North American Network Operators Group|
Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical
Re: Collocation Access
In article <20061023112018.F56322@iama.hypergeek.net>, John A. Kilpatrick <email@example.com> writes
I don't seek to argue it with an individual tech, but with whoever sets the corporate security policy.But presumably it would need to be stolen. Wouldn't the tech notice that happening... Or is there some way the colo security guy can clone it undetected?While your point is valid, arguing something like that with an AT&T tech would be like arguing with the TSA. Logic and reasoning are of no value in the conversation. The policy is the policy and you deal with it.