LMTV LIVE | Introducing Cubro the Network Visibility Company


Cubro_170x200Who is Cubro and WHY should every Network Technologist want to know?

Todays complex network technologists find it challenging and overwhelming to manage their networks in the effort to minimize issues, Legal and Technical, so one must have Total Visibility to be able to recognize performance issues, aberrant behavior, data leaks plus being able to prove that they are protecting their network and data!. Today’s data requirements for  carriers, data centers, defense organizations and enterprises is that they MUST be able to see all their data and applications in real time in order to secure and manage their growing networks and traffic demands while improving productivity and keeping watch for attacks and leaks.

The key to this success is Total Network Visibility with Line Rate, Real Time network segment with focus view capabilities.

These demands are why network technologists need to know who Cubro is and understand their capabilities to provide this challenging Total Network Visibility.  Cubro’s technology can enable today’s organizations to meet these advance and complex challenges with solutions that not only help to protect and grow their network technology but doing so with long life technology with cutting-edge features, with unheard of deployment simplicity, exceptional reliability, with a high ROI and world class support.


Continue reading "LMTV LIVE | Introducing Cubro the Network Visibility Company" »

Create marketing materials that make an impact! (by John Gumas)


If you are a new or Challenger Brand your branding and marketing material must be focused to make a real impact on your potential customer base. On impact your material can either get through and make a positive impact or bounce off and make a negative event.

Having boring or not focused (Not on Point) marketing materials is a great way to not get noticed or noticed negatively.

Of course, that’s exactly what you don’t want. In order to grow your business, you need to make sure you’re doing everything you can to grab the attention of your customers. From informational flyers to social media graphics, it’s important to create marketing materials that make an impact.

Positive impact points to consider below:

Here’s how to get started.

  • Develop Your Message. Your marketing materials should be focused on how you can help your customers and make their life easier. Tailor your product or service to how it can solve a problem, and get to the point quickly. Plus, don’t forget to explain who you are and why they should buy from you over your competitors.
  • Know Your Audience. How can you create effective marketing materials if you don’t know who will be seeing them? A big part of marketing is understanding people. Get to know the ins and outs of your customer base, including what they might be feeling when consuming one of your ads. By appealing to the desires of your customer, you’ll have a much easier time communicating your message.
  • Tell a Story. The secret to capturing the attention of your audience is to tell a story. Storytelling is an essence, not a type of writing. Find a way to hook your audience and tell them something they don’t know. A good place to start is to be relatable and show vulnerability. Did your company start from nothing? Share this with your audience. When executed properly, a heartfelt story can be extremely effective.
  • Think Outside the Box. It’s all too easy to fall into the habit of following trends. Sometimes, though, the best action to take is the one that nobody else has considered. For instance, in this world of digital advertising and instant communication, nothing stands out like a physical catalog or a direct mail letter. Your research should give you a pretty good idea of what will work with your audience. Use this knowledge to your advantage. Be creative, and have fun!

Continue reading "Create marketing materials that make an impact! (by John Gumas)" »

Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)

Top Five Ways to Optimize Performance Monitoring

Network performance monitoring, and especially network optimization, is more of an art than a science because there are so many factors that figure into network and application responsiveness. In addition, while there is a plethora of data on the network, determining the right kind of data that you need and where you should you be capturing it from can become very difficult. This data collection process is then further complicated by the fact that tactical data loses up to 70% of its value after 30 minutes. This makes the speed and accuracy of data analysis critical.

The solution to these problems is to create a network visibility architecture. Network visibility is what enables you to quickly isolate and resolve performance issues; ultimately ensuring the best possible end-user experience. From there, you can use anomaly driven data flows to quickly isolate potential problems.

Here is what you need to set up a visibility architecture:

Optimized Performance 2

  • Taps, virtual taps, and bypass switches – These devices give you timely access to the data you need
  • Network packet broker (NPB) – This device gives you filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs enable: data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data.
  • Application intelligence functionality (within an NPB) – This functionality provides additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack
  • The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g., sniffer, NPM, APM, etc.) that are designed to analyze specific data.


Continue reading "Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)" »

Managing Wireshark Packet Comments (by Tony Fortunato)

In my opinion, Wireshark's File and Packet comments are the most under utilized features.

When I work onsite and capture packets, I get a lot of questions ranging from tool use and of course, packet interpretation.

Other than providing some customized onsite training (I no longer offer public training sessions) or mentoring, knowledge transfer is always challenging.

Providing file comments helps document why and where you performed the trace and any other noteworthy points. Notes such as a problem description, if SPAN or TAP are used are incredibly helpful when others look at the trace file.

Packet comments are even more important since you can explain protocol, application behavior and problems within the related packets.

It doesn't matter if the notes are to jog your memory 6 months from now or if you are sending the trace to another department/vendor.  Anyone will find the comments helpful reducing a lot of the typical back and forth involved when you share a trace file.

In this video I cover how to add, find and remove packet comments.



Continue reading other LoveMyTool posts by Tony Fortunato »

A Line in the Silicon (by Paul W. Smith)

Draw Line in Sand BW
During the siege of the Alamo in 1836, Lt. Col. William Travis is said to have drawn a line in the sand with his sword, imploring those who were willing to defend the fort to step across.  While the story itself has since been debunked, it was good enough to insert the phrase “a line in the sand” into the popular lexicon.  Originally intended to force people to choose sides, crossing a line has also become a familiar metaphor for going just a little too far.  Politicians famously draw both types of lines, and then usually end up regretting it. 

Most of us would step across a line to proclaim that we support the benefits of technology.  There are far too many to list here, and some are more critical than others.   As recently as 1800, the average lifespan was 40 years.  Today, about 50% of the population is over 40.  Were it not for some of the benefits of technology, half of us would be dead. 

Technology is clearly beneficial, until it goes too far.   Crossing that other line has sparked debates ranging from medical record keeping and DNA databases to artificial intelligence and machine autonomy.  Technology allows us to gather huge masses of data (Forbes says we generate 16.3 Zettabytes/year) and continues to find new ways to utilize it.  Although it’s convenient to ask Siri for the closest Italian restaurant that’s open late, it also concerns me that she knows where I am, and where I have been.  The line between utility and privacy can be tough to draw.

Continue reading "A Line in the Silicon (by Paul W. Smith)" »