George Chetcuti’s Blog

Last Updated on 21 Nov. 2014, Total: 575 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
49 Security 14 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Knowledge, Networks and Nations

    In March of 2011 a high level conference at the Royal Society (a Fellowship of the world's most eminent scientists and the oldest scientific academy in continuous existence) discussed the current and future landscape of science. Many aspects were tackled and many questions came up such as, how should authorities, businesses and scientists respond to today's reality? and what is... Read More

  2. More organizations move to Private Clouds

    The University of Western Australia is shifting its 400 TB of data resources to private cloud. All of the University IT resources will now be hosted on the cloud while the connections between the cloud data centers and the University have been upgraded to 10Gbps. So what's the big fuzz? The move is quite big and the interesting part is... Read More

  3. Cloud Computing Assurance Program

    Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified... Read More

  4. Research IT as a Service

    I would like to share with you a couple of points taken from Ian Foster's presentation about the future of research computing and the current trend of moving the administrative load to the cloud. While, the big science projects are the ones that most often get the required funds and resources, the small to medium projects on the other hand... Read More

  5. Faster Storage Systems from IBM

    The XIV is a proven series of high-end storage systems by IBM. The IBM XIV Gen3 is the latest addition to this series that integrates seamlessly with virtualization, databases, email, analytics and data protection solutions from Microsoft, SAP, VMware, Oracle and others. The XIV series are well known for their solid architecture that can allocate resources effectively and maintain availability... Read More

  6. Zoho’s mobile apps

    Zoho's Customer Relationship Management solution now supports mobile devices. iPhone users can now follow sales leads, follow up ongoing deals and access accounts and other info while they are travelling even in offline mode! To read more about Zoho's CRM Mobile Edition for iPhone go here. For the Android users Zoho has released a mobile application that can create invoices... Read More

  7. Installing the DNS role on a Server Core installation

    You can install a DNS server on a Server Core installation of Windows Server 2008 using the command line to perform the installation part and a remote connection to configure and manage DNS services. This option may become handy when your environment requires a separate DNS service and the use of a dedicated Virtual Machine (VM) is not justified. Also,... Read More

  8. Windows Servers Hardening

    A highly recommended best practice in securing Windows Servers is to stop unnecessary services and disable unused functionality. A brief checklist containing high level definitions of tasks to be performed would help administrators reduce the attack surface of their servers. A typical checklist would include: Stopping and disabling all unnecessary services and applications Renaming the Administrator account Creating a new... Read More

  9. Windows Live Family Safety 2011

    How many caring parents would like to have the appropriate tools to manage their kids' online activities! With MS Windows Live Family Safety 2011, parents can manage which websites their children are allowed to visit, which programs they can run and for how long they can use the computer. The product records the children online activity and has some cool... Read More

  10. Windows Servers 2008 outbound traffic

    Managing outbound traffic has become very crucial in determining computer infections. Malware infects computers and then tries to send out stolen data to perpetrators. Viruses seek to replicate themselves by attempting to send packets to infect other computers. Users might use unapproved applications which may result in the transmission of confidential data. Therefore, it is appropriate to review your Windows... Read More

Featured Links