Is is productive to run Tomcat on Windows XP/Pro?

Posted on 2005-04-17
Last Modified: 2010-04-01

Since Tomcat is made to run on Linux platform, I'd like to know if it's "ok" for commercial/production purpose to run Tomcat on Windows platform?

Are there any potential issues that i may encounter such as server crashes, high processor usage, high mem usages, etc?

Question by:mwhc
    LVL 29

    Accepted Solution

    >>Since Tomcat is made to run on Linux platform

    Tomcat is made to run on all platforms not just Linux but also Windows, Solaris and other OSs. You can even get the source code and build your own version if you have soime esoteric version that does not have a current binary.

    Yes, Tomcat can be used as a production server. I would recommend using it in conjuction with Apache HTTP server(connected via mod_jk2) which means that Apache would serve your static content. This is good as Apache serves content 20x faster than tomcat as it is not parsed by the java compiler. Other reasons include, security, vitual hosts and more detailed HTTP configuration.

    >>Are there any potential issues that i may encounter such as server crashes, high processor usage, high mem usages, etc?

    This is more dependent on your code than on Tomcat. If you need a smaller faster Servlet/JSP server then you could look at Resin from Cuacho but they are both stable and production ready servlet/jsp servers.
    LVL 29

    Expert Comment

    Thanks for the points and grade.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This video discusses moving either the default database or any database to a new volume.
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now