Blog

By Kaysel Adrover, Posted in Virtualization

Unlike with a XenApp environment, setting up a virtual desktop environment is not a matter of following out-of-box instructions. In a virtual desktop environment, you have other moving parts, such as hypervisors, Provisioning Server, XenDesktop controllers, XenApp, SAN, and Web Interface to consider. Because virtual desktops require such a high level of resources, it’s important to optimize every area of communication possible, tailored to your network environment. This will allow you to make the most of... read more.

  • March 05, 2012

By Gotham, Posted in Virtualization

ComputerWorld: Despite protests, Google launches privacy plan that lets Google combine data from most of its services: http://bit.ly/xDZEKc NPR: Algorithms for controlling the International Space Station were lost when an unencrypted NASA laptop was stolen last March: http://n.pr/yVTbi3 ITworld: Microsoft opens doors to Metro app store for Windows 8, alongside public Windows 8 preview: http://bit.ly/x3MULd InfoWorld: US local/state government agencies realized 134-269% ROI on server and storage virtual... read more.

  • March 02, 2012

By Gotham, Posted in Virtualization

ComputerWorld: Despite protests, Google launches privacy plan that lets Google combine data from most of its services: http://bit.ly/xDZEKc NPR: Algorithms for controlling the International Space Station were lost when an unencrypted NASA laptop was stolen last March: http://n.pr/yVTbi3 ITworld: Microsoft opens doors to Metro app store for Windows 8, alongside public Windows 8 preview: http://bit.ly/x3MULd InfoWorld: US local/state government agencies realized 134-269% ROI on server and storage virtual... read more.

  • March 02, 2012

By Joe Jessen, Posted in Virtualization

Gotham's Professional Services Department provides complete technology consulting from strategic planning to system implementation. Averaging eight years of service with Gotham, the internal team of 30+ is well versed in the strategic technologies within your organization: Applications, Infrastructure, Security, and Virtualization. The GPS teams not only engage on your projects, but they participate on vendor technology councils, write numerous technology books, and contribute to independent technology a... read more.

  • March 02, 2012

By Gotham, Posted in Virtualization

Montvale, NJ, February 28, 2012 – Gotham Technology Group, LLC announced today it has been named to CRN’s second annual list of the Tech Elite 250. Companies on the 2012 Tech Elite 250 list represent an elite group of IT Solution Providers that have invested in the training and education needed to earn the most technical certifications in the IT Channel. In compiling the list, CRN editors worked with the UBM Channel research group and a team of outside experts to define the most customer-beneficial techn... read more.

  • February 28, 2012

By Gotham, Posted in Virtualization

Montvale, NJ, February 28, 2012 – Gotham Technology Group, LLC announced today it has been named to CRN’s second annual list of the Tech Elite 250. Companies on the 2012 Tech Elite 250 list represent an elite group of IT Solution Providers that have invested in the training and education needed to earn the most technical certifications in the IT Channel. In compiling the list, CRN editors worked with the UBM Channel research group and a team of outside experts to define the most customer-beneficial techn... read more.

  • February 28, 2012

By Russell D. Vines, Posted in Security

One of the most interesting and frustrating aspects of writing about technology is that it’s always in flux. This is one of the reasons books and magazines often do a poor job of reflecting the current state of information systems security: they’re trying to hit a moving target. This was on display as Google’s very public browser override issue erupted over the past few weeks, rapidly changing the privacy debate and causing finger pointing and repositioning at multiple companies. First, Stanford r... read more.

  • February 27, 2012

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Ken Phelan, Posted in Support

The idea that internal IT departments should run like a business, treating the internal IT users like customers, is not new. People have been saying it for years, but rarely doing it. Today’s initiatives around consumerization and cloud computing are the latest push for this improvement on the IT-user relationship. Given that this improvement in the alignment of IT and its constituency is something we’ve been trying to get for years, I think it’s worth trying to get past the hype for a minute and looking at... read more.

  • February 24, 2012