Craig McMurtry's WebLog
World's Coolest Tchotchkes?
Here's a shout-out to my parents for introducing me to what appears to be the world's coolest line...
Author: Craig McMurtry Date: 01/03/2005
64-Bit Windows Part 11: Windows On Windows 64
We saw that both Itanium and x64 processors have a way of making their differences from 32-bit x86...
Author: Craig McMurtry Date: 12/14/2004
64-Bit Windows: The Alienware has landed
The Alienware Athlon 64 FX-55 was delivered last week. It's in an enormous black box that stands...
Author: Craig McMurtry Date: 11/26/2004
Response to John Cavnar-Johnson's comment on my objection to classifying message-queue based systems as being service-oriented
You can read Mr. Cavnar-Johnson's comment here:...
Author: Craig McMurtry Date: 11/15/2004
64-bit Windows - Part 10
A comment from Christopher reminded me to mention this: today, the 64-bit version of Windows are not...
Author: Craig McMurtry Date: 11/07/2004
64-bit Windows Part 9: Microsoft Operating Systems
Concerning operating systems, it is crucial to remember that Itaniums can only run operating systems...
Author: Craig McMurtry Date: 11/05/2004
64-Bit Windows Part 8: What is Microsoft doing about 64-bit personal computers
At this point, we have established that the 64-bit PC computing world is really very different from...
Author: Craig McMurtry Date: 11/05/2004
64-Bit Windows Part 7: Taking it Personally - Michael Dell, are you reading this?
Folks who read my posts, and I am always very surprised to find that there are some, will know that...
Author: Craig McMurtry Date: 11/05/2004
64-Bit Windows Part 6: The Hardware Landscape
What does the 64-bit hardware landscape look like today, 18 months after AMD introduced the first...
Author: Craig McMurtry Date: 11/05/2004
64-bit Windows Part 5: A Summary Comparison of the Two Species of 64-bit Processors
So, we find that the Itanium processor and the x64 Opteron processor are very different. They both...
Author: Craig McMurtry Date: 11/05/2004
64-bit Windows Part 4: The x64 Standard
The first x64 processor was the AMD Opteron. The Opteron x64 processor has at least three very...
Author: Craig McMurtry Date: 11/05/2004
64-bit Windows Part 3: The Itanium Processor
There are two quite different species of 64-bit PC: the Itanium and the x64. The Itanium species...
Author: Craig McMurtry Date: 11/05/2004
64-bit Windows Part 2
What is a 64-bit processor, exactly? Well, when an instruction is sent to a processor, it will often...
Author: Craig McMurtry Date: 11/05/2004
64-Bit Windows Part 1
64-bit computing is here today. Quite literally: this is a 64-bit laptop, running a 64-bit operating...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 9
And, finally, here is what really, really, really, really annoys me in what I hear presumable gurus...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 8
The conclusion to draw from these considerations is that in a service-oriented system we are focused...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 7
Users of the contract document management application, branch administrators, will have a sheaf of...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 6
Let’s turn our attention back to the employee, branch, and document data that we will be storing in...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 5
Having undertaken this analysis at least one cogent insight jumps right out. It is that user data...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 4
Now let us subject these requirements to a service-oriented analysis. You will recall that when we...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 3
If we apply the approach that I described in my last post (too long ago) to the requirements of an...
Author: Craig McMurtry Date: 11/05/2004
Why most of what I read about service-oriented architecture annoys me - Part 2
The term, service-oriented architecture refers to somehow incorporating services into the design of...
Author: Craig McMurtry Date: 07/29/2004
Why most of what I read about service-oriented architecture annoys me - Part 1
All anyone's supposed to be thinking about in IT at the moment is how to adopt a service-oriented...
Author: Craig McMurtry Date: 07/29/2004
Application Security Series, Conclusion
Let me summarize what I have proposed through this lengthy series of posts. We have discussed...
Author: Craig McMurtry Date: 07/29/2004
Application Security, Part 31
Now that we have considered how to use Windows Server 2003 Authorization Manager to authorize...
Author: Craig McMurtry Date: 07/29/2004
Application Security, Part 30
Note that the way we want to use the Authorization Manager API's differs somewhat from the PAG...
Author: Craig McMurtry Date: 07/29/2004
Application Security, Part 29
It's high time I finished this series . . . Okay, so obviously the idea with the Authorization...
Author: Craig McMurtry Date: 07/29/2004
Application Security, Part 28
Now, the Windows Server 2003 Authorization Manager exposes a COM API, which has the unfortunate...
Author: Craig McMurtry Date: 03/27/2004
Application Security, Part 27
So, let us follow these four steps to populate the authorization store for our application. We begin...
Author: Craig McMurtry Date: 03/27/2004
Application Security, Part 26
Once one has created an authorization store, one can proceed to use the Management Console snap-in...
Author: Craig McMurtry Date: 03/27/2004
Application Security, Part 25
So much for the user authentication requirements of application security; what about user...
Author: Craig McMurtry Date: 03/23/2004
Application Security, Part 24
Here is the code for the main form of our Smart Client that handles the event of the user changing...
Author: Craig McMurtry Date: 03/23/2004
Application Security, Part 23
Back in the code for the start-up of the primary form of the Smart Client, static void Main(string[]...
Author: Craig McMurtry Date: 03/23/2004
Notes on Compact Framework Development
I've been working on a Compact Framework application this week. My most-excellent colleague, Rockin'...
Author: Craig McMurtry Date: 03/17/2004
Application Security, Part 21
Alright: at this point we have the foundation of our user authentication strategy set up. Let see...
Author: Craig McMurtry Date: 03/16/2004
Application Security, Part 20
Everything is now in place for the users in the YourApplicationUsers group within Active Directory...
Author: Craig McMurtry Date: 03/16/2004
Application Security, Part 19
Remember, however, that we don’t want all of the users in Active Directory provisioned in...
Author: Craig McMurtry Date: 03/12/2004
Application Security, Part 18
Now, our MIIS management agents can be configured to do either imports or exports when they execute....
Author: Craig McMurtry Date: 03/12/2004
Application Security, Part 17
Let’s start with the basic problem of how to provision users in ADAM that exist in Active...
Author: Craig McMurtry Date: 03/10/2004
Application Security, Part 16
At this point, let’s return to our scenario. Remember that our client organization has Active...
Author: Craig McMurtry Date: 03/09/2004
Thanks to Ted Neward for kind words about the Application Security Series
Terrific Ted Neward was kind enough to post a link to my ongoing Application Security series on the...
Author: Craig McMurtry Date: 03/08/2004
Application Security, Part 15
Okay: so now that we have our ADAM directory service configured for TaskVision II, thereby...
Author: Craig McMurtry Date: 03/08/2004
Application Security, Part 14
I would like to mention to you that a tool that I find invaluable for working with both Active...
Author: Craig McMurtry Date: 03/04/2004
Application Security, Part 12
So, that is the theory of how ADAM, MIIS, and Authorization Manager can facilitate application...
Author: Craig McMurtry Date: 03/04/2004
Response to Darrell's question about ADAM and AD
Darrell wrote: If the organization you are developing for does have a directory service, but you...
Author: Craig McMurtry Date: 03/04/2004
Application Security, Part 9
COM+ provided an infrastructure for role-based security. With role-based security, users are grouped...
Author: Craig McMurtry Date: 03/04/2004
Application Security, Part 11
So, what we would really like to be able to do in administering permissions for an application is...
Author: Craig McMurtry Date: 03/04/2004
Application Security, Part 7
Now, we said that application security was about authentication—controlling who accessed your...
Author: Craig McMurtry Date: 03/04/2004