George Chetcuti’s Blog

Last Updated on 26 Sept. 2014, Total: 552 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
174 News 23 Sept. 2014
94 Products 28 Aug. 2014
43 Security 26 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. The First Trillion Objects stored in Amazon S3

    Late last week the number of objects stored in Amazon S3 reached one trillion (1,000,000,000,000 or 1012). That's 142 objects for every person on Planet Earth or 3.3 objects for every star in our Galaxy. If you could count one object per second it would take you 31,710 years to count them all. Read more here - http://aws.typepad.com/aws/2012/06/amazon-s3-the-first-trillion-objects.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+AmazonWebServicesBlog+%28Amazon+Web+Services+Blog%29... Read More

  2. The Repadmin tool

    The Replication diagnostics tool is a command-line tool that enables you to report the status of replication on each domain controller. The tool is built into Windows Servers 2008 and Windows Servers 2008 R2 and the information retrieved by Repadmin.exe can help you identify potential problems related to replication within a forest. The detailed views allow you to even identify... Read More

  3. The Wbadmin Command

    Windows Server 2008 has inbuilt functionality to perform reliable and effective data backups! The native tools can back up an entire volume to a .vhd file on a second local disk while you can still restore individual files from the vhd file! In cases of system volume failures where Windows does not start you can boot from the Windows installation... Read More

  4. The Windows Server 2008 scwcmd command

    The scwcmd command-line tool provides greater functionality than the GUI-based Security Configuration wizard. The tool allows you to remotely apply role-based security policy to groups of computers, analyze the configuration of groups of computers against the role-based security policy and build GPOs that apply the settings in the role-based security policy. Security policy allows you to enforce a baseline security... Read More

  5. The desktop is not dead!

    According to a senior analyst at IDC, the main reason behind the laptop success sales figures is price. They are leading the market because they are simply much cheaper than they used to be, and the price gap has gone. However, the desktop remains the first choice for resource hungry applications, durability, scalability and security where thieves are less attracted... Read More

  6. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

  7. The first European Cyber Security Month – October 2012

    The Czech Republic, Luxembourg, Norway, Romania, Slovenia, Spain, Portugal, and the United Kingdom are participating with various activities and events throughout October, to raise awareness of cyber security. The objectives of the European Cyber Security Month (ECSM) are to promote cyber security awareness among citizens, to modify their perception of cyber threats, and to provide updated security information through education,... Read More

  8. The importance of log management

    According to recent investigations by Verizon companies are not aware of how precious and important systems logs are! Companies either do not maintain logs or simply ignore them but logs are needed to identify unusual system behavior and track events! Alan Brill, Senior Managing Director at Kroll has published an interesting article on net-security.org that discusses the importance and value... Read More

  9. The new HP Slate 2 Tablet PC

    After withdrawing its TouchPad, HP goes for a new Slate 2 Tablet PC with expanded touch capabilities, enhanced multitasking performance and embedded security, providing added flexibility to mobile business users. An 8.9 inch multi-touch display for touch and pen input, powered by an Intel Atom Z670 processor and mSATA SSM technology with improved boot times and a battery life up... Read More

  10. The world’s fastest single GPU graphics card

    The semiconductor giant Advanced Micro Devices (AMD) has launched the world's fastest single-GPU Graphics card, featuring exceptional performance improvement and enables new levels of gaming and compute capabilities. The AMD Radeon HD 7970's processor is the only GPU based on 28nm production technology. AMD's Eyefinity technology together with AMD's App Acceleration, PCI Express 3 support, better power management, and AMD's... Read More

Featured Links