Recherche avancée

Médias (1)

Mot : - Tags -/biographie

Autres articles (81)

  • MediaSPIP version 0.1 Beta

    16 avril 2011, par

    MediaSPIP 0.1 beta est la première version de MediaSPIP décrétée comme "utilisable".
    Le fichier zip ici présent contient uniquement les sources de MediaSPIP en version standalone.
    Pour avoir une installation fonctionnelle, il est nécessaire d’installer manuellement l’ensemble des dépendances logicielles sur le serveur.
    Si vous souhaitez utiliser cette archive pour une installation en mode ferme, il vous faudra également procéder à d’autres modifications (...)

  • Amélioration de la version de base

    13 septembre 2013

    Jolie sélection multiple
    Le plugin Chosen permet d’améliorer l’ergonomie des champs de sélection multiple. Voir les deux images suivantes pour comparer.
    Il suffit pour cela d’activer le plugin Chosen (Configuration générale du site > Gestion des plugins), puis de configurer le plugin (Les squelettes > Chosen) en activant l’utilisation de Chosen dans le site public et en spécifiant les éléments de formulaires à améliorer, par exemple select[multiple] pour les listes à sélection multiple (...)

  • Multilang : améliorer l’interface pour les blocs multilingues

    18 février 2011, par

    Multilang est un plugin supplémentaire qui n’est pas activé par défaut lors de l’initialisation de MediaSPIP.
    Après son activation, une préconfiguration est mise en place automatiquement par MediaSPIP init permettant à la nouvelle fonctionnalité d’être automatiquement opérationnelle. Il n’est donc pas obligatoire de passer par une étape de configuration pour cela.

Sur d’autres sites (10235)

  • cannot convert FLV to MP4 despite compiling ffmpeg with all codecs

    1er novembre 2013, par Rubytastic

    Try to convert FLV to MP4 with below params, but it always fails. I included also list of codeces that are compiled in. Why It will not convert the FLV to MP4, who knows ?

    ffmpeg -y -i stream2.flv -acodec libmp3lame -ar 44100 -ac 1 -vcodec libx264 stream2.mp4;
    ffmpeg version git-2013-11-01-64a0ed1 Copyright (c) 2000-2013 the FFmpeg developers
     built on Nov  1 2013 14:44:29 with gcc 4.4.7 (GCC) 20120313 (Red Hat 4.4.7-3)
     configuration: --prefix=/root/ffmpeg_build --extra-cflags=-I/root/ffmpeg_build/include --extra-ldflags=-L/root/ffmpeg_build/lib --bindir=/root/bin --extra-libs=-ldl --enable-gpl --enable-nonfree --enable-libfdk_aac --enable-libmp3lame --enable-libopus --enable-libvorbis --enable-libvpx --enable-libx264
     libavutil      52. 49.100 / 52. 49.100
     libavcodec     55. 40.100 / 55. 40.100
     libavformat    55. 20.100 / 55. 20.100
     libavdevice    55.  5.100 / 55.  5.100
     libavfilter     3. 90.100 /  3. 90.100
     libswscale      2.  5.101 /  2.  5.101
     libswresample   0. 17.104 /  0. 17.104
     libpostproc    52.  3.100 / 52.  3.100
    Input #0, flv, from 'stream2.flv':
     Duration: 00:00:01.60, start: 0.000000, bitrate: 636 kb/s
       Stream #0:0: Video: h264 (Baseline), yuv420p(tv), 640x480 [SAR 1:1 DAR 4:3], 11.92 tbr, 1k tbn, 60 tbc
       Stream #0:1: Audio: speex, 16000 Hz, mono
    [graph 1 input from stream 0:1 @ 0xb000d40] Invalid sample format (null)
    Error opening filters!

    i followed the official compile documentation with all the codes, this is my full codec list :

    ffmpeg version git-2013-11-01-64a0ed1 Copyright (c) 2000-2013 the FFmpeg developers
     built on Nov  1 2013 14:44:29 with gcc 4.4.7 (GCC) 20120313 (Red Hat 4.4.7-3)
     configuration: --prefix=/root/ffmpeg_build --extra-cflags=-I/root/ffmpeg_build/include --extra-ldflags=-L/root/ffmpeg_build/lib --bindir=/root/bin --extra-libs=-ldl --enable-gpl --enable-nonfree --enable-libfdk_aac --enable-libmp3lame --enable-libopus --enable-libvorbis --enable-libvpx --enable-libx264
     libavutil      52. 49.100 / 52. 49.100
     libavcodec     55. 40.100 / 55. 40.100
     libavformat    55. 20.100 / 55. 20.100
     libavdevice    55.  5.100 / 55.  5.100
     libavfilter     3. 90.100 /  3. 90.100
     libswscale      2.  5.101 /  2.  5.101
     libswresample   0. 17.104 /  0. 17.104
     libpostproc    52.  3.100 / 52.  3.100
    Codecs:
    D..... = Decoding supported
    .E.... = Encoding supported
    ..V... = Video codec
    ..A... = Audio codec
    ..S... = Subtitle codec
    ...I.. = Intra frame-only codec
    ....L. = Lossy compression
    .....S = Lossless compression
    -------
    D.VI.. 012v                 Uncompressed 4:2:2 10-bit
    D.V.L. 4xm                  4X Movie
    D.VI.S 8bps                 QuickTime 8BPS video
    .EVIL. a64_multi            Multicolor charset for Commodore 64 (encoders: a64multi )
    .EVIL. a64_multi5           Multicolor charset for Commodore 64, extended with 5th color (colram) (encoders: a64multi5 )
    D.V..S aasc                 Autodesk RLE
    D.VIL. aic                  Apple Intermediate Codec
    DEVIL. amv                  AMV Video
    D.V.L. anm                  Deluxe Paint Animation
    D.V.L. ansi                 ASCII/ANSI art
    DEVIL. asv1                 ASUS V1
    DEVIL. asv2                 ASUS V2
    D.VIL. aura                 Auravision AURA
    D.VIL. aura2                Auravision Aura 2
    D.V... avrn                 Avid AVI Codec
    DEVI.. avrp                 Avid 1:1 10-bit RGB Packer
    D.V.L. avs                  AVS (Audio Video Standard) video
    DEVI.. avui                 Avid Meridien Uncompressed
    DEVI.. ayuv                 Uncompressed packed MS 4:4:4:4
    D.V.L. bethsoftvid          Bethesda VID video
    D.V.L. bfi                  Brute Force & Ignorance
    D.V.L. binkvideo            Bink video
    D.VI.. bintext              Binary text
    DEVI.S bmp                  BMP (Windows and OS/2 bitmap)
    D.V..S bmv_video            Discworld II BMV video
    D.VI.S brender_pix          BRender PIX image
    D.V.L. c93                  Interplay C93
    D.V.L. cavs                 Chinese AVS (Audio Video Standard) (AVS1-P2, JiZhun profile)
    D.V.L. cdgraphics           CD Graphics video
    D.VIL. cdxl                 Commodore CDXL video
    D.V.L. cinepak              Cinepak
    DEVIL. cljr                 Cirrus Logic AccuPak
    D.VI.S cllc                 Canopus Lossless Codec
    D.V.L. cmv                  Electronic Arts CMV video (decoders: eacmv )
    D.V... cpia                 CPiA video format
    D.V..S cscd                 CamStudio (decoders: camstudio )
    D.VIL. cyuv                 Creative YUV (CYUV)
    D.V.L. dfa                  Chronomaster DFA
    D.V.LS dirac                Dirac
    DEVIL. dnxhd                VC3/DNxHD
    DEVI.S dpx                  DPX (Digital Picture Exchange) image
    D.V.L. dsicinvideo          Delphine Software International CIN video
    DEVIL. dvvideo              DV (Digital Video)
    D.V..S dxa                  Feeble Files/ScummVM DXA
    D.VI.S dxtory               Dxtory
    D.V.L. escape124            Escape 124
    D.V.L. escape130            Escape 130
    D.VILS exr                  OpenEXR image
    DEV..S ffv1                 FFmpeg video codec #1
    DEVI.S ffvhuff              Huffyuv FFmpeg variant
    DEV..S flashsv              Flash Screen Video v1
    DEV.L. flashsv2             Flash Screen Video v2
    D.V..S flic                 Autodesk Animator Flic video
    DEV.L. flv1                 FLV / Sorenson Spark / Sorenson H.263 (Flash Video) (decoders: flv ) (encoders: flv )
    D.V..S fraps                Fraps
    D.VI.S frwu                 Forward Uncompressed
    D.V.L. g2m                  Go2Meeting
    DEV..S gif                  GIF (Graphics Interchange Format)
    DEV.L. h261                 H.261
    DEV.L. h263                 H.263 / H.263-1996, H.263+ / H.263-1998 / H.263 version 2
    D.V.L. h263i                Intel H.263
    DEV.L. h263p                H.263+ / H.263-1998 / H.263 version 2
    DEV.LS h264                 H.264 / AVC / MPEG-4 AVC / MPEG-4 part 10 (encoders: libx264 libx264rgb )
    D.V.LS hevc                 H.265 / HEVC
    D.V.L. hnm4video            HNM 4 video
    DEVI.S huffyuv              HuffYUV
    D.V.L. idcin                id Quake II CIN video (decoders: idcinvideo )
    D.VI.. idf                  iCEDraw text
    D.V.L. iff_byterun1         IFF ByteRun1 (decoders: iff )
    D.V.L. iff_ilbm             IFF ILBM (decoders: iff )
    D.V.L. indeo2               Intel Indeo 2
    D.V.L. indeo3               Intel Indeo 3
    D.V.L. indeo4               Intel Indeo Video Interactive 4
    D.V.L. indeo5               Intel Indeo Video Interactive 5
    D.V.L. interplayvideo       Interplay MVE video
    DEVILS jpeg2000             JPEG 2000
    DEVILS jpegls               JPEG-LS
    D.VIL. jv                   Bitmap Brothers JV video
    D.V.L. kgv1                 Kega Game Video
    D.V.L. kmvc                 Karl Morton's video codec
    D.VI.S lagarith             Lagarith lossless
    .EVI.S ljpeg                Lossless JPEG
    D.VI.S loco                 LOCO
    D.V.L. mad                  Electronic Arts Madcow Video (decoders: eamad )
    D.VIL. mdec                 Sony PlayStation MDEC (Motion DECoder)
    D.V.L. mimic                Mimic
    DEVIL. mjpeg                Motion JPEG
    D.VIL. mjpegb               Apple MJPEG-B
    D.V.L. mmvideo              American Laser Games MM Video
    D.V.L. motionpixels         Motion Pixels video
    DEV.L. mpeg1video           MPEG-1 video
    DEV.L. mpeg2video           MPEG-2 video (decoders: mpeg2video mpegvideo )
    DEV.L. mpeg4                MPEG-4 part 2
    ..V.L. mpegvideo_xvmc       MPEG-1/2 video XvMC (X-Video Motion Compensation)
    D.V.L. msa1                 MS ATC Screen
    D.V.L. msmpeg4v1            MPEG-4 part 2 Microsoft variant version 1
    DEV.L. msmpeg4v2            MPEG-4 part 2 Microsoft variant version 2
    DEV.L. msmpeg4v3            MPEG-4 part 2 Microsoft variant version 3 (decoders: msmpeg4 ) (encoders: msmpeg4 )
    D.V..S msrle                Microsoft RLE
    D.V.L. mss1                 MS Screen 1
    D.VIL. mss2                 MS Windows Media Video V9 Screen
    DEV.L. msvideo1             Microsoft Video 1
    D.VI.S mszh                 LCL (LossLess Codec Library) MSZH
    D.V.L. mts2                 MS Expression Encoder Screen
    D.VIL. mvc1                 Silicon Graphics Motion Video Compressor 1
    D.VIL. mvc2                 Silicon Graphics Motion Video Compressor 2
    D.V.L. mxpeg                Mobotix MxPEG video
    D.V.L. nuv                  NuppelVideo/RTJPEG
    D.V.L. paf_video            Amazing Studio Packed Animation File Video
    DEVI.S pam                  PAM (Portable AnyMap) image
    DEVI.S pbm                  PBM (Portable BitMap) image
    DEVI.S pcx                  PC Paintbrush PCX image
    DEVI.S pgm                  PGM (Portable GrayMap) image
    DEVI.S pgmyuv               PGMYUV (Portable GrayMap YUV) image
    D.VIL. pictor               Pictor/PC Paint
    DEV..S png                  PNG (Portable Network Graphics) image
    DEVI.S ppm                  PPM (Portable PixelMap) image
    DEVIL. prores               Apple ProRes (iCodec Pro) (decoders: prores prores_lgpl ) (encoders: prores prores_aw prores_ks )
    D.VIL. ptx                  V.Flash PTX image
    D.VI.S qdraw                Apple QuickDraw
    D.V.L. qpeg                 Q-team QPEG
    DEV..S qtrle                QuickTime Animation (RLE) video
    DEVI.S r10k                 AJA Kona 10-bit RGB Codec
    DEVI.S r210                 Uncompressed RGB 10-bit
    DEVI.S rawvideo             raw video
    D.VIL. rl2                  RL2 video
    DEV.L. roq                  id RoQ video (decoders: roqvideo ) (encoders: roqvideo )
    D.V.L. rpza                 QuickTime video (RPZA)
    DEV.L. rv10                 RealVideo 1.0
    DEV.L. rv20                 RealVideo 2.0
    D.V.L. rv30                 RealVideo 3.0
    D.V.L. rv40                 RealVideo 4.0
    D.V.L. sanm                 LucasArts SMUSH video
    DEVI.S sgi                  SGI image
    D.VI.S sgirle               SGI RLE 8-bit
    D.V.L. smackvideo           Smacker video (decoders: smackvid )
    D.V.L. smc                  QuickTime Graphics (SMC)
    D.V... smv                  Sigmatel Motion Video (decoders: smvjpeg )
    DEV.LS snow                 Snow
    D.VIL. sp5x                 Sunplus JPEG (SP5X)
    DEVI.S sunrast              Sun Rasterfile image
    DEV.L. svq1                 Sorenson Vector Quantizer 1 / Sorenson Video 1 / SVQ1
    D.V.L. svq3                 Sorenson Vector Quantizer 3 / Sorenson Video 3 / SVQ3
    DEVI.S targa                Truevision Targa image
    D.VI.. targa_y216           Pinnacle TARGA CineWave YUV16
    D.V.L. tgq                  Electronic Arts TGQ video (decoders: eatgq )
    D.V.L. tgv                  Electronic Arts TGV video (decoders: eatgv )
    D.V.L. theora               Theora
    D.VIL. thp                  Nintendo Gamecube THP video
    D.V.L. tiertexseqvideo      Tiertex Limited SEQ video
    DEVI.S tiff                 TIFF image
    D.VIL. tmv                  8088flex TMV
    D.V.L. tqi                  Electronic Arts TQI video (decoders: eatqi )
    D.V.L. truemotion1          Duck TrueMotion 1.0
    D.V.L. truemotion2          Duck TrueMotion 2.0
    D.V..S tscc                 TechSmith Screen Capture Codec (decoders: camtasia )
    D.V.L. tscc2                TechSmith Screen Codec 2
    D.VIL. txd                  Renderware TXD (TeXture Dictionary) image
    D.V.L. ulti                 IBM UltiMotion (decoders: ultimotion )
    DEVI.S utvideo              Ut Video
    DEVI.S v210                 Uncompressed 4:2:2 10-bit
    D.VI.S v210x                
    DEVI.. v308                 Uncompressed packed 4:4:4
    DEVI.. v408                 Uncompressed packed QT 4:4:4:4
    DEVI.S v410                 Uncompressed 4:4:4 10-bit
    D.V.L. vb                   Beam Software VB
    D.VI.S vble                 VBLE Lossless Codec
    D.V.L. vc1                  SMPTE VC-1
    D.V.L. vc1image             Windows Media Video 9 Image v2
    D.VIL. vcr1                 ATI VCR1
    D.VIL. vixl                 Miro VideoXL (decoders: xl )
    D.V.L. vmdvideo             Sierra VMD video
    D.V..S vmnc                 VMware Screen Codec / VMware Video
    D.V.L. vp3                  On2 VP3
    D.V.L. vp5                  On2 VP5
    D.V.L. vp6                  On2 VP6
    D.V.L. vp6a                 On2 VP6 (Flash version, with alpha channel)
    D.V.L. vp6f                 On2 VP6 (Flash version)
    DEV.L. vp8                  On2 VP8 (decoders: vp8 libvpx ) (encoders: libvpx )
    DEV.L. vp9                  Google VP9 (decoders: vp9 libvpx-vp9 ) (encoders: libvpx-vp9 )
    D.VILS webp                 WebP
    DEV.L. wmv1                 Windows Media Video 7
    DEV.L. wmv2                 Windows Media Video 8
    D.V.L. wmv3                 Windows Media Video 9
    D.V.L. wmv3image            Windows Media Video 9 Image
    D.VIL. wnv1                 Winnov WNV1
    D.V.L. ws_vqa               Westwood Studios VQA (Vector Quantized Animation) video (decoders: vqavideo )
    D.V.L. xan_wc3              Wing Commander III / Xan
    D.V.L. xan_wc4              Wing Commander IV / Xxan
    D.VI.. xbin                 eXtended BINary text
    DEVI.S xbm                  XBM (X BitMap) image
    DEVIL. xface                X-face image
    DEVI.S xwd                  XWD (X Window Dump) image
    DEVI.. y41p                 Uncompressed YUV 4:1:1 12-bit
    D.V.L. yop                  Psygnosis YOP Video
    DEVI.. yuv4                 Uncompressed packed 4:2:0
    D.V..S zerocodec            ZeroCodec Lossless Video
    DEVI.S zlib                 LCL (LossLess Codec Library) ZLIB
    DEV..S zmbv                 Zip Motion Blocks Video
    D.A.L. 8svx_exp             8SVX exponential
    D.A.L. 8svx_fib             8SVX fibonacci
    DEA.L. aac                  AAC (Advanced Audio Coding) (decoders: aac libfdk_aac ) (encoders: aac libfdk_aac )
    D.A.L. aac_latm             AAC LATM (Advanced Audio Coding LATM syntax)
    DEA.L. ac3                  ATSC A/52A (AC-3) (encoders: ac3 ac3_fixed )
    D.A.L. adpcm_4xm            ADPCM 4X Movie
    DEA.L. adpcm_adx            SEGA CRI ADX ADPCM
    D.A.L. adpcm_afc            ADPCM Nintendo Gamecube AFC
    D.A.L. adpcm_ct             ADPCM Creative Technology
    D.A.L. adpcm_dtk            ADPCM Nintendo Gamecube DTK
    D.A.L. adpcm_ea             ADPCM Electronic Arts
    D.A.L. adpcm_ea_maxis_xa    ADPCM Electronic Arts Maxis CDROM XA
    D.A.L. adpcm_ea_r1          ADPCM Electronic Arts R1
    D.A.L. adpcm_ea_r2          ADPCM Electronic Arts R2
    D.A.L. adpcm_ea_r3          ADPCM Electronic Arts R3
    D.A.L. adpcm_ea_xas         ADPCM Electronic Arts XAS
    DEA.L. adpcm_g722           G.722 ADPCM (decoders: g722 ) (encoders: g722 )
    DEA.L. adpcm_g726           G.726 ADPCM (decoders: g726 ) (encoders: g726 )
    D.A.L. adpcm_g726le         G.726 ADPCM little-endian (decoders: g726le )
    D.A.L. adpcm_ima_amv        ADPCM IMA AMV
    D.A.L. adpcm_ima_apc        ADPCM IMA CRYO APC
    D.A.L. adpcm_ima_dk3        ADPCM IMA Duck DK3
    D.A.L. adpcm_ima_dk4        ADPCM IMA Duck DK4
    D.A.L. adpcm_ima_ea_eacs    ADPCM IMA Electronic Arts EACS
    D.A.L. adpcm_ima_ea_sead    ADPCM IMA Electronic Arts SEAD
    D.A.L. adpcm_ima_iss        ADPCM IMA Funcom ISS
    D.A.L. adpcm_ima_oki        ADPCM IMA Dialogic OKI
    DEA.L. adpcm_ima_qt         ADPCM IMA QuickTime
    D.A.L. adpcm_ima_rad        ADPCM IMA Radical
    D.A.L. adpcm_ima_smjpeg     ADPCM IMA Loki SDL MJPEG
    DEA.L. adpcm_ima_wav        ADPCM IMA WAV
    D.A.L. adpcm_ima_ws         ADPCM IMA Westwood
    DEA.L. adpcm_ms             ADPCM Microsoft
    D.A.L. adpcm_sbpro_2        ADPCM Sound Blaster Pro 2-bit
    D.A.L. adpcm_sbpro_3        ADPCM Sound Blaster Pro 2.6-bit
    D.A.L. adpcm_sbpro_4        ADPCM Sound Blaster Pro 4-bit
    DEA.L. adpcm_swf            ADPCM Shockwave Flash
    D.A.L. adpcm_thp            ADPCM Nintendo Gamecube THP
    D.A.L. adpcm_xa             ADPCM CDROM XA
    DEA.L. adpcm_yamaha         ADPCM Yamaha
    DEA..S alac                 ALAC (Apple Lossless Audio Codec)
    D.A.L. amr_nb               AMR-NB (Adaptive Multi-Rate NarrowBand) (decoders: amrnb )
    D.A.L. amr_wb               AMR-WB (Adaptive Multi-Rate WideBand) (decoders: amrwb )
    D.A..S ape                  Monkey's Audio
    D.A.L. atrac1               ATRAC1 (Adaptive TRansform Acoustic Coding)
    D.A.L. atrac3               ATRAC3 (Adaptive TRansform Acoustic Coding 3)
    ..A.L. atrac3p              ATRAC3+ (Adaptive TRansform Acoustic Coding 3+)
    D.A.L. binkaudio_dct        Bink Audio (DCT)
    D.A.L. binkaudio_rdft       Bink Audio (RDFT)
    D.A.L. bmv_audio            Discworld II BMV audio
    ..A.L. celt                 Constrained Energy Lapped Transform (CELT)
    DEA.L. comfortnoise         RFC 3389 Comfort Noise
    D.A.L. cook                 Cook / Cooker / Gecko (RealAudio G2)
    D.A.L. dsicinaudio          Delphine Software International CIN audio
    DEA.LS dts                  DCA (DTS Coherent Acoustics) (decoders: dca ) (encoders: dca )
    ..A.L. dvaudio              
    DEA.L. eac3                 ATSC A/52B (AC-3, E-AC-3)
    D.A.L. evrc                 EVRC (Enhanced Variable Rate Codec)
    DEA..S flac                 FLAC (Free Lossless Audio Codec)
    DEA.L. g723_1               G.723.1
    D.A.L. g729                 G.729
    D.A.L. gsm                  GSM
    D.A.L. gsm_ms               GSM Microsoft variant
    D.A.L. iac                  IAC (Indeo Audio Coder)
    ..A.L. ilbc                 iLBC (Internet Low Bitrate Codec)
    D.A.L. imc                  IMC (Intel Music Coder)
    D.A.L. interplay_dpcm       DPCM Interplay
    D.A.L. mace3                MACE (Macintosh Audio Compression/Expansion) 3:1
    D.A.L. mace6                MACE (Macintosh Audio Compression/Expansion) 6:1
    D.A.L. metasound            Voxware MetaSound
    D.A..S mlp                  MLP (Meridian Lossless Packing)
    D.A.L. mp1                  MP1 (MPEG audio layer 1) (decoders: mp1 mp1float )
    DEA.L. mp2                  MP2 (MPEG audio layer 2) (decoders: mp2 mp2float )
    DEA.L. mp3                  MP3 (MPEG audio layer 3) (decoders: mp3 mp3float ) (encoders: libmp3lame )
    D.A.L. mp3adu               ADU (Application Data Unit) MP3 (MPEG audio layer 3) (decoders: mp3adu mp3adufloat )
    D.A.L. mp3on4               MP3onMP4 (decoders: mp3on4 mp3on4float )
    D.A..S mp4als               MPEG-4 Audio Lossless Coding (ALS) (decoders: als )
    D.A.L. musepack7            Musepack SV7 (decoders: mpc7 )
    D.A.L. musepack8            Musepack SV8 (decoders: mpc8 )
    DEA.L. nellymoser           Nellymoser Asao
    DEA.L. opus                 Opus (Opus Interactive Audio Codec) (decoders: libopus ) (encoders: libopus )
    D.A.L. paf_audio            Amazing Studio Packed Animation File Audio
    DEA.L. pcm_alaw             PCM A-law / G.711 A-law
    D.A..S pcm_bluray           PCM signed 16|20|24-bit big-endian for Blu-ray media
    D.A..S pcm_dvd              PCM signed 20|24-bit big-endian
    DEA..S pcm_f32be            PCM 32-bit floating point big-endian
    DEA..S pcm_f32le            PCM 32-bit floating point little-endian
    DEA..S pcm_f64be            PCM 64-bit floating point big-endian
    DEA..S pcm_f64le            PCM 64-bit floating point little-endian
    D.A..S pcm_lxf              PCM signed 20-bit little-endian planar
    DEA.L. pcm_mulaw            PCM mu-law / G.711 mu-law
    DEA..S pcm_s16be            PCM signed 16-bit big-endian
    DEA..S pcm_s16be_planar     PCM signed 16-bit big-endian planar
    DEA..S pcm_s16le            PCM signed 16-bit little-endian
    DEA..S pcm_s16le_planar     PCM signed 16-bit little-endian planar
    DEA..S pcm_s24be            PCM signed 24-bit big-endian
    DEA..S pcm_s24daud          PCM D-Cinema audio signed 24-bit
    DEA..S pcm_s24le            PCM signed 24-bit little-endian
    DEA..S pcm_s24le_planar     PCM signed 24-bit little-endian planar
    DEA..S pcm_s32be            PCM signed 32-bit big-endian
    DEA..S pcm_s32le            PCM signed 32-bit little-endian
    DEA..S pcm_s32le_planar     PCM signed 32-bit little-endian planar
    DEA..S pcm_s8               PCM signed 8-bit
    DEA..S pcm_s8_planar        PCM signed 8-bit planar
    DEA..S pcm_u16be            PCM unsigned 16-bit big-endian
    DEA..S pcm_u16le            PCM unsigned 16-bit little-endian
    DEA..S pcm_u24be            PCM unsigned 24-bit big-endian
    DEA..S pcm_u24le            PCM unsigned 24-bit little-endian
    DEA..S pcm_u32be            PCM unsigned 32-bit big-endian
    DEA..S pcm_u32le            PCM unsigned 32-bit little-endian
    DEA..S pcm_u8               PCM unsigned 8-bit
    D.A.L. pcm_zork             PCM Zork
    D.A.L. qcelp                QCELP / PureVoice
    D.A.L. qdm2                 QDesign Music Codec 2
    ..A.L. qdmc                 QDesign Music
    DEA.L. ra_144               RealAudio 1.0 (14.4K) (decoders: real_144 ) (encoders: real_144 )
    D.A.L. ra_288               RealAudio 2.0 (28.8K) (decoders: real_288 )
    D.A..S ralf                 RealAudio Lossless
    DEA.L. roq_dpcm             DPCM id RoQ
    DEA..S s302m                SMPTE 302M
    D.A..S shorten              Shorten
    D.A.L. sipr                 RealAudio SIPR / ACELP.NET
    D.A.L. smackaudio           Smacker audio (decoders: smackaud )
    ..A.L. smv                  SMV (Selectable Mode Vocoder)
    D.A.L. sol_dpcm             DPCM Sol
    DEA... sonic                Sonic
    .EA... sonicls              Sonic lossless
    ..A.L. speex                Speex
    D.A..S tak                  TAK (Tom's lossless Audio Kompressor)
    D.A..S truehd               TrueHD
    D.A.L. truespeech           DSP Group TrueSpeech
    DEA..S tta                  TTA (True Audio)
    D.A.L. twinvq               VQF TwinVQ
    D.A.L. vima                 LucasArts VIMA audio
    D.A.L. vmdaudio             Sierra VMD audio
    DEA.L. vorbis               Vorbis (decoders: vorbis libvorbis ) (encoders: vorbis libvorbis )
    ..A.L. voxware              Voxware RT29 Metasound
    D.A... wavesynth            Wave synthesis pseudo-codec
    DEA.LS wavpack              WavPack
    D.A.L. westwood_snd1        Westwood Audio (SND1) (decoders: ws_snd1 )
    D.A..S wmalossless          Windows Media Audio Lossless
    D.A.L. wmapro               Windows Media Audio 9 Professional
    DEA.L. wmav1                Windows Media Audio 1
    DEA.L. wmav2                Windows Media Audio 2
    D.A.L. wmavoice             Windows Media Audio Voice
    D.A.L. xan_dpcm             DPCM Xan
    ..D... dvd_nav_packet       DVD Nav packet
    ..D... klv                  SMPTE 336M Key-Length-Value (KLV) metadata
    DES... ass                  ASS (Advanced SSA) subtitle
    DES... dvb_subtitle         DVB subtitles (decoders: dvbsub ) (encoders: dvbsub )
    ..S... dvb_teletext         DVB teletext
    DES... dvd_subtitle         DVD subtitles (decoders: dvdsub ) (encoders: dvdsub )
    ..S... eia_608              EIA-608 closed captions
    D.S... hdmv_pgs_subtitle    HDMV Presentation Graphic Stream subtitles (decoders: pgssub )
    D.S... jacosub              JACOsub subtitle
    D.S... microdvd             MicroDVD subtitle
    DES... mov_text             MOV text
    D.S... mpl2                 MPL2 subtitle
    D.S... pjs                  PJS (Phoenix Japanimation Society) subtitle
    D.S... realtext             RealText subtitle
    D.S... sami                 SAMI subtitle
    DES... srt                  SubRip subtitle with embedded timing
    DES... ssa                  SSA (SubStation Alpha) subtitle
    DES... subrip               SubRip subtitle
    D.S... subviewer            SubViewer subtitle
    D.S... subviewer1           SubViewer v1 subtitle
    D.S... text                 raw UTF-8 text
    D.S... vplayer              VPlayer subtitle
    D.S... webvtt               WebVTT subtitle
    DES... xsub                 XSUB
  • Data Privacy in Business : A Risk Leading to Major Opportunities

    9 août 2022, par Erin — Privacy

    Data privacy in business is a contentious issue. 

    Claims that “big data is the new oil of the digital economy” and strong links between “data-driven personalisation and customer experience” encourage leaders to set up massive data collection programmes.

    However, many of these conversations downplay the magnitude of security, compliance and ethical risks companies face when betting too much on customer data collection. 

    In this post, we discuss the double-edged nature of privacy issues in business — the risk-ridden and the opportunity-driven. ​​

    3 Major Risks of Ignoring Data Privacy in Business

    As the old adage goes : Just because everyone else is doing it doesn’t make it right.

    Easy data accessibility and ubiquity of analytics tools make data consumer collection and processing sound like a “given”. But the decision to do so opens your business to a spectrum of risks. 

    1. Compliance and Legal Risks 

    Data collection and customer privacy are protected by a host of international laws including GDPR, CCPA, and regional regulations. Only 15% of countries (mostly developing ones) don’t have dedicated laws for protecting consumer privacy. 

    State of global data protection legislature via The UN

    Global legislature includes provisions on : 

    • Collectible data types
    • Allowed uses of obtained data 
    • Consent to data collection and online tracking 
    • Rights to request data removal 

    Personally identifiable information (PII) processing is prohibited or strictly regulated in most jurisdictions. Yet businesses repeatedly circumnavigate existing rules and break them on occasion.

    In Australia, for example, only 2% of brands use logos, icons or messages to transparently call out online tracking, data sharing or other specific uses of data at the sign-up stage. In Europe, around half of small businesses are still not fully GDPR-compliant — and Big Tech companies like Google, Amazon and Facebook can’t get a grip on their data collection practices even when pressed with horrendous fines. 

    Although the media mostly reports on compliance fines for “big names”, smaller businesses are increasingly receiving more scrutiny. 

    As Max Schrems, an Austrian privacy activist and founder of noyb NGO, explained in a Matomo webinar :

    “In Austria, my home country, there are a lot of €5,000 fines going out there as well [to smaller businesses]. Most of the time, they are just not reported. They just happen below the surface. [GDPR fines] are already a reality.”​

    In April 2022, the EU Court of Justice ruled that consumer groups can autonomously sue businesses for breaches of data protection — and nonprofit organisations like noyb enable more people to do so. 

    Finally, new data privacy legislation is underway across the globe. In the US, Colorado, Connecticut, Virginia and Utah have data protection acts at different stages of approval. South African authorities are working on the Protection of Personal Information Act (POPI) act and Brazil is working on a local General Data Protection Law (LGPD).

    Re-thinking your stance on user privacy and data protection now can significantly reduce the compliance burden in the future. 

    2. Security Risks 

    Data collection also mandates data protection for businesses. Yet, many organisations focus on the former and forget about the latter. 

    Lenient attitudes to consumer data protection resulted in a major spike in data breaches.

    Check Point research found that cyberattacks increased 50% year-over-year, with each organisation facing 925 cyberattacks per week globally.

    Many of these attacks end up being successful due to poor data security in place. As a result, billions of stolen consumer records become publicly available or get sold on dark web marketplaces.

    What’s even more troublesome is that stolen consumer records are often purchased by marketing firms or companies, specialising in spam campaigns. Buyers can also use stolen emails to distribute malware, stage phishing and other social engineering attacks – and harvest even more data for sale. 

    One business’s negligence creates a snowball effect of negative changes down the line with customers carrying the brunt of it all. 

    In 2020, hackers successfully targeted a Finnish psychotherapy practice. They managed to steal hundreds of patient records — and then demanded a ransom both from the firm and its patients for not exposing information about their mental health issues. Many patients refused to pay hackers and some 300 records ended up being posted online as Associated Press reported.

    Not only did the practice have to deal with the cyber-breach aftermath, but it also faced vocal regulatory and patient criticisms for failing to properly protect such sensitive information.

    Security negligence can carry both direct (heavy data breach fines) and indirect losses in the form of reputational damages. An overwhelming 90% of consumers say they wouldn’t buy from a business if it doesn’t adequately protect their data. This brings us to the last point. 

    3. Reputational Risks 

    Trust is the new currency. Data negligence and consumer privacy violations are the two fastest ways to lose it. 

    Globally, consumers are concerned about how businesses collect, use, and protect their data. 

    Consumer data sharing attitudes
    • According to Forrester, 47% of UK adults actively limit the amount of data they share with websites and apps. 49% of Italians express willingness to ask companies to delete their personal data. 36% of Germans use privacy and security tools to minimise online tracking of their activities. 
    • A GDMA survey also notes that globally, 82% of consumers want more control over their personal information, shared with companies. 77% also expect brands to be transparent about how their data is collected and used. 

    When businesses fail to hold their end of the bargain — collect just the right amount of data and use it with integrity — consumers are fast to cut ties. 

    Once the information about privacy violations becomes public, companies lose : 

    • Brand equity 
    • Market share 
    • Competitive positioning 

    An AON report estimates that post-data breach companies can lose as much as 25% of their initial value. In some cases, the losses can be even higher. 

    In 2015, British telecom TalkTalk suffered from a major data breach. Over 150,000 customer records were stolen by hackers. To contain the issue, TalkTalk had to throw between $60-$70 million into containment efforts. Still, they lost over 100,000 customers in a matter of months and one-third of their company value, equivalent to $1.4 billion, by the end of the year. 

    Fresher data from Infosys gives the following maximum cost estimates of brand damage, companies could experience after a data breach (accidental or malicious).

    Estimated cost of brand damage due to a data breach

    3 Major Advantages of Privacy in Business 

    Despite all the industry mishaps, a reassuring 77% of CEOs now recognise that their companies must fundamentally change their approaches to customer engagement, in particular when it comes to ensuring data privacy. 

    Many organisations take proactive steps to cultivate a privacy-centred culture and implement transparent data collection policies. 

    Here’s why gaining the “privacy advantage” pays off.

    1. Market Competitiveness 

    There’s a reason why privacy-focused companies are booming. 

    Consumers’ mounting concerns and frustrations over the lack of online privacy, prompt many to look for alternative privacy-centred products and services

    The following B2C and B2B products are moving from the industry margins to the mainstream : 

    Across the board, consumers express greater trust towards companies, protective of their privacy : 

    And as we well know : trust translates to higher engagement, loyalty, and – ultimately revenue. 

    By embedding privacy into the core of your product, you give users more reasons to select, stay and support your business. 

    2. Higher Operational Efficiency

    Customer data protection isn’t just a policy – it’s a culture of collecting “just enough” data, protecting it and using it responsibly. 

    Sadly, that’s the area where most organisations trail behind. At present, some 90% of businesses admit to having amassed massive data silos. 

    Siloed data is expensive to maintain and operationalise. Moreover, when left unattended, it can evolve into a pressing compliance issue. 

    A recently leaked document from Facebook says the company has no idea where all of its first-party, third-party and sensitive categories data goes or how it is processed. Because of this, Facebook struggles to achieve GDPR compliance and remains under regulatory pressure. 

    Similarly, Google Analytics is riddled with privacy issues. Other company products were found to be collecting and operationalising consumer data without users’ knowledge or consent. Again, this creates valid grounds for regulatory investigations. 

    Smaller companies have a better chance of making things right at the onset. 

    By curbing customer data collection, you can : 

    • Reduce data hosting and Cloud computation costs (aka trim your Cloud bill) 
    • Improve data security practices (since you would have fewer assets to protect) 
    • Make your staff more productive by consolidating essential data and making it easy and safe to access

    Privacy-mindful companies also have an easier time when it comes to compliance and can meet new data regulations faster. 

    3. Better Marketing Campaigns 

    The biggest counter-argument to reducing customer data collection is marketing. 

    How can we effectively sell our products if we know nothing about our customers ? – your team might be asking. 

    This might sound counterintuitive, but minimising data collection and usage can lead to better marketing outcomes. 

    Limiting the types of data that can be used encourages your people to become more creative and productive by focusing on fewer metrics that are more important.

    Think of it this way : Every other business uses the same targeting parameters on Facebook or Google for running paid ad campaigns on Facebook. As a result, we see ads everywhere — and people grow unresponsive to them or choose to limit exposure by using ad blocking software, private browsers and VPNs. Your ad budgets get wasted on chasing mirage metrics instead of actual prospects. 

    Case in point : In 2017 Marc Pritchard of Procter & Gamble decided to first cut the company’s digital advertising budget by 6% (or $200 million). Unilever made an even bolder move and reduced its ad budget by 30% in 2018. 

    Guess what happened ?

    P&G saw a 7.5% increase in organic sales and Unilever had a 3.8% gain as HBR reports. So how come both companies became more successful by spending less on advertising ? 

    They found that overexposure to online ads led to diminishing returns and annoyances among loyal customers. By minimising ad exposure and adopting alternative marketing strategies, the two companies managed to market better to new and existing customers. 

    The takeaway : There are more ways to engage consumers aside from pestering them with repetitive retargeting messages or creepy personalisation. 

    You can collect first-party data with consent to incrementally improve your product — and educate them on the benefits of your solution in transparent terms.

    Final Thoughts 

    The definitive advantage of privacy is consumers’ trust. 

    You can’t buy it, you can’t fake it, you can only cultivate it by aligning your external appearances with internal practices. 

    Because when you fail to address privacy internally, your mishaps will quickly become apparent either as social media call-outs or worse — as a security incident, a data breach or a legal investigation. 

    By choosing to treat consumer data with respect, you build an extra layer of protection around your business, plus draw in some banging benefits too. 

    Get one step closer to becoming a privacy-centred company by choosing Matomo as your web analytics solution. We offer robust privacy controls for ensuring ethical, compliant, privacy-friendly and secure website tracking. 

  • The Guide to an Ethical Web : With Big Data Comes Big Responsibility

    13 mars, par Alex Carmona

    Roughly two-thirds of Earth’s 8 billion people use the internet for communication, education, entertainment, business and more. We are connected globally in ways previous generations could’ve never dreamed of. It’s been a wild ride, and we’re just starting.

    Many users have learned that experiences online can be a mix of good and bad. Sometimes, the bad can feel like it outweighs the good, particularly when large tech companies use our data shadily, cut corners on accessibility or act in any other way that devalues the human being behind the screen.

    As fellow internet citizens, what responsibility do we have to create a more ethical web for our customers ?

    In this article, we’ll look at ethical principles online and how to act (and not act) to build trust, reach customers regardless of ability, safeguard privacy and stay compliant while improving business outcomes.

    2025 Ethical Marketing Guide image with a mobile phone and orange button call to action.

    What is an “ethical web” ?

    When we talk about the ethical web, we’re talking about the use of the internet in an ethical way. Among other values, it involves transparency, consent and restraint. It applies the Golden Rule to the internet : Treat others (and their data and user experience) how you’d want yourself (and yours) to be treated. 

    With limited oversight, the internet has evolved in ways that often prioritise profit over user rights. While selling data or pushing cookies might seem logical in this context, they can undermine trust and reputation. And the tide is slowly but surely shifting as consumers and legislators push back.

    Consumers no longer want to buy from companies that will use their data in ways they don’t agree to. In 2022, 75% of UK and US consumers surveyed said they were uncomfortable purchasing from businesses with weak data ethics.

    Legislators worldwide have been taking part in this effort for nearly a decade, with laws like GDPR in the EU and LGPD in Brazil, as well as the various state laws in the US, like California’s CCPA and Virginia’s VCDPA

    Even tech giants are no longer above the law, like Meta, which was fined over a billion Euros for GDPR violations in 2023.

    An image defining the Golden Rule of the Internet. Treat others, their data and user experience like you would want yourself and yours to be treated.

    These changes may make the internet feel less business-friendly at first glance, but ethical choices ultimately build a stronger digital ecosystem for both companies and consumers. 

    Likewise, all internet users alike can make this happen by shunning short-term profit and convenience for healthier, long-term choices and behaviour.

    As we dig into what it takes to build an ethical web, remember that no company or individual is free from mistakes in these areas nor is it an overnight fix. Progress is made one click at a time.

    Ethical SEO : Optimising your content and your ethics

    Content creation and search engine optimisation (SEO) require so much work that it’s hard to fault creators for not always abiding by search engine guidelines and seeking shortcuts – especially when there’s a sea of LinkedIn posts about how copying/pasting ChatGPT responses helped someone rank #1 for several keywords in one week.

    However, users turn to Google and other search engines for something of substance that will guide or entertain them.

    Content meets customer needs and is more likely to lead to sales when it’s well-written, original and optimised just enough to make it easier to find on the first page of results. This doesn’t happen when content teams dilute quality and waste a reader or viewer’s time on posts that will only yield a higher bounce rate.

    Some SEO pros do find success by building backlinks through private blog networks or crafting a million unedited posts with generative AI, but it’s short-lived. Google and other search engines always catch up, and their content plummets or gets penalised and delisted with every new update.

    Content teams can still rank at the top while sticking to ethical SEO principles. Here’s a sample list of dos and don’ts to get started :

    • Do put content quality above all else. Make content that serves the audience, not just a brand or partner ad network.
    • Do apply the E-E-A-T framework. Search engines value content written by authors who bring expertise, experience, authority and trust (E-E-A-T).
    • Don’t keyword stuff. This might have worked in the early days of SEO, but it hurts readability and now harms article performance.
    • Do use alt text as intended. While it can still help SEO, alt text should prioritise accessibility for users with screen readers.
    • Don’t steal content. Whether it’s violating copyright, copying/pasting other people’s content or simply paraphrasing without citation, companies should never steal content.
    • Don’t steal ideas. It’s okay to join in on a current conversation or trends in an industry, but content creators should be sure they have something valuable to add.
    • Do use AI tools as partners, not creators. AI can be an incredible aid in crafting content, but it should never be posted without a human’s touch.

    When we follow ethical SEO guidelines and get more clients with our content, how do we best handle their data ?

    Ethical data governance : Important principles and how to avoid data misuse

    Data governance comprises every aspect of how a company manages data, including storage, security, privacy, lifecycle management, setting policies and maintaining compliance with laws like GDPR and HIPAA.

    Applying data ethics to governance is doing it all in a transparent, restrained way that acknowledges an individual’s right to ownership over their data. 

    For organisations, this translates to getting consent to collect data and clearly spelling out how it will be stored and used — and sticking to it.

    If a user’s birth date is needed for legal reasons, it cannot be sold to a third party or later used for something else without explicit permission. Reusing data in ways that stray from its original purpose is a form of commingling, one of the data misuses that is easy for even well-intentioned teams to do accidentally.

    Ethical data governance also includes the vigilant safeguarding of users’ data and minimising potential privacy issues.

    Failing to implement and adhere to strong security measures leads to situations like the National Public Data (NPD) breach, where cyber criminals expose the addresses, phone numbers and social security numbers of hundreds of millions of people. This was due in large part to a weakness in storing login credentials and a lack of password policy enforcement.

    No one at NPD wanted this to happen, but security likely took a backseat to other business concerns, leading to the company’s filing for bankruptcy.

    More importantly, as a data broker that aggregates information from other sources, the people affected likely had no clue this organisation had been buying and selling their data. The companies originally entrusted with their information helped provide the leaked data, showing a lack of care for privacy.

    Situations like this reinforce the need for strict data protection laws and for companies to refine their data governance approach. 

    Businesses can improve their data governance posturing with managers and other higher-ups setting the right tone at the top. If leadership takes a firm and disciplined approach by setting and adhering to strong policies, the rest of the team will follow and minimise the chances of data misuse and security incidents.

    One way to start is by using tools that make the principles of data ethics easier to follow.

    Ethical web analytics : Drawing insights while respecting privacy

    Web analytics tools are designed to gather data about users and what they do while visiting a site.
    The most popular tool worldwide is Google Analytics (GA). Its brand name and feature set carry a lot of weight, but many former users have switched to alternatives due to dissatisfaction with the changes made in GA4 and reservations about the way Google handles data.

    An image of a spiderweb with a user trapped in it. A spider looks hungrily at the user to symbolise the relationship between the unethical use of web analytics data and customer harm

    Google is another tech giant that has been slapped with massive GDPR fines for issues over its data processing practices. It has run so afoul of compliance that it was banned in France and Austria for a while. Additionally, in the US Department of Justice’s ongoing antitrust lawsuit against Google, the company’s data tracking has been targeted for both how it affects users and potential rivals.

    Unlike GA, ethical web analytics tools allow websites to get the data they need while respecting user privacy.

    Matomo offers privacy protections like :

    We’re also fully transparent about how we handle your data on the web and in the Matomo Cloud and in how we build Matomo as an open-source tool. Our openness allows you to be more open with your customers and how you ethically use their data.

    There are other GDPR-compliant tools on the market, but some of them, like Adobe Analytics, require more setup from users for compliance, don’t grant full control over data and don’t offer on-premise options or consent-free tracking.

    Beyond tracking, there are other ways to make a user’s experience more enjoyable and ethical.

    Ethical user experience : User-friendliness, not user-hostility

    When designing a website or application, creating a positive user experience (UX) always comes first. 

    The UI should be simple to navigate, data and privacy policy information should be easy to find and customers should feel welcomed. They must never be tricked into consenting or installing. 

    When businesses resort to user-hostile tactics, the UX becomes a battle between the user and them. What may seem like a clever tactic to increase sign-ups can alienate potential customers and ruin a brand’s image. 

    Here are some best practices for creating a more ethical UX :

    Avoid dark patterns

    Dark patterns are UI designs and strategies that mislead users into paying for, agreeing to or doing something they don’t actually want. These designs are unethical because they’re manipulative and remove transparency and consent from the interaction. 

    In some cases, they’re illegal and can bring lawsuits. 

    In 2023, Italy’s Data Protection Authority (DPA) fined a digital marketing company €300,000 for alleged GDPR violations. They employed dark patterns by asking customers to accept cookies again after rejecting them and placing the option to reject cookies outside the cookie banner. 

    Despite their legality and 56% of surveyed customers losing trust in platforms that employ dark patterns, a review by the Organisation for Economic Co-operation and Development (OECD) found that 76% of the websites examined contained at least one dark pattern.

    An image showing a person frustrated at a computer with an evil smile on it to symbolise poor user experience caused by unethical web design.

    If a company is worried that they may be relying on dark patterns, here are some examples of what to avoid :

    • Pre-ticking boxes to have users agree to third-party cookies, sign up for a newsletter, etc.
    • Complicated cookie banners without a one-click way to reject all unnecessary cookies
    • Hiding important text with text colour, under drop-down menus or requiring hovering over something with a mouse 
    • Confirm shaming” users with emotionally manipulative language to delay subscription cancellations or opt out of tracking 

    Improve trust centres

    Trust centres are the sections of a website that outline how a company approaches topics like data governance, user privacy and security. 

    They should be easy to find and understand. If a user has a question about a company’s data policy, it should be one click away with language that doesn’t require a law degree to comprehend.

    Additionally, trust centres must cover all relevant details, including where data is stored and who does the subprocessing. This is an area where even some of the best-intentioned companies may miss the mark, but it’s also an easy fix and a great place to start creating a more ethical web.

    Embrace inclusivity

    People want to feel welcomed to the party — and deserve to be — regardless of their race, ethnicity, religion, gender identity, orientation or ability. 

    Inclusivity is great for customers and companies alike. 

    A study by the Unstereotype Alliance found that progressive marketing drove up short- and long-term sales, customer loyalty and purchase consideration. A Kantar study reported that 75% of surveyed customers around the world consider a company’s diversity and inclusivity when making a purchasing decision.

    An easy place to start embracing inclusivity is with a website’s blog images. The people in photos and cartoons should reflect a variety of different backgrounds.

    Another area to improve inclusivity is by making your site or app more accessible.

    Accessibility ethics : An internet for everyone

    Accessibility is designing your product in a way that everyone can enjoy or take part in, regardless of ability. Digital accessibility is applying this design to the web and applications by making accommodations like adding descriptive alt text to images for users with visual impairments.

    Just because someone has a hearing, vision, speech, mobility, neurological or other impairment doesn’t mean they have any less of a right to shop online, read silly listicles or get into arguments with strangers in the comment section.

    Beyond being the right thing to do, the Fable team shows there’s a strong business case for accessibility. People with disabilities have money to spend, and the accommodations businesses make for them often benefit people without disabilities, too – as anyone who streams with subtitles can attest.

    Despite being a win-win for greater inclusivity and business, much of the web is still inaccessible. WebAIM, a leader in web accessibility, studied a million web pages and found an average of over 55 accessibility errors per page.

    We must all play a more active role in improving the experience of our users with disabilities, and we can start with accessibility auditing and testing.

    An accessibility audit is an evaluation of how usable a site is for people with disabilities. It may be done in-house by an expert on a company’s team or, for better results, a third-party consultant who can give a fully objective audit.

    Auditing might consist of running an automated tool or manually checking your site, PDFs, emails and other materials for compliance with the Web Content Accessibility Guidelines list.

    Accessibility testing is narrower than auditing. It checks how accessibility or its absence looks in action. It can be done after a site, app, email or product is released, but it ideally starts in the development process.

    Testing should be done manually and with automated tools. Manual checks put developers in the position of their users, allowing them to get a better idea of what users are dealing with firsthand. Automated tools can save time and money, but there should always be manual testing in the process.

    Auditing gives teams an idea of where to start with improving accessibility, and testing helps make sure accommodations work as intended.

    Conclusion

    At Matomo, we strive to make the ethical web a reality, starting with web analytics.

    For our users, it means full compliance with stringent policies like GDPR and providing 100% accurate data. For their customers, it’s collecting only the data required to do the job and enabling cookieless configurations to get rid of annoying banners. 

    For both parties, it’s knowing that respect for privacy is one of our foundational values, whether it’s the ability to look under Matomo’s hood and read our open-source code, the option to store data on-premise to minimise the chances of it falling into the wrong hands or one of the other ways that we protect privacy.

    If you weren’t 100% ethical before, it’s never too late to change. You can even bring your Google Analytics data with you.

    Join us in our mission to improve the web. We can’t do it alone ! 

    no credit card required