George Chetcuti’s Blog

Last Updated on 13 Aug. 2014, Total: 532 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
21 Monitoring 13 Aug. 2014
165 News 11 Aug. 2014
93 Products 29 July 2014
34 Security 25 July 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Research IT as a Service

    I would like to share with you a couple of points taken from Ian Foster's presentation about the future of research computing and the current trend of moving the administrative load to the cloud. While, the big science projects are the ones that most often get the required funds and resources, the small to medium projects on the other hand... Read More

  2. Faster Storage Systems from IBM

    The XIV is a proven series of high-end storage systems by IBM. The IBM XIV Gen3 is the latest addition to this series that integrates seamlessly with virtualization, databases, email, analytics and data protection solutions from Microsoft, SAP, VMware, Oracle and others. The XIV series are well known for their solid architecture that can allocate resources effectively and maintain availability... Read More

  3. Zoho’s mobile apps

    Zoho's Customer Relationship Management solution now supports mobile devices. iPhone users can now follow sales leads, follow up ongoing deals and access accounts and other info while they are travelling even in offline mode! To read more about Zoho's CRM Mobile Edition for iPhone go here. For the Android users Zoho has released a mobile application that can create invoices... Read More

  4. Installing the DNS role on a Server Core installation

    You can install a DNS server on a Server Core installation of Windows Server 2008 using the command line to perform the installation part and a remote connection to configure and manage DNS services. This option may become handy when your environment requires a separate DNS service and the use of a dedicated Virtual Machine (VM) is not justified. Also,... Read More

  5. Windows Servers Hardening

    A highly recommended best practice in securing Windows Servers is to stop unnecessary services and disable unused functionality. A brief checklist containing high level definitions of tasks to be performed would help administrators reduce the attack surface of their servers. A typical checklist would include: Stopping and disabling all unnecessary services and applications Renaming the Administrator account Creating a new... Read More

  6. Windows Live Family Safety 2011

    How many caring parents would like to have the appropriate tools to manage their kids' online activities! With MS Windows Live Family Safety 2011, parents can manage which websites their children are allowed to visit, which programs they can run and for how long they can use the computer. The product records the children online activity and has some cool... Read More

  7. Windows Servers 2008 outbound traffic

    Managing outbound traffic has become very crucial in determining computer infections. Malware infects computers and then tries to send out stolen data to perpetrators. Viruses seek to replicate themselves by attempting to send packets to infect other computers. Users might use unapproved applications which may result in the transmission of confidential data. Therefore, it is appropriate to review your Windows... Read More

  8. Read-Only Domain Controllers

    The RODC (Read-Only Domain Controller) in AD DS environments is designed specifically for the branch office scenario. RODC receives authentication requests from branch office users and forwards them to a domain controller in the hub site for authentication. There are two types of configuration scenarios, one option is to allow caching of branch office users login credentials and the other... Read More

  9. Windows Patch Management Considerations

    There are certain times when organizations decide not to deploy a software update solution and use Windows native functionality – Microsoft Update, as their main solution. This may be the best approach when organizations have dispersed offices around the globe with a small number of standalone computers. It is simpler to enable automatic updates on these clients' computers rather than... Read More

  10. Citrix acquisition of Cloud.com

    On July 12th 2011, Citrix announced that it has completed the acquisition of Cloud.com. Cloud.com is a major vendor in software platforms for Cloud computing and their main solution, CloudStack is known to be a simple and a very cost-effective 'open by design' solution. Citrix Systems is a major provider of virtual computing with a large spectrum of products -... Read More

Featured Links