Security in a Box - Digital security tools and tactics
Numérique Responsable
Holistic security
Holistic Security
Google Ad Portal Equated “Black Girls” with Porn – The Markup
Searching Google’s ad buying portal for “Black girls” returned hundreds of terms leading to “adult content”
Opquast - check-list de référence | Trello
Un tableau vivant avec la liste des critères de qualité Opquast (Open Quality Standards), pour apprendre, réviser ou mettre en oeuvre sur votre site !
Projects/Sustainability/Ideas - MozillaWiki
climate-strike/license: Prevent oil and gas companies from co-opting your work and extracting more fossil fuels with this software license.
Prevent oil and gas companies from co-opting your work and extracting more fossil fuels with this software license. - climate-strike/license
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites Draft: July 1, 2019 - dark-patterns-v2.pdf
Conformité et accessibilité, l’amour vache (a11y) – 24 jours de web
24 jours de web : Le calendrier de l'avent des gens qui font le web d'après.
How to Check Your Devices for Stalkerware | WIRED
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
How to Know If You’ve Been Hacked, and What to Do About It | WIRED
Facebook. Google. Netflix. Sometimes your accounts get compromised, so it’s vital to understand the threats.
UX Series 3: Digital Accessibility and the UX Design Process
Atlas of Surveillance
Documenting Police Tech in Our Communities with Open Source Research
Google met en open source son scanner de vulnérabilité Tsunami - ZDNet
Selon Google, Tsunami est un scanner de réseau qui permet de détecter les vulnérabilités critiques avec le moins de faux positifs possible.
Talks – SustainableUX
The conference for UX, front-end, and product people who want to make a positive impact—on climate-change, social equality, and inclusion.
The performance cost of custom web fonts, and how to solve it
Custom web fonts are an essential part of most web design, but they come at a performance cost. This post looks at addressing the causes and the symptoms.
What Is the circular economy?
Learn about the three principles that are the foundation of the circular economy concept and some of the benefits of shifting away from the current, linear, economy.
The Circular Design Guide
What if you could redesign everything? The Circular Design Guide is a collaboration between IDEO and the Ellen MacArthur Foundation. It's an action-oriented set of methods, mindsets and thought starters to help innovators design circular solutions that are fit for the future.
AskNature
Find biological strategies and inspired ideas relative to your innovation challenges, so you can emulate time-tested forms, processes, and systems.
What Does 1GB of Mobile Data Cost in Every Country?
Globally, the cost of mobile data ranges between $0.09 per GB up to $27 per GB. Here's how it breaks down in 150+ countries.
Sweep the Sleaze – iA
Promising to make you look wired and magically promote your content in social networks, the Like, Retweet, and +1 buttons occupy a good spot on pretty much every page of the World Wide Web. Because of this, almost every major site and brand is providing free advertising for Twitter and Facebook. But do these buttons work?
Webwaste – A List Apart
In this excerpt from World Wide Waste, Gerry McGovern examines the environmental impact of bloated websites and unnecessary assets. Digital is physical. It seems cheap and free, but it’s not—…
shareon
Lightweight, stylish and ethical share buttons for popular social networks
Perf Track
Tracking framework performance at scale
Publication des travaux sur l'environnement et le numérique | CNNum | Traducteur et éclaireur des transformations numériques
LIRE LA FEUILLE DE ROUTE SUR L'ENVIRONNEMENT ET LE NUMERIQUE LIRE LE DOSSIER DE PRESSE DE LA FEUILLE DE ROUTE
A look at password security, Part I: history and background - The Mozilla Blog
Today I'd like to talk about passwords. Yes, I know, passwords are the worst, but why? This is the first of a series of posts about passwords, with this one ...
How can we design sustainably? Mobile UX London March Meetup - YouTube
Mobile UX London runs frequent events and training courses for UX professionals in London. You can find out more by visiting our website at www.mobileuxlondon.com. On 5 March 2020, we held a meetup focused on Sustainable UX Design, hosted by IBM. Speakers included: 6:05 Anna van der Togt, Service Designer at Livework 26:20 Tom Greenwood, co-founder of Wholegrain Digital 48:40 Chris Sherwin, founder and director of Reboot Innovation 1:21:04 Lucy Stewart, Design Researcher at Snook A big thank you to everyone involved and particularly to our hosts at IBM.
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
Digital – Commission RSE AACC
Jour 85 - L'audit d'accessibilité (partie 1) – Loriane Buffet – Intégratrice web
Pourquoi et comment faire un audit ? Focus sur l’audit de conformité.
Jour 90 - Expérience utilisateur, utilisabilité, design inclusif et accessibilité – Loriane Buffet – Intégratrice web
Mise au point sur ces termes étroitement liés.