Microsoft Announces HTTP 2.0 Server

Interoperability testing for HTTP 2.0 is set to begin later this month and the complete specifications should be completed within the year. Version 2.0's new capabilities will include such features as multiplexing providing the user with the ability to send as many requests as desired and all at the same time versus the previous 1.0 standard of only one at a time. It also includes header compression, request-response pipelining and other requested features designed to make Web pages load faster and improve API functionality and all designed to keep the 1.1 compatibility intact and functioning. At the same time, Google has been working on its own protocol, called SPDY (not an acronym), that was more or less designed to light a fire under the IETF and get working on an update to HTTP 1.1. SPDY and HTTP 2.0 are now largely the same protocols with slight differences, and Google has no intention of going into competition with HTTP 2.0. The code can be found on GitHub.



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • As the threat landscape for data breaches continues to advance in both volume and sophistication, businesses must mature their security strategies to confront and hopefully outpace these new challenges. Unless changes are made to existing security protocols, it's only a matter of time before security barriers are penetrated and valuable data is lost. While there is no silver bullet to ensure complete protection from data breaches, read this Forrester thought leadership paper to learn the four key steps to …

  • It's obvious that organizations consider data encryption and obfuscation mainstays of sound data protection requirements. IANS conducted a survey of over 100 information security professionals to see how they are dealing with advanced attacks while moving into cloud and outsourced service models, where they may have little control over security. Read this research report to learn why applying a strategic security policy of encryption and key management across the enterprise could certainly bring many benefits, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date