Skip to main content

category: Performance

Handle high traffic by sanitising social media traffic in nginx

Absorb large social media marketing traffic like you never did before, with this sneaky nginx rewrite to help out your cache.

HOW TO: Serve Frontity inside WordPress on any environment (no node.js)

A method to load a Frontity site as a theme inside Wordpress with any hosting environment – including those that don’t yet support Node.js!

HOW TO: Support .webp on Cloudflare’s edge with a Worker

A method to serve .webp to supported browsers only using Cloudflare workers (and optionally Webp Express).

Scaling for VOLUME with Frontity & Cloudflare

Can we achieve half a million visits in 60 seconds on entry-level hardware? With Frontity and Cloudflare, the answer may surprise you.

HOW TO: Use Cloudflare to handle Country-based redirects

Do you have a multilingual or multi-regional website that automatically redirects users based on their country? This is for you.

HOW TO: Block traffic coming from a specific domain

Inbound links are awesome. Except for when they’re not. Here’s how to stop bad ones…

HOW TO: Cache the WordPress REST API Post endpoint in Cloudflare

With this method using Apache, Node, Frontity and Cloudflare, you can start imagining how to get your site to 100% uptime.

HOW TO: Set up Webp image support with Webp Express on Nginx (CDN-compatible/no .htaccess)

Learn how to setup and fully support webp image support on Nginx with the webp express plugin. Compatible with Cloudflare, Stackpath and any other CDN.

HOW TO: Deploy a headless site for WordPress to the Cloud for FREE with Frontity and Zeit Now

A quick start guide on deploying a decoupled headless React.js site to the cloud for free Frontity and Zeit Now that uses Wordpress as its backend.

[SOLVED] Google Best Practices: “Includes front-end JavaScript libraries with known security vulnerabilities” ([email protected])

Google Lighthouse Best Practices often flags Wordpress for “Includes front-end JavaScript libraries with known security vulnerabilities”. Why?