Blog

By Timothy Karl, Posted in Infrastructure, Virtualization

As our customers renewed their Citrix licensing this past year, some have seen SD-WAN in their list of available licenses. A question I often get asked is what is this SD-WAN license and how did I use it? There are two components to Citrix NetScaler SD-WAN: WAN Optimization and Virtual WAN.   WAN Optimization has been a part of the Citrix product portfolio for years, since the acquisition of Orbital Data in 2006. It is basically a network optimization device that provides QoS functionality. The tec... read more.

  • December 21, 2017

By Ken Phelan, Posted in AppDev, Infrastructure, Security, Storage, Virtualization

Recently back from AWS:ReInvent, I’m still processing all the data. AWS is Amazon’s Web Services. Amazon is currently hosting 3 times more cloud services than their closest competitor (Azure), making them the 800 pound gorilla of cloud computing. AWS:ReInvent is the trade event they recently held in Las Vegas. Writing a blog helps me process, so here’s my blog about the show. Thanks for helping me process. First of all, ReInvent is huge. Content was being delivered in three different hote... read more.

  • December 05, 2017

By Brian Wagner, Posted in

Cloud First At this time of year, we often meet with our customers and ask the question “What are your initiatives for next year?” Over the last few weeks, and really throughout 2017, we’ve been hearing a lot of cloud, cloud, cloud. The change in mentality is moving quickly. A year ago, a company may have said they have concerns around security and data, and they are going to stay where they have investment. Today’s meetings consist of our customers pushing us to figure out how they... read more.

  • December 01, 2017

By Nancy Rand, Posted in Security

This year was once again filled with major security breaches. In fact, these breaches have impacted so many of us that they are becoming a routine fact of life for companies and individuals alike. The Equifax breach in particular affects practically every person or entity that has had a credit check done in recent years.  Protection of our personally identifiable information (PII) and financial information should have been a priority with a credit bureau. As we've seen, it was not. And of course... read more.

  • November 30, 2017

By Tom Stanley, Posted in AppDev, Infrastructure, Virtualization

Machine Learning is a broad concept covering algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range. It analyzes past data to predict future data and to provide context for the current values. In a sense, the machine has learned how this metric “behaves” and can put parameters around the current value (standard deviation, probability bands, etc.), adding knowledge that isn’t obvious if all you have is the single, current me... read more.

  • November 17, 2017

By Tom Stanley, Posted in AppDev, Infrastructure, Security, Virtualization

The tech news has been abuzz recently with stories about how machine learning is making impressive strides in areas like autonomous vehicles, face recognition, and language translation. You can now be automatically tagged in Facebook photos of events you don’t even remember attending. But, while these are impressive achievements that may enhance some of your personal experiences, they have little bearing on your business. You might be surprised to find out these are just some of the more exciting appl... read more.

  • November 10, 2017

By Stephen Kilcoyne, Posted in Security

Gotham Technology Group and BUFFERZONE Partner to Provide Prevention-Based Container Security Technology to Enterprises  Leading InfoSec Solutions Provider Augments Existing Isolation Security Tech Offering with BUFFERZONE New York City, NY--November 2, 2017- BUFFERZONE Security, a provider of next-generation endpoint security solutions protecting organizations from advanced threats including ransomware, zero-days and phishing scams, and Gotham Technology Group, a leading technology solutions provide... read more.

  • November 02, 2017

By Ken Phelan, Posted in

Come join the murderCome fly with blackWe’ll give you freedomFrom the human track “Come Join the Murder”, The Forest Rangers & The White Buffalo My youngest daughter is going to college next year and is interested in engineering. We’re doing college visits so she can check out possible schools and as an engineer myself this leads to a certain amount of introspection. Engineers have many options in terms of the type of companies they work for and the type of work they do. I&rsqu... read more.

  • October 30, 2017

By Eduardo Blanco, CISSP, Posted in Security

A critical weakness has been discovered in WPA2, the ubiquitous protocol that secures Wi-Fi networks worldwide. The attack known as “KRACKS” which is short for Key Reinstallation Attacks, enables attackers within range of the target Wi-Fi network to see data that is presumed to be safely encrypted. This effectively renders organizations that leverage WPA2 vulnerable to theft of critical data such as credit card numbers, passwords, emails, photos, etc. It also makes it possible for a man-in-the-m... read more.

  • October 17, 2017

By Ken Phelan, Posted in Infrastructure, Virtualization

Commercial software developers work hard to create a product that offers significant value to their customers. They know that the value they deliver in terms of hard savings, increased efficiencies, or lower risk will ultimately drive the price of their software. Optimally, a licensing scheme should effectively capture some portion of the customer value as an equitable payment for that value delivered. I think that is only fair. If we follow this to its natural conclusion, we might conclude that the best l... read more.

  • September 15, 2017