Congratulations to Martin McDermott otherwise known as MMcD @i-conX, our spotlight member for May. Martin has been a member of J-Net since 2010 and recently moved up the ranks to Recognized Expert. In less than 2 years, he has racked up over 280 posts.
We asked Martin to tell us a bit about himself:
“Starting my career in the networking field, I was introduced to Cisco products and they became my familiarity. 2 ½ years ago I started a new job and they were in the process of replacing their old devices with Juniper products (mostly SRXs), therefore I had to do some crash course learning in Juniper, this is when I discovered the J-Net forums. The knowledgebase of the members is amazing, with prompt responses and top-notch advice.
I was able to quickly grasp a foothold through the forums and the great online KBs and would recommend both for any Juniper newbie.
Outside of the Juniper world, I enjoy sports such as Rugby, Football and Motorsport.”
You will find Martin in the SRX forum assisting you with your inquiries. Be sure to give him a Kudos or Accepted Solution if he assists you with your inquiry.
Thank you Martin, we appreciate your dedication and participation in J-Net.
Douglas Richard Hanks Jr. is a Sr. Data Center Architect with Juniper Networks and focuses on solution architecture. He is certified with Juniper Networks as JNCIE-ENT #213 and JNCIE-SP #875.
Douglas’ interests are network engineering and architecture for enterprise and service provider technologies. He is the author of the Juniper MX Series book by O'Reilly Media and several Day One books published by Juniper Networks Books. Douglas is also the co-founder of the Bay Area Juniper Users Group (BAJUG).
Douglas can be reached on Twitter @douglashanksjr.
Lisa Lorenzin is a Principal Solutions Architect with Juniper Networks, specializing in security and mobility solutions, and a contributing member of Trusted Network Connect, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles since 1994, with more than a decade of that focused on network and information security, and is currently concentrating on enterprise security including network segmentation, end-to-end identity-based access control, and integration of mobile security.