Articles by 'Ken Phelan'

Blog Author - Ken Phelan

Ken is one of Gotham’s founders and its Chief Technology Officer, responsible for all internal and external technology and consulting operations for the firm. A recognized authority on technology and operations, Ken has been widely quoted in the technical press, and is a frequent presenter at various technology conferences. Ken is the Chairman of the Wall Street Thin Client Advisory Council.

By Ken Phelan, Posted in Uncategorized

It’s a longstanding joke among technologists. The only problem with technology is the people who use it. I think the joke needs an update. The only problem with technology platforms is applications. I was talking to some of my virtual desktop friends the other day. We were talking about their challenges in keeping a stable platform in the face of the corporate chaos. Every day brings new underlying challenges. There are new applications. There are new security requirements on a regular basis. Even the fo... read more.

  • September 08, 2015

By Ken Phelan, Posted in Uncategorized

I was out at Black Hat last week and I thought I’d sum up some of the things I learned for those of you who couldn’t make it - Top 10 things I learned at Black Hat: Hackers don’t look like they do in the movies. Well, some do, but not the majority of them. Hacking is less emo than you think. It’s also more boring than it looks on the movies. It’s really a long process of finding vulnerabilities in an environment and matching them to exploits. It’s more like data analysis than playing some kind of vid... read more.

  • August 19, 2015

By Ken Phelan, Posted in Security

If you are in a position where you either give or receive IT Security audits, please stop what you’re doing and read this right now (if you haven’t already). It’s the 2014 security audit by OPM’s inspector general office of audits. Katherine Archuleta resigned last Friday as head of the U.S. Office of Personnel Management and I’m guessing she wishes she had read it a little more carefully. My experience indicates that a large of percentage of people reading this line ignored my admonition to read the... read more.

  • July 17, 2015

By Ken Phelan, Posted in Virtualization

My daughter Joyce is graduating this week with a Master’s Degree in Occupational Therapy (#joytheot). Joyce has spent some time educating me on Occupational Therapy, and one of the concepts that I really like is OT’s position on Client Centered Care. I think there is a message there for us in the IT industry. Client Centered Care starts with getting its goals directly from the client. If I was to be in some kind of accident, the healthcare industry would work to put me back together. They would try to re... read more.

  • June 02, 2015

By Ken Phelan, Posted in Security

I was at the RSA Conference in San Francisco last week and I’d like to report that the Information Security economy is booming. With record numbers of attendees and exhibitors, the buzz around security has never been stronger. All of the news regarding attacks has created a lot of momentum. Most of Gotham’s large customers deal with significant incidents on a near daily basis, and even smaller clients have seen serious incidents over the last year. This increased pressure on cyber security now has boa... read more.

  • April 30, 2015

By Ken Phelan, Posted in Virtualization

Gotham rolled out this self-assessment at an event this week, and I thought I would share it with our Blog followers. First of all, let me clarify my use of the term DaaS. DaaS does not refer specifically to an outsourced or cloud Desktop. DaaS is your internal desktop offering, offered as a service. This can be delivered via traditional internal methods, cloud methods, or some hybrid. The important inflection to DaaS is that you’re offering your users a Desktop Service. It’s a productization issue. Your... read more.

  • March 17, 2015

By Ken Phelan, Posted in Security

I was out to dinner with my parents the other night and my mother started getting on my case. You know, the way mothers do. “Kenneth.” Yes, I’m a grown man and my mother still calls me Kenneth when she’s angry with me. “I’ve been reading the paper and there are all these security problems all the time. Aren’t you supposed to be fixing this? There must be something you can do to stop it. It seems like quite a problem.” Mothers. How is it that they can bundle up a wonderful compliment (I’m capable... read more.

  • February 25, 2015

By Ken Phelan, Posted in Virtualization

2015 promises to be a challenging year for IT organizations. There are two primary vectors to this challenge: CYBER SECURITY and OPERATIONAL MATURITY. CYBER SECURITY has been a rising concern for the past several years, and 2015 will be no exception. The number and intensity of attacks will continue to rise in 2015. Organizations will be directing both their budgets and their attention to this increasingly dangerous area of their risk portfolio. Here’s a summary of the things they’re doing: COVER THE... read more.

  • January 15, 2015

By Ken Phelan, Posted in Uncategorized

As I get older I find myself using the phrase “Remember When?” more and more often. Remember when candy bars cost a nickel? Remember when kids would just go out and play after school? Remember when you could get hired by a company, work your whole life there, and retire with a pension? As the cyber-attacks mount, I think we’re seeing the emergence of a new “remember when”. Remember when we used to go on the Internet and download code from vaguely anonymous servers that we would run on our per... read more.

  • December 09, 2014

By Ken Phelan, Posted in Uncategorized

I was at a Gartner conference a couple of weeks ago where the speaker said something to the effect of: The speed of business applications is going to continue to increase. Where it may have been normal to spend months creating an application that would have a lifespan of years, we now need to spend weeks creating applications that will have a lifespan of months. So far so good, I’m seeing this. As a byproduct of this speed requirement, the business is going to procure, write and deploy its own applicatio... read more.

  • September 16, 2014