Blog

By Gotham, Posted in Virtualization

Computerworld: U.S. lawmakers want FTC to probe Google over Safari privacy circumvention: bit.ly/wNaXlG CSO: The Cybersecurity Act of 2012 seeks to protect critical infrastructure from attack via regulation by the DHS: bit.ly/AfeOUM EON: Veeam ONE v6 to provide affordable monitoring, reporting, and more for Hyper-V: bit.ly/yLhWU5 PCWorld: Google bypasses privacy protections not only in Safari, but also in Internet Explorer: bit.ly/wEa6un Computerworld: 5 free Android security apps to help keep your sm... read more.

  • February 24, 2012

By Ken Phelan, Posted in Support

The idea that internal IT departments should run like a business, treating the internal IT users like customers, is not new. People have been saying it for years, but rarely doing it. Today’s initiatives around consumerization and cloud computing are the latest push for this improvement on the IT-user relationship. Given that this improvement in the alignment of IT and its constituency is something we’ve been trying to get for years, I think it’s worth trying to get past the hype for a minute and looking at... read more.

  • February 24, 2012

By Hank Smith, Posted in Virtualization

[wpvideo hR7MRQQN] ... read more.

  • February 20, 2012

By Brian Wagner, Posted in Virtualization

Just a few years ago, the diagram below was a common occurrence in the enterprise space: The solution did provide secure remote access for users using SSL to connect back to the Citrix environment. But it also had several drawbacks: Costly - the typical environment consisted of two load balancers, and at least two CAGs and two Web Interface servers. Lots of hardware and software to maintain Access Gateways or CSG servers (CSG runs on Windows which means Windows Updates, etc) Citrix Web In... read more.

  • February 20, 2012

By Gotham, Posted in Virtualization

With VDI becoming more and more popular, many enterprises have turned to AppSense as a solution for managing users’ personal settings, such as Outlook signatures, favorites, and personal dictionaries. The AppSense Personalization Server captures users’ settings and stores them in a SQL database using an agents installed on the users’ workstations. The beauty of AppSense is that it’s focused on the application and is OS-agnostic. Settings captured on a Windows XP machine can be applied to a user’s session ru... read more.

  • February 19, 2012

By Gotham, Posted in Virtualization

With VDI becoming more and more popular, many enterprises have turned to AppSense as a solution for managing users’ personal settings, such as Outlook signatures, favorites, and personal dictionaries. The AppSense Personalization Server captures users’ settings and stores them in a SQL database using an agents installed on the users’ workstations. The beauty of AppSense is that it’s focused on the application and is OS-agnostic. Settings captured on a Windows XP machine can be applied to a user’s session ru... read more.

  • February 19, 2012

By Joe Jessen, Posted in Virtualization

Joe Jessen, Gotham's Director of Professional Services, also writes for The Virtualization Practice: As Virtual Desktops become standard components of the entire desktop environment there are increasing demands on the end point devices to provide the performance of legacy desktop computers they are replacing.  Devices with more memory, faster processors and expandable peripheral device support are quickly replacing the utility devices most associated with thin clients.  On Monday February 13, 2012 HP ann... read more.

  • February 18, 2012

By Gotham, Posted in Virtualization

RWW: Juniper's 2011 Mobile Threats Report shows malware increase of 155%; 46.7% were Android threats, 41% Java ME: http://rww.to/xly6qr Reuters: Apple to require apps to seek "explicit approval" before accessing users' address book data: http://reut.rs/yz5BYV CBR: Citrix releases CloudStack 3, its first open source cloud platform; includes XenServer 6, and supports NetScaler SDX and VPX: http://bit.ly/zSn6I9 InfoWorld: Researchers find vulnerabilities in public keys used to encrypt data in online trans... read more.

  • February 17, 2012

By Gotham, Posted in Virtualization

RWW: Juniper's 2011 Mobile Threats Report shows malware increase of 155%; 46.7% were Android threats, 41% Java ME: http://rww.to/xly6qr Reuters: Apple to require apps to seek "explicit approval" before accessing users' address book data: http://reut.rs/yz5BYV CBR: Citrix releases CloudStack 3, its first open source cloud platform; includes XenServer 6, and supports NetScaler SDX and VPX: http://bit.ly/zSn6I9 InfoWorld: Researchers find vulnerabilities in public keys used to encrypt data in online trans... read more.

  • February 17, 2012

By Hank Smith, Posted in Virtualization

This question comes up many times from customers who are evaluating the use of a virtual desktop infrastructure (VDI) solution. Unfortunately the answer is, “It depends.” There are many variables in play that will determine that number. Taking the hypervisor (VMware, Citrix, Microsoft) out of the question, along with storage requirements (IOPS, space) it really comes down to the OS and applications. For example, a VDI environment providing primarily Windows 7 virtual desktops will have more requirements... read more.

  • February 16, 2012