1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
2 years ago
7

You have an application running on multiple ec2 instances, however every time an instance fails, your users complain that they l

ose their session. what can you do to prevent this from happening?
Computers and Technology
1 answer:
Alik [6]2 years ago
8 0

To control the users from complaining that they lose their session when an application executes on multiple ec2 instances, store session state in Elastic ache.

<h3>What is an Elastic Cache?</h3>
  • AWS fully manages the in-memory data store and cache service known as Elastic Ache (AWS).
  • In-memory data storage that is compatible with open-source software may be easily set up, managed, and expanded in the cloud, according to Amazon.
  • The service improves the performance of web applications by utilizing managed in-memory caches rather to just slower disk-based databases.
  • Elastic ache supports the open-source in-memory caching engines Memcached and Redis (also known as "Elastic ache for Redis").
  • To control the users from complaining that they lose their session when an application executes on
  • multiple ec2 instances
  • , store session state in
  • Elastic ache
  • .

To learn more about Elastic ache refer to:

brainly.com/question/28209824

#SPJ4

You might be interested in
Who is father of computer <br>​
jarptica [38.1K]

Answer:

Charles Babbage was considered to be the father of computing after his concept, and then later the invention of the Analytical Engine in 1837. The Analytical Engine contained an ALU (arithmetic logic unit), basic flow control, and integrated memory; hailed as the first general-purpose computer concept.

PLEASE MARK ME AS BRAINLIEST :)

6 0
4 years ago
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
4 years ago
Which of the following is NOT areserved word in Java?intpublicstaticnum
Rama09 [41]

Answer:

num

Explanation:

In java reserved words are also known as keywords, keywords are reserve words for a language that can't be used as an identifier(name of a class, name of a variable, name of an array etc.) int, public static, are reserve words.

In given question num is not a reserved word.

6 0
3 years ago
Which type of password would be considered secure
max2010maxim [7]
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
5 0
4 years ago
Read 2 more answers
What can a user do using the Contact Group dialog box? Check all that apply.
RSB [31]

Answer:

1,2,4,5,7

Explanation:

Had the question

3 0
3 years ago
Read 2 more answers
Other questions:
  • A software program that allows a programmer to type in code. modern versions usually make it easy to format the code on the scre
    13·1 answer
  • Need Help ASAP!
    14·2 answers
  • Hydropower uses moving water to do work, such as grinding grains in a mill. True False
    7·1 answer
  • In server-side discovery pattern, load balancing and routing of the request to the service instances are taken care of by the se
    9·1 answer
  • Disk mirroring is a method of storing data that generates extra bits of data from existing data, allowing the system to create a
    14·1 answer
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
    9·2 answers
  • Name the box where the name of the first cell of the selected range appears?
    7·1 answer
  • For each situation, provide a pseudocoded algorithm that would accomplish the task. Make sure to indent where appropriate.Situat
    10·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!