View All News

HTTP Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate HTTP Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage HTTP

Learn to apply best practices and optimize your operations.

  • Mobile goes back to the future with SOA principles

    Enterprise architects don't have to leave SOA principles behind when they develop mobile applications. Granted, the way SOA is applied may change, but it remains useful.

    In this handbook, contributor George Lawton and consultant Tom Nolle present mobile SOA success stories and further potential uses for SOA in mobile development. Lawton opens with an article on how SOA principles can be used to address mobile problems. Next, Lawton discovers how one company used caching services to improve mobile application performance. Nolle closes with an article on using SOA principles to design mobile contextual apps. Continue Reading

  • How API testing is evolving as a regular part of application development

    Whether it is obvious in an organization or not, API testing exists. Learn why API testing is necessary in the application world. Continue Reading

  • Understanding and mitigating a FREAK vulnerability attack

    After the discovery that the FREAK vulnerability can affect a wide variety of OSes, enterprises should amp up mitigation efforts. Here's some background on the attack and how to stop it. Continue Reading

View All Manage

Problem Solve HTTP Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Will TLS 1.3 solve the problems of certificate authorities?

    Transport Layer Security (TLS) and Secure Sockets Layer (SSL) cryptographic protocols have long been the cornerstone of Web application security, and the whole process finds its root (quite literally) in a system of signed certificates. The trouble is this security system has turned into a vulnerability. Too often an enterprise possesses a hodgepodge of signed certificates from various Certificate Authorities (CAs) that are thrown into the directories of protected services, and then often forgotten until they expire. Worse yet, recently hackers have managed to create fake certificates. CAs -- once a seemingly effective answer to ensuring Web security -- are now providing an attack surface for hackers to take advantage of.

    This technical guide surveys the CA landscape, opening with a field report on the latest CA security issue, the problem of fake certificates. To help explain the nature of this threat, our second chapter delves into the certificate system, current problems with it, and what enterprise IT staff can do. This guide’s closing chapter examines industry efforts to cope with the threat: TLS 1.3. Through this guide, IT professionals, and especially those concerned with network security, will learn the latest about TLS/SSL security. Continue Reading

  • How do Outlook clients know mailbox moves are done?

    I'm migrating Exchange 2010 mailboxes to Exchange 2013. How will Outlook clients know the mailboxes moved after the migration? Continue Reading

  • Add to your management toolbox with new DSC resources

    Desired State Configuration is a powerful tool, but doesn't yet include many built-in resources. Learn how to find more and expand your repertoire. Continue Reading

View All Problem Solve