Blog

By Gotham, Posted in Virtualization

Organizations and consumers considering the benefits of cloud computing have a choice of hosted solutions: public, private, and hybrid clouds. Public Cloud: Services are shared by multiple organizations, organized into virtual pools, and provided to specific customers. These virtual pools hide the fact that the infrastructure is shared among multiple customers. Public clouds tend to be standardized, with little room for customization. Standard security policies are applied across the entire solution, and... read more.

  • May 01, 2012

By Gotham, Posted in Virtualization

InfoWorld: Microsoft to support ODF 1.2 open document standard in Office 15 and Office365: http://bit.ly/IlFAXi Wired: Hands on with Google Drive: 5 GB free storage, integration with Google services, and more: http://bit.ly/InQlaF Network World: Windows 8 release preview, the most complete version of the OS to date, slated for June release: http://bit.ly/IkN0Jb CNET: New variant of Flashback malware installs itself without a password, deletes files and folders to mask its presence: http://cnet.co/JCXnv... read more.

  • April 27, 2012

By Gotham, Posted in Virtualization

InfoWorld: Microsoft to support ODF 1.2 open document standard in Office 15 and Office365: http://bit.ly/IlFAXi Wired: Hands on with Google Drive: 5 GB free storage, integration with Google services, and more: http://bit.ly/InQlaF Network World: Windows 8 release preview, the most complete version of the OS to date, slated for June release: http://bit.ly/IkN0Jb CNET: New variant of Flashback malware installs itself without a password, deletes files and folders to mask its presence: http://cnet.co/JCXnv... read more.

  • April 27, 2012

By Russell D. Vines, Posted in Security

First discovered in 2007, the Trojan known as DNSChanger (also called "RSPlug," "Puper," and "Jahlav") has infected millions of Windows PCs and Macs worldwide. Last year the FBI, in an operation called Ghost Click, arrested the Estonian crime ring responsible and seized the rogue network built to redirect users’ DNS settings to bad Web sites. Case closed, right? Bad guys in the joint, $14 million malware enterprise stopped, time to shut down the offending hardware? Well, it’s not that simple. Due to t... read more.

  • April 26, 2012

By Gotham, Posted in Storage

Image credit: Google After months of anticipation, Google released its cloud storage service, called Google Drive, that greatly increases storage capacity and integrates across Google's cloud platform. Google Drive is the search giant's answer to cloud storage competitors, including Box, Microsoft's SkyDrive, and DropBox. Google partners greeted the launch enthusiastically and said its added storage capacity and integration features give business users impetus to access the rest of Google's services. ... read more.

  • April 26, 2012

By Gotham, Posted in Storage

Image credit: Google After months of anticipation, Google released its cloud storage service, called Google Drive, that greatly increases storage capacity and integrates across Google's cloud platform. Google Drive is the search giant's answer to cloud storage competitors, including Box, Microsoft's SkyDrive, and DropBox. Google partners greeted the launch enthusiastically and said its added storage capacity and integration features give business users impetus to access the rest of Google's services. ... read more.

  • April 26, 2012

By Stephen Kilcoyne, Posted in Virtualization

On Tuesday, April 23, according to this VMware Security Note, VMware's “security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future." The code dates back to the 2003-2004 timeframe, and VMware is conducting an investigation.   There is no indication that VMware customers should be concerned of any increased risk at this time. We will continue to keep tabs on the situation, and if and when furth... read more.

  • April 26, 2012

By Gotham, Posted in Virtualization

InfoWorld's J. Peter Bruzzese interviewed Gotham's Ron Barrett about his experience using Microsoft System Center Configuration Manager 2012. Bruzzese: What have you found to be the most impressive aspects of Configuration Manager? Barrett: First and foremost, the switch to user-centric management is huge. In an era when BYOD (bring your own device) has become the rule rather than the exception, IT needs to find a way to bring users the productivity they crave while maintaining control over the corpor... read more.

  • April 25, 2012

By Gotham, Posted in Virtualization

InfoWorld's J. Peter Bruzzese interviewed Gotham's Ron Barrett about his experience using Microsoft System Center Configuration Manager 2012. Bruzzese: What have you found to be the most impressive aspects of Configuration Manager? Barrett: First and foremost, the switch to user-centric management is huge. In an era when BYOD (bring your own device) has become the rule rather than the exception, IT needs to find a way to bring users the productivity they crave while maintaining control over the corpor... read more.

  • April 25, 2012

By Gotham, Posted in Infrastructure

IaaS is a provisioning model that allows organizations to outsource some of the physical components of a computing environment, such as servers and storage. In this model, an organization does not own the physical components, but still maintains control of the software and data that reside in the environment. ... read more.

  • April 23, 2012