On 16 Aug 2010, at 21:38, Miles Fidelman wrote: > There have been some of these built on top of HTTP, but the purist in me > really dislikes violating layering.
I'm a little out of my depth here, but is that really the case? The things you're talking about sound like patterns to me, not layer-specific details. What makes that pattern any less applicable at a higher level in the network stack?