Designer pour renoncer : remettre en question notre conception de l’innovation et du projet
Google data centres' secret
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
Automated Human Risk Management | usecure
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
DNSdumpster.com - dns recon and research, find and lookup dns records
Numérique Éthique – Métacartes
Maturité Numérique Responsable - INFOGREEN FACTORY
Le cloud pollue davantage qu’un simple nuage
A Complete Guide To Accessibility Tooling — Smashing Magazine
Against software development
L’extension assistant RGAA se met à jour ! - Empreinte Digitale, le blog
Hidden role of data in climate crisis
Punkspider
Sécurisez votre serveur web
Apprendre le hacking - Techniques de base hacking / sécurité informatique
Lightning-Fast Web Performance
How do Chrome extensions impact browser performance?
Sécurisez vos applications web avec l'OWASP
Microanalytics.io - Free website analytics, privacy-friendly, alternative to Google Analytics
A Call To Minimize Distration
The software value map an exhaustive collection of value aspects for the development of software intensive products - Khurum_et_al-2013-Journal_of_Software__Evolution_and_Process.pdf
Sustainable software products---Towards assessment criteria for resource and energy efficiency - 1-s2.0-S0167739X17314188-main.pdf
Introduction
CAT Salon: Digital sustainability pt. 1 – an introduction (with Tom Greenwood) - YouTube
Terms & Conditions Apply - A fun mini-game about pop-ups and the deviousness of websites and apps