Articles In Uncategorized

By Gotham, Posted in Uncategorized

From Techopedia: A disk array is a data storage system that contains multiple disk drives and a cache memory. It efficiently distributes data across multiple drives and enables fault tolerance through redundant array of independent disks (RAID). Some disk arrays also use virtualization, which provides additional functionality by optimizing storage use and providing greater flexibility for users managing stored data. ... read more.

  • February 20, 2013

By Brian Wagner, Posted in Uncategorized

The Windows 8 Citrix Receiver, which is a “metro” app, has been released and provides access to Citrix Apps and Desktops on Windows 8 by leveraging Cloud Gateway. Once logged in, the interface has the (fairly) consistent look and feel of the Citrix Receiver I get on all my devices. My favorites show up and I can access apps and desktops without an issue. Windows 8 metro apps can be docked on the side of the screen and the “Desktop” shrinks when doing so. But, you can’t dock traditional 32-bit / 64-bi... read more.

  • February 13, 2013

By Kellye Garrett, Posted in Uncategorized

Every month Gotham holds Jeans Day, an internal fundraiser for charities selected from employee suggestions. Past recipients have included the American Red Cross and the Ulster Literacy Association. Our February charity was Cycle for Survival. Cycle for Survival is an indoor team cycling event that raises funds for rare cancer research. Since its inception in 2007, Cycle for Survival has raised over $26.4 million dollars for rare cancer research and funded 53 clinical trials and research studies. Cycle’s... read more.

  • February 12, 2013

By Ed Bratter, Posted in Uncategorized

So you have a disaster recovery center, you have a playbook that provides specific instructions on how to bring it online in the event of a disaster, and you test the plan once a year – but are you really as prepared as you think you are? For many of us in the Northeast, Hurricane Sandy gave us the opportunity to find out. I’d like to share an experience that made me rethink the way we approach disaster planning and testing. I had a customer who thought they were well prepared, but when disaster struck –... read more.

  • January 30, 2013

By Gotham, Posted in Uncategorized

From the Gartner IT Glossary: Disaster recovery (DR) is defined as (1) The use of alternative network circuits to re-establish communications channels in the event that the primary channels are disconnected or malfunctioning, and (2) The methods and procedures for returning a data center to full operation after a catastrophic interruption (e.g., including recovery of lost data). ... read more.

  • January 30, 2013

By Gotham, Posted in Uncategorized

From the Gartner IT Glossary: Disaster recovery (DR) is defined as (1) The use of alternative network circuits to re-establish communications channels in the event that the primary channels are disconnected or malfunctioning, and (2) The methods and procedures for returning a data center to full operation after a catastrophic interruption (e.g., including recovery of lost data). ... read more.

  • January 30, 2013

By Kellye Garrett, Posted in Uncategorized

A month after rumors that Cisco was looking to exit the home networking market, the company sold Linksys to Belkin. In other Cisco news, the company announced its intent to acquire mobile start-up Intucell; and expanded its partnership with NetApp on its FlexPod architecture. Microsoft’s Surface Pro will finally be available on February 9. The tablet was originally scheduled to be out in January. Just ahead of the BlackBerry 10’s January 30 release, Computerworld reported that RIM’s new enterprise... read more.

  • January 25, 2013

By Gotham, Posted in Uncategorized

From the Microsoft Windows 2008 Glossary: A security token service is a Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature.) ... read more.

  • January 23, 2013

By Gotham, Posted in Uncategorized

From the Microsoft Windows 2008 Glossary: A security token service is a Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature.) ... read more.

  • January 23, 2013

By Gotham, Posted in Uncategorized

From the Microsoft Windows Server 2008 Glossary: A brute force attack is an attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered. ... read more.

  • January 16, 2013