George Chetcuti’s Blog

Last Updated on 20 Oct. 2014, Total: 562 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
23 Monitoring 16 Oct. 2014
181 News 20 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Alert Logic key findings about the state of Cloud Security

    The cloud is not inherently less safe. Among the six security incident categories examined, Web application attack was the only threat category more prevalent in cloud hosting provider environments than in enterprise environments... Read More

  2. Beginning of the end of Windows Live Messenger

    Microsoft thanks all Messenger customers and invites them to upgrade to Skype!... Read More

  3. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  4. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  5. April's Newsletters Teaser

    Salient points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowsSecurity.com monthly newsletters... Read More

  6. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

  7. Why Cloud Computing

    Learn the benefits of cloud computing and Amazon Web Services (AWS) from Amazon Sr. Vice President Andy Jassy in this video:... Read More

  8. CIA to build a "private cloud" using Amazon Web Services

    Although, the cloud computing giant Amazon is normally associated with public cloud provision, it does offer services related to private clouds such as, virtual private clouds and services that extend an organization’s on-premise private clouds... Read More

  9. MS 2012 Law Enforcement Requests Report

    How many times did Microsoft disclose the content of customer communications or data storage to law enforcement? Microsoft received requests from more foreign governments, and received them in greater volume, than other companies. Why?... Read More

  10. MSExchange.org Webinar: The Hidden Costs of Email Management

    Join J. Peter Bruzzese, Microsoft Certified Trainer and CIO and CoFounder of ClipTraining on Wednesday, March 27, 2013 for a live MSExchange.org webinar, sponsored by Kroll Ontrack. In this complimentary 45 minute Webinar, you will discover:... Read More

Featured Links