In a design review meeting, a colleague asked:
Why do we sometimes directly manipulate dependent objects fields, and other times we put the manipulation logic behind methods in those objects? What are the pros/cons in both of the approaches?
Technology is emerging faster than ever, and staying up-to-date with everything that you are interested in is becoming harder with loads of information accessible. We are asking ourselves where to find quality content and what to choose every day. To help you out, our team compiled a list of some of the podcasts they listen to, about web development, IT, software engineering and more.view more
A year ago, our team embarked on following the Domain Driven Design approach. As such, we ordered hard copies of Eric Evans book and Vaughn Vernon book. As soon as they arrived we delved into the techniques used for software development. At first, some of the techniques seemed out of place, but a year later, we found that there is an apparent benefit for our projects as much as for our teams.view more
Once again, we got to see the power, diversity and ripples of human thought. We saw its probing into the microscopic intricate structure of human DNA, to its interstellar travel of million light years away to a place where the very fabric of space-time is ripped and warped as two black holes are interlocked in a cosmic dance.view more
#GDCR16 is a day for celebrating passion and software craftsmanship. This year’s event in Skopje, Macedonia was a blast! Fresh ideas, new perspectives, and great people is everything you need for such an event.view more
With special honor, we are informing you and inviting you to participate at the 6th Global Day of Coderetreat, which will take place in HASELT offices on 22th of October.view more
The WordPress API includes several endpoints you can use to read information from the database and use the data for different purposes. In this blog post, we will get use of the
/wp-json/wp/v2/posts endpoint, which is something like running a
WP_Query. It works using the four most common HTTP methods – GET, POST, PUT and DELETE, for which you will need to be authorized to work with.