George Chetcuti’s Blog

Last Updated on 11 Feb. 2016, Total: 765 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
295 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Unitrends and CloudCheckr Partner to Help MSPs Build, Manage and Grow their AWS-Hosted Businesses

    Unique tool set enables managed service providers to improve margins with cloud backup and recovery offerings, and a low-cost delivery model... Read More

  2. Spiceworks Network Monitor Adds Connectivity Checks for “Internet of Things” Devices

    New features help IT professionals monitor IT services, processes, ports, and any device with an IP address in real-time... Read More

  3. LepideAuditor 16.1now better than ever with File Server Auditing

    LepideAuditor Suite now features File Server Auditing, permission Comparison and a new search feature... Read More

  4. December Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. The City of Westminster Ensures Consistent Delivery of City Services, While Saving 180 Man-Hours a Year, with DH2i Container Management Software

    Growing Colorado City Turns to DxEnterprise Software to Achieve Greater Management Consistency and Efficiency Across Microsoft SQL Server Environment... Read More

  6. Jedi IT Security Code: 5 Tenets to Defend against Data Breaches

    Netwrix outlines common principles for IT pros to maintain data integrity and mitigate risks of cyber attacks... Read More

  7. Don’t Give the Cyber Criminal A Present This Christmas

    Post submitted by the Scottish Business Resilience Centre, SBRC was set up with the objective of creating a secure Scotland for business to flourish, encompassing everything from cyber security to all aspects of premises and employee safety... Read More

  8. Last chance to sign up for the webinar: How to Plan and Complete a Secure Office 365 Migration

    Live Webinar: December 10, 2015 @ 11am or 4pm EST | 8am PST or 1pm PST, US Time There are many pathways to an Office 365 migration, but completing the migration is only part of the solution. While Office 365 offers capabilities for Identity Management, it’s limited in protecting data once it leaves the platform... Read More

  9. DH2i Unveils New Sandbox Lab for the Rapid Proof of Concept (POC) Testing of Container Management Software for Microsoft Windows Applications

    New POC Lab Demonstrates How Enterprises Can Go from Standalone to High Availability (HA) Failover Clusters in Just a Few Minutes... Read More

  10. Patching: A Primer on Protecting an Organization’s Proprietary Information

    Guest post by Robert Brown, director of services Verismic Software... Read More

Featured Links