Co-Design Toolkit
Numérique Responsable
Advanced Data Protection Control (ADPC)
This specification defines a mechanism for expressing user decisions about personal data processing under the European Union’s data protection regulations, and similar regulations outside the EU. The mechanism functions through the exchange of HTTP headers between the user agent and the web server, or through an equivalent JavaScript interface.
Designer pour renoncer : remettre en question notre conception de l’innovation et du projet
Retour pratique sur le travail mené par Emmanuel Bonnet, Diego Landivar et Alexandre Monnin, dans le cadre de l’initiative Closing Worlds.
Google data centres' secret
‘If Google’s data centre water consumption was a pyramid of jugs, it would tower thousands of feet into Arizona’s cloudless sky.’ Nikitha Sattiraju reports
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
Automated Human Risk Management | usecure
Raise employee cyber security awareness with user-tailored training and simulated phishing campaigns, powered through intelligent automation.
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
DNSdumpster.com - dns recon and research, find and lookup dns records
Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.
Numérique Éthique – Métacartes
Maturité Numérique Responsable - INFOGREEN FACTORY
Quel est le niveau de maturité Numérique Responsable de votre entreprise ? Ce court questionnaire vous permet d'évaluer le chemin parcouru.
Le cloud pollue davantage qu’un simple nuage
Les services cloud s’appuient sur de nombreux serveurs répartis à travers le monde. Contrairement aux déchets pour lesquels les impacts environnementaux sont directement visibles, ceux du matériel informatique le sont moins. Néanmoins, ils ne sont pas pour autant inexistants.
A Complete Guide To Accessibility Tooling — Smashing Magazine
In a new short series of posts, we highlight some of the useful tools and techniques for developers and designers. Recently we’ve covered HTML Emails and SVG Generators. This time we look into different kinds of tools to help you streamline your accessibility testing process. Don’t miss the next one.
Against software development
L’extension assistant RGAA se met à jour ! - Empreinte Digitale, le blog
L'assistant RGAA, extension d'aide pratique pour réaliser des audits d'accessibilité numérique se met à jour avec les critères du RGAA 4.0 et 4.1.
Hidden role of data in climate crisis
(Long read)Half of the roughly 13 trillion photos taken since 1900 were shot in the last five years. In fact, more photos were taken in 2020 than in the entire twentieth century. Digital is the great accelerator. Digital puts everything on speed: extraction, production, consumption, waste generation.Digital is physical. Data consumes electricity. D...
Kontra Application Security Training
Kontra is an Application Security Training platform built for modern development teams.
Punkspider
Sécurisez votre serveur web
Vous savez installer un serveur Linux et souhaitez renforcer ses services ? Suivez ce cours, apprenez à monter un serveur web et à gérer les services les plus courants !
Apprendre le hacking - Techniques de base hacking / sécurité informatique
Bases Hacking : apprendre la base de la sécurité informatique. Techniques de base, failles web, buffer overflows, pwn, shellcode, exploits
Lightning-Fast Web Performance
An online lecture course by Scott Jehl.
How do Chrome extensions impact browser performance?
This article looks at how 1000 popular Chrome extensions impact the performance of the browser.
Sécurisez vos applications web avec l'OWASP
Pour créer une application de qualité, vous devez définir son modèle de sécurité ! Apprenez à appliquer les techniques de OWASP, une communauté qui fournit des outils inestimables pour réduire les risques de sécurité dans le développement web.
Microanalytics.io - Free website analytics, privacy-friendly, alternative to Google Analytics
Microanalytics.io is a free website analytics, privacy-focussed alternative to Google Analytics. Our simple analytics has a clean interface, and unlimited integrations. Fully compliant with GDPR, PECR and CCPA.
A Call To Minimize Distration
The software value map an exhaustive collection of value aspects for the development of software intensive products - Khurum_et_al-2013-Journal_of_Software__Evolution_and_Process.pdf
FULLTEXT01.pdf
Sustainable software products---Towards assessment criteria for resource and energy efficiency - 1-s2.0-S0167739X17314188-main.pdf
Set-of-Criteria_Sustainable-SW_v01_2017-05-31.pdf
Introduction
Sustainable Software Engineering | Usability | Sustainability
This paper introduces a methodology to measure and incrementally improve the sustainability of software projects that can be easily adopted without impacting the overall product development cycle. This methodology is composed of a set of metrics that are used to assess the Sustainability Performance of a given software-based project, with the goal of promoting the use of Software Engineering, Project Management and IT Adoption practices that enable economic, social and environmental benefits. The paper also illustrates how this methodology was used in a software project developed for NASA.