TITLE

When is HTTP 1.1 not HTTP 1.1?

AUTHOR(S)
Bradner, Scott
PUB. DATE
September 1999
SOURCE
Network World;09/13/99, Vol. 16 Issue 37, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Comments on the alleged widespread deployment of the HTTP 1.1-compliant browser and server software. Panel discussion at Harvard University in Cambridge, Massachusetts; Need for users to turn on the advanced features of the HTTP 1.1.
ACCESSION #
2493130

 

Related Articles

  • Sending a simpler message. Yager, Tom // InfoWorld;3/18/2002, Vol. 24 Issue 11, p1 

    Focuses on the release of the KnowNow Event Router Version 1.5, a hypertext transfer protocol-based application integration software. Features of the software.

  • The missing link. Knight, Helen // New Scientist;2/18/2012, Vol. 213 Issue 2852, p45 

    The article discusses how the creation of the Hypercard by engineer Bill Atkinson of Apple Inc. in 1985 led to the development of the hypertext transfer protocol that links the World Wide Web by physicists Tim Berners-Lee and Robert Cailliau at CERN.

  • Proxomitron poses problem. Gibbs, Mark // Network World;10/1/2001, Vol. 18 Issue 40, p36 

    Reports the problems on the Hypertext Transfer Protocol message logger Proxomitron in the United States. Use of the message logger to search for web sites; Failure of the message logger to locate the web site; Discussion on the problem encountered.

  • HTTP Attack.  // Network Dictionary;2007, p232 

    A definition of term "HTTP Attack" is presented. It utilizes hypertext transfer protocol (HTTP) port or HTTP communications to perform attacks. Web attacks are frequently associated with HTTP attacks.

  • LDPinch. Nazario, Jose // SC Magazine: For IT Security Professionals (UK Edition);Aug2007, p11 

    The article offers information on LDPinch, a malware that can steal data. Data captured by the malware can be sent to a Web site through hypertext transfer protocol POST or through email messages. The malware access stolen authentication data by installing a Trojan dynamic link library. Through...

  • Exalead extends enterprise search platform.  // KM World;May2006, Vol. 15 Issue 5, p28 

    The article presents the additional features of the Exalead Version 4.0 search program. Indexing and search performance have been improved by a factor of three for large document collections. A new Hypertext Transfer Protocol crawler configuration tool gives administrators better control of the...

  • DESENVOLVIMENTO DE UM SOFTWARE DE ACESSO REMOTO E CONTROLE DE �REA DE TRABALHO DE UM COMPUTADOR ATRAV�S DA WEB. Sanches, Gabriel; Da Silva, Francisco Assis // Colloquium Exactarum;Jul-Dec2010, Vol. 2 Issue 2, p62 

    Nowadays, the practice of accessing computers remotely using an Internet connection has become increasingly more frequent, or for transferring files or technical support performed by companies. Due to the need to remotely access files or perform technical support quickly and effectively, emerged...

  • Mozilla encrypts natural searches on Google by default. Davies, Jessica // New Media Age (Online Edition);7/18/2012, p7 

    The article reports that Mozilla Corp. is planning to encrypt natural searches for Google Inc. searches related to Firefox browser in Great Britain. It offers information on the Firefox 14 that uses Hypertext Transfer Protocol (HTTP) for all Google searches. It mentions that the encryption...

  • Enabling Remote Access. Neal, Michael // Scientific Computing;Sep/Oct2010, Vol. 27 Issue 5, p14 

    The article discusses the positive implication of web services in enabling remote monitoring and connecting distributed hardware over existing physical networks. It mentions that web services are defined as modular software components that are conjured through hypertext transfer protocol (HTTP)...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics