Spring Session makes it easy to write horizontally scalable cloud applications, offload session state into specialized external session stores, and take advantage of current technologies such as WebSockets. This article takes a deep dive into using Spring Session to maximize these benefits, avoiding the limitations of traditional session management employed by enterprise Java
Following the online webinar "Exploring the Uncharted Territory of Microservices" organized by XebiaLabs, which we covered in The Benefits of Microservices, Randy Shoup and Andrew Phillips answered a number of questions on microservices asked by participants.
The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic: new CPU instructions to accelerate cryptographic operations; a novel implementation of the RSA algorithm to accelerate public key encryption; and using SMT to balance web server and cryptographic operations. Their approach, they claim, leads to significant cost savings.
Gregor Roth RESTful HTTP architecture and design, common URI naming, Uniform interface interactions, when to use PUT or POST, how to support non-CRUD operations, and more. 12
What exactly happens when an HTTPS connection is established? This article analyzes the data exchanged between the browser and the server, down to the byte, in order to set up a secured connection. 12
.NET and Java interop can be made really simple using a REST document centric approach. This article demonstrates REST for interop as well as POST-REST. 4