You’ve probably been noticing that more and more websites are using beautiful and in some cases, branded maps to show all sorts of data (most commonly a business location) on their website.
One of the many reasons that WordPress has developed into the most popular CMS is because of how user-friendly the admin area is. However, there are benefits to customizing it even further.
If you’re looking to gather more insight into how your site visitors are interacting with your website but aren’t quite sure about the proper way of collecting such data, Google Tag Manager’s the way to go.
As wordpress continues to flourish as the most popular CMS on the internet, so too does its popularity as a target for hackers who want to gain unauthorized access to your site. Let’s take a look at some additional security steps to secure your site.
If you’ve been tracking your website’s analytics using Google’s Universal Analytics code, you may have noticed that you’re unable to track user demographics. Fortunately, with a few adjustments, we can set up Google Analytics to track user demographics while still reaping the benefits of using the Universal Analytics code.
Managing and maintaining a social media profile can be a handful, especially if you’re managing several social media accounts for a number of clients. You all ready know the importance of producing quality content and how time consuming it can become.
If you’re a developer, I don’t need to tell you about the importance of taking steps to maximize the efficiency of your workflow. And if you’re anything like me, your always looking out for the next best thing to come along and do just that. Luckily for you, you’ve stumbled on a small gold mine here, if you’re not familiar with Sublime Text.
Before giving a client access to their brand new website, customizing the login page to reflect the branding / design of the website is just icing on the cake.
Wordpress is the most popular CMS in existence, but its widespread use has also made it an easy target for mischievous hackers looking to exploit security vulnerabilities for their own agendas.