So I wrote this about a colleague who asked me for a recommendation without providing much context for his request:
[NAME] is a bizzare [NATIONAL] with a firm grasp of security and how it should be implemented. He drinks like a fish and should not be approached without alcohol or food. Beware [NAME] at times of full moon and never present him with a network architecture that does not detail compliance and redundancy/HA solutions.
For some reason it’s still in his approval queue…
Leave a Reply