of Service

    DDoS vectors
    Graphic source: http://www.zdnet.com/article/todays-leading-causes-of-ddos-attacks/

    How the 10/21/2016 Mirai Botnet Dyn DDoS Attack Looked Like

    10/21/2016 Mirai Botnet DDoS attack
    Map source: http://www.computerworld.com/article/3135774/security/researchers-blame-dyn-ddos-attack-on-script-kiddies-targeting-video-game-company.html">

    Graphic source: http://blog.level3.com/security/grinch-stole-iot/

    Global Distribution of Mirai Bots
    Map source: http://blog.level3.com/security/grinch-stole-iot/

    Document/File Converter

    Doing Research on the Internet - Tutorials



    Emotion Recognition


    Facial Recognition

    Facial Recognition
    Map source: http://www.computerworld.com/article/3132409/security/half-of-us-adults-are-profiled-in-police-facial-recognition-databases.html

    Fixing the Computer

    computer fight
    Graphic source: http://www.smosh.com/smosh-pit/photos/funny-gifs-unexpected-twist-endings


    Portable Toolbox

    Free Firewall


    Free Internet Service Providers

    Freedom List

    Graphics Resource Page

    Identity Theft

    Information Quality



    Internet Pinging away
    Map source: http://gizmodo.com/what-is-dns-and-why-does-it-make-the-internet-break-1788065317

    Internet Map
    Map source: http://www.vox.com/xpress/2014/9/20/6661175/the-population-of-the-internet-in-one-map

    Global internet use
    Chart source: http://www.zdnet.com/article/only-40-percent-of-the-global-population-ever-connected-to-the-internet-report/

    Internet Use

    Internet of Things

    Graphic source: http://www.zdnet.com/article/infographic-companies-are-using-iot-to-monitor-environments-and-improve-products/

    IoT Security Concerns
    Graphic source: http://www.zdnet.com/article/internet-of-things-finding-a-way-out-of-the-security-nightmare/

    IOT security
    Graphic source: https://www.helpnetsecurity.com/2016/09/15/iot-test-strategy/

    Graphic source: http://www.techrepublic.com/article/internet-of-things-five-truths-you-need-to-know-to-succeed/

    Internet of Things
    Graphic source: http://www.zdnet.com/article/internet-of-things-big-security-worry-says-hp/

    IoT 2020
    Graphic source: http://www.businessinsider.com/iot-ecosystem-internet-of-things-forecasts-and-business-opportunities-2016-2

    Big data from Iot
    Graphic source: http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/big-data-the-next-frontier-for-innovation

    Video Analytics IoT
    Graphic source: http://www.mckinsey.com/industries/high-tech/our-insights/video-meets-the-internet-of-things

    IoT in various settings
    Graphic source:http://www.mckinsey.com/industries/high-tech/our-insights/video-meets-the-internet-of-things

    Internet Safety and Security

    Machine Learning

    Mobile Apps

    Net Neutrality

    Newgroups Sites

    Apicviewer Freeware

    New Technologies

    Notification Services

    Change Detection.Com Google Alert

    Operating Systems

    Endof sales chart
    Graphic source: http://www.zdnet.com/article/microsoft-sets-end-of-sales-date-for-windows-7-pcs/?tag=nl.e589&s_cid=e589&ttag=e589&ftag=TREc64629f

    Opt-Out Sites

    Personal Location Data

    Personal location data
    Graphic source: http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/big-data-the-next-frontier-for-innovation


    Graphic source: http://www.techrepublic.com/article/infographic-how-to-identify-and-avoid-phishing-attacks/
    Graphic source: http://www.zdnet.com/article/phishing-would-you-fall-for-one-of-these-scam-emails/

    Graphic source: http://www.verizonenterprise.com/resources/reports/rp_data-breach-digest-2017-perspective-is-reality_xg_en.pdf

    Privacy Concerns

    Remote Hacking & Spying

  • FBI & NHTSA say car hacking is real, offer tips to keep you safe
  • FTC Issues Warning Letters to App Developers Using ‘Silverpush’ Code 3/2016
  • FTC reads the riot act to Android developers building apps that can spy on users' television habits 3/2016
  • Motor Vehicles Increasingly Vulnerable to Remote Exploits FBI.gov
  • SilverPush ‘Redefining TV advertising’ is simply spying on users - FTC 3/2016
  • SilverPush Says It’s Using “Audio Beacons” For An Unusual Approach To Cross-Device Ad Targeting 3/2016

  • Ransomware

    Ransomware by org
    Graphic created from source: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ISTR2016_Ransomware_and_Businesses.pdf
    Industries Targeted by Ransomware


    Ransomware amounts
    Graphic source: http://www.computerworld.com/article/3103489/security/almost-half-of-us-businesses-hit-by-ransomware-says-study.html

    Graphic source: http://www.techrepublic.com/article/infographic-the-5-phases-of-a-ransomware-attack/
    Graphic source: http://www.techrepublic.com/article/infographic-the-5-phases-of-a-ransomware-attack/


    Screensavers/Desktop Themes/Wallpapers

    Search Engines

    Graphic source: http://blog.hubspot.com/marketing/google-algorithm-visual-history-infographic

    14 Special Google Searches That Show Instant Answers howtogeek.com

    Search Engine Optimization (SEO)


    ENTER> Software and Plug-Ins Page

    Software Help

    Spam Control


    Technical Assistance



    3D Printing


    Video Editors

    Virtual Reality

    Virus Scans and Spyware Removal

    Voice Assistants

    Web Presence


    WAP is "Wireless Application Protocol" that lets people access the Net using wireless devices like mobile phones and other gadgets. Eventually all wireless tools will come equipped with WAP as standard issue. These wireless net-surfers cannot access HTML-driven sites. Their devices can read sites using WML - "Wireless Markup Language." So, you need to develop WAP cards rather than Web pages to reach these people.

    Windows 10

    Windows Registry & Etc.


    Betty's Home Page
    Site Map

    Annotated Internet Bibliography Cool & Useful Sites A to Z Index Web Resources Index


    PUBLISHED ON THE WEB: February 23, 2000; February 23, 2001; Web and Web2 merged 1/17/2004
    Updated: 4/25/2017 R2,553
    Comments, suggestions, dead link reports:


    Back to Top

    © Copyright 1999 - 2017 Betty C. Jung
    All rights reserved.