To build lasting impact with our clients, their end-users, and our community.
Sure, we love to geek out over technology and design. But it's all for a bigger purpose - boosting your business. Through development, design and business categories here on our blog - we break down our best practices, what to look for when it comes to software development, and how you can in fact, leverage technology.
React Hooks at a Glance
In this post we are going to answer the question why you would want to use React hooks and go over a few of the ones built in. I will be covering the useState and useEffect hooks as I feel these will give you the most bang for your buck...
Vertical Rhythm on the Web
Grids are a thing. They’ve been a thing. There’s nothing earth-shattering about designing on a grid. In fact, it’s so commonplace that there are, what feels like, an infinite number of tools available to make it easier to design on a grid—Bootstrap, Foundation, Bulma, among others. But there’s one thing...
Is Custom Software Worth the Investment?
So you want to know how much custom software costs? Here’s the thing … custom software is equally challenging, complex, and exciting. Like anything custom, it can be difficult to put a price on. At Gaslight, we typically incorporate the following in our sales process; curiosity, listening, collaboration, white board...
Refactoring Patterns in Elixir: Replace Conditional with Pattern Matching
Part 1: Replace Conditionals with Pattern Matching Replace Complex Conditionals in Function Bodies with Pattern Matching in Function Heads Several of us developers at Gaslight have been meeting up on Fridays to discuss Martin Fowler’s seminal book, Refactoring. The 2nd edition of his book, which is what we have been...
So You’re Building an Application With No Designer? Here's 3 Ways to Know the Usability is Suffering
Not long ago, my fellow designer Haley wrote an excellent blog post, “Design happens whether or not you value it - ignoring it can ruin your project”. She laid out a good explanation of what design is and argued why it matters. But understanding the importance of design within an...
Two-Factor Authentication in Elixir and Phoenix
Two-Factor Authentication in Elixir and Phoenix Multi-factor authentication relies on the user having two or more pieces of evidence (or factors) in order to gain access into a system. In this example we will implement a two-factor authentication system that requires the user to present two forms of evidence: what...