Tagged articles
148 articles
Page 2 of 2
Python Programming Learning Circle
Python Programming Learning Circle
Mar 29, 2021 · Databases

User Retention, Funnel, and Session Analysis in ClickHouse Using Bitmap and Retention Functions

The article explains how to perform efficient user retention, funnel, and session analysis on large ClickHouse datasets by replacing costly multi‑table joins with bitmap compression, the built‑in retention function, windowFunnel, and high‑order array functions, providing practical SQL examples and performance insights.

BitmapClickHouseSQL
0 likes · 18 min read
User Retention, Funnel, and Session Analysis in ClickHouse Using Bitmap and Retention Functions
MaGe Linux Operations
MaGe Linux Operations
Mar 21, 2021 · Backend Development

How to Build a Simple Django SSO with Shared Sessions and Redis

This tutorial walks through creating two Django projects, configuring a shared session store (either a common file or Redis) to achieve single sign‑on across them, and provides full code snippets, settings adjustments, and testing steps to demonstrate seamless login synchronization.

BackendDjangoSSO
0 likes · 15 min read
How to Build a Simple Django SSO with Shared Sessions and Redis
IT Xianyu
IT Xianyu
Feb 1, 2021 · Backend Development

Sharing HTTP Session Across a Cluster with Redis in Spring Boot

This article demonstrates how to reproduce the session loss problem in a load‑balanced Spring Boot application, explains its cause, and provides a step‑by‑step solution using Redis for shared session storage, including code, Nginx configuration, and deployment instructions.

BackendClusterJava
0 likes · 5 min read
Sharing HTTP Session Across a Cluster with Redis in Spring Boot
Architecture Digest
Architecture Digest
Dec 25, 2020 · Information Security

Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design

This article analyzes token-based identity authentication in multi‑client information systems, classifies various token types, compares their natural and controllable attributes, proposes a four‑layer hierarchy, and discusses practical usage scenarios and design principles to improve security and privacy.

AuthenticationSecuritySession
0 likes · 9 min read
Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design
360 Tech Engineering
360 Tech Engineering
Nov 9, 2020 · Information Security

Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth

This article explains the principles and workflows of typical authentication mechanisms—including HTTP Basic authentication, cookie‑based sessions, JSON Web Tokens, and OAuth—detailing their encryption processes, storage strategies, token refresh techniques, and security considerations for modern web applications.

AuthenticationHTTPJWT
0 likes · 12 min read
Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth
Top Architect
Top Architect
Oct 30, 2020 · Backend Development

Implementing Login Authentication with Session and JWT in Spring Boot

This article provides a step‑by‑step guide to implementing login authentication in Spring Boot, covering both session‑based and JWT‑based approaches, including code for controllers, filters, interceptors, context utilities, and best‑practice considerations for secure and scalable backend development.

JWTJavaSecurity
0 likes · 22 min read
Implementing Login Authentication with Session and JWT in Spring Boot
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

AuthenticationHMACSession
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
Java Architect Essentials
Java Architect Essentials
Aug 29, 2020 · Backend Development

Understanding Distributed Locks, Session Management, Maven Configuration, and Caching in Backend Architecture

This article explains the fundamentals of backend architecture, covering Maven's settings.xml, front‑back separation, various types of locks (thread, process, distributed), detailed Redis‑based and Zookeeper‑based distributed lock implementations with code examples, session handling in distributed systems, and key Spring‑Redis caching annotations.

BackendJavaSession
0 likes · 15 min read
Understanding Distributed Locks, Session Management, Maven Configuration, and Caching in Backend Architecture
Programmer DD
Programmer DD
Aug 26, 2020 · Fundamentals

What Does ‘Stateless’ Really Mean in HTTP? Exploring State, Cookies & Sessions

Although HTTP is described as a stateless, connectionless protocol, this article dissects what “state” truly refers to, explains why the protocol lacks memory of client interactions, and demonstrates how mechanisms like cookies, sessions, and server‑side caching introduce stateful behavior to enable features such as login persistence and shopping carts.

HTTPSessionWeb Development
0 likes · 16 min read
What Does ‘Stateless’ Really Mean in HTTP? Exploring State, Cookies & Sessions
NetEase Game Operations Platform
NetEase Game Operations Platform
Aug 8, 2020 · Backend Development

Debugging “Instance XXX is not bound to a Session” Errors in Gevent‑Enabled Flask APIs with SQLAlchemy

This article analyzes the intermittent “Instance XXX is not bound to a Session” error that occurs after converting a Flask‑SQLAlchemy endpoint from serial to multithreaded/gevent concurrency, reproduces the issue with test code, explains the root cause in session handling, and provides a concrete fix by patching gevent before session initialization.

BackendFlaskPython
0 likes · 6 min read
Debugging “Instance XXX is not bound to a Session” Errors in Gevent‑Enabled Flask APIs with SQLAlchemy
Java Captain
Java Captain
Jul 26, 2020 · Information Security

Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT

This article explains the fundamentals of authentication and authorization, the roles of credentials, cookies, sessions, various token types including access and refresh tokens, and details the structure, generation, and usage of JWTs, while comparing security considerations and distributed session sharing strategies.

AuthenticationAuthorizationCookie
0 likes · 21 min read
Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT
Top Architect
Top Architect
Jun 19, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication

The article traces the history of web session handling, explains the scalability and security challenges of server‑side sessions, and introduces stateless token‑based authentication using signed HMAC‑SHA256 tokens as a modern solution for scalable, secure web applications.

HMACSessionToken
0 likes · 14 min read
Evolution of Session Management and Token‑Based Authentication
Laravel Tech Community
Laravel Tech Community
May 7, 2020 · Backend Development

Laravel Redirect Cheat Sheet

This article provides a concise Laravel Redirect cheat sheet that explains how to use the framework's URL redirection helper with session storage, covering basic redirects, redirects with data, back navigation, named routes, controller actions, and intended redirects, accompanied by ready-to-use code examples.

BackendLaravelPHP
0 likes · 2 min read
Laravel Redirect Cheat Sheet
Top Architect
Top Architect
Apr 15, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication in Web Applications

The article traces the history of web session handling from simple document browsing to the challenges of storing session IDs in clustered servers, and explains how token‑based authentication using signed tokens like HMAC‑SHA256 provides a stateless, scalable, and more secure alternative for modern web and mobile applications.

SessionTokenstateless
0 likes · 12 min read
Evolution of Session Management and Token‑Based Authentication in Web Applications
macrozheng
macrozheng
Apr 10, 2020 · Backend Development

Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication

This article explains how cookies and sessions compensate for HTTP's stateless nature, details their creation, types, and limitations, compares them with JSON Web Tokens, and provides guidance on choosing the appropriate authentication method for different application scales and security requirements.

AuthenticationJWTSession
0 likes · 16 min read
Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication
Programmer DD
Programmer DD
Mar 31, 2020 · Fundamentals

What Does “Stateless” Really Mean in HTTP? A Deep Dive

This article explores the true meaning of HTTP’s stateless nature, clarifies common misconceptions, examines how cookies and sessions add state, and demonstrates through a simulated shopping scenario why additional mechanisms are needed to maintain user context across requests.

HTTPSessioncookies
0 likes · 15 min read
What Does “Stateless” Really Mean in HTTP? A Deep Dive
Top Architect
Top Architect
Mar 2, 2020 · Information Security

Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure

This article analyses various client scenarios in multi‑client systems, classifies authentication tokens into password, session, API, and other categories, compares them across usage cost, change cost, and security risks, and presents a hierarchical token model with detailed usage steps and practical considerations.

SessionTokenaccess_token
0 likes · 12 min read
Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure
MaGe Linux Operations
MaGe Linux Operations
Feb 24, 2020 · Information Security

Session vs JWT: When to Choose Token‑Based Authentication

This article explains the differences between authentication and authorization, compares session‑based and token‑based (JWT) authentication flows, details JWT structure and signing, and outlines the advantages, disadvantages, and suitable scenarios for each method.

AuthenticationBackendJWT
0 likes · 9 min read
Session vs JWT: When to Choose Token‑Based Authentication
Python Programming Learning Circle
Python Programming Learning Circle
Feb 10, 2020 · Information Security

Common Anti‑Crawling Techniques and Countermeasures for Python Web Scrapers

The article outlines typical anti‑crawling measures such as browser detection, captchas, login requirements, JavaScript obfuscation, and behavior‑based blocks, and provides practical counter‑strategies including header spoofing, captcha solving, session/token handling, JS emulation, and human‑like request pacing.

AutomationJavaScriptSession
0 likes · 6 min read
Common Anti‑Crawling Techniques and Countermeasures for Python Web Scrapers
Laravel Tech Community
Laravel Tech Community
Jan 3, 2020 · Backend Development

Laravel Session Management: Configuration, Drivers, and Usage

This guide explains how Laravel handles session storage across HTTP requests, covering configuration files, built‑in drivers such as file, cookie, database, Memcached and Redis, custom driver creation, and common session operations like retrieving, storing, flashing, and regenerating IDs, with code examples throughout.

BackendCacheLaravel
0 likes · 12 min read
Laravel Session Management: Configuration, Drivers, and Usage
Programmer DD
Programmer DD
Nov 26, 2019 · Information Security

Understanding Cookies, Sessions, and Tokens: When and How to Use Each

This article explains the fundamental differences between cookies, sessions, and tokens, outlines how each works in web authentication, compares their security and performance trade‑offs, and offers practical guidance on storage, encryption, and best practices for implementing token‑based authentication.

AuthenticationCookieSession
0 likes · 13 min read
Understanding Cookies, Sessions, and Tokens: When and How to Use Each
IT Architects Alliance
IT Architects Alliance
Nov 21, 2019 · Backend Development

How Cookies, Sessions, and Tokens Keep Web Users Logged In

This article explains the stateless nature of HTTP and how cookies, server‑side sessions, and token‑based authentication work together to maintain user state across requests, including their storage limits, lifecycle, and practical implementation steps.

AuthenticationBackendSession
0 likes · 8 min read
How Cookies, Sessions, and Tokens Keep Web Users Logged In
ITPUB
ITPUB
Nov 9, 2019 · Fundamentals

Master Tmux: Essential Commands and Workflow for Terminal Multiplexing

This guide explains what Tmux is, how it separates sessions from windows, and provides step‑by‑step instructions for installing, starting, detaching, attaching, managing sessions, panes, and windows, along with useful shortcut keys and command examples.

Sessioncommand-linepane
0 likes · 10 min read
Master Tmux: Essential Commands and Workflow for Terminal Multiplexing
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 15, 2019 · Backend Development

Distributed Session Consistency and Sharing Solutions

The article explains the concept of distributed session consistency, outlines the role and lifecycle of HTTP sessions, describes the challenges of sharing sessions across server clusters, and evaluates several practical solutions including database, cookie, Memcache, and Redis based approaches.

DistributedSessionmemcache
0 likes · 5 min read
Distributed Session Consistency and Sharing Solutions
MaGe Linux Operations
MaGe Linux Operations
Aug 14, 2019 · Fundamentals

Mastering Web Cookies: From Basics to Python Manipulation

This article explains the origin, purpose, and inner workings of HTTP cookies, details their attributes and security implications, demonstrates how to create, retrieve, and set cookies with Python's requests library, and compares cookies with server‑side sessions for robust web development.

HTTPSecuritySession
0 likes · 14 min read
Mastering Web Cookies: From Basics to Python Manipulation
Ziru Technology
Ziru Technology
Jul 25, 2019 · Backend Development

Why Did Our CAS Login Fail? Uncovering Session Sharing Issues and Fixes

A July 3 CAS extension caused login failures due to inconsistent JSESSIONID handling across servers, leading to redirects and authentication errors, which were traced to missing memory‑cache configuration and resolved by removing the misconfigured node and restoring proper session sharing.

AuthenticationSessionjsessionid
0 likes · 9 min read
Why Did Our CAS Login Fail? Uncovering Session Sharing Issues and Fixes
Programmer DD
Programmer DD
Jul 10, 2019 · Information Security

Why JWT Is the Modern Alternative to Session Cookies for Secure Web Apps

This article explains how traditional session‑cookie authentication creates scalability, security, and deployment challenges in front‑end/back‑end separated web applications, and how JSON Web Tokens (JWT) provide a compact, self‑contained, stateless solution while also outlining their advantages and limitations.

JWTSessionToken
0 likes · 7 min read
Why JWT Is the Modern Alternative to Session Cookies for Secure Web Apps
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
May 7, 2019 · Backend Development

Understanding Cookies: Types, Usage, and iOS Integration

This article explains what cookies and sessions are, their types and attributes, demonstrates how they control language preferences on a website, and provides practical iOS examples using NSHTTPCookie, AFNetworking, and NSURLSession to send and manage cookies in network requests.

AFNetworkingNSURLSessionSession
0 likes · 10 min read
Understanding Cookies: Types, Usage, and iOS Integration
Java Captain
Java Captain
Mar 17, 2019 · Backend Development

JSP vs Servlet, Built‑in Objects, Scopes, Session vs Cookie, Spring MVC vs Struts, and Web Security Practices

This article explains the differences between JSP and Servlets, lists JSP built‑in objects and scopes, compares Session and Cookie mechanisms, describes session operation and alternatives when cookies are disabled, contrasts Spring MVC with Struts, and outlines common web security measures such as preventing SQL injection, XSS, and CSRF attacks.

CookieJSPServlet
0 likes · 15 min read
JSP vs Servlet, Built‑in Objects, Scopes, Session vs Cookie, Spring MVC vs Struts, and Web Security Practices
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Sep 17, 2018 · Backend Development

Session Sharing Solutions in Distributed Environments

This article explains the concept of web sessions, the consistency challenges that arise in distributed server clusters, and evaluates four common solutions—session replication, session affinity, cookie‑based sessions, and dedicated session servers—detailing their use cases, advantages, and drawbacks.

Distributed SystemsSessionsession replication
0 likes · 6 min read
Session Sharing Solutions in Distributed Environments
Programmer DD
Programmer DD
Apr 23, 2018 · Information Security

When Should You Really Use JWT? Practical Insights and Common Pitfalls

This article explains JWT fundamentals—encoding, signature, and encryption—examines suitable use‑cases such as one‑time verification and stateless API authentication, discusses token leakage, secret design, logout handling, renewal strategies, and compares JWT with traditional session and OAuth2 approaches.

JWTOAuth2Session
0 likes · 15 min read
When Should You Really Use JWT? Practical Insights and Common Pitfalls
ITPUB
ITPUB
Apr 2, 2018 · Backend Development

How to Share PHP Sessions Across Load‑Balanced Servers Using Redis

This guide explains the session‑sharing problem caused by load balancing, introduces Redis as a shared storage solution, and provides step‑by‑step instructions—including php.ini changes, runtime ini_set calls, and a custom session‑handler class—to configure PHP to store sessions in Redis, with code examples and verification commands.

PHPSessionload balancing
0 likes · 11 min read
How to Share PHP Sessions Across Load‑Balanced Servers Using Redis
Java High-Performance Architecture
Java High-Performance Architecture
Feb 12, 2018 · Databases

5 Practical Redis Use Cases You Shouldn't Miss

Redis, a powerful in‑memory data store, offers versatile capabilities beyond simple key‑value storage, and this article explores five common real‑world scenarios—full‑page caching, leaderboards, session storage, queues, and pub/sub—demonstrating how to leverage its rich data structures for faster, more reliable applications.

PubSubQueueSession
0 likes · 4 min read
5 Practical Redis Use Cases You Shouldn't Miss
Java Backend Technology
Java Backend Technology
Jan 31, 2018 · Information Security

Why JWT Is Replacing Cookies for Stateless Web Authentication

This article explains HTTP's stateless nature, how cookies and server‑side sessions try to overcome it, the challenges of session sharing in clustered environments, and why JSON Web Tokens (JWT) provide a lightweight, secure, and scalable alternative for modern authentication.

AuthenticationJWTSession
0 likes · 14 min read
Why JWT Is Replacing Cookies for Stateless Web Authentication
Programmer DD
Programmer DD
Sep 11, 2017 · Backend Development

Understanding Java Session and Cookie: A Hands‑On Spring Boot Demo

This article explains the fundamentals of HTTP Session and Cookie mechanisms in Java web applications, provides a minimal Spring Boot controller example that stores and retrieves a browser identifier via session, demonstrates behavior across Chrome and 360 browsers, and highlights the security risk of tampering with the JSESSIONID cookie.

CookieJavaSecurity
0 likes · 8 min read
Understanding Java Session and Cookie: A Hands‑On Spring Boot Demo
MaGe Linux Operations
MaGe Linux Operations
Jun 15, 2016 · Fundamentals

Understanding HTTP Cookies: Origins, Creation, and Best Practices

This article explains what HTTP cookies are, their historical origin, how they are created and managed via Set-Cookie headers, the meaning of options like expires, domain, path, and secure, as well as JavaScript handling, subcookies, HTTP‑Only flags, and common limitations.

HTTPJavaScriptSession
0 likes · 17 min read
Understanding HTTP Cookies: Origins, Creation, and Best Practices
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Mar 10, 2015 · Backend Development

Designing Scalable Large Websites: Session Management, Load Balancing, and Database Strategies

The article examines how to build and scale large web sites by combining technical and business considerations, covering static site deployment, multi‑server availability, session synchronization methods, load‑balancing techniques, database read/write separation, caching, and search indexing to handle high concurrency and data growth.

BackendSessioncaching
0 likes · 16 min read
Designing Scalable Large Websites: Session Management, Load Balancing, and Database Strategies