Blog

By Hank Smith, Posted in Virtualization

This question comes up many times from customers who are evaluating the use of a virtual desktop infrastructure (VDI) solution. Unfortunately the answer is, “It depends.” There are many variables in play that will determine that number. Taking the hypervisor (VMware, Citrix, Microsoft) out of the question, along with storage requirements (IOPS, space) it really comes down to the OS and applications. For example, a VDI environment providing primarily Windows 7 virtual desktops will have more requirements... read more.

  • February 16, 2012

By Kaysel Adrover, Posted in Virtualization

If you’re one of the many IT managers considering a move to the next generation Virtual Desktop Infrastructure (VDI) and have begun your research, you’ve already realized the potential savings to your company in the long term. There are two key points you’ll find as you progress further. First, there’s a multitude of virtualization technology in the market place today, such as those by Citrix, VMware and Microsoft, and choosing the right product for your business is very important. Second, VDI is not a smal... read more.

  • February 14, 2012

By Russell D. Vines, Posted in Storage

If the Cloud Service Provider (CSP) you or your organization is using to store files also happens to be distributing pirated video or music, don't be surprised if your files vanish one day. As some cloud users recently discovered, it turns out to be a very bad idea to store files with a service that relies on piracy for a big part of its revenue. We all have now heard that the US government recently unsealed a 72-page copyright infringement indictment against “cyberlocker” site MegaUpload, seizing its do... read more.

  • February 13, 2012

By Ken Phelan, Posted in Virtualization

Virtual Desktops have proven to be a valuable technology. They are providing organizations with the ability to support many end points in many locations with a secure and productive desktop experience. Many large IT organizations are successfully moving from providing computers to providing Desktops as a Service (DaaS). This change helps them align better with business needs and provide a quality experience to their IT consumers. Gotham is committed to the success of our clients’ desktop virtualization i... read more.

  • February 13, 2012

By Gotham, Posted in Virtualization

Time: Is Google planning to release a cloud storage service akin to Dropbox? http://ti.me/zWaqK4 InfoWorld: Microsoft plans to produce a special version of Windows 8 and Office for touch-oriented ARM-based devices: http://bit.ly/xFervz GCN: Virtualization makes it easier to replicate data easier within a disaster recovery system and the cloud: http://bit.ly/ztx2GS CSM: Windows 8 preview launch set for late February: http://bit.ly/wAXeEX CSO: US hospital hit by data-stealing malware, compromising the p... read more.

  • February 10, 2012

By Gotham, Posted in Virtualization

Time: Is Google planning to release a cloud storage service akin to Dropbox? http://ti.me/zWaqK4 InfoWorld: Microsoft plans to produce a special version of Windows 8 and Office for touch-oriented ARM-based devices: http://bit.ly/xFervz GCN: Virtualization makes it easier to replicate data easier within a disaster recovery system and the cloud: http://bit.ly/ztx2GS CSM: Windows 8 preview launch set for late February: http://bit.ly/wAXeEX CSO: US hospital hit by data-stealing malware, compromising the p... read more.

  • February 10, 2012

By Kaysel Adrover, Posted in Virtualization

Citrix EdgeSight Active Application Monitoring is an automated performance testing tool included with EdgeSight Service Pack 2.0 and higher. With Active Application Monitoring, you can create scripts to perform specific application actions and run it against the targeted XenApp server. Specific monitoring points can be created within the script to generate alerts. For example, if a specific action within the script takes longer than specified or does not complete successfully, EdgeSight will generate an ale... read more.

  • February 09, 2012

By Russell D. Vines, Posted in Security

One major obstacle to a company’s adoption of information systems security best practices is often the apparent lack of ROI, or visible return on investment resulting from developing secure processes or acquiring security-specific hardware and software. Unlike a tangible piece of hardware or a software upgrade, employees often see security processes as interfering with their ability to get their job done. But losses due to a lack of security due diligence are tangible and quantifiable, and a properly foc... read more.

  • February 08, 2012

By Russell D. Vines, Posted in Security

It was a happy new years’ for the cyber gang that made off with 42 million South African Rand (about $6.7 million) during the first three days of the year from Postbank, which is part of the South African Post Office and a government agency. The alleged Nigerian syndicate that carried out the theft had previously attempted to pull off the same crime on other, bigger banks in SA, but were unable to penetrate the systems until they found Postbank: http://bit.ly/xIVygH The exploit took months to plan... read more.

  • February 07, 2012

By Hank Smith, Posted in Virtualization

As many more companies start to adopt Virtual Desktop Infrastructure (VDI) as a solution for various user classifications, the question that typically comes up is “Should we use our existing physical workstation image?" In many cases this isn’t even a question; the customer assumes that the physical image will be used in their VDI environment. This article reviews reasons why it is common to utilize an existing image along with the reasons why not to use a physical image. Why use an existing physical wor... read more.

  • February 06, 2012