The intention has always been that I undertake the Magento 2 Certified Associate Developer Exam. After revising the courses from…
All my Magento 2 CSS and JS static asset files were showing as 404 not found. What caused the issue and what I did to fix the problem.
A brief look into Magento 2 front end development LESS compilation using server-side, client side and local compilation methods. Along with the pros and cons of each.
A look into the Mangeto 2 Full Page Cache and use of cacheable=”false” on blocks
This instructor-based course is intended for developers who are new to Magento 2 platform providing a solid foundation upon which to build essential skills. This article looks at my personal experience of the course.
This report explores the foundations of network security, devising a security policy for a fictional company that engages industry frameworks for best practise to discover and mitigate risk. Internal and external threats are both identified, deploying a range of network infrastructure practises to provide a level of safety whilst balancing operational requirements.
Network security is often viewed as covering the 7 layer TCP/IP model. This report covers why the distinction is made between Network Security and Application Security and the tools available to developers enabling best practise to be followed.
Mobile technologies have been evolving for several years across three main platforms, Android, iOS and Windows. The research includes designing and prototyping of an innovative commercially viable planner application for use on mobile devices, evaluating a range of modern tools, technologies and practises used during implementation.
Internet technologies have evolved and modern distributed systems employ several techniques to function effectively and efficiently. These systems and operational techniques are covered within this report, including the following topics; responsiveness, scalability, synchronisation, fault tolerance and availability. Current web based databases are also considered and finally an elastic name server service and controller is designed with a range of relevant technologies explored and evaluated.
This report looks at how IT Service Managers (ITSM) delivering IT as a service can generate and deliver value by using frameworks to design, implement, measure and improve a service portfolio. The discussion focuses around the Information Technology Infrastructure Library (ITIL) framework.