Tag

Stateless

2 views collected around this technical thread.

Code Ape Tech Column
Code Ape Tech Column
May 27, 2025 · Information Security

Combining JWT and Session for Secure and Scalable User Authentication

This article explains how JWT provides stateless authentication while Session adds an extra security layer and lifecycle management, and demonstrates their combined use with Java code to achieve both scalability and fine‑grained control over user sessions.

JWTJavaStateless
0 likes · 8 min read
Combining JWT and Session for Secure and Scalable User Authentication
IT Architects Alliance
IT Architects Alliance
Nov 15, 2024 · Backend Development

Design Principles of Microservices: AKF Scalability Cube, Front‑End/Back‑End Separation, Stateless Services, and RESTful Communication

This article explains core microservice design principles—including the AKF scalability cube with its Y (functional), X (horizontal scaling), and Z (data partition) axes, front‑end/back‑end separation, stateless service architecture, and RESTful communication—providing practical guidance for building scalable, maintainable systems.

Frontend‑Backend SeparationMicroservicesRESTful
0 likes · 9 min read
Design Principles of Microservices: AKF Scalability Cube, Front‑End/Back‑End Separation, Stateless Services, and RESTful Communication
Architect
Architect
Nov 11, 2024 · Backend Development

Microservice Design Principles: AKF Split, Front‑End/Back‑End Separation, Stateless Services, and RESTful Communication

This article explains microservice architecture fundamentals, covering the AKF scalability cube split principle, front‑end/back‑end separation, stateless service design, and RESTful communication, illustrating Y, X, Z axes for functionality, horizontal scaling, and data partitioning with diagrams and practical examples.

MicroservicesRESTfulStateless
0 likes · 9 min read
Microservice Design Principles: AKF Split, Front‑End/Back‑End Separation, Stateless Services, and RESTful Communication
37 Interactive Technology Team
37 Interactive Technology Team
Nov 11, 2024 · Information Security

Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)

JSON Web Token (JWT) is a compact, self‑contained, stateless token that encodes header, payload, and signature in Base64URL, enabling secure, signature‑verified authentication without server‑side session storage, simplifying scaling, supporting cross‑domain use, while offering advantages like lightweight extensibility and drawbacks such as revocation difficulty and secret‑key reliance.

AuthorizationJSONJWT
0 likes · 16 min read
Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)
Code Ape Tech Column
Code Ape Tech Column
Jun 25, 2024 · Backend Development

COLA Stateless State Machine: A Lightweight, Thread‑Safe Alternative to Spring StateMachine for Java Backend Order Processing

The article explains why Spring StateMachine is heavyweight and thread‑unsafe for high‑concurrency order management, introduces the open‑source COLA stateless state machine as a simpler, lock‑free solution, and provides detailed design principles, core concepts, and extensive Java code examples.

COLAConcurrencyJava
0 likes · 13 min read
COLA Stateless State Machine: A Lightweight, Thread‑Safe Alternative to Spring StateMachine for Java Backend Order Processing
Java Architect Essentials
Java Architect Essentials
Apr 21, 2023 · Information Security

Why JWT Is Not Suitable for Session Management and Its Proper Use Cases

This article critically examines the common misconceptions about JWT advantages, explains the security and practical drawbacks of using JWT for session management, and outlines the scenarios where JWT is appropriate, such as short‑lived, one‑time authorization tokens.

JWTSession ManagementStateless
0 likes · 14 min read
Why JWT Is Not Suitable for Session Management and Its Proper Use Cases
Efficient Ops
Efficient Ops
Feb 8, 2023 · Information Security

Why Sessions Burden Servers and How Token‑Based Authentication Solves It

This article traces the evolution from simple web page browsing to modern token‑based authentication, explaining the scalability and security problems of server‑side sessions and showing how signed, stateless tokens using HMAC‑SHA256 eliminate those issues while supporting horizontal scaling and cross‑platform access.

HMACSession ManagementStateless
0 likes · 13 min read
Why Sessions Burden Servers and How Token‑Based Authentication Solves It
ByteDance Data Platform
ByteDance Data Platform
Jan 11, 2023 · Big Data

How EMR Stateless Transforms Big Data with Transient, Stateless Clusters

This article explains the concept of transient clusters and the Stateless architecture in Volcano Engine's EMR platform, compares Stateless with traditional Stateful approaches, outlines its evolution, core components, elastic scaling features, and the business value of cost‑effective, on‑demand big‑data processing.

Big DataCost OptimizationEMR
0 likes · 17 min read
How EMR Stateless Transforms Big Data with Transient, Stateless Clusters
Wukong Talks Architecture
Wukong Talks Architecture
Aug 9, 2022 · Information Security

Understanding HTTP Statelessness, Authentication, Authorization, Cookies, Sessions, and JWT

This article explains why HTTP is a stateless protocol, introduces authentication and authorization concepts, and compares cookies, sessions, and token-based mechanisms such as JWT, detailing their characteristics, workflows, and security considerations for modern web applications.

AuthorizationHTTPJWT
0 likes · 14 min read
Understanding HTTP Statelessness, Authentication, Authorization, Cookies, Sessions, and JWT
macrozheng
macrozheng
Feb 21, 2022 · Fundamentals

When Inheritance Breaks Your Code: Why Composition Often Wins

This article critiques the over‑idealization of object‑oriented programming, explaining how inheritance can create tight coupling and hidden bugs, why encapsulation may leak state, the limits of polymorphism, and how modern stateless service architectures favor composition and functional approaches.

EncapsulationOOPStateless
0 likes · 13 min read
When Inheritance Breaks Your Code: Why Composition Often Wins
IT Architects Alliance
IT Architects Alliance
Jan 22, 2022 · Backend Development

Microservice Design Guidelines: Statelessness, Front‑Back Separation, Business Abstraction, and More

This article presents a comprehensive set of practical microservice design guidelines—including stateless services, front‑back separation, domain‑driven business abstraction, use‑case and entity convergence, high cohesion, low coupling, vertical and horizontal slicing, and team self‑organization—to help architects build scalable, maintainable backend systems.

Domain-Driven DesignMicroservicesStateless
0 likes · 9 min read
Microservice Design Guidelines: Statelessness, Front‑Back Separation, Business Abstraction, and More
Wukong Talks Architecture
Wukong Talks Architecture
Sep 17, 2021 · Information Security

Understanding HTTP Statelessness, Authentication, Authorization, Cookies, Sessions, and JWT

This article explains why HTTP is a stateless protocol and how authentication and authorization are achieved using cookies, sessions, and token-based mechanisms such as JWT, detailing their characteristics, workflows, and security considerations for modern web applications.

AuthorizationHTTPJWT
0 likes · 13 min read
Understanding HTTP Statelessness, Authentication, Authorization, Cookies, Sessions, and JWT
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jul 24, 2021 · Fundamentals

Ten Everyday Analogies to Explain Core Computer Interview Concepts

This article uses ten vivid real‑life analogies to clarify essential interview topics such as HTTP statelessness, serialization, rate limiting, TCP handshakes, thread‑pool mechanics, flow‑control windows, BIO/NIO/AIO differences, deadlocks, and the select versus epoll model, helping readers grasp complex computing concepts through familiar scenarios.

HTTPIO MultiplexingSerialization
0 likes · 10 min read
Ten Everyday Analogies to Explain Core Computer Interview Concepts
Architecture Digest
Architecture Digest
Jun 27, 2021 · Backend Development

Scalable Architecture Without Magic: Principles and Practical Setups

The article outlines practical principles for building scalable, stateless backend architectures—choosing the right tools, using multiple servers, applying caching and rate limiting, delegating responsibilities to databases, handling large data volumes, and presenting example configurations from small to massive deployments.

CachingDatabaseLoad Balancing
0 likes · 11 min read
Scalable Architecture Without Magic: Principles and Practical Setups
DevOps Cloud Academy
DevOps Cloud Academy
Mar 1, 2021 · Cloud Computing

Why Moving to the Cloud Is Not Just a Simple Lift‑and‑Shift: Lessons on Elasticity, Stateless Design, and Architecture

The article explains that migrating legacy monolithic systems to the cloud is far from a simple lift‑and‑shift, highlighting the pitfalls of inflexible on‑premise infrastructure, the importance of horizontal scaling, stateless application design, micro‑service decomposition, and asynchronous communication to fully leverage cloud elasticity and cost efficiency.

MicroservicesStatelessarchitecture
0 likes · 11 min read
Why Moving to the Cloud Is Not Just a Simple Lift‑and‑Shift: Lessons on Elasticity, Stateless Design, and Architecture
Architect
Architect
Nov 8, 2020 · Fundamentals

Understanding the Meaning of “State” in HTTP: Statelessness, Cookies, and Sessions

This article explores what “state” means in the HTTP protocol, clarifies the concepts of statelessness and connection‑lessness, demonstrates their impact through a simulated shopping‑cart scenario, and explains how cookies and sessions introduce state to enable practical web interactions.

HTTPStatelessbackend
0 likes · 14 min read
Understanding the Meaning of “State” in HTTP: Statelessness, Cookies, and Sessions
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

HMACStatelessWeb Security
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
Code Ape Tech Column
Code Ape Tech Column
Aug 19, 2020 · Information Security

Evolution of Session Management and the Rise of Token‑Based Authentication

The article traces the history of web session handling from simple stateless requests through the challenges of scaling session IDs, explains why token‑based authentication (e.g., JWT) offers a stateless, scalable, and more secure alternative, and outlines its core principles and advantages.

Statelessauthenticationscalability
0 likes · 12 min read
Evolution of Session Management and the Rise of Token‑Based Authentication
Java Architect Essentials
Java Architect Essentials
Aug 16, 2020 · Backend Development

Designing a High‑Availability Service Layer: Stateless Architecture, Timeout Settings, Asynchronous Calls, Idempotence, and Service Degradation

This article explains how to build a high‑availability service layer for large‑scale web systems by vertically splitting business domains, adopting stateless design, configuring timeouts, using asynchronous messaging, ensuring idempotent operations, and applying service degradation techniques to maintain stability during traffic spikes.

High AvailabilityService LayerStateless
0 likes · 11 min read
Designing a High‑Availability Service Layer: Stateless Architecture, Timeout Settings, Asynchronous Calls, Idempotence, and Service Degradation
Top Architect
Top Architect
Jun 19, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication

The article traces the history of web session handling, explains the scalability and security challenges of server‑side sessions, and introduces stateless token‑based authentication using signed HMAC‑SHA256 tokens as a modern solution for scalable, secure web applications.

HMACStatelessauthentication
0 likes · 14 min read
Evolution of Session Management and Token‑Based Authentication