At Conrad Research we LOVE Temporal. It gives us a high velocity in development because our code doesn’t have to worry as much about implementing retry logic. We also are heavy users of Cloudflare workers. The combination of these two is awesome, but not straightforward. Let’s dig in:
I recently was reviewing the error logs on a Cloudflare Worker that had only been active for a week and was surprised to see the extent of attacks occurring that were sniffing for leaked credentials. Let’s take a look at some of the URLs that were being accessed.
I’ve been writing webpage copy for the pricing page of a SAAS product and decided it would be interesting to compare ChatGPT 4, Claude 3.5, and Grok 2 LLM AI models while doing so (in hindsight I should have also included llama).
Using HTMX and Cloudflare Workers is a great way to sprinkle in some dynamic functionality into your Cloudflare Pages static site. Let’s look at an example of handling a form submission.
Nested CSS is now baseline; meaning that it’s finally supported across all the major browsers. We’ve been playing around with it and have found it really improves readability of your CSS. Let’s go through some examples.
Wait! What? Securing a static site? Yup, even if your site only contains static content, it doesn’t mean you’re safe from vulnerabilities like Cross-Site Scripting (XSS) and others. This becomes an even bigger issue if you’ve added forms or other interactive elements. The good news is that securing your site is straightforward.
“Hello World”. The most profound two words in computer science. Really this post should be titled “Hello Again” as it represents my return to blogging after a decade of hiatus.