George Chetcuti’s Blog

Last Updated on 2 Sept. 2014, Total: 541 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
169 News 1 Sept. 2014
94 Products 28 Aug. 2014
37 Security 2 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. September Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  2. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

  3. Setting up an Event Collecting Computer

    Having set up all remote hosts that you will be retrieving Events from, it is time to configure the Collecting workstation. The collecting computer would normally be an admin computer running Windows Vista, Windows 7 or Windows Server 2008. Assuming our collecting computer is named env1client01 then, from an elevated command prompt type: wecutil qc This command will set Windows... Read More

  4. Setting up an Event Forwarding Computer

    Windows Event forwarding requires the setup of forwarding computers and a collecting computer as we have seen in Managing Windows Events. In this post we start by setting up a typical forwarding computer and proceed to the collecting computer setup in another post. Let's assume that we are collecting events from a Windows 2008 server named Win2k8Web, hence our first... Read More

  5. Sharing Responsibilities in Cloud Environments

    Cloud Computing elements such as, guest operating systems, physical platforms and others are easily associated with one party (provider or customer) being responsible for both management and security but what about responsibilities when elements overlap boundaries between the provider and the customer? Cloud Computing has brought about new challenges and most importantly, a distributed control environment. Although, some argue that... Read More

  6. Simple script to email users when Quotas are met

    PSotD: Emailing Users When Quota Warning Met... Read More

  7. Skype is reading everything you write

    According to the German security firm Heise Security, Microsoft monitors users’ instant messages and SMSs on Skype... Read More

  8. SmartStyle Private Cloud

    SmartStyle Computing by Zenith Infotech Ltd is a private cloud solution targeting ITaaS (IT as a Service) VARs and IT service providers. The solution is based around cloud servers, advanced storage and virtualized technology. VARs can combine an array of resources to form a resilient setup which can be marketed as business continuity solution. Zenith Infotech provides additional add-ons on... Read More

  9. Software Asset Management

    Keeping an inventory of all software licenses is not just an exercise that helps organizations controlling software costs and adjusting future purchases, but it is a necessity for compliance requirements. A business may fail a software license audit and is asked to pay hefty sums, let alone the potential embarrassment if the news goes public! It is a good business... Read More

  10. Software Defined Networking

    The key characteristic of Software Defined Networking is the separation of the virtual network from the physical network, through a layer of software that hides the physical topology from the applications... Read More

Featured Links