Search Content

Displaying 1 - 20 of 76

… to do. The 80/20 rule comes into play here. 80% of the features can be hacked together very quickly, in the first … to do. The 80/20 rule comes into play here. 80% of the features can be hacked together very quickly, in the first …

… If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that will take people who scan it with a … If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that …

… So now you want to let another developer work on other features. Being git, this will be distributed. However you … So now you want to let another developer work on other features. Being git, this will be distributed. However you …

… it's really strong in terms of flexibility, scalability, reliability, security, manageability, its ability to operate … or e-commerce, you'll want to pay attention to security, reliability, and maintainability , which is where Drupal … it's really strong in terms of flexibility, scalability, reliability, security, manageability, its ability to operate …

… to start collecting the data now. So we want to push some features up to production, but not the rest. If we finish our features as we go, the "develop" branch has ended up with … we need to extract and revert the commits involving the features they did not want. And figure out how to re-revert …

… checks out the new code, runs updates, reverts features, and notifies us in chat when it's done. Then we can … deployment will take (e.g. to run update scripts, apply features), and whether or not we should plan to take the … code? (Might indicate a bigger problem). drush fl - any features that are not up-to-date? If so, might need to …

… on the Open Source Small Business blog , in January 2008.] I’ve seen a lot of code in various languages. As a … on the Open Source Small Business blog , in January 2008.] I’ve seen a lot of code in various languages. As a …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… programmers hit all of these. My biggest weak area is the reliability one--after reviewing other people's code, I find … programmers hit all of these. My biggest weak area is the reliability one--after reviewing other people's code, I find …

… 02/03/2017 - 14:36 Another couple of questions we ask our clients are what complaints do you have with your current … website and what would you like it to do better? Some clients respond that their website is just plain stale and … becoming available, we’ve often heard that a potential client is on a SaaS platform and they’d really like to own …

… WordPress When you need a reliable partner to keep your WordPress site secure, … you can rely on Freelock for help! … When you need a reliable partner to keep your WordPress site secure, …

… able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory … able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory …

… spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents … spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents …

… Story Type Features Add new comment You must have JavaScript enabled to use this form. … is kept private and will not be shown publicly. Homepage Comment About text formats Filtered HTML Web page addresses …

… work, and patches for it essentially disables processor features designed to speed up computing. Most sources suggest … work, and patches for it essentially disables processor features designed to speed up computing. Most sources suggest …

… aliased URLs. The internal path to any item of content is node/<node id>. Add the domain name in front of this, and you've …

… of doing those things. The problem is, build in too many features to the framework and you just end up with a large … tables you otherwise have to build yourself, and other features I'm sure you've heard about already from all the … of doing those things. The problem is, build in too many features to the framework and you just end up with a large …

… site, redefine the styling for a particular element. So a key consideration here is, if you decide down the road to … is how it parses the files listed in the "content" key for tokens, and evaluates those at build time to include … site, redefine the styling for a particular element. So a key consideration here is, if you decide down the road to …

… people. So a person is a contact in my system. You can tag that person as a customer, lead, prospect, whatever you … We attach an expected value of that opportunity, and tag them with a sales stage. This becomes our sales pipeline, … people. So a person is a contact in my system. You can tag that person as a customer, lead, prospect, whatever you …

… shoes Your business has offerings, whether they be products or services—you are providing something that your customers want. However, are you sure it is the product that customers want? How can you be sure? Well, one … that your customers want. However, are you sure it is the product that customers want? How can you be sure? Well, one …