Comment Re:And.. (Score 1) 120
That said, your article is not free of bias. The title "In the Shadows" indicates the negative connotation, but I believe it's directed more at Torrey Point. It's hard to write objectively, especially considering Torrey Points actions.
I'm not sure what your point is here. Torrey Point committed an act that Juniper considered negative enough to de-authorize the company as a certified partner. So there's that. As for Cisco, once again I'll point out the article explicitly states that what Cisco did was 1) not illegal, and 2) not uncommon at all.
"Cisco is painted as doing things abnormal in the industry. I'd bet dollars to donuts that Juniper buys millions of dollars worth of Cisco products every few years, just like Ericsson buys competitive products, and Alkatel buys competitive products, and Microsoft buys competitive products, etc..."
Again, I think the article makes clear that the purchasing of competitors' equipment is a common practice in the tech industry. Where things get a little gray is Cisco's procurement of beta or pre-release products. Some folks (like Dr. Abramson in the article and some folks here in the discussion) believe that's still fair game, while others think it's shady. I'm presenting the information, not making a judgment about the actions. And yes, I believe a lot of manufacturers do this, maybe even most. What made this situation unique was the involvement of Juniper's partner of the year betraying the company and giving Cisco access to cutting edge, early stage technology.
"Most of the time these purchases are not for reverse engineering. These purchases are either for benchmarking or compatibility testing."
I can tell you that after spending considerable time researching the matter for this article that I absolutely do not believe that to be true. Not a single person I spoke with or received information from, whether directly connected to the Torrey Point-Cisco dealings or knowledgeable about "competitive analysis labs" at other vendors, believes the purpose of those efforts are for benchmarking or compatibility testing. A major manufacturer isn't going to pay a premium to get a hold of its competitors products just to see if they play nice with their own equipment. In fact, Cisco says in the article they buy competitors' products in part to make sure their own IP isn't being used in those products. How do you think they determine that?