Worth Reading 022626


 


The current debate on the existence of an “AI bubble” centers on a single question: is the current high level of investment into AI data centers a massive misallocation of capital or the key to future economic growth?

 


The more I have thought about it, the more convinced I am that the very technological advancements that make my life easier — the most recent being artificial intelligence — actually contribute to a busier, more overwhelming life.

 


Using hot water to cool supercomputers? Nvidia and others are doing it. It’s liquid cooling minus the water chillers.

 


New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups.

 


Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification, given the privileged access they typically have to IT systems and tools.

Hedge 296: AS-SETs


 
AS-SETs (not that kind) were originally designed to simplify filtering at eBGP peering points–but they seem to have gone horribly wrong. Job Snijders and Doug Madory join Tom and Russ to discuss the history, use, problems, and (hopeful) demise of AS-SETs.

Worth Reading 022026


 


For decades, many believed SDCs were rare, almost mythical events. However, major hyperscale operators including Meta, Google and Alibaba have disclosed that roughly one in 1,000 CPUs in their fleets can produce silent corruptions under certain conditions.

 


The fundamental rules of creativity and ownership, established in law since the time of the printing press, are now collapsing under the weight of Generative AI.

 


As you and your spouse head off for a two-week Maui vacation, do you hand your 17-year-old boy a bottle of smooth whiskey and the keys to your spare Ferrari, bidding him “have fun while we’re gone”?

 


When Meta Platforms does a big AI system deal with Nvidia, that usually means that some other open hardware plan that the company had can’t meet an urgent need for compute.

 


This paper introduces Whisper Leak, a side-channel attack that infers user prompt topics from encrypted LLM traffic by analyzing packet size and timing patterns in streaming responses. Despite TLS encryption protecting content, these metadata patterns leak sufficient information to enable topic classification.

 

2010 great wall (33) SQ

Great Wall (Beijing)

DSC01691 SQ

Wheels (Chattanooga)

2018 flam norway (20) SQ

Altar (Flam)