Saturday, September 24, 2016

Tabula Rosa SYstems Technology Definition Leaf-Spine Networks



 














Leaf-spine is a two-layer network topology composed of leaf switches and spine switches. Servers and storage connect to leaf switches and leaf switches connect to spine switches. Leaf switches mesh into the
Every leaf switch in a leaf-spine architecture connects to every switch in the network fabric. No matter which leaf switch a server is connected to, it has to cross the same number of devices every time it connects to another server. (The only exception is when the other server is on the same leaf.) This minimizes latency and bottlenecks because each payload only has to travel to a spine switch and another leaf switch to reach its endpoint.
A leaf-spine topology can be layer 2 or layer 3 depending upon whether the links between the leaf and spine layer will be switched or routed. In a layer 2 leaf-spine design, Transparent Interconnection of Lots of Links or shortest path bridging takes the place of spanning-tree. All hosts are linked to the fabric and offer a loop-free route to their Ethernet MAC address through a shortest-path-first computation. In a layer 3 design, each link is routed. This approach is most efficient when virtual local area networks are sequestered to individual leaf switches or when a network overlay, like VXLAN, is working.
================================
        Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Friday, September 23, 2016

Tabula Rosa Systems Technical Term Of 9/23/2016 - Social Media Analytics



 










Social media analytics
Social media analytics is the practice of gathering data from blogs and social media websites and analyzing that data to make business decisions. The most common use of social media analytics is to mine customer sentiment in order to support marketing and customer service activities.
The first step in a social media analytics initiative is to determine which business goals the data that is gathered and analyzed will benefit. Typical objectives include increasing revenues, reducing customer service costs, getting feedback on products and services and improving public opinion of a particular product or business division.
Once the business goals have been identified, key performance indicators (KPIs) for objectively evaluating the data should be defined. For example, customer engagement might be measured by the numbers of followers for a Twitter account and numbers of retweets and mentions of a company's name.
There are a number of types of software tools for analyzing unstructured data found in tweets and Facebook posts. In addition to to text analysis, many enterprise-level social media tools will harvest and store the data.
================================       Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Thursday, September 22, 2016

Netiquette IQ Security Alert For 9/22/2016 - Yahoo Confirms 500 Million Accounts Hacked in Massive Data Breach



 









Yahoo Confirms 500 Million Accounts Hacked in Massive Data Breach

Sunnyvale, Calif. -- Internet giant Yahoo on Thursday revealed a massive data breach affecting at least 500 million user accounts. "We have confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a state-sponsored actor," wrote Bob Lord, the company's chief information security officer. "The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers." Lord said an ongoing investigation suggests that the stolen information didn't include unprotected passwords, payment card data or bank account information. The company is notifying all affected users via email, asking them to change their passwords and adopt alternate means of account verification. The breach may have major implications for Sunnyvale-based Yahoo, whose core business is in the process of being acquired by Verizon for $4.8 billion.
https://yahoo.tumblr.com/post/150781911849/an-important-message-about-yahoo-user-security
================================
      
 Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Wednesday, September 21, 2016

Tabula Rosa Systems Definition Of The Day - Buffer Overflow



 









Buffer Overflow
Posted by: Margaret Rouse
Contributor(s): Michael Cobb
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.
In July 2000, a vulnerability to buffer overflow attack was discovered in Microsoft Outlook and Outlook Express. A programming flaw made it possible for an attacker to compromise the integrity of the target computer by simply it sending an e-mail message. Unlike the typical e-mail virus, users could not protect themselves by not opening attached files; in fact, the user did not even have to open the message to enable the attack. The programs' message header mechanisms had a defect that made it possible for senders to overflow the area with extraneous data, which allowed them to execute whatever type of code they desired on the recipient's computers. Because the process was activated as soon as the recipient downloaded the message from the server, this type of buffer overflow attack was very difficult to defend. Microsoft has since created a patch to eliminate the vulnerability
=================================
      
 Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Tuesday, September 20, 2016

Tabula Rosa Systems Security Bulletin 9/20/2016 - SB16-263: Vulnerability Summary for the Week of September 12, 2016




National Cyber Awareness System:

09/19/2016 06:58 AM EDT

Original release date: September 19, 2016
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.
========================================= **Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 


Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Sunday, September 18, 2016

Tabula Rosa Systems Blog Of 9/1816 - Reasons Not To Respond To Nasty Email

I knew I’d finally “made it” as an Internet writer when I encountered my first barrage of negative comments in response to one of my articles. When I became a Featured Writer on the SheKnows Network, they welcomed me with an email warning me how extra exposure is often accompanied by negative comments, and while they do their best to filter the awful ones, sometimes they seep through.
I’ve existed happily and comfortably in the blog bubble I created for the last 258 days, writing and sharing a deconstructed memoir in essay form daily to an audience of subscribers. Each morning, I hoarded my few dozen likes and comments and relished my smileys and hearts from Facebook; exactly the type of digital encouragement an insecure writer needs.
Also, I felt safe writing from a platform called “HeartsEverywhere.” I love love; finding it and rediscovering it when I lost it. I look for the love (and comedy) in any scenario and when I can’t find it, I cope with words. (I live by the Nora Ephron school of life: “everything is copy.” ) I never imagined MY writing would yield nasty comments; especially hurtful because they didn’t criticize my writing, but me, the human narrating the story.
Most of the unpleasant comments came from men, which is ironic on a site called SheKnows.
The post I wrote which sparked the hate was: “I Feel Like a Divorce Inspiration Club.” I’ve been divorced for almost a dozen years and have found love again and been in that successful partnership for the last 11 years. It was with the benefit of hindsight and many years of healing that I was able to write about divorce and co-parenting with such candor.
The vilest of the comments came from a man who called me a prostitute - and he did this as a comment to every other comment on there (about 47 at the time). I flagged them and they were removed and I laughed it off. Another commenter took it a step further; he wrote an entire essay response to my piece.
 
 
His assumptions were preposterous and while he was potentially projecting or coming from a place of pain (why do I have to be a therapist and analyze his true intentions), my knee-jerk reaction was to take the bait and bite back. I wrote back, addressing every one of his idiotic, false assertions. As soon as I hit publish, I regretted it. I am a writer, not a fighter and I didn’t have to defend my story because it wasn’t about him nor was it up for judgment.
While I didn’t want to sound defensive, I equally didn’t want his rant to mislead other readers into considering any of his outlandish comments. I suspected he was an unhappy troll, who would soon retreat back to the closet under the stairs, but for a few short minutes, I let him in. Those comments were daggers stabbing my self-esteem and I plotted my move to fiction writing. Only 107 days of vulnerable essay writing to go. 
But then it hit me: this was like internet terrorism. He wouldn’t shut me up; I wouldn’t be afraid of words written from behind an anonymous keyboard. I refused to give anyone that power.
Theoretically, the concept that my writing invoked a reaction, should actually make me proud. My words elicited a strong emotion from a reader, enough to incite action and write a comment. Yet somehow that pride took a backseat to the fragile little girl who emerged, standing in front of a class after reading her essay, and the mean boys threw sticks and stones at me. My instinct was to retreat and cry, but instead, I chuckled and vowed NEVER to reply to another antagonizing commenter again. (Although I won’t stop from reading them yet.)
Some of the other non-hooker comments:
• Only 20% of second marriages last
• Don’t have kids unless you are willing to put their happiness above your own. What the author is advocating is wrong.
• YOUR SON DOES NOT HAVE A CHANCE AT HAPPINESS
• You were married for 4 years? Not long enough to qualify as married.
• He said to men love your wife like Christ loved the church and he gave an example of that when he died on the cross for you and me. You are broken by sin in the form of selfishness
And my favorite, directed at my current husband at how to handle me:
• Toss her the blow dryer while she’s showering but remember you have no idea how the crazy glue got on the circuit breaker just say she must have been suicidal and stick to that story.
============================================= **Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================