Numérique Responsable

2978 bookmarks
Custom sorting
Sobriété éditoriale : 6 grands principes
Sobriété éditoriale : 6 grands principes
Article invité, rédigé par Ferréole Lespinasse Sobriété éditoriale, slow content, communication responsable, communication raisonnée... Après l’euphorie de la com paillette et du marketing à outrance, une certaine pondération gagne la fonction marketing-communication. Avis aux producteurs de contenus qui souhaitent
·www.miss-seo-girl.com·
Sobriété éditoriale : 6 grands principes
Why Performance Matters | Web Fundamentals
Why Performance Matters | Web Fundamentals
Thanks to mobile device and network proliferation, more people are using the web than ever before. As this user base grows, performance is more important than ever. In this article, find out why performance matters, and learn what you can do to make the web faster for everyone.
·developers.google.com·
Why Performance Matters | Web Fundamentals
VPTCS : le modèle qualité Web (Elie Sloïm et Eric Gateau)
VPTCS : le modèle qualité Web (Elie Sloïm et Eric Gateau)
VPTCS : le modèle qualité Web, par Elie Sloïm et Eric Gateau Historique Le modèle VPTCS (Visibilité – Perception – Technique – Contenus – Services) est né entre 2000 et 2001 dans le cadre de travaux menés sur le site e-qualite.com. Après un premier article intitulé « Evaluation chronologique d’un site par ses utilisateurs » publié début […]
·www.opquast.com·
VPTCS : le modèle qualité Web (Elie Sloïm et Eric Gateau)
SQL Injection Tutorial for Beginners
SQL Injection Tutorial for Beginners
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server.
·dotweak.com·
SQL Injection Tutorial for Beginners
Optimizing Encoding and Transfer Size of Text-Based Assets
Optimizing Encoding and Transfer Size of Text-Based Assets
Next to eliminating unnecessary resource downloads, the best thing we can do to improve page-load speed is to minimize the overall download size by optimizing and compressing the remaining resources.
·developers.google.com·
Optimizing Encoding and Transfer Size of Text-Based Assets
Page Weight Matters
Page Weight Matters
Three years ago, while I was a web developer at YouTube, one of the senior engineers began a rant about the page weight of the video watch page being far too large. The page had ballooned to as high as 1.2MB and dozens of requests. This engineer... | Chris Zacharias | Founder of imgix. YCombinator alum. Ex-YouTuber. Studied New Media at RIT.
·blog.chriszacharias.com·
Page Weight Matters
Open Source Security Platform
Open Source Security Platform
Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.
·snyk.io·
Open Source Security Platform
5 astuces pour lutter contre la pollution numérique #ONPDP
5 astuces pour lutter contre la pollution numérique #ONPDP
Retrouvez tous les sujets des Pigeons sur https://www.france.tv/slash/on-n-est-plus-des-pigeons/1079565-comment-devenir-influenceur.html?at_medium=custom2&at_campaign=800&at_custom1=description&at_custom2=slash Vous avez des équipements numériques chez vous ? Pas très écolo ! Smartphone, ordinateur, imprimante, box internet, console de jeu, tablette…Nous sommes tous des pollueurs numérique ! Comment être geek et clean ? Les pigeons t’expliquent ! 🔔 N'oubliez pas d'activer vos notifications 🔔 Tester chaque jour la consommation et les marques, pour cela tous les moyens sont bons ! On N'est Pl...
·www.youtube.com·
5 astuces pour lutter contre la pollution numérique #ONPDP
Eliminating Known Vulnerabilities With Snyk
Eliminating Known Vulnerabilities With Snyk
The way we consume **open source software (OSS) dramatically changed** over the past decade or two. Flash back to the early 2000s, we mostly used large OSS projects from a small number of providers, such as Apache, MySQL, Linux and OpenSSL. These projects came from well-known software shops that maintained good development and quality practices. It wasn’t our code, but it felt trustworthy, and it was safe to assume it didn’t hold more bugs than our own code. Fast-forward to today and OSS has turned into crowd-sourced marketplaces. Node’s npm carries over 210,000 packages from over 60,000 co...
·www.smashingmagazine.com·
Eliminating Known Vulnerabilities With Snyk
The Best Request Is No Request, Revisited
The Best Request Is No Request, Revisited
Now that HTTP/2 is enjoying greater ubiquity than ever, it’s especially important to challenge the once unquestionable rule of resource bundling in client side performance. Join Stefan Baumga…
·alistapart.com·
The Best Request Is No Request, Revisited
h5bp/html5-boilerplate
h5bp/html5-boilerplate
A professional front-end template for building fast, robust, and adaptable web apps or sites. - h5bp/html5-boilerplate
·github.com·
h5bp/html5-boilerplate
aFarkas/lazysizes
aFarkas/lazysizes
High performance and SEO friendly lazy loader for images (responsive and normal), iframes and more, that detects any visibility changes triggered through user interaction, CSS or JavaScript without...
·github.com·
aFarkas/lazysizes
Accessibilité numérique : la quatrième version du RGAA est publiée !
Accessibilité numérique : la quatrième version du RGAA est publiée !
10 ans après la création du RGAA - le référentiel général d’accessibilité des administrations, la direction interministérielle du numérique (DINSIC) publie sa quatrième version. Changement de nom, structure repensée, clarté améliorée, il est aussi renforcé par de nouvelles obligations et son champ d’application élargi à certains acteurs privés et à d’autres supports.
·www.numerique.gouv.fr·
Accessibilité numérique : la quatrième version du RGAA est publiée !
The most common types of ATO attacks
The most common types of ATO attacks
Whether you're new to security or a veteran, you need to stay up to date on threats. Learn what ATO attacks are and what the most common types look like.
·blog.sqreen.com·
The most common types of ATO attacks
lirantal/is-website-vulnerable
lirantal/is-website-vulnerable
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries - lirantal/is-website-vulnerable
·github.com·
lirantal/is-website-vulnerable