nanog mailing list archives

Re: Collocation Access


From: Roland Perry <lists () internetpolicyagency com>
Date: Mon, 23 Oct 2006 21:28:49 +0100


In article <20061023112018.F56322 () iama hypergeek net>, John A. Kilpatrick <john () hypergeek net> writes
But presumably it would need to be stolen. Wouldn't the tech notice that happening... Or is there some way the colo security guy can clone it undetected?

While your point is valid, arguing something like that with an AT&T tech would be like arguing with the TSA. Logic and reasoning are of no value in the conversation. The policy is the policy and you deal with it.

I don't seek to argue it with an individual tech, but with whoever sets the corporate security policy.
--
Roland Perry


Current thread: