Saturday, February 28, 2015

Tabula Rosa Blog Of The Day - Internet Neutrality Clarified!


 Now that the United States FCC has ruled in favor of Internet Neutrality, here is a simple explanation of what this means for netizens. Do not believe the propaganda of many extremists and lobbyists who are claiming this ruling constitutes a takeover of the Internet -  it is exactly the opposite! 

Similarly, if you are outside of the United States, the ruling still applies because a huge amount of Internet traffic flows through US carries and providers. Also some countries do not have high-speed and access limitation because certain governments allow carries to limit speed and availability. We all should do our part to make this and simple access a reality for all!
 =============================================
The New Net-Neutrality Policy, in Three Simple Phrases

What America's historic ruling means in plain English

Tim FernholzFeb 26 2015, 3:26 PM ET

Pablo Martinez Monsivais/AP 

The U.S. Federal Communications Commission just adopted strict net-neutrality rules that will treat the Internet like a public utility. What’s in the new regulations? There are three major principles that Internet-service providers—like Comcast, AT&T, Time Warner Cable, and Verizon—have to follow when sending data from their networks to your computer:
No Blocking
Internet providers can’t prevent you from accessing “legal content, applications, services, or non-harmful devices” when you’re on the Internet. This is intended to prevent censorship and discrimination of specific sites or services. Some open-Internet advocates worry the phrase “legal content” will create a loophole that might let Internet providers block stuff they see as questionable on copyright grounds without a fair hearing.

No Throttling

Internet providers can’t deliberately slow down data from applications or sites on the Internet. That means, for instance, that a broadband company has to let all traffic flow equally, regardless of whether it’s coming from a competitor or a streaming video service like Netflix that uses a lot of data.

No Paid Prioritization

Internet providers can’t charge content providers extra to bring their data to you faster. That means no Internet “fast lanes,” because regulators fear they will lead to degraded service for anyone not willing to pay more.

If content providers or the networks that underly the Internet complain about Internet providers acting as gatekeepers for their users, the FCC says it will have the authority “to hear complaints and take appropriate enforcement action if necessary, if it determines the interconnection activities of ISPs are not just and reasonable.” It’s not clear yet what that will mean in practice.
 
 
================================= 
**Important note** - contact our company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Technical Term Of The Day - Google Honeypot

 
 

Honeypot – source -  techterms.com
A honeypot is a security system designed to detect and counteract unauthorized access or use of a computer system. The name "honeypot" is used in reference to the way the system traps unauthorized users, such as hackers or spammers so they can be identified and prevented from causing further problems.
Honeypots are different than typical security solutions because they intentionally lure in hackers or users with malicious intent. For example, a company may purposely create a security hole in their network that hackers could exploit to gain access to a computer system. The system might contain fake data that would be of interest to hackers. By gaining access to the data, the hacker might reveal identifying information, such as an IP address, geographical location, computer platform, and other data. This information can be used to increase security against the hacker and similar users.
Another example of a honeypot is an email honeypot designed to counteract spammers. It may be configured as a fake email address that is intentionally added to known spam lists. The email address can be used to track the servers and relays that send spam to the honeypot account. This information can be used to blacklist certain IP addresses and domain names in anti-spam databases. An email honeypot can even be used as a counterattack tool, which forwards spam to the email addresses of identified spammers.
While honeypots are an effective way to monitor and protect information systems, they can also be expensive to maintain. Therefore, honeypots are used primarily by large companies and organizations, rather than small businesses. Government and educational institutions may also deploy research honeypots as a means of tracking unauthorized access attempts and improving security solutions.
================================= 
**Important note** - contact sister company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Friday, February 27, 2015

Tabula Rosa Quotation Of The Day - On the Benefit Of Internet Neutrality


=====================================================================


memory ballooning
Memory ballooning is a memory management technique that allows a physical host to take advantage of unused memory on its guest virtual machines (VMs).

When a host OS is short on physical memory, the hypervisor polls balloon drivers installed on the guests to request available memory. The guests respond by using page-reclaiming algorithms to determine which pages are available and can be assigned to the balloon drivers. The process of assigning available pages to the driver is known as inflating the balloon. Releasing available pages is known as deflating the balloon. 

In a positive sense, memory ballooning allows that the total amount of RAM required by guest virtual machines to exceed the amount of physically available RAM on the host. A problem can occur, however, when a balloon driver inflates to the point where the guest VM no longer has the memory it needs to run processes within the guest. In such a scenario, the guest operating system will start swapping things out to deal with its memory issues. This swap activity can negatively affect performance, depending upon the amount of memory to recoup and/or the quality of the storage IOPS delivered to the VM. 

Other memory-reclaiming techniques include memory overcommit, memory paging, memory mirroring and transparent page sharing.
================================
**Important note** - contact sister company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:

www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Technical Term Of The Day - Memory Ballooning



=====================================================================

=====================================================================

==========================================

Memory Ballooning
Memory ballooning is a memory management technique that allows a physical host to take advantage of unused memory on its guest virtual machines (VMs).

When a host OS is short on physical memory, the hypervisor polls balloon drivers installed on the guests to request available memory. The guests respond by using page-reclaiming algorithms to determine which pages are available and can be assigned to the balloon drivers. The process of assigning available pages to the driver is known as inflating the balloon. Releasing available pages is known as deflating the balloon. 

In a positive sense, memory ballooning allows that the total amount of RAM required by guest virtual machines to exceed the amount of physically available RAM on the host. A problem can occur, however, when a balloon driver inflates to the point where the guest VM no longer has the memory it needs to run processes within the guest. In such a scenario, the guest operating system will start swapping things out to deal with its memory issues. This swap activity can negatively affect performance, depending upon the amount of memory to recoup and/or the quality of the storage IOPS delivered to the VM. 

Other memory-reclaiming techniques include memory overcommit, memory paging, memory mirroring and transparent page sharing.
=================================
**Important note** - contact sister company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:

www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Thursday, February 26, 2015

#Netiquette IQ Blog - A Major Victory For Netizens! FCC Rules On #Internet Neutrality!

 After over a year of debates, discussions and heavy political lobbying, the FCC has finally ruled, along party lines to approve the U.S. regulation of the Internet as though it was a utility with equal access for all!
=====================================================================

POLITICO Pro

FCC approves net neutrality rules
By Alex Byers and Brooks Boliek

2/26/15 1:05 PM EST
Updated 2/26/15 2:21 PM EST

The Federal Communications Commission voted along party lines Thursday to approve sweeping changes to how it regulates the Internet, capping more than a year of noisy debate that sparked millions of public comments and drew the attention of President Barack Obama and congressional leaders.

The agency’s three Democrats voted to approve Chairman Tom Wheeler’s net neutrality order, which would treat broadband like a utility to ensure all Web traffic is treated equally. The commission’s two GOP members, Republican lawmakers and the nation’s telecom giants oppose the rules, saying they will dampen innovation and investment. AT&T has already threatened a legal challenge.

“The Internet is the most powerful and pervasive platform on the planet. It’s simply too important to be left without rules and without a referee on the field,” Wheeler said at Thursday’s FCC’s meeting. “Today is a red-letter day for Internet freedom, for consumers who want to use the Internet on their terms, for innovators who want to reach consumers without the control of gatekeepers.”

In a separate decision Thursday, the FCC’s Democratic majority voted to override state laws that prevent community-run broadband networks in Chattanooga, Tennessee and Wilson, North Carolina from expanding their geographic reach. The move will help such locally managed networks compete with incumbent cable and telecom companies.

Net neutrality, however, has been the most contentious policy issue.

Wheeler’s plan will prevent ISPs from blocking or degrading legal Internet traffic and bar them from cutting deals to charge companies for so-called Internet fast lanes. It applies net neutrality protections to both land-based and wireless Internet as well as to “interconnection” points between networks deep inside the Web.

The FCC chairman didn’t initially intend to write net neutrality rules, but a decision by the D.C. Circuit of Appeals in January 2014 tossing key elements of the agency’s previous Open Internet order threw the issue in his lap.

His initial replacement proposal — which would have allowed pay-for-play Internet fast lanes, as long as they were deemed “commercially reasonable” — sparked an immediate backlash. Outraged liberals launched a protest campaign and generated millions of comments to the agency in support of tighter regulation. A segment by comedian and HBO host John Oliver lampooning Wheeler’s plan added to the outrage.

After sustained pressure from progressives — and a public push from President Barack Obama in November — Wheeler gravitated toward a tougher approach that subjects ISPs to regulations originally written for phone companies in the 1930s. It’s based on Title II of the Communications Act.

That shift incensed Republicans, who see the rules as drastic over-regulation and a federal government power grab. Ajit Pai, the FCC’s senior GOP commissioner, has said the plan could ultimately give the agency the authority to set rates for Internet service — a charge Wheeler and FCC officials have denied.

“The commission’s decision to adopt President Obama’s plan marks a monumental shift toward government control of the Internet,” Pai said at the agency meeting Thursday. “It gives the FCC the power to micromanage virtually every aspect of how the Internet works. It’s an overreach that will let a Washington bureaucracy, and not the American people, decide the future of the online world.?”

GOP lawmakers have been turning up the heat on Wheeler on net neutrality. They’ve launched investigations into what they see as inappropriate White House influence over the FCC’s decision making and offered an alternative legislative proposal that would institute weaker net neutrality rules and tie the FCC hands on future regulation of broadband.

Republicans have also criticized Wheeler on transparency grounds for not releasing his plan ahead of the FCC vote. An FCC official said the agency’s standard practice is to not make proposals public before a vote, adding they’re normally made available within days or weeks depending on the complexity of the topic.

“Overzealous government bureaucrats should keep their hands off the Internet,” House Speaker John Boehner said in a statement. “More mandates and regulations on American innovation and entrepreneurship are not the answer, and that’s why Republicans will continue our efforts to stop this misguided scheme.”

The telecom industry is expected to mount a legal challenge to the net neutrality order, and AT&T has indicated the big carriers will likely ask a court to block the plan.
On Thursday, the company warned the FCC’s vote may not last.

“Instead of a clear set of rules moving forward, with a broad set of agreement behind them, we once again face the uncertainty of litigation, and the very real potential of having to start over — again — in the future,” said Jim Cicconi, AT&T’s top lobbyist. “Partisan decisions taken on 3-2 votes can be undone on similarly partisan 3-2 votes only two years hence.”

The FCC’s decision to intervene on behalf of community broadband may open a new phase in the broader debate over competition in the Internet service market.

Some ISPs have lobbied for state restrictions on municipal networks, and Obama has called on the FCC to come to the aid of towns and cities that want to build out their own locally-run Internet service. Republicans in Congress, meanwhile, have warned the FCC against what they call unconstitutional meddling in state affairs.
=================================
**Important note** - contact our company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:

www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
 

Tabula Rosa Systems Alert From US-CERT For Cisco And Mozilla


 
=============================================


National Cyber Awareness System:
02/24/2015 04:15 PM EST

Original release date: February 24, 2015
The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox, Firefox ESR, and Thunderbird. Exploitation of these vulnerabilities may allow a remote attacker to obtain sensitive information or execute arbitrary code on an affected system.
Updates available include:
  • Firefox 36
  • Firefox ESR 31.5
  • Thunderbird 31.5
Users and administrators are encouraged to review the Security Advisories for Firefox, Firefox ESR, and Thunderbird and apply the necessary updates.



02/25/2015 10:39 AM EST

Original release date: February 25, 2015
Cisco has identified a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition. The vulnerability is due to improper processing of malformed IPv6 packets carrying extension headers. Cisco Network Convergence System 6000 (NCS 6000) and Cisco Carrier Routing System X (CRS-X) running an affected version of Cisco IOS XR Software are affected by this vulnerability.
Users and administrators are encouraged to review the Cisco Advisory and apply the necessary updates.

=================================
**Important note** - contact company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Wednesday, February 25, 2015

Tabula Rosa Systems Product Overview - CrossWare


==========================================
 Overview
Crossware Mail Signature is a server-based application that automatically adds your correctly
branded, legally compliant, personalised and attractive signatures to all company emails. These
signatures may include legal disclaimers, logos, graphics and advertising banners – which can be
randomised or specific to certain recipients. Crossware Mail Signature can take care of your
compliance needs by including appropriate disclaimers and legislative disclosure requirements on all
emails as they pass through your servers. With Crossware Mail Signature there’s no more setting up
or ongoing management of individual signatures on users’ workstations, as well as no design
changes to your Domino Directory or email template.

Crossware Mail Signature lets you centrally manage the design and usage of your signature block –
including logos, fonts, messages and disclaimers – using the signature configuration database.

Technical Description
Crossware Mail Signature is a server-side application that runs on Lotus Domino.The software can be
used on every Lotus Domino platform including Windows, Linux, zLinux, IBM i, Solaris and AIX.
It also supports any Domino server email client including Lotus Notes 6 and above, Lotus iNotes,
Blackberry and Lotus Traveler compatible devices including iPhone, iPad, Android, Symbian and
Windows Mobile.
Installation

Installing Crossware Mail Signature is done via a very simple installation wizard. Just download the
trial to your workstation, double-click and follow the easy-to-use installer. The typical installation
takes just 30 minutes. Whether you have a single server, multiple servers or cluster server
configuration, Crossware Mail Signature supports all types of server setup.

Crossware Mail Signature can be used for both internal and external emails, or it can be exclusive to
external emails only. For both internal and external email, the software is to be installed on any
single Domino Mail Server and then pushed through to all other servers; where it will then be
automatically replicated. If you are looking to use Crossware on external mail only then simply install the software on your SMTP Gateway server. See the attached Technical Diagrams for more details.

Benefits
Crossware Mail Signature is positioned to apply four key pillars of opportunity to your business.
These pillars include: Branding, Compliance, Advertising and Centralised Management. Each of these pillars can be utilised in different ways.
=============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki
=================================================
============================================
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================


Monday, February 23, 2015

Tabula Rosa Systems Product Feature Of The Day - Gigamon NetFlow Generation

Gigamon is one of Tabula Rosa's premiere products and with good reason. The blog today describes how Gigamon can can generate Netflow within a network. This can be a powerful tool for network engineers, administrators and architects.

If you have questions about this or any Gigamon product, please contact our company as noted belo.
====================================================



NetFlow Generation

Challenges in NetFlow Generation

NetFlow is a simple, effective way to increase visibility into traffic types and usage patterns across systems. The flow-generated data can be used to build relationships and usage patterns between nodes on the network. Routers and switches that support NetFlow can collect IP traffic statistics to be exported as NetFlow records. However the processor and memory load of enabling NetFlow can cause service degradation and affect their ability to pass traffic without introducing latency and packet drops. Due to this processing overhead, sampled NetFlow is implemented in most of the high-end routers. Sampling one in every “n” packets for NetFlow processing can severely limit the visibility needed to monitor flows and fail to provide a comprehensive network trend analysis.
The Gigamon Solution
The advanced capabilities of GigaSMART® technology can be leveraged to summarize and generate unsampled NetFlow statistics from incoming traffic streams. Offloading NetFlow Generation to an out-of-band solution like the Gigamon Visibility Fabric completely eliminates the risk of expending expensive production network resources in generating these analytics. Combined with the flexibility offered by Gigamon’s patented Flow Mapping® technology, operators can pick and choose from the incoming flows to generate NetFlow statistics, without losing critical information. Support for NetFlow versions 5 and 9 and IP information export (IPFIX), enables seamless integration with standards-based collectors. NetFlow records can also be exported to multiple collectors concurrently, providing a single flow source for business-critical management applications such as security, billing, capacity planning, and more. Pervasive flow-level visibility across remote locations and Big Data environments can be used to derive accurate statistics such as usage patterns, top talkers, and top applications for effective capacity planning and enforcing security policies.
NetFlow-based data is summarized information and does not provide access to specific set of packets or packet payloads. Not having this information can also impede analysis around latency and jitter, application usage patterns, etc. Gigamon’s Visibility Fabric architecture is the first in the industry to summarize flow statistics as well as to provide the flexibility of aggregating, replicating, filtering, and forwarding raw traffic streams to monitoring tools for detailed troubleshooting and analytics.
The Gigamon Visibility Fabric thus establishes a scalable framework to deliver pervasive flow-level visibility across enterprises, data centers, and service provider environments to accurately design, engineer, optimize, and manage their network infrastructure.
Feature Description
·         First in the Industry to Combine End-to-End Traffic and Flow Visibility in a Single Solution
o    High-throughput solution with support for unsampled 1:1 NetFlow record generation
o    Integrated traffic visibility solution with NetFlow Generation
·         Out-of-Band NetFlow Generation
o    Transforms packet data across multiple devices into summarized NetFlow records
·         Supported NetFlow Export Formats
o    NetFlow v5 and v9
o    IP Information Export (IPFIX)
·         Ingress Filtering
o    Patented Flow Mapping technology enables granular control over incoming flows for generating NetFlow records
·         Multiple NetFlow Exports
o    Supports NetFlow exports for up to six NetFlow collectors; most switches and routers support limited numbers of collectors
o    Filter output for specific collectors or replicate output across multiple collectors
·         High Throughput Solution
o    Supports unsampled 1:1 flow record generation and configurable sampled NetFlow generation from incoming traffic streams
·         End-to-End Visibility 
=====================================================

**Important note** - contact our company for very powerful solutions for IP management (DNS, IPv4 and IPv6), security, firewall, log management, DLP, IDS, IPS and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki
=================================================
============================================
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================