Numérique Responsable

3285 bookmarks
Newest
Quel design pour un navigateur « low-tech » ?
Quel design pour un navigateur « low-tech » ?
En octobre 2019, pendant un workshop étudiant dans lequel nous cherchions à re-designer le web, j’ai eu l’idée avec Labo.mg de concevoir un navigateur internet « low-tech » (je vous dét…
·graphism.fr·
Quel design pour un navigateur « low-tech » ?
Welcome to the Dark Patterns Tip Line
Welcome to the Dark Patterns Tip Line
The Dark Patterns Tip Line is a platform people can use to submit deceptive designs they encounter in everyday digital products and services.
·darkpatternstipline.org·
Welcome to the Dark Patterns Tip Line
Design Patterns for Mental Health
Design Patterns for Mental Health
The Mental Health Patterns Library is a public library that contains a set of principles, patterns and examples for the design and delivery of digital services and products that address mental health needs.
·designpatternsformentalhealth.org·
Design Patterns for Mental Health
Advanced Data Protection Control (ADPC)
Advanced Data Protection Control (ADPC)
This specification defines a mechanism for expressing user decisions about personal data processing under the European Union’s data protection regulations, and similar regulations outside the EU. The mechanism functions through the exchange of HTTP headers between the user agent and the web server, or through an equivalent JavaScript interface.
·dataprotectioncontrol.org·
Advanced Data Protection Control (ADPC)
Google data centres' secret
Google data centres' secret
‘If Google’s data centre water consumption was a pyramid of jugs, it would tower thousands of feet into Arizona’s cloudless sky.’ Nikitha Sattiraju reports
·independent.co.uk·
Google data centres' secret
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
·geeksforgeeks.org·
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
Automated Human Risk Management | usecure
Automated Human Risk Management | usecure
Raise employee cyber security awareness with user-tailored training and simulated phishing campaigns, powered through intelligent automation.
·usecure.io·
Automated Human Risk Management | usecure
Maturité Numérique Responsable - INFOGREEN FACTORY
Maturité Numérique Responsable - INFOGREEN FACTORY
Quel est le niveau de maturité Numérique Responsable de votre entreprise ? Ce court questionnaire vous permet d'évaluer le chemin parcouru.
·infogreenfactory.green·
Maturité Numérique Responsable - INFOGREEN FACTORY
Le cloud pollue davantage qu’un simple nuage
Le cloud pollue davantage qu’un simple nuage
Les services cloud s’appuient sur de nombreux serveurs répartis à travers le monde. Contrairement aux déchets pour lesquels les impacts environnementaux sont directement visibles, ceux du matériel informatique le sont moins. Néanmoins, ils ne sont pas pour autant inexistants.
·siecledigital.fr·
Le cloud pollue davantage qu’un simple nuage
A Complete Guide To Accessibility Tooling — Smashing Magazine
A Complete Guide To Accessibility Tooling — Smashing Magazine
In a new short series of posts, we highlight some of the useful tools and techniques for developers and designers. Recently we’ve covered HTML Emails and SVG Generators. This time we look into different kinds of tools to help you streamline your accessibility testing process. Don’t miss the next one.
·smashingmagazine.com·
A Complete Guide To Accessibility Tooling — Smashing Magazine
Hidden role of data in climate crisis
Hidden role of data in climate crisis
(Long read)Half of the roughly 13 trillion photos taken since 1900 were shot in the last five years. In fact, more photos were taken in 2020 than in the entire twentieth century. Digital is the great accelerator. Digital puts everything on speed: extraction, production, consumption, waste generation.Digital is physical. Data consumes electricity. D...
·gerrymcgovern.com·
Hidden role of data in climate crisis
Sécurisez votre serveur web
Sécurisez votre serveur web
Vous savez installer un serveur Linux et souhaitez renforcer ses services ? Suivez ce cours, apprenez à monter un serveur web et à gérer les services les plus courants !
·openclassrooms.com·
Sécurisez votre serveur web
Sécurisez vos applications web avec l'OWASP
Sécurisez vos applications web avec l'OWASP
Pour créer une application de qualité, vous devez définir son modèle de sécurité ! Apprenez à appliquer les techniques de OWASP, une communauté qui fournit des outils inestimables pour réduire les risques de sécurité dans le développement web.
·openclassrooms.com·
Sécurisez vos applications web avec l'OWASP