George Chetcuti’s Blog

Last Updated on 12 Sept. 2014, Total: 546 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
173 News 12 Sept. 2014
94 Products 28 Aug. 2014
38 Security 5 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

  2. The first European Cyber Security Month – October 2012

    The Czech Republic, Luxembourg, Norway, Romania, Slovenia, Spain, Portugal, and the United Kingdom are participating with various activities and events throughout October, to raise awareness of cyber security. The objectives of the European Cyber Security Month (ECSM) are to promote cyber security awareness among citizens, to modify their perception of cyber threats, and to provide updated security information through education,... Read More

  3. The importance of log management

    According to recent investigations by Verizon companies are not aware of how precious and important systems logs are! Companies either do not maintain logs or simply ignore them but logs are needed to identify unusual system behavior and track events! Alan Brill, Senior Managing Director at Kroll has published an interesting article on net-security.org that discusses the importance and value... Read More

  4. The new HP Slate 2 Tablet PC

    After withdrawing its TouchPad, HP goes for a new Slate 2 Tablet PC with expanded touch capabilities, enhanced multitasking performance and embedded security, providing added flexibility to mobile business users. An 8.9 inch multi-touch display for touch and pen input, powered by an Intel Atom Z670 processor and mSATA SSM technology with improved boot times and a battery life up... Read More

  5. The world’s fastest single GPU graphics card

    The semiconductor giant Advanced Micro Devices (AMD) has launched the world's fastest single-GPU Graphics card, featuring exceptional performance improvement and enables new levels of gaming and compute capabilities. The AMD Radeon HD 7970's processor is the only GPU based on 28nm production technology. AMD's Eyefinity technology together with AMD's App Acceleration, PCI Express 3 support, better power management, and AMD's... Read More

  6. The world’s largest library

    ‘The Internet has often been called the world’s largest library with all the books on the floor’... Read More

  7. The ‘Masquerade’ Behind ACTA

    The appointed rapporteur for ACTA in the European Parliament resigns and explains the situation, Mr. Kader Arif says: "I want to denounce in the strongest possible manner the entire process that led to the signature of this agreement: no inclusion of civil society organizations, a lack of transparency from the start of the negotiations, repeated postponing of the signature of... Read More

  8. There is Too Much Cooling in Data Centers

    According to an assistant professor of computer science at the University of Toronto Scarborough, server environments can easily operate at warmer temperatures thus saving costs on air conditioning without endangering the health and performance of the hardware. Read more here – http://www.tomsitpro.com/articles/datacente-cooling-science_research-UTSC,1-549.html... Read More

  9. Threat Landscape report for 2013

    The European Union Agency for Network and Information Security (ENISA) has issued its annual Threat Landscape 2013 report... Read More

  10. Top-secret base revealed on Apple Maps

    'A top-secret base in Taiwan, revealed on Apple Maps. The Navy SEALs' rehearsal site for the Osama bin Laden raid, found on Bing. Once again, commercial satellites have snapped images of things that governments would rather hide from public view. And once again, those governments are finding that there's not much they can do once this sensitive imagery ends up... Read More

Featured Links