`
`
`
`Sent: 9/10/2020 4:41:20 PM
`
`
`
`To: TTAB EFiling
`
`
`
`CC:
`
`
`
`Subject: U.S. Trademark Application Serial No. 87697680 - NETARGOS - TM1215US00 - Request for
`Reconsideration Denied - Return to TTAB - Message 1 of 6
`
`
`
`
`
`
`
`*************************************************
`
`Attachment Information:
`
`Count: 19
`
`Files: 1-1.jpg, 1-2.jpg, 2-1.jpg, 2-2.jpg, 2-3.jpg, 2-4.jpg, 2-5.jpg, 2-6.jpg, 2-7.jpg, 2-8.jpg, 3-1.jpg, 3-2.jpg,
`3-3.jpg, 3-4.jpg, 3-5.jpg, 3-6.jpg, 3-7.jpg, 3-8.jpg, 87697680.doc
`
`
`
`
`
`
`
`United States Patent and Trademark Office (USPTO)
`Office Action (Official Letter) About Applicant’s Trademark Application
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Application Serial No. 87697680
`
`
`
`Mark: NETARGOS
`
`
`Correspondence Address:
` Hae-Chan Park
`
` H.C. PARK & ASSOCIATES, PLC
`
` 1894 PRESTON WHITE DRIVE
`
` RESTON VA 20191
`
`
`
`Applicant: Xabyss Inc.
`
`
`
`Reference/Docket No. TM1215US00
`
`
`
`Correspondence Email Address:
`
` Patent@park-law.com
`
`
`
`
`
`
`
`REQUEST FOR RECONSIDERATION
`AFTER FINAL ACTION
`DENIED
`
`
`Issue date: September 10, 2020
`
`
`Applicant’s request for reconsideration is denied. See 37 C.F.R. §2.63(b)(3). The trademark
`examining attorney has carefully reviewed applicant’s request and determined the request did not:
`(1) raise a new issue, (2) resolve all the outstanding issue, (3) provide any new or compelling
`
`
`
`evidence with regard to the outstanding issue, or (4) present analysis and arguments that were
`persuasive or shed new light on the outstanding issue. TMEP §§715.03(a)(ii)(B), 715.04(a).
`
`Accordingly, the following refusal made final in the Office action dated February 7, 2020 is maintained
`and continued:
`
`• Refusal Under Section 2(d)-Likelihood of Confusion
`
`
`
`
`
`
`
`
`
`See TMEP §§715.03(a)(ii)(B), 715.04(a).
`
`
`
`
`
`In addition, the following requirement made final in that Office action is satisfied:
`
`• Definite amended identification of goods provided
`
`
`
`
`
`
`
`
`
`See TMEP §§715.03(a)(ii)(B), 715.04(a).
`
`Specifically, the refusal under Section 2(d) is maintained for the reasons set forth in the final office
`action, which are that applicant’s applied-for mark is similar to registrants’ marks, and applicant’s goods
`are related to registrants’ goods and services.
`
`
`
`Comparison of the Marks
`
`
`
`With respect to Registration No. 3906134, the only difference between the applied-for mark and
`registrant’s mark is that applicant adds a descriptive or at most suggestive term to registrants’ marks.
`Each of the marks includes the arbitrary term “ARGOS”. Thus, the marks are identical in part. Because
`they both incorporate the distinctive arbitrary term “ARGOS” they appear similar overall when
`compared in their entireties.
`
`
`
`With respect to Registration No. 4784418, the only difference between the literal elements of applied-
`for mark and registrant’s mark is that applicant adds a descriptive or at most suggestive term to
`registrants’ marks. Each of the marks includes the arbitrary term “ARGOS”. Thus, the marks are identical
`
`
`
`in part. Because they both incorporate the distinctive arbitrary term “ARGOS” they appear similar
`overall when compared in their entireties. Further, the design element in registrant’s mark does not
`distinguish the marks in a way that obviates a likelihood of confusion for the reasons discussed in the
`final office action.
`
`
`
`Comparison of the Goods and Services
`
`
`
`Applicant contends that its amendment to the identification of goods obviates a likelihood of confusion.
`The examining attorney disagrees. Applicant’s goods, as amended, are related to registrants’ goods and
`services.
`
`
`
`With respect to Registration No. 3906134, applicant contends the goods are not related by pointing to
`several of the goods listed in the registration and comparing those to the goods in applicant’s
`application. However, goods are compared as set forth in the identification. See In re Detroit Athletic
`Co., 903 F.3d 1297, 1307, 128 USPQ2d 1047, 1052 (Fed. Cir. 2018) (citing In re i.am.symbolic, llc, 866
`F.3d 1315, 1325, 123 USPQ2d 1744, 1749 (Fed. Cir. 2017). Here, registrant’s goods include
`“microcomputers” which are related to registrant’s goods as shown by the previously attached evidence
`as well as the newly attached evidence from Lenovo, HP, Dell, and Microsoft demonstrating that third
`parties commonly provide both microcomputers as well as data storage hardware, networking
`monitoring apparatus, software for network security and/or software for enterprise security
`management. The attached evidence from Apple also shows that software for network security and
`microcomputers are used together.
`
`
`
`With respect to Registration No. 4784418, the previously attached evidence demonstrates that
`applicant’s goods are related to registrant’s services. See also attached evidence from Nete Rich,
`Accedian and Firemon showing that third parties commonly provide cybersecurity software for
`computer security and prevention of computer risks as well as software for network security that helps
`minimize network blind spots.
`
`
`
`Conclusion
`
`
`
`Because applicant’s applied-for mark is similar to registrants’ marks and applicant’s goods are related to
`registrants’ goods and services, the refusal under Section 2(d) is maintained.
`If applicant has already filed an appeal with the Trademark Trial and Appeal Board, the Board will be
`notified to resume the appeal. See TMEP §715.04(a).
`
`
`
`
`
`If applicant has not filed an appeal and time remains in the six-month response period, applicant has
`the remainder of that time to (1) file another request for reconsideration that complies with and/or
`overcomes any outstanding final requirement(s) and/or refusal(s), and/or (2) file a notice of appeal to
`the Board. TMEP §715.03(a)(ii)(B). Filing a request for reconsideration does not stay or extend the time
`for filing an appeal. 37 C.F.R. §2.63(b)(3); see TMEP §715.03(c).
`
`
`
`
`
`
`
`
`
`
`
`Nicole Passman
`
`/Nicole Passman/
`
`Examining Attorney
`
`Law Office 125
`
`(571) 272-3244
`
`nicole.passman@uspto.gov
`
`
`
`
`
`
`
`Nolomv
`
`I w:
`
`-
`
`:LATFDRM
`
`sou"\9Ms
`
`PARTMEns
`
`fur. "Mi-W i
`
`can!Mm
`
`3 mm A nun:
`D\sonVER KNOW
`
`Centralize control
`
`S ABILIZE NETWORKS FOR
`REMOTE \VORKERS
`Delecl blind spols n software-defined networks, mommr a dism‘huted
`wulk‘fume amnma
`[Iy cunfigura edge devices, and ya
`
`sihility into
`
`
`GAIN A BIRD'SVEYE \HEW
`OF YOUR SDN
`ENV‘RUNMENT
`
`KNOW APP
`PERFORMANCE TO
`AUGMENT EXPER‘ENCE
`
`REDUCE COSTS ID
`MANAGE SDN W‘TH
`MCHE SKILLS
`
`
`
`
`
`
`
`
`
`
`
`Tms sis um cm In ”1de mm a Iaiwnma ma varianilmld mm. By unmj Ims mm. m iqm [v uIIr (wins and mm Inky.
`Irym 6mm my mmamn wnn't Ia uacm mm ya: want manner“. A male mm am no m: l" your Elmer In remember my mom-m mm M Imam
`
`
`
`LOW PERFORMANCE DUE TO POOR
`VISIBILITY
`_
`.
`Sahwaledellned networks are managed Independently by
`proprielary, Internal, DUVDOSE'bUi". firmware — leading 10 fragile
`operations where changes requlre large amounls dime and
`Gusts Limiled mnnllaring capamlmes rm sunwaredermed
`network managemanl and lack of uendor-agnosxlc monlloring
`skills lead to blind spols
`
`Inslghls
`W'nh suflwamdefined Wlde area networks (SD
`WAN), all nelwork flaws and Baths don‘l need
`to go through a central data Dem“.
`Guaranieemg wde area nerwurk performance
`proves more challenging moss Remote 0mm
`and Branch Office (R090) networks and
`distributed workfoyceg.
`II is easierto add another path In the publlc
`mm m was making In Immu- mm a llsWflFlva ma Mrsnmlm mm E! urinu Imimm you sumo Io um molds am away pom;
`Iryou «In» Mr Immazlon wm re wcm mu m an mmm A male mm Wlll be um l'l yw- Dmeflfl remanberywv mm mm In Irweea
`
`
`
`
`
`m M”
`
`
`
`
`
`MMWWWWWWW
`
`Nah/Irv
`
`\‘hi‘ulu L
`
`-
`
`PLATFORM sow‘rmus Humans
`
`TIIUWIEIBLFH
`
`COMPANY
`
`summ- m:
`mscnvsnmow
`
`Security
`ASI: ATTACK SURFACE
`INTELLIGENCE TO PROTECT
`YOUR BRAND
`See what hackers see In defend your digi‘lal anack surface at all times—withaul
`increasing your security workload.
`
`ASI launch dnlails
`
`Fend ofl the bid guys oulside yuur penmemr
`Fmd hidden dwgili‘
`.‘ Iaslemim hm hm Nalnnnch
`
`CONTINUOUSLY SCAN
`FOR CRITICAL RISKS &
`KNOW WHEN
`SDMETHING‘S WRONG
`
`ZERO TIME TO DEPLOY
`
`DRIVEN EV AI
`POWERED BY
`CVBERSECUHITV
`EXPERTS.
`
`ms (:5 ms mm -.. puma? ,n . .m. a mipnr-i-u m psmnm-n mm fly us nu rm; mm, m 3915. m mm mm; m mm, m ('7
`4 you demm J'wv mmmanun wan I he mama \me'l m: 'MSi .
`I5 mm: A mm mm ml :e um m W Druwser m member ycul prefermce nm \c we mm
`
`LIII‘FIJAI'
`
`I. Lynn: 1
`
`I4 \uu u
`
`
`
`
`
`
`
`
`
`
`
`
`SlJKl‘AlJL. KEDUL‘IL Y UUK
`RISK.
`Conlinunusiy monitor and prmecl yam campany,
`brand, and assels lrarn external adversaries.
`Understand your exposure, priorilize risk, and
`
`run-dine is“: before they Iun: imu incidents.
`
`I Mnimize risks in your digital footprint
`Tnll SIS Inns mum l0 Dllwlfll ymwlm a MsDomm HM! MPSMIIRIII MME! E! uhllll "HIV/IBM. You act-1m our wold; IM rmvlct WW
`mu. um."- vmir lflflllnillm wnn'l ns harm m m. m uni-mm, a war. rnnh- mu n.- mm in my firm-(Km r-m—nharvrurr "Mm-w. mm in Iridmrl
`
`p’ Annlym
`Uncover lrends and exploitable vulnerabil' es. Nmenrich
`experts save your learn from having In prlorluze and remediale
`
`dala from multiple feeds and every unknown,
`
`SIGN UP FOR A FREE TRIAL o
`
`
`
`
`
`“no"... “.4 “Janna... nun..."
`I
`1m; 5.9 uses mm m plmuymwln . mspnnswe mu persnnallzul 52ng m, using Imswerxme you sgleem aw made an privacy pansy
`lfym damm‘ yum mil-mall)" wnn‘t be hacked m... ym wilt Illiivmbsme A Single (nah! mu I- used M will blunts-(Ia ram-Inner ymv mm. men n. lrackad
`
`A i
`
`7 - q :
`
`miscomiguranons.
`
`
`
`
`
`
`
`
`
`
`
`“a |I||_II|
`
`f Analyst:
`pan of
`Perform thorough invesligations and analyze lh
`enpusulcs lulking Ill :1qu alLack surlaue‘ We Hag ul lU'd‘
`issues and recommend fixes tn save yuur team lime, and
`avoid missing critical issues.
`30 DAY FREE TRIAL 0
`
`ms sag ms cmkine lo puma- mm a mswns'na and balsamlmd mm. B! usim Imumm you mm m uur mm and awn mm.
`mm near-e yam mum-lawn wun't a: mm mm my: rum-mm A amle mm ww ne mu m yum mum remnnervmv mm mm a: mama
`
`pluynulm’ nth—unuuhu am... m. \uLInu’ nun.“ w... unjuun
`anack surface are already compromised and which exposed
`vu‘nerahiiities are already being actively exploiled by bad
`actors.
`
`
`
`SCHEDULE A DEMO o
`
`I Monitor your attack surface
`, Mum.“
`;—
`nu: ma um cwm Io uwoeywm - mwum and Nisan-Ital 99M“. By mu Imwmme vw mum uurwolu: am mm m.
`Ifyuu dam yw mrmam mm be mm mm wsn m‘smm. A smgla (nub: mu I» used m yaw mnwserh ramnherymn puma mow he mm
`
`
`
`I ‘
`
`
`
`SIGN UP FORASIO
`
`
`
`
`
`
`
`
`
`‘\
`
`i A-J'w
`
`Discover
`
`laenmy all oi me exposed assets In your
`IT ecosystem for a complele View of your
`mack airline,
`
`alum vr run Hal .3
`
`
`
`This sis usas amine in plan. ymwin a lispmlslva ma palsariilm Sarina Ey using Ihiswlbsml you aqm l‘n nur mama and may aim;
`ll‘ M «mi yaw iriiurrriarion worn De imam w you will iiiirwcoeiie. A slim mom will in mm in ywr Dimvm lomImberywl momma mm D0 Ilium
`
`lP Ranges
`Web Apps
`Deplnyraa Spnwam
`Cuipmale Wehsile
`Cnmpanynwned Domains
`Known pumrcfacing damn, develnpmenL and
`slagii'ig servers
`
`immparty Javnscnpt Hesoumes
`unknown. punlicelacing Gemini development.
`and staging servers
`Servers sires. and web page: ma: were part of
`a merger or acqulsltlnn bin rinr lnvenIni-led
`Abandoned Servers nr Dnmaln Names
`Unsulharlzed Typosquntllrig Dumalris
`Dalebasg; ~ accgslhle all me lmmm
`
`
`
`SSL lellcates
`Nerwom Services I SSH. LDAF', VPN. RDP.
`VIIPi emall servers network devlces Jiouiers
`Public Code Rena:
`Publlc Clfllld 3 ISBN
`Spins & PAAS apps mat iiancile company
`dale/pmcesses:
`
`Tnlx us «are cm In Ilmlm mum : rlspflrrswa am: pusmiizm mm Ev uni-u IMSWM Wu nun-n [n mrmom am nmw [HID]
`vaw deme vow into-marten Won't Be IIECKEO mum «an wwmme A single waive will be we: in your numeric rewauermv mm mm ue wearer
`
`ASl evaluates and prioritizes your :urrenl
`risks and vulnerabili‘ries accordlnci IO [he
`
`
`
`
`
`
`
`
`
`
`
`
`Hana duu VuiilEIdUllilifb qwuiuiug w m:
`irkelihnod of attack. our expen impact
`anaiyses ensure you'IE lucused an the
`righl issues a] all limes, Delect and
`analyze lilkl by criticulity and impanlo
`rnliigate the mosl dangelous issues
`befure hackers can Expioil Ihern.
`
`
`i
`
`
`
`Squaltlng Domains
`Siie CMS Vulnerabilites
`Vuinerabilily Assessmenl
`This 512 uses mm In wwdeyouwlh a mums": and {Emmilmld Senna. Ey usuu mismme Wu am. in nurlwha and man why.
`If m. nadim yum min-mam wnn't ha uamn mm ym “sit Im; mm. A male canine wiil he um ill your hlmnr In rammihar vmll nlstm ml in as “man
`
`Remediate
`
`Asi laalures delaiied report: Ind
`mrwmmm
`reoclllrnendliiom iord'ie most or al
`w
`:Eflfi‘d‘zifflfl" n
`risks inciuding delailed evidence, impact
`
`“WWW“ "hm-
`anaiysls. and stepsw remedial:
`'—
`Cullahuratwe incident Management
`m...‘.._..v..
`,
`J;
`.i M. .L- 4.“-.-
`
`
`mm 5-5 uses meme no Izlmifla mum a iasmnma m wannanm mm uy uflm Imsmin Nu aq... m nur moms m .1er pom,
`Ir mu new» Vmir imam" wnn't he mm mm ml mil mm mm": A swim mum wil be usnfl ifl hm! nmmerm ramunbervm" men-mu mm In irarxen
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`m, a: w [W n. “mink ,u. will u my...“ and peuumlmul yum: a, mils; um, mm: yum Iylw m um unit: an pm“, My
`lfym menu yum mfnmlahnrl mm as flacksfl mu yul will Immun- a smqla (unhl mu I. used m my tum-(In ram-Inner yum mum-x- mm x:- Irantad
`
`Read all aboul Ihe hum of Nelenrich‘s
`muck Surface lnIeHigence. Find om how
`NElEnrich delivers WWI-1
`Irmll'lolneu - an irresisfible mix offlnfl
`and mack «Mme mlllgeme, Alsn,
`check our same coal inswghts from bur
`Head of Security Slraregy, Brandon
`Huffman, and uther industry
`
`heavyweigms‘
`
`ms sis late (mom lfl plum- mm 2 mswnswa am: mmmlm gamma Ev usillll Imumm You alum H: mm malls and nmw may
`Ir ya: man yaw mnulnabun won't be warm: mm m. mu mm mm a sum mum mu no Hana m my wows-um mmnerymv mumm- mm BI Iramu
`
`'Dnumul-‘v l nannl-n
`
`fine flu oi enlxm l'nu «- nrhlo wuuro nl' naoJ-noon
`
`
`
`
`
`
`
`
`
`
`
`
`
`I'DWel‘Illl capabmnes that solve [01‘ a WIUC range OI “59433805
`
`Our alwayqenn ARI nuntlnllullsly eparrhpe nnlmp mm: rppneirmrpe [n
`find brand mermons or other rela1ed Information, Pravenl
`I‘nlnrmalion leakages by enabling your SOC ream In fix lhese issues
`
`before-Ihe-lacl
`
`Thrs ere «3:5 wanes 1n wwme yw mm a resvnnslva anfl nereunarrzeu semee Ev us nu me wemre m agree 1.: Eur mane am: What! new
`If you dadlm rwr mlulmaban wun'l he lucked wear you will rms websme A smalz mkre wrrl be usrfl run your mnweene ere-nhar yuur ["2ch mm be lrachefl
`
`IW
`
`
`
`Constanl anack sur1ace manilaring of your authenlicaled semces
`like MonguDB‘ Elastlcsearchj and FTP. Protect yourself from public
`exposure of confidenlial informatmn and a variety of anack vemors
`
`Tm: :Ila me chue: lu Dumds rm mm . rasuullslrs «m Bsrsunilzed sewree. Br u» ng rm: mum .w lull! in uur mm and man nullw.
`tr yw dad-ms Yum mlulmdban wzn'l be llackall Mm wu'
`ll um “barre. A mule mums wll In mu m m. Hume-r In lslmmbar yuul nlulimm.
`
`AlOps f managed
`intelligence
`lmplement ”095‘” "5‘1““ 005“!
`
`Virtual NDC
`NocVuul l'lSkS and uncenalmies,
`Overcome ramme challenges and
`menu: epnnnp unnmp
`
`
`
`Enlerprise secul
`Combluzmun of our own powerful
`platform, 50C Expemse. 1hreat
`inlpl anrl Induslrvelparllnn sum
`
`
`
`
`
`
`
`
`
`Immigrant-unewnuch :omlallackrsurfacuuemanneI,
`
`Ella/JUN [litElFM
`'
`'
`'
`streamline \T Ops, \mpmve MTTR,
`.
`and prnwde mcladlhle cuslomer
`exgeliences‘
`
`ensure SEVWCEU uma
`p
`
`o
`
`inlEl ZII'ICI II'EELISU -|EE|C|IH DIEM
`' H
`y
`9
`capabllmes.
`0
`
`mm Km um mm 1. pump yn . .mu 2 mpnmm m psmnam-u <-rw l-y us ng 'mr mm! in 1 «5-» m mlr rnnkw m umary pm,
`Hm am he yum mlc'matmr unn t he waded um yum mm m web's“! A smgls :anl a , m a mu m ,m hmhier n: f?m!1lth\l:lfl may.“ um m n. ‘rausd
`
`30 DAV FREE Tn
`
`PLATFORM
`Kanmm NNI-nr n
`Nb:
`Surlane InlekuHlKhIhS
`
`COMPANY
`SOLUTIONS
`Ahmnus
`rk
`N
`(“my
`Leader nu
`.k- ermge IT On
`[\um!
`careers
`acaleyauv wrap,
`a sbwhzedwqwtm opémmns
`
`‘smfiwum'aa mum mum A‘Wlllrwat: w nu
`Tlu: w may cuumas‘u uumda m “m avawnlulw uuuuamualmsuwm 5-, u! nu -\
`mm name mm mm gunman:usuamcmmwan-mummma Azuwlumukg mm mum-m. mum Imam um yumuwra‘u‘uuI-ulmhl'muud
`
`"4'35“”6'59'3‘] min imam ch :zom
`
`CONTACT DETAILS
`.75‘nuN Flats
`|_ 3qu 3m] San
`-
`A9513! \an
`PM“
`
`Im
`‘Hou new no vow ‘nlc'mat‘uf‘wfl[Dmtackc-IMM m mum: meme Ammo :DoKe-w‘l :c mu m mu m ‘ om rcmwnoryour momwco nm \0 no'rama
`
`DINING
`
`
`
`
`
`
`
`
`
`
`
`
`
` 1 w
`
`[\CCEDIAN
`
`
`
`60° Network and Application Performance Monito ‘ing and Visibility
`
` SL'yLIGHT” PW: pm'idcs my net“ 01k and appucau'm pc‘ifnnnam: munimmg NM and mi). enabling
`
`cumplc'l: viability atmss 211 typzz urnmmk mfraztrumulc: phyncal imam. snfmmt-dtfinod and dead,
`WM: a full-featured sct mm Hawk and APM applicatinn pafnnluancc nominating mom SkyLIGHT va
`tanks :11 nenmrk Elam; and applizadun nmctimuswaflh-suudu traffic and czar-“nit waffle {mm n1 insidg,
`and between dmn 2mm: and fiztunl mnrhimsdmd 100% afflie nppllcalimis accessed by 100% ofusers.
`including Websites on the public inremet Cmix applicirions. and SMS application“. among other;
`
`ll
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mumn: u
`"a n-
`“ ”7‘9. 43%?
`
`Network and application performance
`monitoring: real time and back in time
`Ofl'ermg a full suite ofnamed: and application performance monitoring lmls. SkyLIGHT PVX amiyzes 160%
`ofunwork mm: and 100% ofawhcalwn “minions in ml lime la produce 11mm ofdmilcfi market
`including mm “Ilium. dn'ic: and appliclhml pcrfmnlanoc. “2b applicxlim mun. cunumuncanau and
`wlmcfim mm. and other key “2mm and appliullan pal'mmme Indicalm's SkyLlGHT 12w: quaddy
`identifies oveiwovted Newark dfl'lm. applicarion latemy. web npyhcanm alow perfcmlmce. and 001m
`perfmmame issues in web implication; These pdmmmnce mam are centralized and mud in a lune-series
`dab Sim: (a plant]: 2: nub—and aclmuahle—lumry n1 mnali mind; and appllcallun acln «y :5 mm as u]:
`pnfurmancc ofindixidml unwark anim and application mpomm.
`
` .-
`
`“mm I «Mme
`SkyLIGI-I'I va =na'blrs 11‘ professional: m rapidly id-flify mm and applicatinn perfummnm funds and
`:xupllons. SkyLIGHT pvx mm a. limp]: m :mjpam min-mt performance mu. .1 nfmrc Imam. at erl
`asm idmiifywha] uawnehvnrkm application behaviors rm Emmi
`
`Drilling down: finding the needle in the haystack
`
`
`
`
`
`
`
`
`
`
`
`made easy
`Sky/LIGHT PVX'a Jam-1yHus gamma own flew» fw IT imxlsfillflpdesk. lwlwul'k daiu calla. mid
`applmimqo mine-mad the big picture m)d qulckly ldcmify legacy appliellllon and web appllmatlm isms
`Mail: 3190 pmmding a full suite ofummlii perfmumnce mgemenl mo]: and spplicaliml pelfozmanc:
`magnum! mob.
`
`skyLioi-lr va also provide! inmm ms; to NPM and APM perfomumce demils. including perfm‘rrwwe
`issue! in web appucmim. dimly firm The dauhbnmd. The drill new capabilities Sm- rapid {mm isolaiimi mow
`IT teams In nctuzmcly and mhlilivcly stucco I11: “haysmw and get “gm In in: "needle” within a fcw mom:
`clicks.
`
`SKYLIGHT
`
`% Appllatlm Transaction
`V
`A
`
`
`
`Appllatlnllmum...“
`V
`A
`
`% Applicitinn QuE
`V
`A
`
`ca Nekwk Will!
`
`
`
`”MA
`
`E
`
`um?
`V
`
`"PM
`
`
`
`
`
`
`
`
`
`360° performance indicators: zero blind spots
`SkyLIGI-IT va campuks Immimis ofpalm: min in Hal-lime fix any flim- lmmiug ill: “guy-2.1L
`rr analys‘s have Mics: lo a Dmnplalumni“ set afmetrics in pinpoint Inns. admit. Mum“.
`and npplicmloll perfemllh‘lue issues my. a single troublaheotillg imad‘nu‘
`O diam-Lid: mm: and :mlfigm-minn “sun
`- nflwnrk usage. mm. and 1mm mmicz
`n sewer—lid: mot mdlmlun
`
`o appllnalion wspome and mm- menial;
`- data wilme {mm and mnnf‘ev time:
`
`Will. aid. lnhliliw configuration. SkyLIGHT Mix-i application mm: m1: mu: IT mfg-lanai: to
`quickly “him mlrtnmn well u'
`o Hm to menu: aypliwliou pcdumuuw
`. Haw lu muuihxl application performance
`c How m tmublcslmol aypllcahmm
`
`
`
`
`
`
`
`
`
`
`- And much mm:
`
`PVX Q Cowp‘cmvismlity
`
`p
`
`
`
`
`From network maps to conversations: a bird’s
`eye view
`Win: a fan-changing and highly cmnplcxIT infi‘asu'unmc. .2me answers m simpl: questions such as “who‘s
`using mm?" m "at what 15:1 nfpcdmmmcr- .1 not my SkyLIGHT 12m 11:1,); 11 mm mm .1»:
`gnrgnphy arm‘s. matwork and application Hm idmm'fying “hm data \ulumu are high. mspnnsz Iimzs long,
`and mom LrequeuL
`wiu. um: nmmk and Wham 11121171 in 1mm rr analysts :1: simply a click my em... Eklcmlluhlg
`
`
`
`
`
`
`
`
`
`
`impacted nmvmk and application canwualims‘ At a glanoc. tiny can 5:: hmv may was an aEfoncd. “in:
`they a: lacuna. and for how long Hwy have hem mpmcndng a pcrfunnm: dcgndatiom.
`
`mmmm
`nu— m-v.
`mil-uu...
`will‘nun
`
`"-7mInn
`
`mpm...
`
`From network flows to application transaction
`visibility
`End-mus mm: mm: applicilinus uuflnir mull. “mo—ma Wimp; and minim“; Um um
`l=ll which Miami: in application cmlpmsntx at: not pa‘fflnning up in nrpcciatiuns; duyjusi 1mm that
`Willing i: slim-n thm it 5|)mlld be. m rum impacting mm ounjab [:51th Win. Wihlaslmmiug
`nerwmt and npphcnliun Maxim an IT team mm restrict us invasligmun unjust 1: angle pamm ufdie
`nem'mk and applicnliun [culprimimswad [hey [aquire \ isi‘mhty into «11: full - pufomlmc: pour.
`
`
`
`
`
`
`
`
`
`
`Ln iii-1mm m applinaum distal-wry and am mapping. swan-r PVchxmli-i an applicatinu
`pufamlana: pad] by disphying bad: 31: mm film and the application :unvasah'nrns inside til-diam
`Perfummlce mulblcshmxmg I'eqlllres mlie‘mlanflmg Ihe respective unpam ofmm and npplxcalnm
`mhunwture ml each can SkyLIGHT va addresses both 0“ha pelfonnanca aspems with a single. easyrwr
`us: plaflom: {m nnnvlk and appunuuupn‘iunuanc: lumlm‘ing and managcmsm.
`
`Application chains and dependencies: from
`network flows to transaction details
`Applicaliml delivery is nava- :5 map]: as a client may imam; m a pawn. in miiiy. application
`transaction: go llmgll mlmamlu infinsn-uctm-a tiers. for example:
`I LAN andWAN
`
`- murily'filtumg dn'icfi
`- cummon "mm sauces (3%.. mime mululnnL minimum)
`a load balancets
`
`o WAN fi‘P'imizmian appliances
`
`m: applinafim Iaycr bring its um) um nfumnplzxilics. including mimics mi Dummml scniczs and back
`—cnd3 m1. as application scrum. smug: and daubas: servers.
`Understmiding haw application Chains work is Ulelefbl‘e key SkyLlGHT va whens how each npplicalim litr
`impacts [lie endinuer Expenieim when Imuhleshmling penfurnmnce dégmdnnmm
`
`
`
`
`
`
`
`
`
`
`SkyLlGhTPVX Inn-Jr: wmkmmmwpmamummnm,mmmdm
`cm and vnhmlmachinn—Ind mum aflh: lpplxcafinnnmsedby 1mm arm mnhding wchnimcrn
`Huynhh': imam. (Snixappliuafim andSaaS applicalhma Immg Minx
`
`ACCEDIAN
`Mk5
`5w
`Puma:
`
`Skyhglnl‘llrfunl
`
`Want. aDemo
`in: Tml
`
`Na“um
`Eva-m
`Ema:
`
`Sisal-VP —>
`
`
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site