Slices & Articles Get by the slice or add to your own ebook
|Ace Academics||Ace Academics||ePub|
|Desmond, Brian||O'Reilly Media||ePub|
One of the most significant Active Directory features introduced in Windows Server 2008 was the Read-Only Domain Controller (RODC). Deploying domain controllers into untrusted locations has always been a substantial security risk for Active Directory deployments. The risk of a domain controller becoming physically compromised and having password hashes for that domain stolen or the risk of a database (ntds.dit) being modified offline and placed back on the network are both important risks to measure. The RODC brings the ability to mitigate both of these risks.
By default, RODCs do not store any passwords locally in their database. If a user authenticates to an RODC, the RODC will need to contact a writeable domain controller (sometimes called an RWDC) upstream in order to validate that users password. This, of course, also applies to other objects with passwords, such as computer and trust accounts. Through the use of Password Replication Policies, you can define what passwords are allowed to be cached locally on an RODC. You can also examine a real-time view of what passwords are currently cached on an RODC.See All
|James Elliott||O'Reilly Media|
Applying Criteria to Associations
So far we’ve been looking at the properties of a single class in forming our criteria. Of course, in our real systems, we’ve got a rich set of associations between objects, and sometimes the details we want to use to filter our results come from these associations. Fortunately, the criteria query API provides a straightforward way of performing such searches.
How do I do that?
Let’s suppose we’re interested in finding all the tracks associated with particular artists. We’d want our criteria to look at the values contained in each Track’s artists property, which is a collection of associations to
Artist objects. Just to make it a bit more fun, let’s say we want to be able to find tracks associated with artists whose name property matches a particular SQL string pattern.
Let’s add a new method to QueryTest.java to implement this. Add the method shown in Example 8-13 after the end of the tracksNoLongerThan() method.
Example 8-13. Filtering tracks based on their artist associationsSee All
|Low Sui Pheng||Chartridge Books Oxford||ePub|
Managing change under ISO 9000
An effective quality management system is one which adopts customer-oriented strategies and has an organisational form which can respond efficiently to customer preference. It should also encourage innovations - new technologies, new markets, new customer applications of existing products, new products, new organisational forms, new requirements for entrepreneurial activities - and be flexible enough to meet social and economic changes in the environment. The improvement of existing quality management systems through flexibility and innovation will increase product and service quality. This will in turn enhance and advance the organisation’s business objective.
The “segmentalist” and “integrative” concepts are examined in this chapter using detailed case studies of two construction firms. These should be removed from or implemented into the organisation where necessary. Organisations must adopt the “integrative” approach which looks ahead to the challenges of the future rather than the “segmentalist” approach which is contented with past accomplishments. A corporate renaissance must be created within the organisation to take on these challenges and implement change and innovation. It is therefore necessary to develop the humanistic factors and a “participatory management” environment. However, in so doing, the technical aspects are also of importance and should not be totally ignored. These are collectively the key elements to maintaining a quality management system effectively.See All
Business & Economics