Blogs

View All RSS Feed

Last Updated on 24 July 2014, Total: 1129 Blog Posts

525 George Chetcuti’s Blog 24 July 2014
604 Windows Networking Admin Blog 6 June 2014
  1. The European Cloud Computing Strategy

    The European Commission aims at enabling and facilitating faster adoption of cloud computing throughout all sectors of the economy in order to boost the productivity, growth and jobs in Europe. The strategy includes three key actions which are Standards & Certification, Contract terms & Conditions, and European Cloud Partnership Read more here - http://ec.europa.eu/information_society/activities/cloudcomputing/cloud_strategy/index_en.htm... Read More

  2. The First Trillion Objects stored in Amazon S3

    Late last week the number of objects stored in Amazon S3 reached one trillion (1,000,000,000,000 or 1012). That's 142 objects for every person on Planet Earth or 3.3 objects for every star in our Galaxy. If you could count one object per second it would take you 31,710 years to count them all. Read more here - http://aws.typepad.com/aws/2012/06/amazon-s3-the-first-trillion-objects.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+AmazonWebServicesBlog+%28Amazon+Web+Services+Blog%29... Read More

  3. The HTC Advantage X7501

    HTC announced Advantage X7501, a monstrous PDA with huge number of features. Here are the highlights: Microsoft® Windows Mobile® 6 Standard with Direct Push Technology 624 MHz CPU Built-in 8GB hard drive with miniSD™ expansion slot Laptop-style experience with a huge 5-inch touch screen display and detachable QWERTY keyboard Always "on", connect to your office, watch videos or listen to... Read More

  4. The KEMP ESP - Edge Security Pack

    KEMP has built a large and loyal install base across a range of market segments, applications and geographies. These include a large number of customers who have deployed KEMP's LoadMaster load balancers in conjunction with Microsoft workloads. As a part of the solution for Exchange, Lync or SharePoint a key component has historically been Microsoft's Forefront Threat Management Gateway (TMG)... Read More

  5. The Motherboard with Powerful Graphical and CPU Options for SOHO or Power Users

    Taipei, Taiwan, February 12, 2007 - The ASUS P5NT WS is built on the NVIDIAC55+MCP55PXE chipset structure which supports a LGA775 Socket for running Intel Dual-core™/Quad-core™ CPUs and two NVIDIA SLI graphic cards with Dual x16 speeds on the same platform. This allows the user to enjoy the best CPU and graphics for the system build. With the addition of... Read More

  6. The Repadmin tool

    The Replication diagnostics tool is a command-line tool that enables you to report the status of replication on each domain controller. The tool is built into Windows Servers 2008 and Windows Servers 2008 R2 and the information retrieved by Repadmin.exe can help you identify potential problems related to replication within a forest. The detailed views allow you to even identify... Read More

  7. The Wbadmin Command

    Windows Server 2008 has inbuilt functionality to perform reliable and effective data backups! The native tools can back up an entire volume to a .vhd file on a second local disk while you can still restore individual files from the vhd file! In cases of system volume failures where Windows does not start you can boot from the Windows installation... Read More

  8. The Windows SDK RTMs!

    From Windows SDK blog : The Windows SDK team is proud to announce that the RTM release of the Microsoft Windows SDK for Windows Server 2008 and .NET Framework 3.5 is now live for customers to install! Availability: The Windows SDK is available to install as either an ISO, or Web Setup Platforms: This SDK release supports Windows Server 2008,... Read More

  9. The Windows Server 2008 scwcmd command

    The scwcmd command-line tool provides greater functionality than the GUI-based Security Configuration wizard. The tool allows you to remotely apply role-based security policy to groups of computers, analyze the configuration of groups of computers against the role-based security policy and build GPOs that apply the settings in the role-based security policy. Security policy allows you to enforce a baseline security... Read More

  10. The desktop is not dead!

    According to a senior analyst at IDC, the main reason behind the laptop success sales figures is price. They are leading the market because they are simply much cheaper than they used to be, and the price gap has gone. However, the desktop remains the first choice for resource hungry applications, durability, scalability and security where thieves are less attracted... Read More

Featured Links