Collocation Access
Roland Perry
lists at internetpolicyagency.com
Mon Oct 23 20:28:49 UTC 2006
In article <20061023112018.F56322 at iama.hypergeek.net>, John A.
Kilpatrick <john at hypergeek.net> writes
>> But presumably it would need to be stolen. Wouldn't the tech notice
>>that happening... Or is there some way the colo security guy can
>>clone it undetected?
>
>While your point is valid, arguing something like that with an AT&T
>tech would be like arguing with the TSA. Logic and reasoning are of no
>value in the conversation. The policy is the policy and you deal with
>it.
I don't seek to argue it with an individual tech, but with whoever sets
the corporate security policy.
--
Roland Perry
More information about the NANOG
mailing list