Web Accessible Code Libraries and Design Patterns – Web Axe

Coder Survival Guide
Mobile Accessibility Guidelines - Accessibility for Products - BBC
J'ai pénétré dans les mines de coltan au Congo
Salut tout le monde, j'espère que vous allez bien ! Il y a quelques mois, je suis parti en République Démocratique du Congo pour réaliser un documentaire sur...
a11y casts
Partagez vos vidéos avec vos amis, vos proches et le monde entier
Web Accessibility for Newbies
In the current world of ubiquitous computing and an industry-wide desire to improve company and product diversity and inclusion, there’s no longer an excuse to not invest in web accessibility. That…
Restitution de la Fresque du Numérique - V2.0 - par Yvain Mouneu
La Fresque du Numérique est un atelier ludique et collaboratif de 3 heures avec une pédagogie similaire à celle de La Fresque du Climat. Le but de ce "ser...
Défauts d’accessibilité : Impacts sur les utilisateurs
ETSI EN 301 549 - V2.1.2 - Accessibility requirements for ICT products and services - en_301549v020102p.pdf
Union. — ethanmarcotte.com
Tech workers, it’s time we unionize.
Security Assurance and Security Operations
infosec.mozilla.org : Guidelines, principles published on https://infosec.mozilla.org
Web Accessibility | Accessibility Initiative | Wix.com
Build a website accessible to people with disabilities. Choose a template with the features you need built-in and customize anything with the intuitive Wix Editor.
Le Conseil d’Etat retoque en partie GendNotes, une application de collecte de données destinée à la gendarmerie
Ce fichier est censé recueillir des données ethniques, religieuses ou politiques. La plus haute juridiction administrative en a pour l’heure restreint l’exploitation, sans toutefois remettre en cause la création de l’application qui en découle.
How French welfare services are creating ‘robo-debt’ - AlgorithmWatch
When automated fraud detection algorithms fail, welfare services can wrongly demand the repayment of benefits. Journalist Lucie Inland explains how the French welfare office automatically put her in debt, and how she fought back.
🧠Psychology of Design: 101 Cognitive Biases & Principles That Affect Your UX
A complete list of cognitive biases and design principles. Tons of product examples, tips and checklists to improve your user experience.
Self-defense numérique
A presentation created with Slides.
Mon Convertisseur CO2
Visualisez facilement un poids en CO2 grâce à ce convertisseur, et découvrez quels sont les gestes climat qui comptent vraiment.
Zoom Escaper
Zoom Escaper is a simple tool to help you escape Zoom meetings and other videoconferencing scenarios. It allows you to self-sabotage your audio stream, making your presence unbearable to others.
home
Get Help About Us Want to ditch your online account? Shouldn’t be a problem, right? Unfortunately, on many websites, including popular ones like Facebook, deleting your account can be a real pain. AccountKiller collects direct
7 Best Free Lightweight WordPress Themes 2021 - aThemes
Looking for the best free lightweight WordPress themes to make your site load fast? Check out 7 of our favorites - they're all multipurpose and flexible.
Mobile Accessibility at W3C
The Website of the World Wide Web Consortium’s Web Accessibility Initiative.
Mobile Accessibility: How WCAG 2.0 and Other W3C/WAI Guidelines Apply to Mobile
Guide sur les lecteurs d'écran
Dropbox Design Diversity & Inclusion Toolkit | Dropbox Design
Explore and take steps toward a more diverse and inclusive design culture.
WebAIM: WebAIM Million – 2021 Update
Handicap : quoi, qui, combien ? Chiffres 2015
Chiffres clés 2015 sur le handicap. Qui cela concerne t-il ? Quelles formes existe t-il et combien y'a t-il d'handicapés en France ?
The Compiler Writer Resource Page
Microsoft Word - Cyber-Security in smart grid - a survey - Revised version 2(3).doc - 1809.02609.pdf
Smart Devices, Smart Grids, and Cybersecurity - DZone Security
We explore the emergence of smart grid technology, the cybersecurity implications of this innovation, and ways organizations can ensure their cybersecurity.
Share a secret - One Time
Keep sensitive information out of your chat logs and email. Share a secret link that is available only one time.
XSS Payloads
XSS Payloads