George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Computerized voices!

    If you're in the study of voice-activated features or curious why people generally find women voices more pleasing than men's then I suggest you read this article at cnn.com. Research on computerized voices suggests that female preference starts as early as the womb and the practice goes back to World War II, when women voices were employed in airplane cockpits... Read More

  2. Configuring Disk Quotas using Windows Explorer

    With Windows Explorer you can manage disk quotas in Windows Servers 2008 without the need of invoking the Quota management console, although the console remains the recommended tool. To configure disk quotas on a computer using Windows Explorer follow these steps: Open Windows Explorer and right click the disk you want to configure quotas for and select Properties. From the... Read More

  3. Conquest of Africa - Googlica

    Google has set its feet in Africa, and takes all the credit for the latest developments in Internet infrastructure, ecommerce and other online activity. Internet speeds have gone up and prices down! More Africans are participating in various online initiatives and the entire ecosystem seems to be growing very fast. Read the full story here - http://www.channelstv.com/home/2012/05/15/google-in-africa-its-a-hit/... Read More

  4. Consumers Lose Faith in Passwords

    TeleSign consumer account security report is an international study of digital security concerns and practices... Read More

  5. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  6. Contactless Fingerprint Reader Research

    National Institute of Standards and Technology (NIST) is working with industry to bring fast, touchless fingerprint readers out of the lab and into the marketplace... Read More

  7. Control your online privacy

    A browser extension for Google Chrome can help you fix your Facebook and Google privacy settings... Read More

  8. ControlPoint 7.0 Software Secures SharePoint Content with Proactive Mitigation to Reduce the Risk of Data Breaches in the Cloud and On-Premises

    Metalogix ControlPoint 7.0 and Sensitive Content Manager Provide Real-Time Situational Awareness to Identify and Lock Down Suspicious User Activity and Unauthorized Access of SharePoint Content... Read More

  9. Convert VMware VMs to Hyper-V VMs with NEW Complimentary 5nine V2V Easy Converter v2.0

    5nine Software, the Windows Server/Hyper-V Management and agentless Security Software provider, has released a NEW, Free 5nine V2V Easy Converter v2.0 with Hyper-V Server 2012 R2 Support... Read More

  10. Cool Data Center Designs

    Is Facebook aiming at something bigger with its new data center? Rather than commissioning the buildup of its data center, Facebook went for a complete new model, which they call the Open Compute Project. The technology behind Facebook's green data center is developed together with major hardware vendors such as HP, Dell, AMD and Intel which shows that Facebook has... Read More

Featured Links