12 “Manager READMEs” from Silicon Valley’s Top Tech Companies
What does tech management at Slack, HubSpot, Netflix, Etsy, Shopify, InVision, and more have in common? A lot, apparently!

When we launched our first SoapBox hero I was surprised to discover a document used to introduce her working style to her team. I had never seen that before and it was awesome!
management  leadership  business 
10 days ago
Stream | API for Scalable News Feeds & Activity Streams
Build scalable news feeds & activity streams. Stream’s simple, powerful APIs are used by some of the largest and most popular apps. Save months of development headache and focus on what makes your app unique.
saas  api  feeds 
10 days ago
Royalty Free Music | Filmstro
NEW: Download static versions of all our royalty-free music tracks for FREE. YouTube cleared. Explore the library and start creating!
music  opensource  stock 
18 days ago
ServiceWorker Cookbook
The Service Worker Cookbook is a collection of working, practical examples of using service workers in modern web sites.
serviceworker  javascript 
18 days ago
Why good people turn bad online | Mosaic
Meet the scientists finding out how we can defeat our inner trolls and build more cooperative digital societies.
abuse  socialmedia  web 
19 days ago
How to successfully harness AI to combat fraud and abuse - RSA 2018
While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems. Watching this talk will allow you to:

Learn how machine learning helps combat fraud and abuse.
Discover how to overcome challenges faced when using machine learning to anti-abuse.
Understand what the unsolved challenges are in the space.
ai  abuse  security 
19 days ago
Challenges faced while training an AI to combat abuse
This post looks at the main challenges that arise when training a classifier to combat fraud and abuse.
ai  abuse  security 
19 days ago
Why AI is the key to robust anti-abuse defenses
This post explains why artificial intelligence (AI) is the key to building anti-abuse defenses that keep up with user expectations and combat increasingly sophisticated attacks. This is the first post of a series of four posts dedicated to provide a concise overview of how to harness AI to build robust anti-abuse protections.
ai  abuse  security 
19 days ago
Digitala jag
Din utbildning i grund­läggande
digitala färdigheter
Det här är en utbildning från Google Digitalakademin och Arbetsförmedlingen för dig som vill bli tryggare med att använda digitala tjänster i din vardag. Utbildningen är uppdelad i ett antal teman. Inom varje tema finns innehållsdelar om saker omkring oss som kräver digitala färdigheter.
web  internet 
19 days ago
Utbrett hat mot lokala förtroendevalda visar ny studie - SKL
Var femte kommentar om lokala förtroendevalda innehöll hat, hot och kränkningar. Det är ett av resultaten i FOI:s studie om hur kommunstyrelseordföranden omnämns i digitala miljöer.
abuse  internet  technology 
19 days ago
Devops Security Checklist | Sqreen
This security checklist aims to give DevOps professionals a list of DevOps security best practices they can follow to implement DevSecOps.
security  checklist 
19 days ago
Everything Mark Zuckerberg Will Follow Up On for Congress | WIRED
By our best reckoning, what follows is every instance in which Zuckerberg volunteered to get back to a specific senator or representative—giving his “team” one heaping pile of homework in the process.
9 weeks ago
Digital tillgänglighet - Introduktion till WCAG av Per Axbom [e-bok].
Jag vill hjälpa dig att snabbt förstå hur du ökar möjligheten för så många människor som möjligt att använda digitala tjänster. Genom att skapa lösningar på ett inkluderande sätt hjälper vi alla människor.

Att lära sig grunderna för tillgänglighet behöver inte kännas svårt. De standardiserade rekommendationerna, Web Content Accessibility Guidelines (WCAG), innehåller fjorton övergripande riktlinjer med tillhörande kriterier. Här får du alla dessa riktlinjer presenterade på ett enkelt sätt, och med exempel där det är relevant.

Med denna kunskap kan du snart själv börja bidra till mer tillgängliga digitala tjänster, och ställa krav på personer som bygger och förvaltar webbaserade lösningar.
10 weeks ago
What Web Can Do Today
Can I rely on the Web Platform features to build my app?
An overview of the device integration HTML5 APIs
web  browser  technology 
10 weeks ago
PWA Stats
A community-driven list of stats and news related to Progressive Web Apps
PWA  web 
10 weeks ago
pi-top is an award winning ecosystem designed to make experimenting, coding and building electronics, simple, affordable and fun.
raspberrypi  laptop  diy  hardware 
10 weeks ago
Get Obachan - Your favorite Japanese subscription box
Wonderful things from Japan
hand-picked and delivered
to your door ✌️
11 weeks ago
The Two Faces of AMP - TimKadlec.com
Look, AMP, you’re either a tool for the open web, or you’re a tool for Google search. I don’t mind if you’re the latter, but please stop pretending you’re something else.
web  google  amp 
march 2018
The GeoCities Animated Gif Search Engine
gif  graphics  web 
march 2018
Your Interactive Makes Me Sick - Features - Source: An OpenNews project
Why your coolest scrolly features can cause problems, and what to do about it
a11y  design  scroll  animation 
march 2018
The original US patent drawing for the Lego brick, filed 60 years ago
Godtfred Kirk Christiansen’s US patent application for the Lego toy building brick
lego  design 
february 2018
Modular online encoding, encryption and conversion tool — Cryptii
Web app that encodes, decodes, encrypts, decrypts, converts, translates, simulates and views content online offering a variety of ciphers, formats, algorithms and methods.
tools  encryption 
december 2017
« earlier      
2007 2008 37signals accessibility adobe advertising advice agency ajax amazon analysis analytics android animation apache api apple apps art backup bestof blog blogging books branding browser browsers business career casestudy cheatsheet checklist clients clothing cms communication community comparison content copywriting creativity css css3 culture data database design development documentation drupal drupalmodules ecommerce education email employment entrepreneur facebook firefox flash flickr fonts football forms framework free freelance funny furniture future gallery generator git github google googlemaps graphics grid gtd guidelines hiring history howto html html5 humor ia icons identity ie illustration illustrator images innovation inspiration interface internet interview ios ipad iphone javascript journalism jquery layout library lifehacks list logos london mac magazine management maps marketing media microformats microsoft mobile motion music mysql navigation news newspapers opensource optimization organization osx patterns pdf pear performance photography photos photoshop php plugins podcasting portfolio posters presentation print privacy process productivity programming prototyping redesign reference research resources responsive rss ruby rubyonrails sass search security semanticweb seo sethgodin shopping showcase sketch slideshow smashingmagazine snippets social socialmedia software startup statistics strategy styleguide sublimetext2 svg t-shirts technology testing tips tools trends tutorial tutorials tv twitter typography ui usability ux vector video views visualization web web2.0 webdesign webdev webstandards windows wireframes wordpress workflow writing xhtml xml

Copy this bookmark: