Our December Member Spotlight is on Ben Dale also known as “dfex”, a Recognized Expert that has been a contributor in J-Net for just over three and a half years. You can find Ben mainly in the SRX and Switching forums sharing his expertise and assisting Juniper users. To date he has over 250 posts and has racked up over 50 Kudos.
Ben is a systems engineer for Comlinx , a Juniper Elite partner, located in sunny Brisbane, Queensland, Australia. He’s been involved in network infrastructure and systems integration for a bit over 11 years now and spends his days designing, building, and supporting networks for a range of enterprise and service provider customers across Australia. When Ben’s not neck deep in routers, he likes to spend his free time doting on his 18 month old daughter and debating IPv6 migration strategies with her.
Be sure to give Ben a Kudos or Accepted Solution if he assists you with your inquiries.
Thank you and congratulations, we appreciate your participation in J-Net.
Douglas Richard Hanks Jr. is a Sr. Data Center Architect with Juniper Networks and focuses on solution architecture. He is certified with Juniper Networks as JNCIE-ENT #213 and JNCIE-SP #875.
Douglas’ interests are network engineering and architecture for enterprise and service provider technologies. He is the author of the Juniper MX Series book by O'Reilly Media and several Day One books published by Juniper Networks Books. Douglas is also the co-founder of the Bay Area Juniper Users Group (BAJUG).
Douglas can be reached on Twitter @douglashanksjr.
Lisa Lorenzin is a Principal Solutions Architect with Juniper Networks, specializing in security and mobility solutions, and a contributing member of Trusted Network Connect, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles since 1994, with more than a decade of that focused on network and information security, and is currently concentrating on enterprise security including network segmentation, end-to-end identity-based access control, and integration of mobile security.