On 2006-11-02-19:16:36, Deepak Jain <[EMAIL PROTECTED]> wrote:
> 10G is fine, but a coarse step price-wise. (boxes that are 1U that
> uplink 10G often have >10G of input traffic possible). I like being
> able to plug optics in as we need more upink. If its not feasible,
> well then. :)
As there's
At 05:09 PM 11/2/2006, [EMAIL PROTECTED] (Dave Rand) wrote:
Over the last few years, I have worked with many ISPs. The majority of the
problems had little to do with the format/style/volume of abuse complaints,
and a lot to do with empowering the abuse desks to take action. "you
suck" was not
Mike Lyon wrote:
Howdy. Please excuse the semi-offtopic post. My company is looking for
bandwidth at the location below before Christmas. So that pretty much
rules out your standard leased-line options. Leased line looks to be
about 60 days out or so.
Does anyone know of any MAN (or anything e
[EMAIL PROTECTED] wrote:
On Thu, 2 Nov 2006, Deepak Jain wrote:
We need to place a new order for some new fiber builds and were
considering some other vendors. Especially in the nx2.5G and nx10G (are
CWDM x-cievers even available in 10G yet?) range. Anyone have any new
favorites?
2.5G are o
On Thu, 2 Nov 2006, Deepak Jain wrote:
> >> We need to place a new order for some new fiber builds and were
> >> considering some other vendors. Especially in the nx2.5G and nx10G (are
> >> CWDM x-cievers even available in 10G yet?) range. Anyone have any new
> >> favorites?
> > 2.5G are only sli
We need to place a new order for some new fiber builds and were
considering some other vendors. Especially in the nx2.5G and nx10G (are
CWDM x-cievers even available in 10G yet?) range. Anyone have any new
favorites?
2.5G are only slightly more expensive than 1G - if you have OC48 gear that
is
[In the message entitled "Re: adviCe on network security report" on Nov 2,
16:39, Sean Donelan writes:]
>
> On Thu, 2 Nov 2006, Dave Rand wrote:
> > I did a study on this a few years ago. I sent out about 20,000 abuse
> > reports,
> > all by hand, to various network around the world. They al
On Thu, 2 Nov 2006, Dave Rand wrote:
I did a study on this a few years ago. I sent out about 20,000 abuse reports,
all by hand, to various network around the world. They all came from this
email address, and were clearly identified as non-robotic, personal messages.
There were "many" bounces.
You could give Interxion a try. They have metro ethernet services out of the london area that could backhaul to the address below. www.interxion.com
On 11/2/06, Mike Lyon <[EMAIL PROTECTED]> wrote:
Howdy. Please excuse the semi-offtopic post. My company is looking forbandwidth at the location below
Any aspadmin.com mail folks on here? Please contact me offlist. It's
regarding one of your MX's.
Many thanks,
SR
Howdy. Please excuse the semi-offtopic post. My company is looking for
bandwidth at the location below before Christmas. So that pretty much
rules out your standard leased-line options. Leased line looks to be
about 60 days out or so.
Does anyone know of any MAN (or anything else for that matter
[In the message entitled "Re: adviCe on network security report" on Nov 2,
8:54, "J. Oquendo" writes:]
>
> Out of curiousity (and I doubt many will respond publicly to this) how many
> people have had success versus failure when dealing with abuse issues. I'm
> thinking for every answered messa
On Thursday 02 Nov 2006 14:54, you wrote:
>
> I'm thinking for every answered message sent to abuse (non autoresponder),
> one will likely see more than 7-10 failures.
It is a self fulfilling issue. Those abuse desks who deal with the issues you
rarely end up writing to, those who don't, you
On Thu, 2 Nov 2006, J. Oquendo wrote:
> > ISP security and abuse teams already receive reports from almost every
> > group in existence. After they process the high priority work, e.g. court
> > orders from countries around the world, reports from customers, etc;
> > figuring out how to make t
Sean Donelan wrote:
> Hint, hint, hint. When the abuse and security folks at ISPs give suggestions
> on how to best work with them, its sometimes a good idea
> to listen.
What happens when the security folks are absent? This seems to be somewhat of
the case concerning contacting "[EMAIL PROTE
15 matches
Mail list logo