View All RSS Feed

Last Updated on 6 Oct. 2015, Total: 1337 Blog Posts

732 George Chetcuti’s Blog
605 Windows Networking Admin Blog
  1. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  2. Productivity Future Prediction by Microsoft

    A very reasonably view of the future technology is presented by Microsoft's Office Labs where the overall concept integrates information flow, gadgets and everyday surrounding objects seamlessly together. Glass walls turn into huge displays and tables into tablets! Plausible sci-fi as some of the technology shown in these videos already exists; some has reached the level of prototypes while, some... Read More

  3. Q&A With Sanbolic CEO Momchil "Memo" Michailov

    Momchil V. Michailov, CEO of Sanbolic discusses next-generation storage technologies in view of the new virtualized enterprises... Read More

  4. Q&A with Unitrends CEO

    Unitrends CEO Uses Army Intelligence to Win the Backup War - In this brief Q&A, we will see how Mike Coney, Unitrends’ CEO used his vast experience with the U.S. Army Intelligence Agency and the industry to turn Unitrends from a lackluster vendor of backup and recovery solutions to one of the fastest growing companies in the market... Read More

  5. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  6. QLogic Unveils Expanded HPC Networking Portfolio at SC07

    RENO, Nev. (SC07), November 12, 2007 – QLogic Corp. (NASDAQ:QLGC), a leader in networking for storage and high performance computing (HPC), today unveiled an expanded portfolio of products, services, qualifications and an ecosystem program for HPC networking. HPC clusters have rapidly grown to comprise more than 60 percent of servers deployed in HPC environments and IDC is forecasting a compound... Read More

  7. Quick resource utilization check on Windows 2008 Servers

    There are a number of tools which give you details about resource utilization on Windows based machines. Detailed reports are best used when digging further down into an existing problem or analyzing a complex problem that requires a lot of details but an ad hoc quick performance check would suffice with few details. Actually, routine quick checks would benefit most... Read More

  8. R-Studio v.3.6 Build 123523

    R-Studio reached version 3.6 Build 123523 R-Studio is a family of powerful and cost-effective undelete and data recovery software. Empowered by the new unique data recovery technologies, it is the most comprehensive data recovery solution for recovery files from FAT12/16/32, NTFS, NTFS5 (created or updated by Windows 2000/XP/2003/Vista), Ext2FS/Ext3FS (LINUX file systems) and UFS1/UFS2 (FreeBSD/OpenBSD/NetBSD file systems) partitions. It functions... Read More

  9. RAID Announces General Availability for Tiered Storage System Magellan to support SAS/FC host and SAS/SATA Disks to Address Data Center Flexibility

    Methuen, MA - RAID today announced that it has released its Magellan 60-tiered disk solution which will begin to ship in volume on February 1st, 2007. RAID Inc.'s storage solutions are used in a variety of mission critical applications. "We have a solid reputation of providing our customers with best-in-class and fully integrated storage solutions that are purposely built for... Read More

  10. RARLabs Unrar Password Prompt Buffer Overflow Vulnerability

    Advisory from iDefense Labs: RARLabs Unrar Password Prompt Buffer Overflow Vulnerability I. BACKGROUND Unrar is a command line archive extractor for Windows and Linux. For more information visit the vendor's site at the URL shown below. II. DESCRIPTION Remote exploitation of a stack based buffer overflow vulnerability in RARLabs Unrar may allow an attacker to execute arbitrary code... Read More

Featured Links