George Chetcuti’s Blog

Last Updated on 30 Oct. 2014, Total: 565 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
183 News 30 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. ReactOS!

    A potential competitor to Microsoft Windows Desktop Operating Systems may be round the corner! ReactOS a new Operating System similar to Windows is just waiting for funding before it can be finalized. A venture which took off some years ago by Russian students is said to be compatible with all Windows-based applications, programs and services. According to the young Russian... Read More

  2. Windows Server 2008 DNS deployments

    DNS implementations in Windows Server 2008 environments can have four types of deployments. The most productive is the dynamic DNS server which is integrated with every DC in the network. Read-write DCs will also contain read-write DNS servers. In remote sites where a DC may be present for availability purposes, read-only DCs will also include read-only DNS servers. External networks... Read More

  3. DDoS Protection as a Service

    Imperva, a leader in data security solutions is offering an amazing cloud-based solution that helps organizations mitigate Distributed Denial of Service (DDoS) attacks. Imperva can guarantee protection against DDoS attacks that are capable of consuming up to 4Gbps of bandwidth (burstable) even though most attacks are in the range of 10Mbps to 200Mbps. The cloud service can scale automatically to... Read More

  4. Cool Data Center Designs

    Is Facebook aiming at something bigger with its new data center? Rather than commissioning the buildup of its data center, Facebook went for a complete new model, which they call the Open Compute Project. The technology behind Facebook's green data center is developed together with major hardware vendors such as HP, Dell, AMD and Intel which shows that Facebook has... Read More

  5. Lenovo’s UltraBook

    Lenovo are really doing a good job! Lenovo claims that its new Ultrabook, the IdeaPad U300S is the slimmest laptop on the market. It appears that Apple's state of the art hardware is being challenged in terms of portability by this new model from Lenovo. Click here to read more. Check out the specs here... Read More

  6. Career Development

    For those IT Professionals who would like to plan their future career based on a job role rather than technology or platform, I suggest Microsoft's Professional Career Chart. The chart is structured around the different roles we find in IT operations, management and software development based on Microsoft technologies. For example, an application developer can match his current job description,... Read More

  7. HP to discontinue its TouchPad and webOS Phones

    HP has announced that it will discontinue operations for webOS devices (TouchPad and webOS phones) at the end of fiscal year 2011. Although, the platform may have been technically solid, it did not reach the expected financial targets. However, HP will continue to explore alternate options for the webOS software as a separate product. The other hot news from HP... Read More

  8. NAP Logging

    During any NAP (Network Access Protection) deployment, it is important to have a record of events in particular during the initial stages. During initial stages you will be gathering information about computers and their compliancy levels. Through the NAP logs you identify which computers are non-compliant and can take the necessary actions before going for NAP enforcement. Additionally, you would... Read More

  9. The Windows Server 2008 scwcmd command

    The scwcmd command-line tool provides greater functionality than the GUI-based Security Configuration wizard. The tool allows you to remotely apply role-based security policy to groups of computers, analyze the configuration of groups of computers against the role-based security policy and build GPOs that apply the settings in the role-based security policy. Security policy allows you to enforce a baseline security... Read More

  10. SmartStyle Private Cloud

    SmartStyle Computing by Zenith Infotech Ltd is a private cloud solution targeting ITaaS (IT as a Service) VARs and IT service providers. The solution is based around cloud servers, advanced storage and virtualized technology. VARs can combine an array of resources to form a resilient setup which can be marketed as business continuity solution. Zenith Infotech provides additional add-ons on... Read More

Featured Links