George Chetcuti’s Blog

Last Updated on 22 July 2014, Total: 524 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
20 Monitoring 19 May 2014
160 News 22 July 2014
92 Products 17 July 2014
33 Security 21 July 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Is your Helpdesk Solution Social Media Friendly?

    Organizations that provide online support services to their customers, and have so far relied on the traditional helpdesk systems need to go back to the drawing board and redesign their customer support process to include social media functionality. Customers spend long hours on social media and having the ability to interact with your support reps using twitter or Facebook will... Read More

  2. Intellectual Property Watchlist 2012

    Consumers International, an independent global campaigning voice for consumers has published its fourth annual IP Watchlist. CI looks towards a future in which creators and consumers support each other in a mutually beneficial ecosystem of content production, consumption and reuse. The report also states that the recent discontent caused by ACTA and SOPA could have been avoided if government policy-makers... Read More

  3. Conquest of Africa - Googlica

    Google has set its feet in Africa, and takes all the credit for the latest developments in Internet infrastructure, ecommerce and other online activity. Internet speeds have gone up and prices down! More Africans are participating in various online initiatives and the entire ecosystem seems to be growing very fast. Read the full story here - http://www.channelstv.com/home/2012/05/15/google-in-africa-its-a-hit/... Read More

  4. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  5. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  6. UK ISPs to block The Pirate Bay!

    "Sites like The Pirate Bay destroy jobs in the UK and undermine investment in new British artists," the British Phonographic Industry (BPI) said. According to U.K.'s High Court, Pirate Bay must be blocked by UK ISPs. However, the court order will neither influence the artists' pockets nor prevent users from accessing the site if they use proxy servers and other... Read More

  7. Amazon EC2 now supports Microsoft SQL Server 2012

    Amazon AWS Cloud now supports the launch of Microsoft SQL Server on m1.small (1 ECU, 1.7 GB RAM) and m1.medium (2 ECU, 3.75 GB RAM) instance types. Amazon is introducing support for Microsoft SQL Server Web Edition, which brings together affordability, scalability, and manageability in a single offering. SQL Server Web will be supported across all Amazon EC2 instance types,... Read More

  8. Try Windows Intune for free!

    Try Microsoft cloud services with Windows Intune. Windows Intune helps you manage and secure personal computers and with the 30-day free trial you can use up to 25 computers. Windows Intune includes both the cloud service for PC management and security and upgrade rights to Windows 7 Enterprise and future versions of Windows. You can remotely perform a number of... Read More

  9. Why Can My Devices Be Searched at the Border?

    The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More

  10. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

Featured Links