If you're not familiar with how you can engineer traffic on L3's network
take a peek at
http://www.scn.rain.com/~neighorn/PDF/Traffic_Engineering_with_BGP_and_Level
3.pdf (slightly outdated but still useful)
As far as HE is concerned, when I asked them about communities a few weeks
ago all they
I too am curious...
We've used them for a few months as edge devices and most (if not all) *knock
on wood* of the issues we've had have been fixed by RouterOS updates,
configuration changes (lots of chefs in the kitchen), or were circuit/carrier
related.
While I would never compare them
Thomas,
We saw some instability this morning around 2:53am (EST) that resulted in
practically complete communication failure in our Detroit colo. It lasted
approximately 45 minutes and service was restored rather gradually.
---
Brandon Lehmann CCNA, CCAI, CFOT, Net+, A+, Security+
BitRadius
I find it more entertaining that I recognized no less than three organizations
on that list that we've seen come up a lot recently in our spam scanning
systems.
-Original Message-
From: Andrew Latham [mailto:lath...@gmail.com]
Sent: Tuesday, April 23, 2013 6:11 PM
To: Valdis
In any event, I'm pretty sure that I'd rather get hit with tampering with
evidence versus them retrieving data that may incriminate me. I believe
this may be a the lesser of two evils game.
-Original Message-
From: Kyle Creyts [mailto:kyle.cre...@gmail.com]
Sent: Monday, December 17,
I believe there is another side to that argument as well.
If I operate a regional ISP and request address space for dynamic
address pools I am aware of a few things:
1) I am fully aware that there is a chance a customer's system could
become infected and generate millions of malicious
6 matches
Mail list logo