?????????????????????????????????????????????????????????????????????????????????????????????????????????). For that reason, only HEAD and many GET requests (i.e. restricted to actual file requests and so with URLs with out query string made use of as being a command, and so on.) may be pipelined in a secure and idempotent method. After a few years