Articles by 'Ken Phelan'

Blog Author - Ken Phelan

Ken is one of Gotham’s founders and its Chief Technology Officer, responsible for all internal and external technology and consulting operations for the firm. A recognized authority on technology and operations, Ken has been widely quoted in the technical press, and is a frequent presenter at various technology conferences. Ken is the Chairman of the Wall Street Thin Client Advisory Council.

By Ken Phelan, Posted in Uncategorized

In the New York area we’re continuing to deal with very real and personal impacts of Sandy. The sheer magnitude of the loss is frankly overwhelming. Many lives were lost, thousands of people remain displaced as their homes are either gone or condemned, huge pieces of the local infrastructure are still not functioning, and many local shoreline treasures are potentially damaged beyond repair. At Gotham, we don’t do anything particularly heroic in the face of disasters. We don’t rush into burning buildings... read more.

  • November 20, 2012

By Ken Phelan, Posted in Infrastructure

Lately, we’ve seen a lot of activity at Gotham clients regarding increasing the functionality their SSL VPN. Gotham has installed a lot of this technology and I was thinking about the early days of SSL VPN. When SSL VPNs first came out, Gotham was one of the first movers in evangelizing what we thought was a great way to simplify access for individual users. During the education process we would eventually find ourselves in the office of whoever was running the traditional IPSEC VPN that was currently in... read more.

  • October 17, 2012

By Ken Phelan, Posted in Virtualization

Gotham has several practice areas but we’re generally best known for our Security and Virtualization practices. It’s not uncommon for clients to show a little confusion at the juxtaposition of these two practices. I get a reaction similar to one you might get telling a person that you own a restaurant that specializes in sushi and barbecue. At Gotham, we don’t think that the process of securing your IT offering should be separated from the process of defining and delivering your IT offering. This is m... read more.

  • October 02, 2012

By Ken Phelan, Posted in Virtualization

JPMorgan lowered their forecast for 2012 Tech Spending earlier today. http://news.investors.com/technology/091012-625120-it-spending-forecast-cut.htm?ven=yahoocp,yahoo PC spending took a particular beating. They are now predicting a 2.3% fall (to $224 Billion) from a previous expectation of a small amount of growth (0.9%). Server revenue is also predicted to fall 1.4% to 52 Billion. This is a big problem for many computing industry titans. Microsoft, Intel and many of the large mainstream PC industry... read more.

  • September 10, 2012

By Ken Phelan, Posted in Virtualization

As promised, a follow-up on the challenges on managing a DaaS experience. Let’s run through a scenario comparing the experience of two users, one with a corporate desktop and the second with a DaaS. Let’s call the user on the standard PC Bill, and call the user on the new DaaS Steve. What if the system is slow? Bill might turn it on and off a few times. He might just yell over the top of his cube “Hey, is anybody else slow?” He’ll call support and they’ll start to go over the checklist trying to figur... read more.

  • August 30, 2012

By Ken Phelan, Posted in Virtualization

Consultants (myself included) like to make up words and phrases. When a word or phrase is fresh, it’s a beautiful thing full of promise and ambiguous glory. As it gets older, it inevitably finds some form of stable consensus which is just plain boring. It’s a sort of evolution from something cool and ethereal to something specific and occasionally fetid. Like a rainbow that turns into a swamp. There’s a whole new breed of restaurants that they’re calling fast casual. That’s a great name. I know what fast... read more.

  • August 20, 2012

By Ken Phelan, Posted in Virtualization

I was at Disney World last week with my family. Unlike normal people who simply have a good time, I spend a lot of time at Disney just sitting on various benches marveling at what a terrific job they do at crafting the Disney experience. Frankly, just the presence of a bench to sit on puts Disney in a class by itself. Over at Harry Potter world, there are so few benches that people were forced to hover over them and compete for a place to sit. True story. So, anyway, I got to thinking about how to apply... read more.

  • August 14, 2012

By Ken Phelan, Posted in Security

As an Integrator, I pitch a lot of products to potential customers. I often position these products as solutions, working to find and solve a particular customer need. Based on a mild sense of intellectual and moral integrity, I often worry about whether Gotham is actually solving problems, or just pushing boxes. When discussing a product as a potential solution for a customer, I find that there are generally two types of meetings: The first type of meeting is what I call QVC IT – generally, a present... read more.

  • July 09, 2012

By Ken Phelan, Posted in Virtualization

One of my favorite lines is from the movie Gumball Rally. One of the drivers, an Italian professional race car driver, gets into the Ferrari he’s going to drive across country, promptly rips the rearview mirror off, and throws it away. “And now, my friend,” he says, “the first rule of Italian driving. What’s behind me, is not my problem.” Unfortunately for most of my desktop transformation clients, what’s behind them is most definitely their problem. In most desktop transformation efforts, we’ve got a... read more.

  • April 17, 2012

By Ken Phelan, Posted in Virtualization

While many companies are experiencing success in their virtual desktop environments, a number of companies feel that virtual desktops haven't met their needs. Some of the details vary, but a general story outline often goes like this: The company has a large and complex desktop offering. There are many applications. The desktop offering is assembled by many parties, up to and including the users themselves, who can install applications as needed. The user has a significant number of environmental setti... read more.

  • April 04, 2012