Blog

  • London Paddington to Bristol Temple Meads

    When I joined dxw in 2013, an introductory blog post wasn’t yet a thing on our onboarding checklist. It happened that my first piece of writing for the company’s blog was about the WebDevConf I attended in 2014 in Bristol. Back then, I thought that if I ever wanted to move out of London, I…

  • Beyond slide decks and reports

    Beyond slide decks and reports: Running workshops to share research findings and help others apply design thinking We recently worked on a discovery project with the Government Digital Service (GDS) to improve the tools and systems that support the Cabinet Office spend controls. We worked with the Standards Assurance team at GDS, who are responsible…

  • A fond farewell

    After nearly two years at dxw, the time has come for me to move on. I have not been particularly good at writing blog posts for dxw. In fact, writing blog posts used to be a big part of a previous job, and then I only wrote about two per year. So when I was…

  • TiL: what we’ve been learning this summer…

    Back in June, we introduced you to our ‘Today I learned’ channel. The channel has been buzzing with activity of late, so here are a few of the latest lessons we’ve been learning. Enjoy! Let it go… Life of (Raspberry) PI Learning Japanese… New feature in OpenSSH: Thanks, Deliveroo! The beauty of idioms… Mind-blowing Adobe XD!…

  • 2017 dxw annual retreat!

    Retreat! (No, not that kind, come back….come baaaacccckkk!) As part of our Sisyphean task to continue to improve everything dxw, we headed off on our annual retreat at The Olde Bell in Hurley, Berks. Whilst the surroundings were familiar to those who attended the previous year, the format of the retreat was organised this year…

  • XSS in WordPress: a tutorial

    One of the most common vulnerabilities in WordPress plugins is cross site scripting – XSS for short. The basic premise of XSS is that an attacker is able to cause JavaScript to run in somebody else’s browser, while they’re on a website that the attacker shouldn’t be able to control. By the end of this,…