This is a nicely done explanation of how “2.0” can be beneficial in a behind the firewall environment. What do you think?