Articles In Uncategorized

By Hank Smith, Posted in Uncategorized

Gotham partnered with Nerdio last year as we saw an increase in our customer base, both existing and new, looking at alternative EUC solutions specifically for Azure Virtual Desktop (AVD) and Windows 365 Cloud PC. Nerdio makes the administration of those workloads much easier as compared to the native tools (PowerShell scripts, etc.) that Microsoft provides. With Nerdio, administrators can take advantage of the various auto-scaling features, image management, and overall easy to use GUI. Nerdio is really in... read more.

  • March 21, 2023

By Ken Phelan, Posted in Uncategorized

As many of us return to work and the world feels like it’s returning to normal, it can be easy to forget that the COVID-19 pandemic isn’t completely behind us. Cases are surging in parts of the country, and for a growing number of people, their initial case of COVID was just the beginning of an ongoing ordeal known as long COVID, post-COVID, or long-haul COVID. This terrible affliction has stricken one of the Gotham family and we are rallying around Jason. Jason is Fara Smith’s twin broth... read more.

  • July 26, 2021

By Ken Phelan, Posted in Uncategorized

Game theorists like to look at game play as a way of modeling human behavior. One of their favorite games is called the prisoner’s dilemma. You’ve probably heard of it. In summary, it goes like this: You and a partner commit a crime. You’re not caught in the act, but the police bring you both downtown for questioning. The police put you in separate rooms and question you. At this point, the following outcomes are possible: Option 1 - You both keep quiet and each spend one year in jail... read more.

  • February 12, 2020

By Nancy Rand, Posted in Uncategorized

May 31, SecurityWeek – (International) 65 million users affected by Tumblr breach. Tumblr officials reported that as a precaution, they have reset all their customers’ passwords after an Australian security researcher found that a hacker under the online name, “peace_of_mind” posted the information of 50 million Tumblr accounts on a darknet Web site called, “The Real Deal” for a small sum of money. The same hacker was also seen selling millions of records of LinkedIn, Fling.com, and Myspace users. Source ... read more.

  • June 01, 2016

By Nancy Rand, Posted in Uncategorized

May 20, The Register – (International) 60 percent of Androids exposed by new attack on mediaserver. A security researcher from Duo reported that about 60 percent of enterprise Android phones running Lollipop version 5 operating system (OS), KitKat version 4.4, and Marshmallow version 6 OS were susceptible to a Qualcomm Secure Execution Environment (QSEE) vulnerability after researchers discovered the flaw in the mediaserver component that could allow an attacker to gain complete control over the device by t... read more.

  • May 23, 2016

By Ken Phelan, Posted in Uncategorized

In Richard Thaler’s new book, Misbehaving: The Making of Behavioral Economics, he explains a number of risk management behaviors that are currently frustrating the IT Risk world. It’s a great read, and I highly recommend it if IT risk is part of your job. One of his discussions surrounds a group of senior executives at a large corporate conglomerate. He offered them the following scenario: Suppose you were offered an investment opportunity for your division that will yield one of two payoffs. After th... read more.

  • January 20, 2016

By Ken Phelan, Posted in Uncategorized

Every business builds itself around the needs for three constituencies - customers, employees, and owners. The CEO acronym is an easy way to remember them. There is always a balance, but generally one of them has a priority role. Customer-driven businesses start with customer experience as their priority. A lot of retail organizations have this focus. Nordstrom’s comes to mind. Service industry’s often make employees a priority, knowing that a good employee will make the service product shine. Starbucks... read more.

  • November 06, 2015

By Ken Phelan, Posted in Uncategorized

One of the things I like really like about my job is that I spend a lot of time out of my office, visiting clients. Conference calls and web meetings are fine, but nothing communicates like a face-to-face interaction. When you go to someone’s office you simply understand the situation better. One of the telling things I often run into in this physical inspection is something I call Cap-X bloat. Many organizations are fine when it comes to buying things, but they often don’t have the time to implement the... read more.

  • October 15, 2015

By Nancy Rand, Posted in Uncategorized

September 16, Reuters – (National) Homeland Security websites vulnerable to cyber attack: Audit. The Office of the Inspector General for DHS released a report September 15 citing several deficiencies within DHS’s information systems, including lapses in internal systems used by several agencies that may allow unauthorized individuals to gain access to sensitive data, and the need to establish a cyber-training program for analysts and investigators, among other findings. Source September 16, Threatpost –... read more.

  • September 18, 2015

By Ken Phelan, Posted in Uncategorized

It’s a longstanding joke among technologists. The only problem with technology is the people who use it. I think the joke needs an update. The only problem with technology platforms is applications. I was talking to some of my virtual desktop friends the other day. We were talking about their challenges in keeping a stable platform in the face of the corporate chaos. Every day brings new underlying challenges. There are new applications. There are new security requirements on a regular basis. Even the fo... read more.

  • September 08, 2015