Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
There's more to Data Backups than a software solution! Although, some major solutions are so well designed that you can form procedures around them! However, Data Backup Policies and some specific procedures still need to be created for your environment and aligned with other processes. Then, you can use the backup solution according to the set policies and procedures. To... Read More
Most Systems Administrators have used Performance Monitor to view real-time performance data on Windows servers and identify bottlenecks. Some may have also recorded sessions and later analyzed log files for performance issues. In fact, this is what I will be talking about in the couple of posts to come, mainly about Data Collector Sets. Data Collector sets gather system information,... Read More
Join Michael Osterman of Osterman Research and Dominic Brown of HP Autonomy on October 8, 2013 at 2:00pm EDT / 11:00am PDT as they discuss information governance in an era of increasingly diverse data types. This Webinar will be recorded and the recording shared with all registrants... Read More
Security experts at Dell SecureWorks has been on the go discovering number of APTs (Advanced Persistent Threats) threatening various sectors such as, energy and military. This is the second cyber espionage activity that Dell's CTU (Counter Threat Unit) has discovered this year. Dell's experts have found that Mirage (latest APT) has C&C (command & control) servers IP addresses originating from... Read More