Partager via


Craig McMurtry's WebLog

World's Coolest Tchotchkes?

Here's a shout-out to my parents for introducing me to what appears to be the world's coolest line...

Author: Craig McMurtry Date: 01/03/2005

64-Bit Windows Part 11: Windows On Windows 64

We saw that both Itanium and x64 processors have a way of making their differences from 32-bit x86...

Author: Craig McMurtry Date: 12/14/2004

64-Bit Windows: The Alienware has landed

The Alienware Athlon 64 FX-55 was delivered last week. It's in an enormous black box that stands...

Author: Craig McMurtry Date: 11/26/2004

Response to John Cavnar-Johnson's comment on my objection to classifying message-queue based systems as being service-oriented

You can read Mr. Cavnar-Johnson's comment here:...

Author: Craig McMurtry Date: 11/15/2004

64-bit Windows - Part 10

A comment from Christopher reminded me to mention this: today, the 64-bit version of Windows are not...

Author: Craig McMurtry Date: 11/07/2004

64-bit Windows Part 9: Microsoft Operating Systems

Concerning operating systems, it is crucial to remember that Itaniums can only run operating systems...

Author: Craig McMurtry Date: 11/05/2004

64-Bit Windows Part 8: What is Microsoft doing about 64-bit personal computers

At this point, we have established that the 64-bit PC computing world is really very different from...

Author: Craig McMurtry Date: 11/05/2004

64-Bit Windows Part 7: Taking it Personally - Michael Dell, are you reading this?

Folks who read my posts, and I am always very surprised to find that there are some, will know that...

Author: Craig McMurtry Date: 11/05/2004

64-Bit Windows Part 6: The Hardware Landscape

What does the 64-bit hardware landscape look like today, 18 months after AMD introduced the first...

Author: Craig McMurtry Date: 11/05/2004

64-bit Windows Part 5: A Summary Comparison of the Two Species of 64-bit Processors

So, we find that the Itanium processor and the x64 Opteron processor are very different. They both...

Author: Craig McMurtry Date: 11/05/2004

64-bit Windows Part 4: The x64 Standard

The first x64 processor was the AMD Opteron. The Opteron x64 processor has at least three very...

Author: Craig McMurtry Date: 11/05/2004

64-bit Windows Part 3: The Itanium Processor

There are two quite different species of 64-bit PC: the Itanium and the x64. The Itanium species...

Author: Craig McMurtry Date: 11/05/2004

64-bit Windows Part 2

What is a 64-bit processor, exactly? Well, when an instruction is sent to a processor, it will often...

Author: Craig McMurtry Date: 11/05/2004

64-Bit Windows Part 1

64-bit computing is here today. Quite literally: this is a 64-bit laptop, running a 64-bit operating...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 9

And, finally, here is what really, really, really, really annoys me in what I hear presumable gurus...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 8

The conclusion to draw from these considerations is that in a service-oriented system we are focused...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 7

Users of the contract document management application, branch administrators, will have a sheaf of...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 6

Let’s turn our attention back to the employee, branch, and document data that we will be storing in...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 5

Having undertaken this analysis at least one cogent insight jumps right out. It is that user data...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 4

Now let us subject these requirements to a service-oriented analysis. You will recall that when we...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 3

If we apply the approach that I described in my last post (too long ago) to the requirements of an...

Author: Craig McMurtry Date: 11/05/2004

Why most of what I read about service-oriented architecture annoys me - Part 2

The term, service-oriented architecture refers to somehow incorporating services into the design of...

Author: Craig McMurtry Date: 07/29/2004

Why most of what I read about service-oriented architecture annoys me - Part 1

All anyone's supposed to be thinking about in IT at the moment is how to adopt a service-oriented...

Author: Craig McMurtry Date: 07/29/2004

Application Security Series, Conclusion

Let me summarize what I have proposed through this lengthy series of posts. We have discussed...

Author: Craig McMurtry Date: 07/29/2004

Application Security, Part 31

Now that we have considered how to use Windows Server 2003 Authorization Manager to authorize...

Author: Craig McMurtry Date: 07/29/2004

Application Security, Part 30

Note that the way we want to use the Authorization Manager API's differs somewhat from the PAG...

Author: Craig McMurtry Date: 07/29/2004

Application Security, Part 29

It's high time I finished this series . . . Okay, so obviously the idea with the Authorization...

Author: Craig McMurtry Date: 07/29/2004

Application Security, Part 28

Now, the Windows Server 2003 Authorization Manager exposes a COM API, which has the unfortunate...

Author: Craig McMurtry Date: 03/27/2004

Application Security, Part 27

So, let us follow these four steps to populate the authorization store for our application. We begin...

Author: Craig McMurtry Date: 03/27/2004

Application Security, Part 26

Once one has created an authorization store, one can proceed to use the Management Console snap-in...

Author: Craig McMurtry Date: 03/27/2004

Application Security, Part 25

So much for the user authentication requirements of application security; what about user...

Author: Craig McMurtry Date: 03/23/2004

Application Security, Part 24

Here is the code for the main form of our Smart Client that handles the event of the user changing...

Author: Craig McMurtry Date: 03/23/2004

Application Security, Part 23

Back in the code for the start-up of the primary form of the Smart Client, static void Main(string[]...

Author: Craig McMurtry Date: 03/23/2004

Notes on Compact Framework Development

I've been working on a Compact Framework application this week. My most-excellent colleague, Rockin'...

Author: Craig McMurtry Date: 03/17/2004

Application Security, Part 21

Alright: at this point we have the foundation of our user authentication strategy set up. Let see...

Author: Craig McMurtry Date: 03/16/2004

Application Security, Part 20

Everything is now in place for the users in the YourApplicationUsers group within Active Directory...

Author: Craig McMurtry Date: 03/16/2004

Application Security, Part 19

Remember, however, that we don’t want all of the users in Active Directory provisioned in...

Author: Craig McMurtry Date: 03/12/2004

Application Security, Part 18

Now, our MIIS management agents can be configured to do either imports or exports when they execute....

Author: Craig McMurtry Date: 03/12/2004

Application Security, Part 17

Let’s start with the basic problem of how to provision users in ADAM that exist in Active...

Author: Craig McMurtry Date: 03/10/2004

Application Security, Part 16

At this point, let’s return to our scenario. Remember that our client organization has Active...

Author: Craig McMurtry Date: 03/09/2004

Thanks to Ted Neward for kind words about the Application Security Series

Terrific Ted Neward was kind enough to post a link to my ongoing Application Security series on the...

Author: Craig McMurtry Date: 03/08/2004

Application Security, Part 15

Okay: so now that we have our ADAM directory service configured for TaskVision II, thereby...

Author: Craig McMurtry Date: 03/08/2004

Application Security, Part 14

I would like to mention to you that a tool that I find invaluable for working with both Active...

Author: Craig McMurtry Date: 03/04/2004

Application Security, Part 12

So, that is the theory of how ADAM, MIIS, and Authorization Manager can facilitate application...

Author: Craig McMurtry Date: 03/04/2004

Response to Darrell's question about ADAM and AD

Darrell wrote: If the organization you are developing for does have a directory service, but you...

Author: Craig McMurtry Date: 03/04/2004

Application Security, Part 9

COM+ provided an infrastructure for role-based security. With role-based security, users are grouped...

Author: Craig McMurtry Date: 03/04/2004

Application Security, Part 11

So, what we would really like to be able to do in administering permissions for an application is...

Author: Craig McMurtry Date: 03/04/2004

Application Security, Part 7

Now, we said that application security was about authentication—controlling who accessed your...

Author: Craig McMurtry Date: 03/04/2004

<Previous Next>