Articles In Virtualization

By Kaysel Adrover, Posted in Virtualization

Unlike with a XenApp environment, setting up a virtual desktop environment is not a matter of following out-of-box instructions. In a virtual desktop environment, you have other moving parts, such as hypervisors, Provisioning Server, XenDesktop controllers, XenApp, SAN, and Web Interface to consider. Because virtual desktops require such a high level of resources, it’s important to optimize every area of communication possible, tailored to your network environment. This will allow you to make the most of... read more.

  • March 05, 2012

By Gotham, Posted in Virtualization

ComputerWorld: Despite protests, Google launches privacy plan that lets Google combine data from most of its services: http://bit.ly/xDZEKc NPR: Algorithms for controlling the International Space Station were lost when an unencrypted NASA laptop was stolen last March: http://n.pr/yVTbi3 ITworld: Microsoft opens doors to Metro app store for Windows 8, alongside public Windows 8 preview: http://bit.ly/x3MULd InfoWorld: US local/state government agencies realized 134-269% ROI on server and storage virtual... read more.

  • March 02, 2012

By Gotham, Posted in Virtualization

ComputerWorld: Despite protests, Google launches privacy plan that lets Google combine data from most of its services: http://bit.ly/xDZEKc NPR: Algorithms for controlling the International Space Station were lost when an unencrypted NASA laptop was stolen last March: http://n.pr/yVTbi3 ITworld: Microsoft opens doors to Metro app store for Windows 8, alongside public Windows 8 preview: http://bit.ly/x3MULd InfoWorld: US local/state government agencies realized 134-269% ROI on server and storage virtual... read more.

  • March 02, 2012

By Joe Jessen, Posted in Virtualization

Gotham's Professional Services Department provides complete technology consulting from strategic planning to system implementation. Averaging eight years of service with Gotham, the internal team of 30+ is well versed in the strategic technologies within your organization: Applications, Infrastructure, Security, and Virtualization. The GPS teams not only engage on your projects, but they participate on vendor technology councils, write numerous technology books, and contribute to independent technology a... read more.

  • March 02, 2012

By Gotham, Posted in Virtualization

Montvale, NJ, February 28, 2012 – Gotham Technology Group, LLC announced today it has been named to CRN’s second annual list of the Tech Elite 250. Companies on the 2012 Tech Elite 250 list represent an elite group of IT Solution Providers that have invested in the training and education needed to earn the most technical certifications in the IT Channel. In compiling the list, CRN editors worked with the UBM Channel research group and a team of outside experts to define the most customer-beneficial techn... read more.

  • February 28, 2012

By Gotham, Posted in Virtualization

Montvale, NJ, February 28, 2012 – Gotham Technology Group, LLC announced today it has been named to CRN’s second annual list of the Tech Elite 250. Companies on the 2012 Tech Elite 250 list represent an elite group of IT Solution Providers that have invested in the training and education needed to earn the most technical certifications in the IT Channel. In compiling the list, CRN editors worked with the UBM Channel research group and a team of outside experts to define the most customer-beneficial techn... read more.

  • February 28, 2012

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Hank Smith, Posted in Virtualization

[wpvideo hR7MRQQN] ... read more.

  • February 20, 2012

By Brian Wagner, Posted in Virtualization

Just a few years ago, the diagram below was a common occurrence in the enterprise space: The solution did provide secure remote access for users using SSL to connect back to the Citrix environment. But it also had several drawbacks: Costly - the typical environment consisted of two load balancers, and at least two CAGs and two Web Interface servers. Lots of hardware and software to maintain Access Gateways or CSG servers (CSG runs on Windows which means Windows Updates, etc) Citrix Web In... read more.

  • February 20, 2012