In light of RocketTheme’s 10th anniversary, we decided to ask a few questions about RocketTheme’s history and future to its founder and CEO, Andy Miller.
At the end of this month (December 31, 2014), Joomla is discontinuing support for Joomla 2.5. This has a lot of users that haven’t yet made the switch to Joomla 3 eager to do so.
RocketTheme is turning 10! What started as a one-person ad-hoc template design company has since grown to become one of the most recognized and trusted brands for templates and extensions on Joomla, WordPress, phpBB, and Magento.
For many bloggers, especially full-time ones, travel is a necessary part of life. What sounds on the surface to be a perfect profession for homebodies can be anything but. A professional blogger will likely find themselves leaving the comfort of their home office quite often, especially if they work in a field where events and meetups take place at frequency.
No one likes to receive spam in their inbox, especially if that spam comes from your own website. Contact forms are a great way to give your visitors an easy method for contacting you, but they can easily become a lot more trouble than they’re worth.
GitHub is an extremely popular Git repository used by developers and programmers around the world to make organizing, managing, storing, collaborating on and sharing their projects easy.
RocketTheme has teamed up with Vector Open Stock to create an exclusive free icon set that you can use on your next project.
Many Web developers work as freelance contractors, giving them control over the projects they take on, and the hours they work. This also means taking on the responsibility of invoicing clients, and making sure they have the ability to pay in a way that is fast and convenient for them.
If you think of code as the painter’s masterpiece, then the tools with which it is written are the brushes and canvas. Choosing the right system by which you can comfortably and reliably produce great websites is important.
WordPress has come a long way in terms of security and the prevention of unauthorized access. However, even with the extensive attention paid to making it secure out of the box, it remains a big target for hackers.