A few companies sell this service, and I looked into it. While conversion and existing layout to a WordPress theme isn’t too hard to create a rudimentary theme that replicates an existing website. Is this a valuable service? Is it going to help the site? Answers withing. Continue reading Converting HTML Layouts into a WordPress Theme
This is the third in a series about writing WP-CLI commands. The previous article explained how to import CSV files into a database table. In this, we describe how to add documentation.
Continue reading Adding a WP-CLI Command to Your Plugin, Part 3
The crossplatform email game has gotten a lot easier in the past five years: the main platforms to target are iOS and Android. Everyone else gets the same content.
Continue reading HTML Email Got Easier
The previous article, I showed how to add a WP-CLI command to your plugin. In this tutorial I define the methods to read the CSV data files from standard input, and dump it to the screen.
Continue reading Adding a WP-CLI Command to Your Plugin, Part 2
I wanted to write some importers for CSV files, but not one that operated from the admin screens. I wanted a command that I could pipe my data into, and populate a table.
“Simple,” I thought, and then realized I needed to parse wp-config.php for the database password. While that’s not hard, it’s really bad form, especially when you can use WP-CLI to run commands within the WordPress environment.
Continue reading Adding a WP-CLI Command to Your Plugin, Part 1
Several years ago, I wrote a series of article about implementing a small network that has some “enterprise” network features. For the most part, these aren’t necessary, but I believe, as we deal with more mobile devices and IOT devices, we will want to isolate our networks into segments, and implement firewalls between the segments, even for small LANs. Fortunately, our phones are somewhat safe — Windows hacking over the LAN in the late 1990s taught everyone a lesson. That said, there are a lot of camera, sensors, and other devices that are on LANs, running with default passwords, and subject to sniffing.