Blog

By Nancy Rand, Posted in Security

Earlier this week, the public was apprised of a major hardware vulnerability in Intel, AMD and ARM. This vulnerability affects practically every computer and mobile device in use today.   First and foremost, you should patch all devices up to the current releases to ensure you receive the latest protection combined with Endpoint Detection and Response software. The articles linked below present the information in detail.   The following Common Vulnerabilities and Exposures (CVE) are associate... read more.

  • January 05, 2018

By Hank Smith, Posted in Infrastructure, Security, Support

Throughout my years of IT consulting, patching servers and desktops has been a sore subject with customers. It’s always been something that is required, but in many cases not performed. The benefits of patching in a timely manner include feature enhancements, bug fixes, and of course security updates. But for many of our customers, patching is time-consuming and resource-intensive, and gets in the way of IT teams focusing on more strategic and tactical matters. As a result, patches aren’t maint... read more.

  • December 21, 2017

By Timothy Karl, Posted in Infrastructure, Virtualization

As our customers renewed their Citrix licensing this past year, some have seen SD-WAN in their list of available licenses. A question I often get asked is what is this SD-WAN license and how did I use it? There are two components to Citrix NetScaler SD-WAN: WAN Optimization and Virtual WAN.   WAN Optimization has been a part of the Citrix product portfolio for years, since the acquisition of Orbital Data in 2006. It is basically a network optimization device that provides QoS functionality. The tec... read more.

  • December 21, 2017

By Ken Phelan, Posted in AppDev, Infrastructure, Security, Storage, Virtualization

Recently back from AWS:ReInvent, I’m still processing all the data. AWS is Amazon’s Web Services. Amazon is currently hosting 3 times more cloud services than their closest competitor (Azure), making them the 800 pound gorilla of cloud computing. AWS:ReInvent is the trade event they recently held in Las Vegas. Writing a blog helps me process, so here’s my blog about the show. Thanks for helping me process. First of all, ReInvent is huge. Content was being delivered in three different hote... read more.

  • December 05, 2017

By Brian Wagner, Posted in

Cloud First At this time of year, we often meet with our customers and ask the question “What are your initiatives for next year?” Over the last few weeks, and really throughout 2017, we’ve been hearing a lot of cloud, cloud, cloud. The change in mentality is moving quickly. A year ago, a company may have said they have concerns around security and data, and they are going to stay where they have investment. Today’s meetings consist of our customers pushing us to figure out how they... read more.

  • December 01, 2017

By Nancy Rand, Posted in Security

This year was once again filled with major security breaches. In fact, these breaches have impacted so many of us that they are becoming a routine fact of life for companies and individuals alike. The Equifax breach in particular affects practically every person or entity that has had a credit check done in recent years.  Protection of our personally identifiable information (PII) and financial information should have been a priority with a credit bureau. As we've seen, it was not. And of course... read more.

  • November 30, 2017

By Tom Stanley, Posted in AppDev, Infrastructure, Virtualization

Machine Learning is a broad concept covering algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range. It analyzes past data to predict future data and to provide context for the current values. In a sense, the machine has learned how this metric “behaves” and can put parameters around the current value (standard deviation, probability bands, etc.), adding knowledge that isn’t obvious if all you have is the single, current me... read more.

  • November 17, 2017

By Tom Stanley, Posted in AppDev, Infrastructure, Security, Virtualization

The tech news has been abuzz recently with stories about how machine learning is making impressive strides in areas like autonomous vehicles, face recognition, and language translation. You can now be automatically tagged in Facebook photos of events you don’t even remember attending. But, while these are impressive achievements that may enhance some of your personal experiences, they have little bearing on your business. You might be surprised to find out these are just some of the more exciting appl... read more.

  • November 10, 2017

By Stephen Kilcoyne, Posted in Security

Gotham Technology Group and BUFFERZONE Partner to Provide Prevention-Based Container Security Technology to Enterprises  Leading InfoSec Solutions Provider Augments Existing Isolation Security Tech Offering with BUFFERZONE New York City, NY--November 2, 2017- BUFFERZONE Security, a provider of next-generation endpoint security solutions protecting organizations from advanced threats including ransomware, zero-days and phishing scams, and Gotham Technology Group, a leading technology solutions provide... read more.

  • November 02, 2017

By Ken Phelan, Posted in

Come join the murderCome fly with blackWe’ll give you freedomFrom the human track “Come Join the Murder”, The Forest Rangers & The White Buffalo My youngest daughter is going to college next year and is interested in engineering. We’re doing college visits so she can check out possible schools and as an engineer myself this leads to a certain amount of introspection. Engineers have many options in terms of the type of companies they work for and the type of work they do. I&rsqu... read more.

  • October 30, 2017