Last week, WP Engine employees from our Limerick and London offices came together for the bi-annual All Hands event in Limerick. All Hands is a 2-day event where employees come to engage with, collaborate, and strategize with employees from other offices. This year’s theme was “Boldly Go” in honor of the famous sci-fi sagas Star Wars and Star Trek. In addition to discussing goals for the upcoming year and new strategies for success, the team took moment to have a good time.
Events on the agenda included team lunches, Q&A sessions with executives, information sessions, and a company party with a talent show. Next week, employees in US offices will come...
Every year it can feel like the holidays sneak up on us. We assemble, we strategize, and we take the necessary precautions yet we frequently feel like we are scrambling. For ecommerce businesses, this time of year is crucial not only for generating revenue but for generating recurrent relationships
Last week, WP Engine employees from our Limerick and London offices came together for the bi-annual All Hands event in Limerick. All Hands is a 2-day event where employees come to engage with, collaborate, and strategize with employees from other offices. This year’s theme was “Boldly
In addition to all of the above, the Genesis Framework will be further upgraded for Gutenberg with the release of version 2.8 in Q1 2019. 2.8 will include built-in features that allow you to easily and efficiently style and control Gutenberg blocks as well as auto-load demo content, which can arm
Sharing Economy 2.0: Technology is Removing the Need for Single Asset Ownership
History and use of these devices are stored on the blockchain in the back end, recording data including time used, amount paid, and so on. For devices such as machinery, the machine records accrued time and will notify the device when it needs its next service. The use of smart contracts within a
A 60-Second Trailer of the 60-Day Report on Cybersecurity
She explained that the original design of the Internet was driven more by considerations of interoperability rather than security, and as a result we are now faced with almost insurmountable issues. Some examples include online criminals who steal our information, mass bandits who have the ability
Blockchain Scalability: Even If Most Transactions Are in Layer II We Still Need a Layer I
Ultimately, there seems to be a consensus among the majority of the community that utilizing both layer I and layer II solutions is a no-brainer. What exact combination we end up seeing from the myriad solutions being developed is anyone’s guess, but using both offers the security and speed that
Teenager’s UX: Designing for Teens
Help teens learn and stay focused by choosing your words wisely. Use words that teens understand. Write in short sentences and paragraphs. Format key points or steps of a process using bullet points. Teens generally have poorer reading and comprehension skills than adults. If your site targets a
wp engine all hands spring 2019: emea
Why WSJ Mobile App Gets ** Customer Reviews
A second reason to give print subscribers free access? They're the most valuable customers: print advertising is more effective than online advertising because broadsheet layouts have a stronger impact. Thus, a newspaper should encourage readers to maintain their print subscriptions by treating
The Science of Silence: Intentional Silence as a Moderation Technique
I use a personal guideline when practicing intentional silence: When I find myself in the depths of a poignant pause, I count to seven before speaking. It is an attempt to coax the participant into filling the silence first. Let the first four seconds tick away — remember, this is where the
Instructional Overlays and Coach Marks for Mobile Apps
Because Makr’s tips are text-based rather than visual, if users tap through them quickly they will likely not absorb any of the information presented, and will reach the workspace without an idea of how best to proceed with their task. At least the tooltips do have arrows pointing to tools in the
The Distribution of Users’ Computer Skills: Worse Than You Think
The OECD project looked at a broad range of job-related skills, but of most interest to us is the test of technology skills. For this part of the study, participants were asked to perform 14 computer-based tasks. Instead of using live websites, the participants attempted the tasks on simulated
Defeated By a Dialog Box
Upon further experimentation, I discovered another way of getting rid of the options box: uncheck the checkbox marked "Show options dialog." This, of course, completely violates the design rules for checkboxes and radio buttons , which are not supposed to have any immediate effect when they are
Don't Force Users to Register Before They Can Buy
TinyPrints.com required that users create an account and also automatically subscribed users to the newsletter, mentioning above the Create Account button that “You will be subscribed to the Tiny Prints email newsletter” (stated in tiny print, which makes users weary right there.) Being signed
wp engine all hands spring 2019: emea
Infinite Scrolling is Not for Every Website
The success of infinite scrolling on social media sites such as Twitter have made this technique popular, but that doesn’t mean you should do it too. Continuous scrolling is advantageous for content that streams constantly and has a relatively flat structure, where each unit of content belongs at
Store Finders: Why People Still Need Locator Links
Even though people often rely on external mapping tools when they search directly for a certain location, store locators are still a useful website feature: they support users who are already on the site, engaged in a task that may have a location component — such as shopping or researching for
Accordions for Complex Website Content on Desktops
Another situation in which accordions are helpful is when the information is restricted to very small spaces, such as on mobile devices. On small screens people often stop scrolling before reaching the end of an extremely long page. If the page has several loosely related pieces of information
Facilitating an Effective Design Studio Workshop
Each participant has a set amount of time to both present and receive critique; for example, three minutes to present and five minutes to receive critique. The facilitator should instruct participants to post their sketches to the wall and explain the core idea, while the other team members who are
Basic Patterns for Mobile Navigation
However, on mobile devices, both navigation and search come at a price: they occupy screen space and grab users’ attention, both of which are at an even higher premium on mobile than on desktop. If the screen space is really scarce, a search box or navigation links at the top of the page can
3 High-Tech Ways Companies Are Fighting Cybercrime Right Now
For a company wanting to practice cyber deception, the first step is deception technology adoption based on organization needs. Traps can be embedded in a variety of environments, from private clouds to data centers, and can target legacy or modern software. After an attack takes place with decoy
Five Best Open-Source Antivirus’ for Carefree Cyber-Threat Protection
You can detect a lot of different types of malicious software by using open source antivirus products. Experienced developers in both fields will tell you this is the most secure way to connect to the internet today. These programs simply make their code available for free so you can modify and
A 60-Second Trailer of the 60-Day Report on Cybersecurity
Finally, Hathaway sees this as a unique opportunity for the United States to work with countries around the world, and with organizations on an extremely local level. “We cannot succeed if our government works in isolation,” she added. It requires “leading from the top” from
A 60-Second Trailer of the 60-Day Report on Cybersecurity
Melissa Hathaway came across our radar recently when President Obama tasked the former Bush administration aide with leading a 60-day review of Bush’s Comprehensive National Cybersecurity Initiative; a largely classified, purported $30 billion, multi phase plan to address cybersecurity issues
wp engine all hands spring 2019: emea
RW Q&A: Monisha Perkash, founder of Lumo Bodytech
Perkash came up with the idea for Lumo seeing her co-founder and CTO, Andrew Chang, suffering from debilitating back pain. Perkash is married to a spine and sports physician, so she could understand how important posture really was. Perkash advised Andrew to attend a posture class and as a result
A 60-Second Trailer of the 60-Day Report on Cybersecurity
Finally, Hathaway sees this as a unique opportunity for the United States to work with countries around the world, and with organizations on an extremely local level. “We cannot succeed if our government works in isolation,” she added. It requires “leading from the top” from
WP Engine All Hands Spring 2019: EMEA | Store Finders and Locators
Store Finders and Locators
Another noticeable change over our years of research is users’ increasing reliance on external mapping tools such as Google Maps, Apple Maps, or Waze to provide turn-by-turn directions. Companies have reacted to this new state of facts. In Study 4, only two of the 11 sites tested used an on-site
The Fold Manifesto: Why the Page Fold Still Matters
A second set of data comes from Google’s analysis of display advertising (PDF) across a huge number of websites. The study looked at how “viewable” an advertisement was, with viewability defined as 50% of the ad’s pixels being on-screen for one second. Advertisements just above the fold had
University Websites: Top 10 Design Guidelines
Elon University's main Admissions page (top) has a clearly labeled link to Deadlines & dates near the top of the page. Following that link leads to the Application Deadlines page (bottom) which has a prominent table outlining the deadlines for each type of application. This information is