On 16 Aug 2010, at 21:38, Miles Fidelman wrote:

> There have been some of these built on top of HTTP, but the purist in me 
> really dislikes violating layering.

I'm a little out of my depth here, but is that really the case? The things 
you're talking about sound like patterns to me, not layer-specific details. 
What makes that pattern any less applicable at a higher level in the network 
stack?

Reply via email to