Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
On July 12th 2011, Citrix announced that it has completed the acquisition of Cloud.com. Cloud.com is a major vendor in software platforms for Cloud computing and their main solution, CloudStack is known to be a simple and a very cost-effective 'open by design' solution. Citrix Systems is a major provider of virtual computing with a large spectrum of products -... Read More
CA Technologies and Microsoft join forces to offer Cloud backup services. CA Technologies well known for their enterprise backup solution ARCserve will piggyback onto Microsoft's Azure services to compete with its rivals CommVault, Symantec and others. On the other hand, Microsoft would benefit from a wider portfolio of cloud services which gives them a competitive advantage as a complete cloud... Read More
Graphical user interfaces are great, but nothing beats the expressiveness of the command line!... Read More
Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified... Read More
Amazon is working with the German University – Freie Universitat on the Plat_Forms contest of this year which will focus on cloud computing and scalability. The German contest has been going on a yearly basis since 2007, and it is based on a set of given requirements rather than allowing programmers to participate with all kinds of applications! But they... Read More
According to Peter G. Neumann, an 80-year-old computer scientist at SRI International, the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure. Peter's intuition is that complexity has become something that people don't want to hear about and the inclination is now... Read More
A post by Terry Zink on MSDN blogs outlines how Android devices are being used to send spam. According to Terry, the spammers has control of a botnet that lives on Android devices and which is capable of logging to the user's Yahoo Mail account and send spam. Read the full blog post here - http://blogs.msdn.com/b/tzink/archive/2012/07/03/spam-from-an-android-botnet.aspx... Read More