Articles In Virtualization

By Gotham, Posted in Virtualization

Montvale, NJ, February 28, 2012 – Gotham Technology Group, LLC announced today it has been named to CRN’s second annual list of the Tech Elite 250. Companies on the 2012 Tech Elite 250 list represent an elite group of IT Solution Providers that have invested in the training and education needed to earn the most technical certifications in the IT Channel. In compiling the list, CRN editors worked with the UBM Channel research group and a team of outside experts to define the most customer-beneficial techn... read more.

  • February 28, 2012

By Gotham, Posted in Virtualization

Montvale, NJ, February 28, 2012 – Gotham Technology Group, LLC announced today it has been named to CRN’s second annual list of the Tech Elite 250. Companies on the 2012 Tech Elite 250 list represent an elite group of IT Solution Providers that have invested in the training and education needed to earn the most technical certifications in the IT Channel. In compiling the list, CRN editors worked with the UBM Channel research group and a team of outside experts to define the most customer-beneficial techn... read more.

  • February 28, 2012

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Hank Smith, Posted in Virtualization

[wpvideo hR7MRQQN] ... read more.

  • February 20, 2012

By Brian Wagner, Posted in Virtualization

Just a few years ago, the diagram below was a common occurrence in the enterprise space: The solution did provide secure remote access for users using SSL to connect back to the Citrix environment. But it also had several drawbacks: Costly - the typical environment consisted of two load balancers, and at least two CAGs and two Web Interface servers. Lots of hardware and software to maintain Access Gateways or CSG servers (CSG runs on Windows which means Windows Updates, etc) Citrix Web In... read more.

  • February 20, 2012

By Gotham, Posted in Virtualization

With VDI becoming more and more popular, many enterprises have turned to AppSense as a solution for managing users’ personal settings, such as Outlook signatures, favorites, and personal dictionaries. The AppSense Personalization Server captures users’ settings and stores them in a SQL database using an agents installed on the users’ workstations. The beauty of AppSense is that it’s focused on the application and is OS-agnostic. Settings captured on a Windows XP machine can be applied to a user’s session ru... read more.

  • February 19, 2012

By Gotham, Posted in Virtualization

With VDI becoming more and more popular, many enterprises have turned to AppSense as a solution for managing users’ personal settings, such as Outlook signatures, favorites, and personal dictionaries. The AppSense Personalization Server captures users’ settings and stores them in a SQL database using an agents installed on the users’ workstations. The beauty of AppSense is that it’s focused on the application and is OS-agnostic. Settings captured on a Windows XP machine can be applied to a user’s session ru... read more.

  • February 19, 2012

By Joe Jessen, Posted in Virtualization

Joe Jessen, Gotham's Director of Professional Services, also writes for The Virtualization Practice: As Virtual Desktops become standard components of the entire desktop environment there are increasing demands on the end point devices to provide the performance of legacy desktop computers they are replacing.  Devices with more memory, faster processors and expandable peripheral device support are quickly replacing the utility devices most associated with thin clients.  On Monday February 13, 2012 HP ann... read more.

  • February 18, 2012

By Gotham, Posted in Virtualization

RWW: Juniper's 2011 Mobile Threats Report shows malware increase of 155%; 46.7% were Android threats, 41% Java ME: http://rww.to/xly6qr Reuters: Apple to require apps to seek "explicit approval" before accessing users' address book data: http://reut.rs/yz5BYV CBR: Citrix releases CloudStack 3, its first open source cloud platform; includes XenServer 6, and supports NetScaler SDX and VPX: http://bit.ly/zSn6I9 InfoWorld: Researchers find vulnerabilities in public keys used to encrypt data in online trans... read more.

  • February 17, 2012