Worth Reading 122625


ASPA is now available in the RIPE NCC RPKI Dashboard, adding a way to express and validate your upstream relationships on top of ROA-based origin validation. Building on its introduction at RIPE 91, this article explains what ASPA does, why it matters, and how to start thinking about deployment.


AI bots made their presence felt this year, accounting for 4.2 percent of HTML request traffic as they trawl the web for content to be used in training models.


Multimodal tasks were the weakest area across the board, with accuracy often below 50%. This matters because these tasks involve reading charts, diagrams, or images, where a chatbot could confidently misread a sales graph or pull the wrong number from a document, leading to mistakes that are easy to miss but hard to undo.


Or, for that matter, where am I? Let’s look at location on the Internet, and how the Internet “knows” where I am.


It’s not science fiction. When a solar storm hits Earth, it can have real-world consequences, and satellite networks like Starlink are on the front lines.


Two months ago, I wrote about the competition concerns with the GenAI infrastructure boom. One of my provocative claims was that the lifespan of the chips may be significantly shorter than the accounting treatment given to them.


Chinese authorities on Thursday certified the China Environment for Network Innovation (CENI), a vast research network that Beijing hopes will propel the country to the forefront of networking research.


In 2025, the domain industry moved decisively from a fragmented ecosystem into a more integrated, capital-intensive market where infrastructure, identity, and AI are increasingly intertwined.


However, OpenAI has the daunting problem that, unlike Microsoft and Google, it has no other substantial sources of revenue. To survive, it needs to generate profits from ChatGPT.


Computer History Museum software curator Al Kossow has successfully retrieved the contents of the over-half-a-century old tape found at the University of Utah last month.

Worth Reading 121925


In my earlier article on Technitium and Wazuh, I described DNS as both a behavioral signal and an enforcement point. DNS queries appear early in the attack chain, often long before C2 traffic stabilizes.


Cloudflare’s network suffered a brief but widespread outage Friday, after an update to its Web Application Firewall to mitigate a vulnerability in React Server Components went wrong.


You’d think that by now, networks were well enough understood that people would stop making assumptions that we have known, almost since the dawn of networking, to be untrue. Yet as users, developers, and network administrators, we still seem curiously unable to let go of long-held beliefs.


As well as the Mac clones, there were PC-style PowerPC machines – and a version of classic MacOS for them has just been rediscovered, enabling previously unimagined combinations.


Have you ever experienced that moment of panic when you can’t recall a familiar phone number or navigate without a map app? This growing reliance on external memory—known as the “Google Effect”—is a real-world example of how we’ve outsourced core cognitive functions to our devices.

Worth Reading 121725


Tensor processing units (TPUs) are specially designed AI accelerators. They are a type of application-specific integrated circuit (ASIC), or chips designed for specific tasks. For TPUs, that task is running and optimizing AI and machine learning (ML) workflows, including training and inference.


Civil unrest can often cloud measurement data. Some measurement systems, including ours, make relatively sweeping assumptions about the stability of both end user and network service behaviours, and assume that the changes that occur from day-to-day are minor.


Identifying active IPv6 addresses is challenging. Various methods emerged to master the measurement challenge in this huge address space, including hitlists, new probing techniques, and AI-generated target lists. In this paper, we apply active Subnet-Router anycast (SRA) probing, a commonly unused method to explore the IPv6 address space.


Several months ago, I arrived at the office at 8:45 a.m., sat at my desk, and was about to start my day. The only problem was that I, for the life of me, could not remember my password. This is a bit laughable because for the past year, I had typed that exact password almost daily, sometimes from muscle memory.


Vaibhav Kakkar once tested a therapy chatbot to help with a real-life dilemma. “It responded with structured cognitive-behavioral prompts, helping me reframe my thinking,” recalled Kakkar, CEO of marketing agency Digital Web Solutions. “Impressive–but when I needed deeper guidance, it hit a wall.”

Computer Network Design Complexity and Tradeoffs Training

I’m teaching a “one off” special event class over on O’Reilly’s platform (via Pearson) this coming Friday, the 5th of December. From the Description:

Join networking engineer and infrastructure expert Russ White for this exclusive, one-time event exploring the critical role of tradeoffs in network design. We’ll begin by unpacking how complexity shapes the decisions architects and designers must make, and how tradeoffs are often an unavoidable part of navigating that complexity. Through real-world examples, you’ll learn how different network design choices impact overall system complexity, and how to approach these decisions with greater clarity and confidence. We’ll wrap up with an in-depth discussion of unintended consequences—how they arise, how to anticipate them, and how they relate to designing in complex, adaptive environments.

As always, if you register for the course you can watch later.

Register here.