Best of the Hedge 9: Ethics in IT


 
Nash King (@gammacapricorni) joins Russ White and Tom Ammon in a wide ranging discussion of ethics in IT, including being comfortable with standing up and saying “no” when asked to do something you consider unethical and the virtue ethic.

Worth Reading 122625


ASPA is now available in the RIPE NCC RPKI Dashboard, adding a way to express and validate your upstream relationships on top of ROA-based origin validation. Building on its introduction at RIPE 91, this article explains what ASPA does, why it matters, and how to start thinking about deployment.


AI bots made their presence felt this year, accounting for 4.2 percent of HTML request traffic as they trawl the web for content to be used in training models.


Multimodal tasks were the weakest area across the board, with accuracy often below 50%. This matters because these tasks involve reading charts, diagrams, or images, where a chatbot could confidently misread a sales graph or pull the wrong number from a document, leading to mistakes that are easy to miss but hard to undo.


Or, for that matter, where am I? Let’s look at location on the Internet, and how the Internet “knows” where I am.


It’s not science fiction. When a solar storm hits Earth, it can have real-world consequences, and satellite networks like Starlink are on the front lines.


Two months ago, I wrote about the competition concerns with the GenAI infrastructure boom. One of my provocative claims was that the lifespan of the chips may be significantly shorter than the accounting treatment given to them.


Chinese authorities on Thursday certified the China Environment for Network Innovation (CENI), a vast research network that Beijing hopes will propel the country to the forefront of networking research.


In 2025, the domain industry moved decisively from a fragmented ecosystem into a more integrated, capital-intensive market where infrastructure, identity, and AI are increasingly intertwined.


However, OpenAI has the daunting problem that, unlike Microsoft and Google, it has no other substantial sources of revenue. To survive, it needs to generate profits from ChatGPT.


Computer History Museum software curator Al Kossow has successfully retrieved the contents of the over-half-a-century old tape found at the University of Utah last month.

Hedge 291: The Assault on Standards


 
As the Internet centralizes and gets “big,” standards are often being sidelined or consumed. What are the possible results of abandoning standards? Is there anything “normal network engineers” can do about it?

Worth Reading 121725


Tensor processing units (TPUs) are specially designed AI accelerators. They are a type of application-specific integrated circuit (ASIC), or chips designed for specific tasks. For TPUs, that task is running and optimizing AI and machine learning (ML) workflows, including training and inference.


Civil unrest can often cloud measurement data. Some measurement systems, including ours, make relatively sweeping assumptions about the stability of both end user and network service behaviours, and assume that the changes that occur from day-to-day are minor.


Identifying active IPv6 addresses is challenging. Various methods emerged to master the measurement challenge in this huge address space, including hitlists, new probing techniques, and AI-generated target lists. In this paper, we apply active Subnet-Router anycast (SRA) probing, a commonly unused method to explore the IPv6 address space.


Several months ago, I arrived at the office at 8:45 a.m., sat at my desk, and was about to start my day. The only problem was that I, for the life of me, could not remember my password. This is a bit laughable because for the past year, I had typed that exact password almost daily, sometimes from muscle memory.


Vaibhav Kakkar once tested a therapy chatbot to help with a real-life dilemma. “It responded with structured cognitive-behavioral prompts, helping me reframe my thinking,” recalled Kakkar, CEO of marketing agency Digital Web Solutions. “Impressive–but when I needed deeper guidance, it hit a wall.”

Hedge 290: The Amoeba and the Mathematician


 
In this Hedge roundtable, Eyvonne, Tom, and Russ discuss The Amoeba and the Mathematician

Best of the Hedge: Hedge 6 on DoH (Part 2)


 
In this episode of the Hedge, Geoff Huston joins Tom Ammon and Russ White to finish the discussion on the ideas behind DNS over HTTPS (DoH), and to consider the implications of its widespread adoption. Is it time to bow to our new overlords?

Computer Network Design Complexity and Tradeoffs Training

I’m teaching a “one off” special event class over on O’Reilly’s platform (via Pearson) this coming Friday, the 5th of December. From the Description:

Join networking engineer and infrastructure expert Russ White for this exclusive, one-time event exploring the critical role of tradeoffs in network design. We’ll begin by unpacking how complexity shapes the decisions architects and designers must make, and how tradeoffs are often an unavoidable part of navigating that complexity. Through real-world examples, you’ll learn how different network design choices impact overall system complexity, and how to approach these decisions with greater clarity and confidence. We’ll wrap up with an in-depth discussion of unintended consequences—how they arise, how to anticipate them, and how they relate to designing in complex, adaptive environments.

As always, if you register for the course you can watch later.

Register here.

Best of the Hedge: Episode 5 on DoH (Part 1)

In this episode of the Hedge, Geoff Huston joins Tom Ammon and Russ White to discuss the ideas behind DNS over HTTPS (DoH), and to consider the implications of its widespread adoption. Is it time to bow to our new overlords?