Animate SVG Path Changes in CSS

.mega-header::before { content: “”; position: absolute; top: 0; right: 0; width: 75%; height: 90%; background-image: radial-gradient(ellipse closest-side, rgba(15, 14, 22, 0.5), #100e17), url(https://res.cloudinary.com/css-tricks/image/fetch/w_1200,q_auto,f_auto/https://css-tricks.com/wp-content/uploads/2020/02/simple-svg-paths.png); background-size: cover; background-repeat: no-repeat; opacity: 0.75; } Every once in a while I’m motivated to attempt to draw some shapes with <path>, the all-powerful drawing syntax of SVG. I only understand a […]

Read more
Popular Mobile Document-Management Apps Put Data at Risk

Most iOS and Android apps that Cometdocs has published on Google and Apple app stores transmit entire documents – unencrypted. Dozens of popular file management apps published by a popular operator of an online document management system do not encrypt file transfers to and from user devices, potentially exposing data. Mobile security firm Wandera, which […]

Read more
TekSavvy partners with Ericsson to upgrade broadband for over 30,000 households in southwestern Ontario

TekSavvy Solutions announced today that it has chosen Ericsson to upgrade TekSavvy’s existing fixed wireless access (FWA) services and network in rural southwestern Ontario. The modernization of the existing FWA infrastructure is expected to be completed in the first half of 2020.  Ericsson will be leveraging its radio system, cloud core technology and transport technology […]

Read more
User Have Risky Security Habits, but Security Pros Aren’t Much Better

Researchers spot gaps in users’ and IT practitioners’ security habits, and between security tools and user preferences. Cybersecurity professionals, and the employees and consumers they serve, all engage in risky security practices. Data shows password issues continue to plague users of all experience levels, two-factor authentication adoption is lagging, and mobile devices are introducing new […]

Read more
Nokia restructures tech leadership to eliminate group chief information technology role 

While an increasing number of organizations are realizing the importance of having a CIO in a strategic role to navigate the complicated waters of digital transformation, telecom giant Nokia has decided to eliminate the group CIO role from its leadership structure.  The change took place at the start of 2020, but the company publicly commented […]

Read more
Hackers Were Inside Citrix for Five Months

Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents. The disclosure comes almost a year after Citrix acknowledged that digital intruders had broken in by probing its employee […]

Read more
Understanding Web Accessibility Color Contrast Guidelines and Ratios

.mega-header::before { content: “”; position: absolute; top: 0; right: 0; width: 75%; height: 90%; background-image: radial-gradient(ellipse closest-side, rgba(15, 14, 22, 0.5), #100e17), url(https://res.cloudinary.com/css-tricks/image/fetch/w_1200,q_auto,f_auto/https://css-tricks.com/wp-content/uploads/2020/02/contrast-checker.png); background-size: cover; background-repeat: no-repeat; opacity: 0.75; } What should you do when you get a complaint about the color contrast in your web design? It might seem perfectly fine to you because […]

Read more
Top