<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
xmlns:podcast="https://podcastindex.org/namespace/1.0"
xmlns:rawvoice="https://blubrry.com/developer/rawvoice-rss/"
>

<channel>
	<title>rule 11 reader</title>
	<atom:link href="https://rule11.tech/feed/" rel="self" type="application/rss+xml" />
	<link>https://rule11.tech</link>
	<description>culture eats technology for breakfast</description>
	<lastBuildDate>Wed, 22 Apr 2026 12:11:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/rule11.tech/wp-content/uploads/cropped-rule11-logo-square.png?fit=32%2C32&#038;ssl=1</url>
	<title>rule 11 reader</title>
	<link>https://rule11.tech</link>
	<width>32</width>
	<height>32</height>
</image> 
	<atom:link rel="hub" href="https://pubsubhubbub.appspot.com/" />
	<podcast:locked>yes</podcast:locked>
	<itunes:author>Russ White</itunes:author>
	<itunes:explicit>false</itunes:explicit>
	<itunes:image href="https://rule11.tech/wp-content/plugins/powerpress/itunes_default.jpg" />
	<itunes:type>episodic</itunes:type>
	<itunes:owner>
		<itunes:name>Russ White</itunes:name>
	</itunes:owner>
	<copyright>Russ White</copyright>
	<podcast:license>Russ White</podcast:license>
	<podcast:medium>podcast</podcast:medium>
	<image>
		<title>rule 11 reader</title>
		<url>https://rule11.tech/wp-content/plugins/powerpress/rss_default.jpg</url>
		<link>https://rule11.tech/hedge</link>
	</image>
	<itunes:category text="Technology" />
	<rawvoice:rating>TV-G</rawvoice:rating>
	<rawvoice:frequency>Weekly</rawvoice:frequency>
	<podcast:person role="Host" href="https://linkedin.com/in/riw777">Russ White</podcast:person>
	<podcast:podping usesPodping="true" />
<site xmlns="com-wordpress:feed-additions:1">73371701</site>	<item>
		<title>Worth Reading 042226</title>
		<link>https://rule11.tech/wr-042226/</link>
					<comments>https://rule11.tech/wr-042226/#respond</comments>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:11:04 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020284</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-042226.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/">
In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.</a></blockquote>
&#160;
<blockquote><a href="https://ojs.aaai.org/index.php/AAAI/article/view/42130">
This report explores the evolution and current state of neuro- symbolic artificial intelligence, an approach that integrates neural network capabilities with symbolic reasoning.</a></blockquote>
&#160;
<blockquote><a href="https://www.networkworld.com/article/4158187/linux-7-0-debuts-with-some-big-changes-for-networking.html">
The Linux 7.0 kernel is now out, and it’s one of the most impactful releases in years for networking professionals.</a></blockquote>
&#160;
<blockquote><a href="https://www.techsequences.org/podcasts/2026/04/outpaced-by-ai-can-radical-collaboration-save-small-business-from-cyber-extinction/">
The human-speed defense of small business is being obliterated by the machine-speed offense of AI-driven cybercrime. Today, what large companies treat as a manageable risk is a terminal expense for small enterprises, with 60% of small enterprises shutting down within six months of a major attack.</a></blockquote>
&#160;
<blockquote><a href="https://openbindings.com/blog/one-interface-every-protocol">
The original frustration was familiar. You build on one provider, they change pricing, deprecate an API, or just aren't the right tool anymore, and migrating is brutal. </a></blockquote>
]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/"><br />
In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://ojs.aaai.org/index.php/AAAI/article/view/42130"><br />
This report explores the evolution and current state of neuro- symbolic artificial intelligence, an approach that integrates neural network capabilities with symbolic reasoning.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.networkworld.com/article/4158187/linux-7-0-debuts-with-some-big-changes-for-networking.html"><br />
The Linux 7.0 kernel is now out, and it’s one of the most impactful releases in years for networking professionals.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.techsequences.org/podcasts/2026/04/outpaced-by-ai-can-radical-collaboration-save-small-business-from-cyber-extinction/"><br />
The human-speed defense of small business is being obliterated by the machine-speed offense of AI-driven cybercrime. Today, what large companies treat as a manageable risk is a terminal expense for small enterprises, with 60% of small enterprises shutting down within six months of a major attack.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://openbindings.com/blog/one-interface-every-protocol"><br />
The original frustration was familiar. You build on one provider, they change pricing, deprecate an API, or just aren&#8217;t the right tool anymore, and migrating is brutal. </a></p></blockquote>
]]></content:encoded>
					
					<wfw:commentRss>https://rule11.tech/wr-042226/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020284</post-id>	</item>
		<item>
		<title>Hedge 302: Communications in Biological Systems</title>
		<link>https://rule11.tech/hedge-302/</link>
					<comments>https://rule11.tech/hedge-302/#respond</comments>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 18:18:29 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020279</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-302.png" alt="" width="400" class="alignnone" />
&#160;
What does biology have to do with computer networks? Much more than you might think. Communications systems, after all, need to solve the same problems--and they often use the same kinds of tools. In this episode of the Hedge, Emily Reeves and Joe Deweese join Russ and Tom to talk about a recent paper comparing computer communications to biological communications.]]></description>
										<content:encoded><![CDATA[<p>What does biology have to do with computer networks? Much more than you might think. Communications systems, after all, need to solve the same problems&#8211;and they often use the same kinds of tools. In this episode of the Hedge, Emily Reeves and Joe Deweese join Russ and Tom to talk about a recent paper comparing computer communications to biological communications.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020279-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-302.mp3?_=1" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-302.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-302.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-302.mp3"><em>download</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rule11.tech/hedge-302/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-302.mp3" length="130826328" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>54:30</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">1020279</post-id>	</item>
		<item>
		<title>Worth Reading 041326</title>
		<link>https://rule11.tech/wr-041326/</link>
					<comments>https://rule11.tech/wr-041326/#respond</comments>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 15:16:11 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020270</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-041326.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://www.theregister.com/2026/04/07/ai_returns_gartner/">
Tech leaders hoping AI might help save money and improve efficiency in IT infrastructure should know that only 28 percent of use cases fully succeed and offer return on investment (ROI).</a></blockquote>
&#160;
<blockquote><a href="https://packetpushers.net/podcasts/heavy-strategy/hs129-achieving-operational-excellence/">
The best strategy in the world won’t succeed if a team falters operationally. But what is operational excellence, and what does it take to acquire it</a></blockquote>
&#160;
<blockquote><a href="https://potsandpansbyccg.com/2026/04/08/some-thoughts-on-convergence/">
Industry analysts are using the word convergence as shorthand for competition that bundles cell service with broadband. Convergence is the newest strategy that replaces the traditional bundling strategy of selling a package of broadband, cable TV, and voice.</a></blockquote>
&#160;
<blockquote><a href="https://cacm.acm.org/blogcacm/evitable-trust/">
Leaving aside my discovery that YouTube videos on the Naturalistic Fallacy are branded by female cleavage (???), we move on to the two problems embedded in statements I hear by articulation and by implication in the public discourse: “We must cultivate trust in AI,” and “AI acquiescence is inevitable.”</a></blockquote>
&#160;
<blockquote><a href="https://blog.j2sw.com/technology/tcp-ao-for-bgp-what-it-is-and-what-is-does/">
Most engineers don’t think about securing TCP itself. We rely on the applications riding on top of the network.  When you run routing protocols or long-lived control sessions across untrusted or shared infrastructure, TCP becomes part of your attack surface whether you planned for it or not.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.theregister.com/2026/04/07/ai_returns_gartner/"><br />
Tech leaders hoping AI might help save money and improve efficiency in IT infrastructure should know that only 28 percent of use cases fully succeed and offer return on investment (ROI).</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://packetpushers.net/podcasts/heavy-strategy/hs129-achieving-operational-excellence/"><br />
The best strategy in the world won’t succeed if a team falters operationally. But what is operational excellence, and what does it take to acquire it</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://potsandpansbyccg.com/2026/04/08/some-thoughts-on-convergence/"><br />
Industry analysts are using the word convergence as shorthand for competition that bundles cell service with broadband. Convergence is the newest strategy that replaces the traditional bundling strategy of selling a package of broadband, cable TV, and voice.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://cacm.acm.org/blogcacm/evitable-trust/"><br />
Leaving aside my discovery that YouTube videos on the Naturalistic Fallacy are branded by female cleavage (???), we move on to the two problems embedded in statements I hear by articulation and by implication in the public discourse: “We must cultivate trust in AI,” and “AI acquiescence is inevitable.”</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.j2sw.com/technology/tcp-ao-for-bgp-what-it-is-and-what-is-does/"><br />
Most engineers don’t think about securing TCP itself. We rely on the applications riding on top of the network.  When you run routing protocols or long-lived control sessions across untrusted or shared infrastructure, TCP becomes part of your attack surface whether you planned for it or not.</a></p></blockquote>
]]></content:encoded>
					
					<wfw:commentRss>https://rule11.tech/wr-041326/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020270</post-id>	</item>
		<item>
		<title>Best of the Hedge: Episode 30, Network Fundamentals</title>
		<link>https://rule11.tech/boh-30/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 12:51:25 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020264</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-030-repost.png" alt="" width="400" class="alignnone" />
&#160;
What are networking fundamentals, and why are they important? Join us for this repost of a classic Hedge discussion with Ethan, Eyvonne, Tom, and Russ.]]></description>
										<content:encoded><![CDATA[<p>What are networking fundamentals, and why are they important? Join us for this repost of a classic Hedge discussion with Ethan, Eyvonne, Tom, and Russ.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020264-2" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-030.mp3?_=2" /><a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-030.mp3">https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-030.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-030.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-030.mp3" length="37566008" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>52:10</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/58342505-73641.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020264</post-id>	</item>
		<item>
		<title>Worth Reading 040626</title>
		<link>https://rule11.tech/wr-040626/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 11:48:56 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020254</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-040626.png" alt="" width="600" height="241" class="alignnone size-full wp-image-1020255" />
&#160;
<blockquote><a href="https://www.digitaltrends.com/computing/stanford-study-stresses-you-should-avoid-using-ai-chatbots-as-a-personal-guide/">
Stanford researchers are warning that using AI chatbots for personal advice could backfire. The problem isn’t just accuracy, it’s how these systems respond when you’re dealing with complicated, real-world conflicts.</a></blockquote>
&#160;
<blockquote><a href="https://blog.apnic.net/2026/03/31/rpki-vs-social-engineering-a-case-study-in-route-hijacking/">
During the APNIC Routing Security Special Interest Group (SIG) session at APRICOT 2026 / APNIC 61, APNIC and LACNIC presented a case study of a Border Gateway Protocol (BGP) hijack that combined a technical attack with social engineering.</a></blockquote>
&#160;
<blockquote><a href="https://labs.ripe.net/author/rivadeneyra/when-ibgp-full-mesh-is-actually-unnecessary/">
It is widely believed that all BGP routers within an Autonomous System (AS) must be connected in a full iBGP mesh, or, when this becomes impractical, that route reflectors or confederations must be used. However, a full mesh is not always necessary, and in some scenarios it may even be undesirable.</a></blockquote>
&#160;
<blockquote><a href="https://potsandpansbyccg.com/2026/03/31/filling-the-sky-with-satellites/">
The skies are quickly filling with communications satellites. Following is a short list of the many ventures that have or will soon be launching large numbers of broadband satellites.</a></blockquote>
&#160;
<blockquote><a href="https://cacm.acm.org/blogcacm/why-context-is-the-hard-problem-in-enterprise-ai/">
In early demos, the system looked impressive. It could summarize logs, explain configuration issues, and suggest possible fixes. Instead of digging through internal docs, the answers were coming back in seconds. For a while, it really felt like this system was going to work as expected.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.digitaltrends.com/computing/stanford-study-stresses-you-should-avoid-using-ai-chatbots-as-a-personal-guide/"><br />
Stanford researchers are warning that using AI chatbots for personal advice could backfire. The problem isn’t just accuracy, it’s how these systems respond when you’re dealing with complicated, real-world conflicts.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.apnic.net/2026/03/31/rpki-vs-social-engineering-a-case-study-in-route-hijacking/"><br />
During the APNIC Routing Security Special Interest Group (SIG) session at APRICOT 2026 / APNIC 61, APNIC and LACNIC presented a case study of a Border Gateway Protocol (BGP) hijack that combined a technical attack with social engineering.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://labs.ripe.net/author/rivadeneyra/when-ibgp-full-mesh-is-actually-unnecessary/"><br />
It is widely believed that all BGP routers within an Autonomous System (AS) must be connected in a full iBGP mesh, or, when this becomes impractical, that route reflectors or confederations must be used. However, a full mesh is not always necessary, and in some scenarios it may even be undesirable.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://potsandpansbyccg.com/2026/03/31/filling-the-sky-with-satellites/"><br />
The skies are quickly filling with communications satellites. Following is a short list of the many ventures that have or will soon be launching large numbers of broadband satellites.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://cacm.acm.org/blogcacm/why-context-is-the-hard-problem-in-enterprise-ai/"><br />
In early demos, the system looked impressive. It could summarize logs, explain configuration issues, and suggest possible fixes. Instead of digging through internal docs, the answers were coming back in seconds. For a while, it really felt like this system was going to work as expected.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020254</post-id>	</item>
		<item>
		<title>Worth Reading 040426</title>
		<link>https://rule11.tech/wr-040426/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 18:58:20 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020248</guid>

					<description><![CDATA[&#160;
<blockquote><a href="https://circleid.com/posts/sovereignty-inversion-how-rirs-reduced-national-sovereignty-to-a-us100-liability-cap">
What appears as double extraction at the operator level becomes something larger and more serious at the level of the state. It becomes sovereignty inversion.</a></blockquote>
&#160;
<blockquote><a href="https://www.theregister.com/2026/03/26/panasonic_datacenter_energy_plans/">
Major memory makers have already sold all the kit they can make this year, creating shortages and price increases. </a></blockquote>
&#160;
<blockquote><a href="https://www.potaroo.net/ispcol/2026-03/endtime.html">
It's fading from our collective memory, but almost thirty years ago the global IT industry was gripped by Y2K fever.</a></blockquote>
&#160;
<blockquote><a href="https://spectator.org/ai-the-biggest-heist-in-world-history/">
What do you get when you combine Big Tech, a Bill Clinton fixer, Davos, the architect of the Hunter Biden laptop disinfo, and “Artificial Intelligence”? The biggest heist in world history. </a></blockquote>
&#160;
<blockquote><a href="https://www.networkworld.com/article/4151356/network-and-storage-patterns-for-ai-workloads-the-overlooked-bottleneck.html">
Stop blaming the GPUs! Your AI feels slow because data is getting stuck in traffic. Fix the "supply chain" to keep those tokens flowing.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://circleid.com/posts/sovereignty-inversion-how-rirs-reduced-national-sovereignty-to-a-us100-liability-cap"><br />
What appears as double extraction at the operator level becomes something larger and more serious at the level of the state. It becomes sovereignty inversion.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.theregister.com/2026/03/26/panasonic_datacenter_energy_plans/"><br />
Major memory makers have already sold all the kit they can make this year, creating shortages and price increases. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2026-03/endtime.html"><br />
It&#8217;s fading from our collective memory, but almost thirty years ago the global IT industry was gripped by Y2K fever.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://spectator.org/ai-the-biggest-heist-in-world-history/"><br />
What do you get when you combine Big Tech, a Bill Clinton fixer, Davos, the architect of the Hunter Biden laptop disinfo, and “Artificial Intelligence”? The biggest heist in world history. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.networkworld.com/article/4151356/network-and-storage-patterns-for-ai-workloads-the-overlooked-bottleneck.html"><br />
Stop blaming the GPUs! Your AI feels slow because data is getting stuck in traffic. Fix the &#8220;supply chain&#8221; to keep those tokens flowing.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020248</post-id>	</item>
		<item>
		<title>Hedge 301: SONiC</title>
		<link>https://rule11.tech/hedge-301/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 15:13:15 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020244</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-301.png" alt="" width="600" height="240" class="alignnone" />
&#160;
What's the deal with SONiC? Is it easy to build and use, or hard? Is it something you should be looking at? Jeff Doyle joins Russ and Tom to look at the SONiC operating system, ecosystem, and deployment.]]></description>
										<content:encoded><![CDATA[<p>What&#8217;s the deal with SONiC? Is it easy to build and use, or hard? Is it something you should be looking at? Jeff Doyle joins Russ and Tom to look at the SONiC operating system, ecosystem, and deployment.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020244-3" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-301.mp3?_=3" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-301.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-301.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-301.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-301.mp3" length="118997197" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>49:35</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/153784027-73241.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020244</post-id>	</item>
		<item>
		<title>Worth Reading 032826</title>
		<link>https://rule11.tech/wr-032826/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Sat, 28 Mar 2026 15:25:59 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020239</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-032826.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf">
This document provides DNS deployment guidelines to secure the DNS protocol and infrastructure, mitigate misuse or misconfiguration, and provide an additional layer of network security as part of a zero trust and/or defense-in-depth security risk management approach.</a></blockquote>
&#160;
<blockquote><a href="https://blog.apnic.net/2026/03/25/demystifying-performance-of-ebpf-network-applications/">
However, eBPF has not seen similarly widespread adoption in other types of networked applications, such as web servers and databases. In this blog post, we argue that this gap stems from limitations in the current eBPF architecture — specifically, the kernel runtime, APIs, and compiler toolchain.</a></blockquote>
&#160;
<blockquote><a href="https://www.theregister.com/2026/03/25/open_source_bill_opinion/">
Time and again, I see people begging for companies with deep pockets to fund open source projects. I mean, after all, they've made billions from this code. You'd think they could support the code's creators and maintainers. It would be only fair, right?</a></blockquote>
&#160;
<blockquote><a href="https://cacm.acm.org/blogcacm/model-collapse-is-already-happening-we-just-pretend-it-isnt/">
The weird, rare, surprising patterns that make data rich slowly get smoothed out when an AI model trains on outputs from a previous model. </a></blockquote>
&#160;
<blockquote><a href="https://circleid.com/posts/sovereignty-inversion-how-rirs-reduced-national-sovereignty-to-a-us100-liability-cap">
In the previous note, the claim was not that the registry layer merely imposes visible fees or administrative inconvenience. The claim was more precise. The first extraction occurs when a scarce, transferable, revenue-enabling resource is kept institutionally discounted through non-asset rhetoric, conditional recognition, and friction around transfer and use</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf"><br />
This document provides DNS deployment guidelines to secure the DNS protocol and infrastructure, mitigate misuse or misconfiguration, and provide an additional layer of network security as part of a zero trust and/or defense-in-depth security risk management approach.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.apnic.net/2026/03/25/demystifying-performance-of-ebpf-network-applications/"><br />
However, eBPF has not seen similarly widespread adoption in other types of networked applications, such as web servers and databases. In this blog post, we argue that this gap stems from limitations in the current eBPF architecture — specifically, the kernel runtime, APIs, and compiler toolchain.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.theregister.com/2026/03/25/open_source_bill_opinion/"><br />
Time and again, I see people begging for companies with deep pockets to fund open source projects. I mean, after all, they&#8217;ve made billions from this code. You&#8217;d think they could support the code&#8217;s creators and maintainers. It would be only fair, right?</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://cacm.acm.org/blogcacm/model-collapse-is-already-happening-we-just-pretend-it-isnt/"><br />
The weird, rare, surprising patterns that make data rich slowly get smoothed out when an AI model trains on outputs from a previous model. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://circleid.com/posts/sovereignty-inversion-how-rirs-reduced-national-sovereignty-to-a-us100-liability-cap"><br />
In the previous note, the claim was not that the registry layer merely imposes visible fees or administrative inconvenience. The claim was more precise. The first extraction occurs when a scarce, transferable, revenue-enabling resource is kept institutionally discounted through non-asset rhetoric, conditional recognition, and friction around transfer and use</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020239</post-id>	</item>
		<item>
		<title>Hedge 300: Solving Injection Attacks</title>
		<link>https://rule11.tech/hedge-300/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 10:46:35 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020235</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-300.png" alt="" width="400" class="alignnone" />
&#160;
It's episode 300, and it's roundtable time. In this episode, Tom, Eyvonne, and Russ talk about how systems can be designed to prevent injection attacks, and then the perennial unpleasantness of layoffs.]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s episode 300, and it&#8217;s roundtable time. In this episode, Tom, Eyvonne, and Russ talk about how systems can be designed to prevent injection attacks, and then the perennial unpleasantness of layoffs.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020235-4" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-300.mp3?_=4" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-300.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-300.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-300.mp3"><em>download</em></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-300.mp3" length="92592417" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>38:35</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/153764476-72740.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020235</post-id>	</item>
		<item>
		<title>Worth Reading 032526</title>
		<link>https://rule11.tech/wr-032526/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 14:46:55 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020231</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-032526.png" alt="" width="600" height="241" class="alignnone size-full wp-image-1020232" />
&#160;
<blockquote><a href="https://cacm.acm.org/blogcacm/inference-at-the-edge-is-a-sovereignty-problem-not-a-latency-problem/">
For organizations in telecommunications, financial services, healthcare, and public infrastructure, the driver for running inference at the edge is not to reduce milliseconds. It is because the data cannot legally leave the building, the country, or the jurisdiction.</a></blockquote>
&#160;
<blockquote><a href="https://circleid.com/posts/internet-number-resources-are-not-political-property">
Internet number resources are not political property. They are operator-held assets embedded in functioning networks.</a></blockquote>
&#160;
<blockquote><a href="https://www.pewresearch.org/internet/2026/02/24/how-teens-use-and-view-ai/">
Just over half of U.S. teens say they have used chatbots for help with schoolwork, and 12% say they’ve gotten emotional support. More teens think AI will be positive for them than negative</a></blockquote>
&#160;
<blockquote><a href="https://www.theregister.com/2026/03/19/pwc_ai/">
You'll use AI and like it too – if you work for PwC. Paul Griggs, US chief executive of the global professional services giant, has made clear there is no room at the corporation for AI skeptics.</a></blockquote>
&#160;
<blockquote><a href="https://www.potaroo.net/ispcol/2026-03/cidr-report.html">
For some time, I have been looking after a routing analysis report called the "CIDR Report". Here I'd like to explain the reasons for this report, and what is in the report and share some thoughts as to its usefulness today to the Internet routing community.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://cacm.acm.org/blogcacm/inference-at-the-edge-is-a-sovereignty-problem-not-a-latency-problem/"><br />
For organizations in telecommunications, financial services, healthcare, and public infrastructure, the driver for running inference at the edge is not to reduce milliseconds. It is because the data cannot legally leave the building, the country, or the jurisdiction.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://circleid.com/posts/internet-number-resources-are-not-political-property"><br />
Internet number resources are not political property. They are operator-held assets embedded in functioning networks.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.pewresearch.org/internet/2026/02/24/how-teens-use-and-view-ai/"><br />
Just over half of U.S. teens say they have used chatbots for help with schoolwork, and 12% say they’ve gotten emotional support. More teens think AI will be positive for them than negative</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.theregister.com/2026/03/19/pwc_ai/"><br />
You&#8217;ll use AI and like it too – if you work for PwC. Paul Griggs, US chief executive of the global professional services giant, has made clear there is no room at the corporation for AI skeptics.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2026-03/cidr-report.html"><br />
For some time, I have been looking after a routing analysis report called the &#8220;CIDR Report&#8221;. Here I&#8217;d like to explain the reasons for this report, and what is in the report and share some thoughts as to its usefulness today to the Internet routing community.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020231</post-id>	</item>
		<item>
		<title>Worth Reading 032326</title>
		<link>https://rule11.tech/wr-032326/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 15:25:05 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020225</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-032326.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://cacm.acm.org/blogcacm/celebrating-the-80th-anniversary-of-eniac/">
The ENIAC (Electronic Numerical Integrator and Computer), a machine that profoundly reshaped computing, marked its 80th anniversary on 15 February 2026. ENIAC was a technological leap that laid the foundation for the modern computing revolution and eventually transformed nearly every aspect of society.</a></blockquote>
&#160;
<blockquote><a href="https://blog.apnic.net/2026/03/12/apnic-routing-security-sig-at-apricot-2026-social-engineering-rpki-aspa-ta-constraints/">
During the APNIC Routing Security SIG session, held at APRICOT 2026 in Jakarta, the community heard about six applications of Resource Public Key Infrastructure (RPKI) to the problem of secure Internet routing. </a></blockquote>
&#160;
<blockquote><a href="https://blog.apnic.net/2026/03/16/getting-network-automation-right-a-practical-strategy-for-enterprise-networks/">
There is no doubt that automation offers benefits such as speed, accuracy, reliability, and efficiency, and goes far beyond simple configuration management tasks, including resource provisioning. However, it may not be a good fit for every infrastructure environment. One must evaluate and compare the pros and cons before adopting automation.</a></blockquote>
&#160;
<blockquote><a href="https://appleinsider.com/articles/26/03/03/what-privacy-as-expected-meta-ray-bans-are-a-privacy-disaster">
Meta's Ray-Ban smart glasses are a privacy nightmare, with footage of naked people, sensitive information, and violent acts captured and seen by Meta's AI and an army of employees.</a></blockquote>
&#160;
<blockquote><a href="https://www.networkworld.com/article/4146960/microsofts-laser-free-cable-tech-promises-to-slash-ai-data-center-networking-power-bills.html">
MOSAIC ditches lasers for cheap MicroLEDs and medical imaging fiber, cuts cabling energy by up to 50%, and already fits in a standard transceiver after a proof-of-concept with MediaTek.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://cacm.acm.org/blogcacm/celebrating-the-80th-anniversary-of-eniac/"><br />
The ENIAC (Electronic Numerical Integrator and Computer), a machine that profoundly reshaped computing, marked its 80th anniversary on 15 February 2026. ENIAC was a technological leap that laid the foundation for the modern computing revolution and eventually transformed nearly every aspect of society.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.apnic.net/2026/03/12/apnic-routing-security-sig-at-apricot-2026-social-engineering-rpki-aspa-ta-constraints/"><br />
During the APNIC Routing Security SIG session, held at APRICOT 2026 in Jakarta, the community heard about six applications of Resource Public Key Infrastructure (RPKI) to the problem of secure Internet routing. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.apnic.net/2026/03/16/getting-network-automation-right-a-practical-strategy-for-enterprise-networks/"><br />
There is no doubt that automation offers benefits such as speed, accuracy, reliability, and efficiency, and goes far beyond simple configuration management tasks, including resource provisioning. However, it may not be a good fit for every infrastructure environment. One must evaluate and compare the pros and cons before adopting automation.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://appleinsider.com/articles/26/03/03/what-privacy-as-expected-meta-ray-bans-are-a-privacy-disaster"><br />
Meta&#8217;s Ray-Ban smart glasses are a privacy nightmare, with footage of naked people, sensitive information, and violent acts captured and seen by Meta&#8217;s AI and an army of employees.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.networkworld.com/article/4146960/microsofts-laser-free-cable-tech-promises-to-slash-ai-data-center-networking-power-bills.html"><br />
MOSAIC ditches lasers for cheap MicroLEDs and medical imaging fiber, cuts cabling energy by up to 50%, and already fits in a standard transceiver after a proof-of-concept with MediaTek.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020225</post-id>	</item>
		<item>
		<title>Worth Reading 031526</title>
		<link>https://rule11.tech/wr-031526/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 00:26:19 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020220</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/WR-031526.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://blog.apnic.net/2026/03/04/dns-blocking-in-practice-pdns-in-a-research-and-education-network/">
As malicious domains continue to pose a threat across the Internet, security professionals are left to consider the measures that can effectively defend their organizations from these threats.</a></blockquote>
&#160;
<blockquote><a href="https://circleid.com/posts/why-dns-level-piracy-enforcement-is-a-trap">
Right now, a growing chorus is treating India’s “lock and suspend” approach as a success story and a model for the world.</a></blockquote>
&#160;
<blockquote><a href="https://www.potaroo.net/ispcol/2026-03/nts.html">
On the last day of December 2016 there was a brief hiccup as the world's clocks adjusted their time according to the Coordinated Universal Time (UTC) standard by adding an extra second to the last minute of the 31st of December.</a></blockquote>
&#160;
<blockquote><a href="https://cacm.acm.org/research/a-decade-of-docker-containers/">
For the past decade, Docker has provided a robust solution for building, shipping, and sharing applications. But behind its simple "build and run" workflow lie many years of complex technical challenges.</a></blockquote>
&#160;
<blockquote><a href="https://cacm.acm.org/blogcacm/when-pretty-diagrams-lie/">
AI assistants that produce drawings and other output that looks like evidence reduce questioning without increasing correctness.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://blog.apnic.net/2026/03/04/dns-blocking-in-practice-pdns-in-a-research-and-education-network/"><br />
As malicious domains continue to pose a threat across the Internet, security professionals are left to consider the measures that can effectively defend their organizations from these threats.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://circleid.com/posts/why-dns-level-piracy-enforcement-is-a-trap"><br />
Right now, a growing chorus is treating India’s “lock and suspend” approach as a success story and a model for the world.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2026-03/nts.html"><br />
On the last day of December 2016 there was a brief hiccup as the world&#8217;s clocks adjusted their time according to the Coordinated Universal Time (UTC) standard by adding an extra second to the last minute of the 31st of December.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://cacm.acm.org/research/a-decade-of-docker-containers/"><br />
For the past decade, Docker has provided a robust solution for building, shipping, and sharing applications. But behind its simple &#8220;build and run&#8221; workflow lie many years of complex technical challenges.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://cacm.acm.org/blogcacm/when-pretty-diagrams-lie/"><br />
AI assistants that produce drawings and other output that looks like evidence reduce questioning without increasing correctness.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020220</post-id>	</item>
		<item>
		<title>Hedge 299: 6G</title>
		<link>https://rule11.tech/hedge-299/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 17:38:02 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020214</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-299.png" alt="" width="400" class="alignnone" />
&#160;
As we discussed in the prior episode, the 6G hype is building. What's in 6G, though, and how realistic is it that a new wireless technology is going to radically change the world? In this episode of the Hedge, George Michaelson joins us from Australia to discuss the ins and outs of 6G.
]]></description>
										<content:encoded><![CDATA[<p>As we discussed in the prior episode, the 6G hype is building. What&#8217;s in 6G, though, and how realistic is it that a new wireless technology is going to radically change the world? In this episode of the Hedge, George Michaelson joins us from Australia to discuss the ins and outs of 6G.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020214-5" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-299.mp3?_=5" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-299.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-299.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-299.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-299.mp3" length="80251942" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>55:43</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/152944726-72015.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020214</post-id>	</item>
		<item>
		<title>Worth Reading 031026</title>
		<link>https://rule11.tech/wr-031026/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 15:39:59 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020209</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-031026.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://www.darkreading.com/cyber-risk/attackers-now-need-just-29-minutes-to-own-a-network">
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.</a></blockquote>
&#160;
<blockquote><a href="https://www.potaroo.net/ispcol/2026-02/v6dns.html">
In theory, the design of IPv6 was such that the upper-level end-to-end transport protocols, namely TCP and UDP need not be aware of the IP layer protocol being used. We should be able to use IPv4 and IPv6 interchangeably in the DNS right?</a></blockquote>
&#160;
<blockquote><a href="chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/pdf/2602.16800">
Weshow that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator.</a></blockquote>
&#160;
<blockquote><a href="https://www.nextplatform.com/connect/2026/03/02/nvidia-sees-the-light-on-silicon-photonics-and-maybe-optical-switching/4093099">
By virtue of its $6.9 billion acquisition of Mellanox Technologies completed in early 2020, Nvidia became a seller of optical transceivers for Ethernet and InfiniBand, but seven years before that deal was done, Mellanox had acquired optical technology suppliers Kotura and IPtronics to become a supplier of these components itself, correctly perceiving how important optics would be for the future.</a></blockquote>
&#160;
<blockquote><a href="https://blog.apnic.net/2026/03/03/network-management-session-at-apricot-2026-dns-logs-enterprise-open-source-and-configuration-management/">
The Network Management session at APRICOT 2026 brought together four presenters to share practical, data‑driven insights into how operators can better understand and optimize their networks.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.darkreading.com/cyber-risk/attackers-now-need-just-29-minutes-to-own-a-network"><br />
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2026-02/v6dns.html"><br />
In theory, the design of IPv6 was such that the upper-level end-to-end transport protocols, namely TCP and UDP need not be aware of the IP layer protocol being used. We should be able to use IPv4 and IPv6 interchangeably in the DNS right?</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/pdf/2602.16800"><br />
Weshow that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.nextplatform.com/connect/2026/03/02/nvidia-sees-the-light-on-silicon-photonics-and-maybe-optical-switching/4093099"><br />
By virtue of its $6.9 billion acquisition of Mellanox Technologies completed in early 2020, Nvidia became a seller of optical transceivers for Ethernet and InfiniBand, but seven years before that deal was done, Mellanox had acquired optical technology suppliers Kotura and IPtronics to become a supplier of these components itself, correctly perceiving how important optics would be for the future.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.apnic.net/2026/03/03/network-management-session-at-apricot-2026-dns-logs-enterprise-open-source-and-configuration-management/"><br />
The Network Management session at APRICOT 2026 brought together four presenters to share practical, data‑driven insights into how operators can better understand and optimize their networks.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020209</post-id>	</item>
		<item>
		<title>Hedge 298: The 6G Hype Begins</title>
		<link>https://rule11.tech/hedge-298/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 13:54:33 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020205</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-298.png" alt="" width="400" class="alignnone" />
&#160;
It's 2026, and it's time for a new cellular telephone hype cycle: 6G! Doug Dawson from CCG joins Russ and Tom to talk about why 5G is really 4.5G, the proposed changes for 6G, and the challenges higher frequency ranges and bandwidths face in the real world.
&#160;
It's definitely worth following Doug's daily post about the telecom and wireless worlds over at <a href="https://potsandpansbyccg.com/">Pots and Pans.</a>]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s 2026, and it&#8217;s time for a new cellular telephone hype cycle: 6G! Doug Dawson from CCG joins Russ and Tom to talk about why 5G is really 4.5G, the proposed changes for 6G, and the challenges higher frequency ranges and bandwidths face in the real world.<br />
&nbsp;<br />
It&#8217;s definitely worth following Doug&#8217;s daily post about the telecom and wireless worlds over at <a href="https://potsandpansbyccg.com/">Pots and Pans.</a><br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020205-6" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-298.mp3?_=6" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-298.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-298.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-298.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-298.mp3" length="63107136" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episode>298</itunes:episode>
		<podcast:episode display="Hedge 298">298</podcast:episode>
		<itunes:title>6G Hype!</itunes:title>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>43:49</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/152765273-71565.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020205</post-id>	</item>
		<item>
		<title>Hedge 297: MPLS</title>
		<link>https://rule11.tech/hedge-297/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 17:07:04 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020195</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-297.png" alt="" width="600" class="alignnone" />
&#160;
Has MPLS really "died" because of SD-WAN services? Scott Robohon joins Tom and Russ to talk about the past and future of MPLS.]]></description>
										<content:encoded><![CDATA[<p>Has MPLS really &#8220;died&#8221; because of SD-WAN services? Scott Robohn joins Tom and Russ to talk about the past and future of MPLS.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020195-7" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-297.mp3?_=7" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-297.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-297.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-297.mp3"><em>download</em></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-297.mp3" length="76125241" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>52:51</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/152592880-70922.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020195</post-id>	</item>
		<item>
		<title>Worth Reading 022626</title>
		<link>https://rule11.tech/wr-022626/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 13:10:17 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020191</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-022626.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://americanaffairsjournal.org/2026/02/understanding-the-llm-bubble/">
The current debate on the existence of an “AI bubble” centers on a single question: is the current high level of investment into AI data centers a massive misallocation of capital or the key to future economic growth? </a></blockquote>
&#160;
<blockquote><a href="https://www.dailywire.com/news/i-tried-using-ai-to-simplify-my-life-and-it-made-things-worse">
The more I have thought about it, the more convinced I am that the very technological advancements that make my life easier — the most recent being artificial intelligence — actually contribute to a busier, more overwhelming life.</a></blockquote>
&#160;
<blockquote><a href="https://www.networkworld.com/article/4135239/raising-the-temp-on-liquid-cooling.html">
Using hot water to cool supercomputers? Nvidia and others are doing it. It’s liquid cooling minus the water chillers.</a></blockquote>
&#160;
<blockquote><a href="https://arstechnica.com/security/2026/02/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/">
New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. </a></blockquote>
&#160;
<blockquote><a href="https://packetpushers.net/podcasts/heavy-strategy/hs125-how-to-choose-an-it-hiring-service/">
Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification, given the privileged access they typically have to IT systems and tools.</a></blockquote>
]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://americanaffairsjournal.org/2026/02/understanding-the-llm-bubble/"><br />
The current debate on the existence of an “AI bubble” centers on a single question: is the current high level of investment into AI data centers a massive misallocation of capital or the key to future economic growth? </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.dailywire.com/news/i-tried-using-ai-to-simplify-my-life-and-it-made-things-worse"><br />
The more I have thought about it, the more convinced I am that the very technological advancements that make my life easier — the most recent being artificial intelligence — actually contribute to a busier, more overwhelming life.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.networkworld.com/article/4135239/raising-the-temp-on-liquid-cooling.html"><br />
Using hot water to cool supercomputers? Nvidia and others are doing it. It’s liquid cooling minus the water chillers.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://arstechnica.com/security/2026/02/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/"><br />
New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://packetpushers.net/podcasts/heavy-strategy/hs125-how-to-choose-an-it-hiring-service/"><br />
Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification, given the privileged access they typically have to IT systems and tools.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020191</post-id>	</item>
		<item>
		<title>Hedge 296: AS-SETs</title>
		<link>https://rule11.tech/hedge-296/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 20:27:27 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020186</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-296.png" alt="" width="400" class="alignnone" />
&#160;
AS-SETs (not that kind) were originally designed to simplify filtering at eBGP peering points--but they seem to have gone horribly wrong. Job Snijders and Doug Madory join Tom and Russ to discuss the history, use, problems, and (hopeful) demise of AS-SETs.]]></description>
										<content:encoded><![CDATA[<p>AS-SETs (not that kind) were originally designed to simplify filtering at eBGP peering points&#8211;but they seem to have gone horribly wrong. Job Snijders and Doug Madory join Tom and Russ to discuss the history, use, problems, and (hopeful) demise of AS-SETs.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020186-8" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-296.mp3?_=8" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-296.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-296.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-296.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-296.mp3" length="70831786" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>49:11</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/152420700-70505.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020186</post-id>	</item>
		<item>
		<title>Worth Reading 022026</title>
		<link>https://rule11.tech/wr-022026/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 13:54:19 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020182</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-022026.png" alt="" width="400" class="alignnone" />
&#160;
<blockquote><a href="https://www.digitaltrends.com/computing/silent-chip-defects-may-be-corrupting-data-in-modern-computers/">
For decades, many believed SDCs were rare, almost mythical events. However, major hyperscale operators including Meta, Google and Alibaba have disclosed that roughly one in 1,000 CPUs in their fleets can produce silent corruptions under certain conditions.</a></blockquote>
&#160;
<blockquote><a href="https://www.techsequences.org/podcasts/2026/02/the-algorithms-original-sin-inside-the-legal-war-over-ai-training-data/">
The fundamental rules of creativity and ownership, established in law since the time of the printing press, are now collapsing under the weight of Generative AI.</a></blockquote>
&#160;
<blockquote><a href="https://mindmatters.ai/2026/02/industrial-scale-blackmail-thanks-to-agentic-ai/">
As you and your spouse head off for a two-week Maui vacation, do you hand your 17-year-old boy a bottle of smooth whiskey and the keys to your spare Ferrari, bidding him “have fun while we’re gone”?</a></blockquote>
&#160;
<blockquote><a href="https://www.nextplatform.com/2026/02/18/some-game-theory-on-that-nvidia-meta-platforms-partnership/">
When Meta Platforms does a big AI system deal with Nvidia, that usually means that some other open hardware plan that the company had can’t meet an urgent need for compute.</a></blockquote>
&#160;
<blockquote><a href="https://arxiv.org/abs/2511.03675">
This paper introduces Whisper Leak, a side-channel attack that infers user prompt topics from encrypted LLM traffic by analyzing packet size and timing patterns in streaming responses. Despite TLS encryption protecting content, these metadata patterns leak sufficient information to enable topic classification.</a></blockquote>
&#160;
]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.digitaltrends.com/computing/silent-chip-defects-may-be-corrupting-data-in-modern-computers/"><br />
For decades, many believed SDCs were rare, almost mythical events. However, major hyperscale operators including Meta, Google and Alibaba have disclosed that roughly one in 1,000 CPUs in their fleets can produce silent corruptions under certain conditions.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.techsequences.org/podcasts/2026/02/the-algorithms-original-sin-inside-the-legal-war-over-ai-training-data/"><br />
The fundamental rules of creativity and ownership, established in law since the time of the printing press, are now collapsing under the weight of Generative AI.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://mindmatters.ai/2026/02/industrial-scale-blackmail-thanks-to-agentic-ai/"><br />
As you and your spouse head off for a two-week Maui vacation, do you hand your 17-year-old boy a bottle of smooth whiskey and the keys to your spare Ferrari, bidding him “have fun while we’re gone”?</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.nextplatform.com/2026/02/18/some-game-theory-on-that-nvidia-meta-platforms-partnership/"><br />
When Meta Platforms does a big AI system deal with Nvidia, that usually means that some other open hardware plan that the company had can’t meet an urgent need for compute.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://arxiv.org/abs/2511.03675"><br />
This paper introduces Whisper Leak, a side-channel attack that infers user prompt topics from encrypted LLM traffic by analyzing packet size and timing patterns in streaming responses. Despite TLS encryption protecting content, these metadata patterns leak sufficient information to enable topic classification.</a></p></blockquote>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020182</post-id>	</item>
		<item>
		<title>Worth Reading 021726</title>
		<link>https://rule11.tech/wr-021726/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Tue, 17 Feb 2026 15:34:32 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020178</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-021726.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://blog.apnic.net/2026/02/16/notes-from-nanog-96/">
If I learned one thing at NANOG 96, it’s how to build an up-to-date state of the art AI data centre! As I now understand it, the process is quite simple.</a></blockquote>
&#160;
<blockquote><a href="https://mindmatters.ai/2026/02/ai-hype-explodes-again/">
New AI models usually create excitement among the true believers and this year hasn’t been an exception. OpenAI and Anthropic released GPT-5.3 Codex and Claude Opus 4.6 respectively on the same day, February 5. T</a></blockquote>
&#160;
<blockquote><a href="https://www.fierce-network.com/wireless/opinion-four-nines-new-five-nines">
When my phone stopped working last month during the latest calamitous network outage to hit the US, I assumed it was that pesky Amazon cloud POP in North Virginia playing up again. After all, it was AWS’s VA data centre that triggered three (3) of the last big network failures in North America. </a></blockquote>
&#160;
<blockquote><a href="https://www.theregister.com/2026/02/12/starlink_challenges/">
Starlink can sometimes shift data more quickly than is possible on terrestrial networks, and improves connectivity in remote areas. But the space broadband service also presents new technical and regulatory challenges, according to speakers who took to the stage on Tuesday at the Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT) in Jakarta, Indonesia.</a></blockquote>
&#160;
<blockquote><a href="https://blog.apnic.net/2026/02/12/forward-to-hell-on-misusing-transparent-dns-forwarders-for-amplification-attacks/">
The Domain Name System (DNS) infrastructure is infamous for facilitating reflective amplification attacks. Countermeasures such as server shielding, access control, rate limiting, and protocol restrictions have been implemented to improve the situation. Still, DNS-based reflective amplification attacks remain. </a></blockquote>
&#160;
<blockquote><a href="https://labs.ripe.net/author/flavio_luciani_1/peering-market-at-a-glance-trends-transformations-and-the-regional-dynamics-of-internet-interconnection/">
Recent claims that IXPs "aren’t showing significant growth", that more interconnection is happening outside exchanges, and that peering can be more expensive than transit challenge long-standing assumptions about the role of IXPs. But do these claims hold up? A new paper from NAMEX explores the data.</a></blockquote>
&#160;]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://blog.apnic.net/2026/02/16/notes-from-nanog-96/"><br />
If I learned one thing at NANOG 96, it’s how to build an up-to-date state of the art AI data centre! As I now understand it, the process is quite simple.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://mindmatters.ai/2026/02/ai-hype-explodes-again/"><br />
New AI models usually create excitement among the true believers and this year hasn’t been an exception. OpenAI and Anthropic released GPT-5.3 Codex and Claude Opus 4.6 respectively on the same day, February 5. T</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.fierce-network.com/wireless/opinion-four-nines-new-five-nines"><br />
When my phone stopped working last month during the latest calamitous network outage to hit the US, I assumed it was that pesky Amazon cloud POP in North Virginia playing up again. After all, it was AWS’s VA data centre that triggered three (3) of the last big network failures in North America. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://www.theregister.com/2026/02/12/starlink_challenges/"><br />
Starlink can sometimes shift data more quickly than is possible on terrestrial networks, and improves connectivity in remote areas. But the space broadband service also presents new technical and regulatory challenges, according to speakers who took to the stage on Tuesday at the Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT) in Jakarta, Indonesia.</a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://blog.apnic.net/2026/02/12/forward-to-hell-on-misusing-transparent-dns-forwarders-for-amplification-attacks/"><br />
The Domain Name System (DNS) infrastructure is infamous for facilitating reflective amplification attacks. Countermeasures such as server shielding, access control, rate limiting, and protocol restrictions have been implemented to improve the situation. Still, DNS-based reflective amplification attacks remain. </a></p></blockquote>
<p>&nbsp;</p>
<blockquote><p><a href="https://labs.ripe.net/author/flavio_luciani_1/peering-market-at-a-glance-trends-transformations-and-the-regional-dynamics-of-internet-interconnection/"><br />
Recent claims that IXPs &#8220;aren’t showing significant growth&#8221;, that more interconnection is happening outside exchanges, and that peering can be more expensive than transit challenge long-standing assumptions about the role of IXPs. But do these claims hold up? A new paper from NAMEX explores the data.</a></p></blockquote>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020178</post-id>	</item>
		<item>
		<title>Hedge 295: Specialization</title>
		<link>https://rule11.tech/hedge-295/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 12:54:23 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020172</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-295.png" alt="" width="400" class="alignnone" />
&#160;
Should network engineers focus on specializing in one technology, vendor, or solution, or should they think about building a diverse skill set? Eyvonne, Tom, and Russ discuss the advantages of each, how these options relate to the future of network engineering, and skill diversification.]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/rule11.tech/wp-content/uploads/hedge-295.png?w=400&#038;ssl=1" alt=""  class="alignnone" /><br />
&nbsp;<br />
Should network engineers focus on specializing in one technology, vendor, or solution, or should they think about building a diverse skill set? Eyvonne, Tom, and Russ discuss the advantages of each, how these options relate to the future of network engineering, and skill diversification.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020172-9" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-295.mp3?_=9" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-295.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-295.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-295.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-295.mp3" length="55249250" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>38:22</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/152235482-69881.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020172</post-id>	</item>
		<item>
		<title>Worth Reading 021326</title>
		<link>https://rule11.tech/wr-021326/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 12:19:22 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020168</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-021326.png" alt="" width="400" class="alignnone" />

https://blog.apnic.net/2026/02/06/from-roots-to-reach-network-resilience-in-natural-disasters/
When communication networks break down, people cannot report their condition, responders lose situational awareness, and entire communities risk slipping beyond the reach of coordinated assistance. Network failure does not merely accompany disaster — it reshapes the human consequences.

https://cornwallalliance.org/nuclear-is-the-most-reliable-path-to-affordable-electricity/
Amid this “worldwide” economic backdrop, nuclear energy presents an affordable alternative to unreliable electricity sources like wind and solar.  Economically, it makes no sense to abandon working production methods until new ones can replace the existing and future demand.  World citizens are facing this reality in higher electricity prices. 

https://www.potaroo.net/ispcol/2026-02/ipasn.html
There have been a number of services that allow a lookup of an IP address or Autonomous System Number (ASN) and return information about that IP number resource. The Regional Internet Registries (RIRs) each operate a database that records (among other data items) the number resource and the details of the entity that is described in the relevant number registration record.

https://potsandpansbyccg.com/2026/02/09/the-challenge-of-adding-fiber-to-poles/
On February 5, the FCC issued a Memorandum and Order related to a pole attachment dispute between Comcast and Appalachian Power Company (APCO).

https://blog.apnic.net/2026/02/10/the-current-state-of-rdap/
While whois remains in widespread use, the RDAP ecosystem is rapidly maturing. Indeed, 2025 saw significant adoption and an accelerated expansion of RDAP services across the industry.

https://www.theregister.com/2026/02/10/dijkstras_algorithm_impact_on_networks/
The new algorithm is no minor tweak to Dijkstra’s but a significantly different approach. Its headline claim is that, whereas Dijkstra requires a sorting operation, and thus is only able to perform as well as the best sorting algorithm, this new approach “breaks the sorting barrier”. That is, it avoids the need for sorting and is able to deliver better bounds on performance than Dijkstra.]]></description>
										<content:encoded><![CDATA[<p>https://blog.apnic.net/2026/02/06/from-roots-to-reach-network-resilience-in-natural-disasters/<br />
When communication networks break down, people cannot report their condition, responders lose situational awareness, and entire communities risk slipping beyond the reach of coordinated assistance. Network failure does not merely accompany disaster — it reshapes the human consequences.</p>
<blockquote class="wp-embedded-content" data-secret="QmxhPXDBMh"><p><a href="https://cornwallalliance.org/nuclear-is-the-most-reliable-path-to-affordable-electricity/">Nuclear is the Most Reliable Path to Affordable Electricity  </a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Nuclear is the Most Reliable Path to Affordable Electricity  &#8221; &#8212; Cornwall Alliance" src="https://cornwallalliance.org/nuclear-is-the-most-reliable-path-to-affordable-electricity/embed/#?secret=mOnBYW3fuB#?secret=QmxhPXDBMh" data-secret="QmxhPXDBMh" width="500" height="282" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe><br />
Amid this “worldwide” economic backdrop, nuclear energy presents an affordable alternative to unreliable electricity sources like wind and solar.  Economically, it makes no sense to abandon working production methods until new ones can replace the existing and future demand.  World citizens are facing this reality in higher electricity prices. </p>
<p>https://www.potaroo.net/ispcol/2026-02/ipasn.html<br />
There have been a number of services that allow a lookup of an IP address or Autonomous System Number (ASN) and return information about that IP number resource. The Regional Internet Registries (RIRs) each operate a database that records (among other data items) the number resource and the details of the entity that is described in the relevant number registration record.</p>
<blockquote class="wp-embedded-content" data-secret="MjJPxZfHPp"><p><a href="https://potsandpansbyccg.com/2026/02/09/the-challenge-of-adding-fiber-to-poles/">The Challenge of Adding Fiber to Poles</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The Challenge of Adding Fiber to Poles&#8221; &#8212; POTs and PANs" src="https://potsandpansbyccg.com/2026/02/09/the-challenge-of-adding-fiber-to-poles/embed/#?secret=rm86bjs7s4#?secret=MjJPxZfHPp" data-secret="MjJPxZfHPp" width="500" height="282" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe><br />
On February 5, the FCC issued a Memorandum and Order related to a pole attachment dispute between Comcast and Appalachian Power Company (APCO).</p>
<p>https://blog.apnic.net/2026/02/10/the-current-state-of-rdap/<br />
While whois remains in widespread use, the RDAP ecosystem is rapidly maturing. Indeed, 2025 saw significant adoption and an accelerated expansion of RDAP services across the industry.</p>
<p>https://www.theregister.com/2026/02/10/dijkstras_algorithm_impact_on_networks/<br />
The new algorithm is no minor tweak to Dijkstra’s but a significantly different approach. Its headline claim is that, whereas Dijkstra requires a sorting operation, and thus is only able to perform as well as the best sorting algorithm, this new approach “breaks the sorting barrier”. That is, it avoids the need for sorting and is able to deliver better bounds on performance than Dijkstra.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020168</post-id>	</item>
		<item>
		<title>Worth Reading 021226</title>
		<link>https://rule11.tech/wr-021226/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 21:35:47 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020163</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-021226.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://mindmatters.ai/2026/01/why-isnt-the-ai-bubble-common-knowledge-and-pop/">
People often invest in companies not because they think the companies will succeed, but because they think others will invest. Thus, they try to invest before the others do, hoping there will be a greater fool who will pay more than they did.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2026/01/20/pwc_ai_ceo_survey/">
More than half of CEOs report seeing neither increased revenue nor decreased costs from AI, despite massive investments in the technology, according to a PwC survey of 4,454 business leaders.</a></blockquote>

<blockquote><a href="https://circleid.com/posts/the-excruciating-slow-rise-of-dnssec">
DNSSEC promised to secure DNS with cryptographic proof, yet messy rollouts, outages, and hype backlash ruined its reputation.</a></blockquote>

<blockquote><a href="https://www.potaroo.net/ispcol/2026-01/ip2org.html">
If you start the query process with an IP address, or an AS Number then you can find details about the current holder of that number resource, including its organisation name. But the reverse query is far more challenging in this database query framework. </a></blockquote>

<blockquote><a href="https://www.digitaltrends.com/computing/early-tests-suggest-chatgpt-healths-assessment-of-your-fitness-data-may-cause-unnecessary-panic/">
Earlier this month, OpenAI introduced a new health focused space within ChatGPT, pitching it as a safer way for users to ask questions about sensitive topics like medical data, illnesses, and fitness. </a></blockquote>

<blockquote><a href="https://www.networkworld.com/article/4122790/gauging-the-real-impact-of-ai-agents.html">
Letâ€™s start with hosting, and the key point here is that resource pools to host AI agents are not the answer. There are multiple reasons for this, but the main one is that the hosting location for AI agents has to balance being close to the databases used, the applications the agent is part of, and the users.</a></blockquote><img src="https://rule11.tech/wp-content/uploads/wr-021226.png" alt="" width="600" height="240" class="alignnone size-full wp-image-1020164" />]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://mindmatters.ai/2026/01/why-isnt-the-ai-bubble-common-knowledge-and-pop/"><br />
People often invest in companies not because they think the companies will succeed, but because they think others will invest. Thus, they try to invest before the others do, hoping there will be a greater fool who will pay more than they did.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2026/01/20/pwc_ai_ceo_survey/"><br />
More than half of CEOs report seeing neither increased revenue nor decreased costs from AI, despite massive investments in the technology, according to a PwC survey of 4,454 business leaders.</a></p></blockquote>
<blockquote><p><a href="https://circleid.com/posts/the-excruciating-slow-rise-of-dnssec"><br />
DNSSEC promised to secure DNS with cryptographic proof, yet messy rollouts, outages, and hype backlash ruined its reputation.</a></p></blockquote>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2026-01/ip2org.html"><br />
If you start the query process with an IP address, or an AS Number then you can find details about the current holder of that number resource, including its organisation name. But the reverse query is far more challenging in this database query framework. </a></p></blockquote>
<blockquote><p><a href="https://www.digitaltrends.com/computing/early-tests-suggest-chatgpt-healths-assessment-of-your-fitness-data-may-cause-unnecessary-panic/"><br />
Earlier this month, OpenAI introduced a new health focused space within ChatGPT, pitching it as a safer way for users to ask questions about sensitive topics like medical data, illnesses, and fitness. </a></p></blockquote>
<blockquote><p><a href="https://www.networkworld.com/article/4122790/gauging-the-real-impact-of-ai-agents.html"><br />
Letâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s start with hosting, and the key point here is that resource pools to host AI agents are not the answer. There are multiple reasons for this, but the main one is that the hosting location for AI agents has to balance being close to the databases used, the applications the agent is part of, and the users.</a></p></blockquote>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/rule11.tech/wp-content/uploads/wr-021226.png?resize=600%2C240&#038;ssl=1" alt="" width="600" height="240" class="alignnone size-full wp-image-1020164" srcset="https://i0.wp.com/rule11.tech/wp-content/uploads/wr-021226.png?w=600&amp;ssl=1 600w, https://i0.wp.com/rule11.tech/wp-content/uploads/wr-021226.png?resize=400%2C160&amp;ssl=1 400w, https://i0.wp.com/rule11.tech/wp-content/uploads/wr-021226.png?resize=150%2C60&amp;ssl=1 150w" sizes="(max-width: 600px) 100vw, 600px" /></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020163</post-id>	</item>
		<item>
		<title>Hedge 294: Resource Constrained Environments</title>
		<link>https://rule11.tech/hedge-294/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 21:02:41 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020157</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-294.png" alt="" width="400" class="alignnone" />
&#160;
The future of network design and architecture is--based on current trends--is going to be working with and around resource constraints. How would resource constraints impact the way we design and manage networks? Mike Bushong joins Tom, Eyvonne, and Russ to ponder network engineering in a resource constrained world.]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/rule11.tech/wp-content/uploads/hedge-294.png?w=400&#038;ssl=1" alt=""  class="alignnone" /><br />
&nbsp;<br />
The future of network design and architecture is&#8211;based on current trends&#8211;is going to be working with and around resource constraints. How would resource constraints impact the way we design and manage networks? Mike Bushong joins Tom, Eyvonne, and Russ to ponder network engineering in a resource constrained world.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020157-10" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-294.mp3?_=10" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-294.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-294.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-294.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-294.mp3" length="69464282" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>48:14</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/152028828-69284.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020157</post-id>	</item>
		<item>
		<title>Worth Reading 012826</title>
		<link>https://rule11.tech/wr-012826/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 21:41:15 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020146</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-012826.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://mindmatters.ai/2026/01/why-isnt-the-ai-bubble-common-knowledge-and-pop/">
People often invest in companies not because they think the companies will succeed, but because they think others will invest. Thus, they try to invest before the others do, hoping there will be a greater fool who will pay more than they did.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2026/01/20/pwc_ai_ceo_survey/">
More than half of CEOs report seeing neither increased revenue nor decreased costs from AI, despite massive investments in the technology, according to a PwC survey of 4,454 business leaders.</a></blockquote>

<blockquote><a href="https://circleid.com/posts/the-excruciating-slow-rise-of-dnssec">
DNSSEC promised to secure DNS with cryptographic proof, yet messy rollouts, outages, and hype backlash ruined its reputation.</a></blockquote>

<blockquote><a href="https://www.potaroo.net/ispcol/2026-01/ip2org.html">
If you start the query process with an IP address, or an AS Number then you can find details about the current holder of that number resource, including its organisation name. But the reverse query is far more challenging in this database query framework. </a></blockquote>

<blockquote><a href="https://www.digitaltrends.com/computing/early-tests-suggest-chatgpt-healths-assessment-of-your-fitness-data-may-cause-unnecessary-panic/">
Earlier this month, OpenAI introduced a new health focused space within ChatGPT, pitching it as a safer way for users to ask questions about sensitive topics like medical data, illnesses, and fitness. </a></blockquote>

<blockquote><a href="https://www.networkworld.com/article/4122790/gauging-the-real-impact-of-ai-agents.html">
Let’s start with hosting, and the key point here is that resource pools to host AI agents are not the answer. There are multiple reasons for this, but the main one is that the hosting location for AI agents has to balance being close to the databases used, the applications the agent is part of, and the users.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://mindmatters.ai/2026/01/why-isnt-the-ai-bubble-common-knowledge-and-pop/"><br />
People often invest in companies not because they think the companies will succeed, but because they think others will invest. Thus, they try to invest before the others do, hoping there will be a greater fool who will pay more than they did.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2026/01/20/pwc_ai_ceo_survey/"><br />
More than half of CEOs report seeing neither increased revenue nor decreased costs from AI, despite massive investments in the technology, according to a PwC survey of 4,454 business leaders.</a></p></blockquote>
<blockquote><p><a href="https://circleid.com/posts/the-excruciating-slow-rise-of-dnssec"><br />
DNSSEC promised to secure DNS with cryptographic proof, yet messy rollouts, outages, and hype backlash ruined its reputation.</a></p></blockquote>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2026-01/ip2org.html"><br />
If you start the query process with an IP address, or an AS Number then you can find details about the current holder of that number resource, including its organisation name. But the reverse query is far more challenging in this database query framework. </a></p></blockquote>
<blockquote><p><a href="https://www.digitaltrends.com/computing/early-tests-suggest-chatgpt-healths-assessment-of-your-fitness-data-may-cause-unnecessary-panic/"><br />
Earlier this month, OpenAI introduced a new health focused space within ChatGPT, pitching it as a safer way for users to ask questions about sensitive topics like medical data, illnesses, and fitness. </a></p></blockquote>
<blockquote><p><a href="https://www.networkworld.com/article/4122790/gauging-the-real-impact-of-ai-agents.html"><br />
Let’s start with hosting, and the key point here is that resource pools to host AI agents are not the answer. There are multiple reasons for this, but the main one is that the hosting location for AI agents has to balance being close to the databases used, the applications the agent is part of, and the users.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020146</post-id>	</item>
		<item>
		<title>Hedge 293: Moore&#8217;s Law</title>
		<link>https://rule11.tech/hedge-293/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 15:18:28 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020140</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-293.png" alt="" width="400" class="alignnone" />
&#160;
Is there an interaction between Moore's Law and network computing? If so, what is the relationship? How do advances in silicon capabilities and network speeds and feeds rely and drive one another. Geoff Huston joins Russ on this episode of the Hedge to look at a bit of the history.
]]></description>
										<content:encoded><![CDATA[<p>Is there an interaction between Moore&#8217;s Law and network computing? If so, what is the relationship? How do advances in silicon capabilities and network speeds and feeds rely and drive one another. Geoff Huston joins Russ on this episode of the Hedge to look at a bit of the history.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020140-11" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-293.mp3?_=11" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-293.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-293.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-293.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-293.mp3" length="74749682" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episode>293</itunes:episode>
		<podcast:episode>293</podcast:episode>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>51:54</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/151691424-68327.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020140</post-id>	</item>
		<item>
		<title>Hedge 292: Data Center Costs</title>
		<link>https://rule11.tech/hedge-292/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Sat, 17 Jan 2026 00:26:55 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020136</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-292.png" alt="" width="400" class="alignnone" />
&#160;
The cost of building and maintaining a data center is rising rapidly--and not just in financial terms. George Michaelson joins Tom and Russ to discuss the wider costs of data centers.]]></description>
										<content:encoded><![CDATA[<p>The cost of building and maintaining a data center is rising rapidly&#8211;and not just in financial terms. George Michaelson joins Tom and Russ to discuss the wider costs of data centers.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020136-12" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-292.mp3?_=12" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-292.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-292.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-292.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-292.mp3" length="77507601" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episode>292</itunes:episode>
		<podcast:episode>292</podcast:episode>
		<itunes:title>Data Center Costs with George Michaelson</itunes:title>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>53:49</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/151524716-67878.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020136</post-id>	</item>
		<item>
		<title>Best of the Hedge 9: Ethics in IT</title>
		<link>https://rule11.tech/both-009/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 08 Jan 2026 22:25:33 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020131</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-009-1.png" alt="" width="400" class="alignnone" />
&#160;
Nash King (@gammacapricorni) joins Russ White and Tom Ammon in a wide ranging discussion of ethics in IT, including being comfortable with standing up and saying “no” when asked to do something you consider unethical and the virtue ethic. ]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/rule11.tech/wp-content/uploads/hedge-009-1.png?w=400&#038;ssl=1" alt=""  class="alignnone" /><br />
&nbsp;<br />
Nash King (@gammacapricorni) joins Russ White and Tom Ammon in a wide ranging discussion of ethics in IT, including being comfortable with standing up and saying “no” when asked to do something you consider unethical and the virtue ethic.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020131-13" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-009.mp3?_=13" /><a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-009.mp3">https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-009.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-009.mp3"><em>download</em></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-009.mp3" length="45534989" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>31:37</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/50853323-67323.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020131</post-id>	</item>
		<item>
		<title>Worth Reading 010626</title>
		<link>https://rule11.tech/wr-010626/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 21:54:38 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020124</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-010626.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://potsandpansbyccg.com/2025/12/23/let-the-6g-hype-begin/">
In case you haven’t been paying attention, wireless vendors are busy working towards the introduction of 6G starting around 2030.  </a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/29/four_tech_trends_2025/">
The oxygen of publicity this year has mostly been consumed by our two-lettered friend, AI. There's no reason to think this will change in 2026. </a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/31/long_lived_tech/">
COBOL turned 66 this year and is still in use today. Major retail and commercial banks continue to run core account processing, ATM networks, credit card clearing, and batch end-of-day settlement. On top of that, many payment networks, stock exchanges, and clearinghouses rely on COBOL for high‑volume, high‑reliability batch and online transaction processing on mainframes.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/31/groq_nvidia_analysis/">
This summer, AI chip startup Groq raised $750 million at a valuation of $6.9 billion. Just three months later, Nvidia celebrated the holidays by dropping nearly three times that to license its technology and squirrel away its talent.</a></blockquote>

<blockquote><a href="https://restofworld.org/2025/linkedin-job-scams/">
LinkedIn job scams have become a borderless epidemic, preying on the hopes of desperate job seekers and costing victims across the globe anywhere from a few hundred dollars to $25,000.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/31/ipv6_at_30/">
Yet according to data from Google, the Asia Pacific Network Information Center (APNIC), and Cloudflare, less than half of all netizens use IPv6 today. To understand why, know that IPv6 also suggested other, rather modest, changes to the way networks operate.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://potsandpansbyccg.com/2025/12/23/let-the-6g-hype-begin/"><br />
In case you haven’t been paying attention, wireless vendors are busy working towards the introduction of 6G starting around 2030.  </a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/29/four_tech_trends_2025/"><br />
The oxygen of publicity this year has mostly been consumed by our two-lettered friend, AI. There&#8217;s no reason to think this will change in 2026. </a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/31/long_lived_tech/"><br />
COBOL turned 66 this year and is still in use today. Major retail and commercial banks continue to run core account processing, ATM networks, credit card clearing, and batch end-of-day settlement. On top of that, many payment networks, stock exchanges, and clearinghouses rely on COBOL for high‑volume, high‑reliability batch and online transaction processing on mainframes.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/31/groq_nvidia_analysis/"><br />
This summer, AI chip startup Groq raised $750 million at a valuation of $6.9 billion. Just three months later, Nvidia celebrated the holidays by dropping nearly three times that to license its technology and squirrel away its talent.</a></p></blockquote>
<blockquote><p><a href="https://restofworld.org/2025/linkedin-job-scams/"><br />
LinkedIn job scams have become a borderless epidemic, preying on the hopes of desperate job seekers and costing victims across the globe anywhere from a few hundred dollars to $25,000.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/31/ipv6_at_30/"><br />
Yet according to data from Google, the Asia Pacific Network Information Center (APNIC), and Cloudflare, less than half of all netizens use IPv6 today. To understand why, know that IPv6 also suggested other, rather modest, changes to the way networks operate.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020124</post-id>	</item>
		<item>
		<title>Worth Reading 122625</title>
		<link>https://rule11.tech/wr-122625/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 26 Dec 2025 21:14:20 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020119</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-122625.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://labs.ripe.net/author/tim_bruijnzeels/aspa-in-the-rpki-dashboard-a-new-layer-of-routing-security/">
ASPA is now available in the RIPE NCC RPKI Dashboard, adding a way to express and validate your upstream relationships on top of ROA-based origin validation. Building on its introduction at RIPE 91, this article explains what ASPA does, why it matters, and how to start thinking about deployment.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/15/cloudflare_report_bot_traffic/">
AI bots made their presence felt this year, accounting for 4.2 percent of HTML request traffic as they trawl the web for content to be used in training models.</a></blockquote>

<blockquote><a href="https://www.digitaltrends.com/computing/google-finds-ai-chatbots-are-only-69-accurate-at-best/">
Multimodal tasks were the weakest area across the board, with accuracy often below 50%. This matters because these tasks involve reading charts, diagrams, or images, where a chatbot could confidently misread a sales graph or pull the wrong number from a document, leading to mistakes that are easy to miss but hard to undo.</a></blockquote>

<blockquote><a href="https://www.potaroo.net/ispcol/2025-12/geoip.html">
Or, for that matter, where am I? Let's look at location on the Internet, and how the Internet "knows" where I am.</a></blockquote>

<blockquote><a href="https://blog.apnic.net/2025/12/17/investigating-starlinks-performance-during-the-may-2024-solar-superstorm/">
It’s not science fiction. When a solar storm hits Earth, it can have real-world consequences, and satellite networks like Starlink are on the front lines.  </a></blockquote>

<blockquote><a href="https://blog.citp.princeton.edu/2025/12/18/ai-chip-lifespans-a-note-on-the-secondary-market/">
Two months ago, I wrote about the competition concerns with the GenAI infrastructure boom. One of my provocative claims was that the lifespan of the chips may be significantly shorter than the accounting treatment given to them.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/19/china_environment_for_network_innovation/">
Chinese authorities on Thursday certified the China Environment for Network Innovation (CENI), a vast research network that Beijing hopes will propel the country to the forefront of networking research.</a></blockquote>

<blockquote><a href="https://circleid.com/posts/the-domain-industry-business-in-2025">
In 2025, the domain industry moved decisively from a fragmented ecosystem into a more integrated, capital-intensive market where infrastructure, identity, and AI are increasingly intertwined.</a></blockquote>

<blockquote><a href="https://mindmatters.ai/2025/12/is-openai-approaching-the-valley-of-death/">
However, OpenAI has the daunting problem that, unlike Microsoft and Google, it has no other substantial sources of revenue. To survive, it needs to generate profits from ChatGPT.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/23/unix_v4_tape_successfully_recovered/">
Computer History Museum software curator Al Kossow has successfully retrieved the contents of the over-half-a-century old tape found at the University of Utah last month.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://labs.ripe.net/author/tim_bruijnzeels/aspa-in-the-rpki-dashboard-a-new-layer-of-routing-security/"><br />
ASPA is now available in the RIPE NCC RPKI Dashboard, adding a way to express and validate your upstream relationships on top of ROA-based origin validation. Building on its introduction at RIPE 91, this article explains what ASPA does, why it matters, and how to start thinking about deployment.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/15/cloudflare_report_bot_traffic/"><br />
AI bots made their presence felt this year, accounting for 4.2 percent of HTML request traffic as they trawl the web for content to be used in training models.</a></p></blockquote>
<blockquote><p><a href="https://www.digitaltrends.com/computing/google-finds-ai-chatbots-are-only-69-accurate-at-best/"><br />
Multimodal tasks were the weakest area across the board, with accuracy often below 50%. This matters because these tasks involve reading charts, diagrams, or images, where a chatbot could confidently misread a sales graph or pull the wrong number from a document, leading to mistakes that are easy to miss but hard to undo.</a></p></blockquote>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2025-12/geoip.html"><br />
Or, for that matter, where am I? Let&#8217;s look at location on the Internet, and how the Internet &#8220;knows&#8221; where I am.</a></p></blockquote>
<blockquote><p><a href="https://blog.apnic.net/2025/12/17/investigating-starlinks-performance-during-the-may-2024-solar-superstorm/"><br />
It’s not science fiction. When a solar storm hits Earth, it can have real-world consequences, and satellite networks like Starlink are on the front lines.  </a></p></blockquote>
<blockquote><p><a href="https://blog.citp.princeton.edu/2025/12/18/ai-chip-lifespans-a-note-on-the-secondary-market/"><br />
Two months ago, I wrote about the competition concerns with the GenAI infrastructure boom. One of my provocative claims was that the lifespan of the chips may be significantly shorter than the accounting treatment given to them.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/19/china_environment_for_network_innovation/"><br />
Chinese authorities on Thursday certified the China Environment for Network Innovation (CENI), a vast research network that Beijing hopes will propel the country to the forefront of networking research.</a></p></blockquote>
<blockquote><p><a href="https://circleid.com/posts/the-domain-industry-business-in-2025"><br />
In 2025, the domain industry moved decisively from a fragmented ecosystem into a more integrated, capital-intensive market where infrastructure, identity, and AI are increasingly intertwined.</a></p></blockquote>
<blockquote><p><a href="https://mindmatters.ai/2025/12/is-openai-approaching-the-valley-of-death/"><br />
However, OpenAI has the daunting problem that, unlike Microsoft and Google, it has no other substantial sources of revenue. To survive, it needs to generate profits from ChatGPT.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/23/unix_v4_tape_successfully_recovered/"><br />
Computer History Museum software curator Al Kossow has successfully retrieved the contents of the over-half-a-century old tape found at the University of Utah last month.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020119</post-id>	</item>
		<item>
		<title>Worth Reading 121925</title>
		<link>https://rule11.tech/wr-121925/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 19 Dec 2025 23:56:06 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020114</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-121925.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://zaferbalkan.com/technitium-misp/">
In my earlier article on Technitium and Wazuh, I described DNS as both a behavioral signal and an enforcement point. DNS queries appear early in the attack chain, often long before C2 traffic stabilizes.</a></blockquote>

<blockquote><a href="https://www.networkworld.com/article/4101647/cloudflare-firewall-reacts-badly-to-react-exploit-mitigation.html">
Cloudflare’s network suffered a brief but widespread outage Friday, after an update to its Web Application Firewall to mitigate a vulnerability in React Server Components went wrong.</a></blockquote>

<blockquote><a href="https://blog.apnic.net/2025/12/08/21-years-and-counting-of-eight-fallacies-of-distributed-computing/">
You’d think that by now, networks were well enough understood that people would stop making assumptions that we have known, almost since the dawn of networking, to be untrue. Yet as users, developers, and network administrators, we still seem curiously unable to let go of long-held beliefs.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/12/08/classic_macos_for_nonapple_powerpc/">
As well as the Mac clones, there were PC-style PowerPC machines – and a version of classic MacOS for them has just been rediscovered, enabling previously unimagined combinations.</a></blockquote>

<blockquote><a href="https://www.techsequences.org/podcasts/2025/12/digital-dementia-the-high-cost-of-convenience/">
Have you ever experienced that moment of panic when you can’t recall a familiar phone number or navigate without a map app? This growing reliance on external memory—known as the “Google Effect”—is a real-world example of how we’ve outsourced core cognitive functions to our devices. </a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://zaferbalkan.com/technitium-misp/"><br />
In my earlier article on Technitium and Wazuh, I described DNS as both a behavioral signal and an enforcement point. DNS queries appear early in the attack chain, often long before C2 traffic stabilizes.</a></p></blockquote>
<blockquote><p><a href="https://www.networkworld.com/article/4101647/cloudflare-firewall-reacts-badly-to-react-exploit-mitigation.html"><br />
Cloudflare’s network suffered a brief but widespread outage Friday, after an update to its Web Application Firewall to mitigate a vulnerability in React Server Components went wrong.</a></p></blockquote>
<blockquote><p><a href="https://blog.apnic.net/2025/12/08/21-years-and-counting-of-eight-fallacies-of-distributed-computing/"><br />
You’d think that by now, networks were well enough understood that people would stop making assumptions that we have known, almost since the dawn of networking, to be untrue. Yet as users, developers, and network administrators, we still seem curiously unable to let go of long-held beliefs.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/12/08/classic_macos_for_nonapple_powerpc/"><br />
As well as the Mac clones, there were PC-style PowerPC machines – and a version of classic MacOS for them has just been rediscovered, enabling previously unimagined combinations.</a></p></blockquote>
<blockquote><p><a href="https://www.techsequences.org/podcasts/2025/12/digital-dementia-the-high-cost-of-convenience/"><br />
Have you ever experienced that moment of panic when you can’t recall a familiar phone number or navigate without a map app? This growing reliance on external memory—known as the “Google Effect”—is a real-world example of how we’ve outsourced core cognitive functions to our devices. </a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020114</post-id>	</item>
		<item>
		<title>Hedge 291: The Assault on Standards</title>
		<link>https://rule11.tech/hedge-291/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 19:51:10 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020110</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-291.png" alt="" width="400" class="alignnone" />
&#160;
As the Internet centralizes and gets "big," standards are often being sidelined or consumed. What are the possible results of abandoning standards? Is there anything "normal network engineers" can do about it?]]></description>
										<content:encoded><![CDATA[<p>As the Internet centralizes and gets &#8220;big,&#8221; standards are often being sidelined or consumed. What are the possible results of abandoning standards? Is there anything &#8220;normal network engineers&#8221; can do about it?<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020110-14" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-291.mp3?_=14" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-291.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-291.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-291.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-291.mp3" length="34506089" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>23:57</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/150847610-66164.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020110</post-id>	</item>
		<item>
		<title>Worth Reading 121725</title>
		<link>https://rule11.tech/wr-121725/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 12:33:40 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020106</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-121725.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://www.networkworld.com/article/4093957/what-are-tpus-your-guide-to-tensor-processing-units-and-ai-acceleration.html">
Tensor processing units (TPUs) are specially designed AI accelerators. They are a type of application-specific integrated circuit (ASIC), or chips designed for specific tasks. For TPUs, that task is running and optimizing AI and machine learning (ML) workflows, including training and inference.</a></blockquote>

<blockquote><a href="https://blog.apnic.net/2025/11/25/a-second-look-at-geolocation-and-starlink/">
Civil unrest can often cloud measurement data. Some measurement systems, including ours, make relatively sweeping assumptions about the stability of both end user and network service behaviours, and assume that the changes that occur from day-to-day are minor.</a></blockquote>

<blockquote><a href="https://dl.acm.org/doi/abs/10.1145/3768997?af=R">
Identifying active IPv6 addresses is challenging. Various methods emerged to master the measurement challenge in this huge address space, including hitlists, new probing techniques, and AI-generated target lists. In this paper, we apply active Subnet-Router anycast (SRA) probing, a commonly unused method to explore the IPv6 address space. </a></blockquote>

<blockquote><a href="https://cacm.acm.org/opinion/ai-fatigue-reflections-on-the-human-side-of-ais-rapid-advancement/">
Several months ago, I arrived at the office at 8:45 a.m., sat at my desk, and was about to start my day. The only problem was that I, for the life of me, could not remember my password. This is a bit laughable because for the past year, I had typed that exact password almost daily, sometimes from muscle memory.</a></blockquote>

<blockquote><a href="https://cacm.acm.org/news/ais-impact-on-mental-health/">
Vaibhav Kakkar once tested a therapy chatbot to help with a real-life dilemma. "It responded with structured cognitive-behavioral prompts, helping me reframe my thinking," recalled Kakkar, CEO of marketing agency Digital Web Solutions. "Impressive--but when I needed deeper guidance, it hit a wall."</a></blockquote>
]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.networkworld.com/article/4093957/what-are-tpus-your-guide-to-tensor-processing-units-and-ai-acceleration.html"><br />
Tensor processing units (TPUs) are specially designed AI accelerators. They are a type of application-specific integrated circuit (ASIC), or chips designed for specific tasks. For TPUs, that task is running and optimizing AI and machine learning (ML) workflows, including training and inference.</a></p></blockquote>
<blockquote><p><a href="https://blog.apnic.net/2025/11/25/a-second-look-at-geolocation-and-starlink/"><br />
Civil unrest can often cloud measurement data. Some measurement systems, including ours, make relatively sweeping assumptions about the stability of both end user and network service behaviours, and assume that the changes that occur from day-to-day are minor.</a></p></blockquote>
<blockquote><p><a href="https://dl.acm.org/doi/abs/10.1145/3768997?af=R"><br />
Identifying active IPv6 addresses is challenging. Various methods emerged to master the measurement challenge in this huge address space, including hitlists, new probing techniques, and AI-generated target lists. In this paper, we apply active Subnet-Router anycast (SRA) probing, a commonly unused method to explore the IPv6 address space. </a></p></blockquote>
<blockquote><p><a href="https://cacm.acm.org/opinion/ai-fatigue-reflections-on-the-human-side-of-ais-rapid-advancement/"><br />
Several months ago, I arrived at the office at 8:45 a.m., sat at my desk, and was about to start my day. The only problem was that I, for the life of me, could not remember my password. This is a bit laughable because for the past year, I had typed that exact password almost daily, sometimes from muscle memory.</a></p></blockquote>
<blockquote><p><a href="https://cacm.acm.org/news/ais-impact-on-mental-health/"><br />
Vaibhav Kakkar once tested a therapy chatbot to help with a real-life dilemma. &#8220;It responded with structured cognitive-behavioral prompts, helping me reframe my thinking,&#8221; recalled Kakkar, CEO of marketing agency Digital Web Solutions. &#8220;Impressive&#8211;but when I needed deeper guidance, it hit a wall.&#8221;</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020106</post-id>	</item>
		<item>
		<title>Hedge 290: The Amoeba and the Mathematician</title>
		<link>https://rule11.tech/hedge-290/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 12 Dec 2025 15:47:29 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020102</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-290.png" alt="" width="400" class="alignnone" />
&#160;
In this Hedge roundtable, Eyvonne, Tom, and Russ discuss <a href="https://hedgehogreview.com/web-features/thr/posts/the-amoeba-and-the-mathematician">The Amoeba and the Mathematician</a>]]></description>
										<content:encoded><![CDATA[<p>In this Hedge roundtable, Eyvonne, Tom, and Russ discuss <a href="https://hedgehogreview.com/web-features/thr/posts/the-amoeba-and-the-mathematician">The Amoeba and the Mathematician</a><br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020102-15" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-290.mp3?_=15" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-290.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-290.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-290.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-290.mp3" length="38245293" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>26:33</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/150691712-65752.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020102</post-id>	</item>
		<item>
		<title>Best of the Hedge: Hedge 6 on DoH (Part 2)</title>
		<link>https://rule11.tech/boh-006/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 15:13:40 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020093</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-006.png" alt="" width="400" class="alignnone" />
&#160;
In this episode of the Hedge, Geoff Huston joins Tom Ammon and Russ White to finish the discussion on the ideas behind DNS over HTTPS (DoH), and to consider the implications of its widespread adoption. Is it time to bow to our new overlords? ]]></description>
										<content:encoded><![CDATA[<p>In this episode of the Hedge, Geoff Huston joins Tom Ammon and Russ White to finish the discussion on the ideas behind DNS over HTTPS (DoH), and to consider the implications of its widespread adoption. Is it time to bow to our new overlords?<br />
&nbsp;<br />
<em>This is part two of a two part series. This is a &#8220;best of the Hedge&#8221; repost.</em><br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020093-16" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-006.mp3?_=16" /><a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-006.mp3">https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-006.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-006.mp3"><em>download</em></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-006.mp3" length="19379581" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>27:46</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/50853320-65311.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020093</post-id>	</item>
		<item>
		<title>Computer Network Design Complexity and Tradeoffs Training</title>
		<link>https://rule11.tech/complexity-class/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 20:06:51 +0000</pubDate>
				<category><![CDATA[SCHEDULE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020086</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/netcomplex.png" alt="" width="400" class="alignnone" />

I'm teaching a "one off" special event class over on O'Reilly's platform (via Pearson) this coming Friday, the 5th of December. From the Description:

<blockquote>Join networking engineer and infrastructure expert Russ White for this exclusive, one-time event exploring the critical role of tradeoffs in network design. We’ll begin by unpacking how complexity shapes the decisions architects and designers must make, and how tradeoffs are often an unavoidable part of navigating that complexity. Through real-world examples, you'll learn how different network design choices impact overall system complexity, and how to approach these decisions with greater clarity and confidence. We’ll wrap up with an in-depth discussion of unintended consequences—how they arise, how to anticipate them, and how they relate to designing in complex, adaptive environments.</blockquote>

As always, if you register for the course you can watch later.

<a href="https://learning.oreilly.com/live-events/computer-network-design-complexity-and-tradeoffs/0642572259341/">Register here.</a>

]]></description>
										<content:encoded><![CDATA[<p>I&#8217;m teaching a &#8220;one off&#8221; special event class over on O&#8217;Reilly&#8217;s platform (via Pearson) this coming Friday, the 5th of December. From the Description:</p>
<blockquote><p>Join networking engineer and infrastructure expert Russ White for this exclusive, one-time event exploring the critical role of tradeoffs in network design. We’ll begin by unpacking how complexity shapes the decisions architects and designers must make, and how tradeoffs are often an unavoidable part of navigating that complexity. Through real-world examples, you&#8217;ll learn how different network design choices impact overall system complexity, and how to approach these decisions with greater clarity and confidence. We’ll wrap up with an in-depth discussion of unintended consequences—how they arise, how to anticipate them, and how they relate to designing in complex, adaptive environments.</p></blockquote>
<p>As always, if you register for the course you can watch later.</p>
<p><a href="https://learning.oreilly.com/live-events/computer-network-design-complexity-and-tradeoffs/0642572259341/">Register here.</a></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020086</post-id>	</item>
		<item>
		<title>Best of the Hedge: Episode 5 on DoH (Part 1)</title>
		<link>https://rule11.tech/boh-5/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 28 Nov 2025 14:00:54 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020080</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/boh-5.png" alt="" width="400" class="alignnone" />

In this episode of the Hedge, Geoff Huston joins Tom Ammon and Russ White to discuss the ideas behind DNS over HTTPS (DoH), and to consider the implications of its widespread adoption. Is it time to bow to our new overlords?]]></description>
										<content:encoded><![CDATA[<p>In this episode of the Hedge, Geoff Huston joins Tom Ammon and Russ White to discuss the ideas behind DNS over HTTPS (DoH), and to consider the implications of its widespread adoption. Is it time to bow to our new overlords?</p>
<audio class="wp-audio-shortcode" id="audio-1020080-17" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-005.mp3?_=17" /><a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-005.mp3">https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-005.mp3</a></audio>
<p><a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-005.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-005.mp3" length="19114873" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>27:46</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/50853319-64826.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020080</post-id>	</item>
		<item>
		<title>Hedge 289: Containerlab</title>
		<link>https://rule11.tech/hedge-289/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 20:05:32 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020076</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-289.png" alt="" width="400" class="alignnone" />

If you are struggling with building labs on lighter weight systems--or if you're just interested in what Containerlab is and does--join Rick, Roman, and Russ for this discussion of what Containerlab is, what it does, and where its going.]]></description>
										<content:encoded><![CDATA[<p>If you are struggling with building labs on lighter weight systems&#8211;or if you&#8217;re just interested in what Containerlab is and does&#8211;join Rick, Roman, and Russ for this discussion of what Containerlab is, what it does, and where its going.</p>
<audio class="wp-audio-shortcode" id="audio-1020076-18" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-289.mp3?_=18" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-289.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-289.mp3</a></audio>
<p><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-289.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-289.mp3" length="62536343" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>43:25</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">1020076</post-id>	</item>
		<item>
		<title>Worth Reading 111425</title>
		<link>https://rule11.tech/wr-111425/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 15:16:52 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020071</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-111425.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://blog.apnic.net/2025/11/05/a-first-look-at-the-adoption-of-bgp-based-ddos-scrubbing-services-a-five-year-longitudinal-analysis/">
An Autonomous System (AS) can protect itself against DDoS attacks by rerouting incoming DDoS traffic through a ‘DDoS scrubber’, a process that is typically implemented using the Border Gateway Protocol (BGP). While BGP-based scrubbing is a useful service, its adoption on the global Internet is unknown.</a></blockquote>

<blockquote><a href="https://hedgehogreview.com/web-features/thr/posts/the-amoeba-and-the-mathematician">
Until recently, many professionals, including many doctors, thought they needed to become more machine-like to keep their jobs. Such worry contributed to the specialization trend of the last century.</a></blockquote>

<blockquote><a href="https://www.aspendigital.org/blog/so-you-want-to-hack-back/">
In an era of growing cyber threats, traditional defensive measures can be insufficient in the face of sophisticated or novel tactics. As a result, the question of whether private or public entities should engage in active defense or offensive “hack back” tactics has taken on greater urgency.</a></blockquote>

<blockquote><a href="https://blog.apnic.net/2025/11/13/podcast-the-politics-of-undersea-cables/">
In this episode of PING, APNIC Chief Scientist Geoff Huston explores the complex landscape of undersea cables.</a></blockquote>

<blockquote><a href="https://www.potaroo.net/ispcol/2025-11/measure-ipv6.html">
By 1990 it was clear that IP had a problem. It was still a tiny Internet at the time, but the growth patterns were exponential, doubling in size every 12 months. We were stressing out the pool of Class B IPv4 addresses and in the absence of any corrective measures this address pool would be fully depleted in 1994.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://blog.apnic.net/2025/11/05/a-first-look-at-the-adoption-of-bgp-based-ddos-scrubbing-services-a-five-year-longitudinal-analysis/"><br />
An Autonomous System (AS) can protect itself against DDoS attacks by rerouting incoming DDoS traffic through a ‘DDoS scrubber’, a process that is typically implemented using the Border Gateway Protocol (BGP). While BGP-based scrubbing is a useful service, its adoption on the global Internet is unknown.</a></p></blockquote>
<blockquote><p><a href="https://hedgehogreview.com/web-features/thr/posts/the-amoeba-and-the-mathematician"><br />
Until recently, many professionals, including many doctors, thought they needed to become more machine-like to keep their jobs. Such worry contributed to the specialization trend of the last century.</a></p></blockquote>
<blockquote><p><a href="https://www.aspendigital.org/blog/so-you-want-to-hack-back/"><br />
In an era of growing cyber threats, traditional defensive measures can be insufficient in the face of sophisticated or novel tactics. As a result, the question of whether private or public entities should engage in active defense or offensive “hack back” tactics has taken on greater urgency.</a></p></blockquote>
<blockquote><p><a href="https://blog.apnic.net/2025/11/13/podcast-the-politics-of-undersea-cables/"><br />
In this episode of PING, APNIC Chief Scientist Geoff Huston explores the complex landscape of undersea cables.</a></p></blockquote>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2025-11/measure-ipv6.html"><br />
By 1990 it was clear that IP had a problem. It was still a tiny Internet at the time, but the growth patterns were exponential, doubling in size every 12 months. We were stressing out the pool of Class B IPv4 addresses and in the absence of any corrective measures this address pool would be fully depleted in 1994.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020071</post-id>	</item>
		<item>
		<title>Worth Reading 111225</title>
		<link>https://rule11.tech/wr-111225/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 13:55:59 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020067</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-111225.png" alt="" width="600" class="alignnone" />

If you’re using IP address truncation thinking it makes data “anonymous” or “non-personal,” you’re creating a false sense of security.</a></blockquote>

<blockquote><a href="https://mindmatters.ai/2025/10/large-language-models-inconsistent-because-theyre-unintelligent/">
With distressingly typical Silicon Valley fake-it-till-you make-it bravado, LLM creators have been telling investors that artificial general intelligence (AGI) is just around the corner (or has already been achieved!). The problem the promoters blithely ignore is that LLMs do not know how the words they input and output relate to the real world.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/10/29/forrester_ai_rehiring/">
Many organizations rushing to cut staff in the name of AI efficiency are expected to quietly rehire those roles – often "offshore or at lower salary."</a></blockquote>

<blockquote><a href="https://cacm.acm.org/opinion/computing-is-indeed-a-discipline-in-crisis/">
While Silicon Valley is investing tens of billions of dollars chasing the artificial general intelligence dream, academic computing research in the U.S. is facing a severe drought.</a></blockquote>

<blockquote><a href="https://www.nextplatform.com/2025/11/06/attacking-interconnects-and-networks-across-all-scales/">
There are two competing forces in IT, and they are at play during the GenAI era as much as they have ever been during prior eras in the datacenter. </a></blockquote>]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/rule11.tech/wp-content/uploads/wr-111225.png?w=600&#038;ssl=1" alt=""  class="alignnone" /></p>
<p>If you’re using IP address truncation thinking it makes data “anonymous” or “non-personal,” you’re creating a false sense of security.</a></p></blockquote>
<blockquote><p><a href="https://mindmatters.ai/2025/10/large-language-models-inconsistent-because-theyre-unintelligent/"><br />
With distressingly typical Silicon Valley fake-it-till-you make-it bravado, LLM creators have been telling investors that artificial general intelligence (AGI) is just around the corner (or has already been achieved!). The problem the promoters blithely ignore is that LLMs do not know how the words they input and output relate to the real world.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/10/29/forrester_ai_rehiring/"><br />
Many organizations rushing to cut staff in the name of AI efficiency are expected to quietly rehire those roles – often &#8220;offshore or at lower salary.&#8221;</a></p></blockquote>
<blockquote><p><a href="https://cacm.acm.org/opinion/computing-is-indeed-a-discipline-in-crisis/"><br />
While Silicon Valley is investing tens of billions of dollars chasing the artificial general intelligence dream, academic computing research in the U.S. is facing a severe drought.</a></p></blockquote>
<blockquote><p><a href="https://www.nextplatform.com/2025/11/06/attacking-interconnects-and-networks-across-all-scales/"><br />
There are two competing forces in IT, and they are at play during the GenAI era as much as they have ever been during prior eras in the datacenter. </a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020067</post-id>	</item>
		<item>
		<title>Hedge 288: Loneliness</title>
		<link>https://rule11.tech/hedge-288/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 18:58:26 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020058</guid>

					<description><![CDATA[<img class="alignnone size-full wp-image-1020059" src="https://rule11.tech/wp-content/uploads/hedge-288.png" alt="" width="600" height="240" />

Sometimes we just like to talk about "life issues" as they relate to network engineering and technology career fields. Loneliness seems to especially plague network engineering and other "small" IT fields, where communities are small, change is rapid, and stress is high. Loneliness expert Lucy Rose joins Eyvonne, Tom, and Russ to discuss loneliness.]]></description>
										<content:encoded><![CDATA[<p>Sometimes we just like to talk about &#8220;life issues&#8221; as they relate to network engineering and technology career fields. Loneliness seems to especially plague network engineering and other &#8220;small&#8221; IT fields, where communities are small, change is rapid, and stress is high. Loneliness expert Lucy Rose joins Eyvonne, Tom, and Russ to discuss loneliness.</p>
<p><a href="https://www.thecostofloneliness.org/">Check out the Cost of Loneliness here.</a></p>
<audio class="wp-audio-shortcode" id="audio-1020058-19" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-288.mp3?_=19" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-288.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-288.mp3</a></audio>
<p><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-288.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-288.mp3" length="73557728" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>51:05</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/149895988-63863.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020058</post-id>	</item>
		<item>
		<title>Hedge 287: IPv6 in Planned Economies</title>
		<link>https://rule11.tech/hedge-287/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 07 Nov 2025 15:51:55 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020052</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-287.png" alt="" width="400" class="alignnone" />

Do planned economies, like China, have an advantage in deploying IPv6? What do the numbers on the DFZ show? George Michaelson joins Russ and Tom to discuss.]]></description>
										<content:encoded><![CDATA[<p>Do planned economies, like China, have an advantage in deploying IPv6? What do the numbers on the DFZ show? George Michaelson joins Russ and Tom to discuss.</p>
<audio class="wp-audio-shortcode" id="audio-1020052-20" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-287.mp3?_=20" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-287.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-287.mp3</a></audio>
<p><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-287.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-287.mp3" length="72311230" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>50:13</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/149755705-63421.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020052</post-id>	</item>
		<item>
		<title>Worth Reading 110525</title>
		<link>https://rule11.tech/wr110525/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 15:34:26 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020048</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr110525.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://circleid.com/posts/starlink-passes-10000-satellites-expanding-global-internet-reach">
SpaceX has surpassed 10,000 satellite launches in its Starlink programme, following the deployment of 56 additional units on Sunday. The milestone highlights the rapid expansion of satellite-based broadband infrastructure and its increasing role in global connectivity.</a></blockquote>

<blockquote><a href="https://www.networkworld.com/article/4077558/inside-googles-multi-architecture-revolution-axion-arm-joins-x86-in-production-clusters.html">
While x86 has been dominant for decades, a new migration project at Google represents a significant shift to more mixed architectures.</a></blockquote>

<blockquote><a href="https://tennesseestar.com/economy/commentary-the-ai-revolution-runs-through-americas-heartland/realclearwire/2025/10/25/">
The proliferation of data centers needed to support AI development, along with myriad announcements to onshore manufacturing supply chains, are leading to surging energy demand.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/10/27/jen_easterly_ai_cybersecurity/">
Ex-CISA head Jen Easterly claims AI could spell the end of the cybersecurity industry, as the sloppy software and vulnerabilities that criminals rely on will be tracked down faster than ever.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/10/27/ai_intelligence_opinion/">
But is the AI being used for this actually intelligent or just very, very good at faking it? This is not a new question. American philosopher John Searle came up with the Chinese Room, aka the "Chinese Box" argument, all the way back in 1980. He argued that while a computer could eventually simulate understanding – i.e. it could pass the Turing Test – that doesn't mean it's intelligent.</a></blockquote>]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/rule11.tech/wp-content/uploads/wr110525.png?w=400&#038;ssl=1" alt=""  class="alignnone" /></p>
<blockquote><p><a href="https://circleid.com/posts/starlink-passes-10000-satellites-expanding-global-internet-reach"><br />
SpaceX has surpassed 10,000 satellite launches in its Starlink programme, following the deployment of 56 additional units on Sunday. The milestone highlights the rapid expansion of satellite-based broadband infrastructure and its increasing role in global connectivity.</a></p></blockquote>
<blockquote><p><a href="https://www.networkworld.com/article/4077558/inside-googles-multi-architecture-revolution-axion-arm-joins-x86-in-production-clusters.html"><br />
While x86 has been dominant for decades, a new migration project at Google represents a significant shift to more mixed architectures.</a></p></blockquote>
<blockquote><p><a href="https://tennesseestar.com/economy/commentary-the-ai-revolution-runs-through-americas-heartland/realclearwire/2025/10/25/"><br />
The proliferation of data centers needed to support AI development, along with myriad announcements to onshore manufacturing supply chains, are leading to surging energy demand.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/10/27/jen_easterly_ai_cybersecurity/"><br />
Ex-CISA head Jen Easterly claims AI could spell the end of the cybersecurity industry, as the sloppy software and vulnerabilities that criminals rely on will be tracked down faster than ever.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/10/27/ai_intelligence_opinion/"><br />
But is the AI being used for this actually intelligent or just very, very good at faking it? This is not a new question. American philosopher John Searle came up with the Chinese Room, aka the &#8220;Chinese Box&#8221; argument, all the way back in 1980. He argued that while a computer could eventually simulate understanding – i.e. it could pass the Turing Test – that doesn&#8217;t mean it&#8217;s intelligent.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020048</post-id>	</item>
		<item>
		<title>Hedge 286: Roundtable</title>
		<link>https://rule11.tech/hedge-286/</link>
					<comments>https://rule11.tech/hedge-286/#comments</comments>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 15:25:32 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[CULTURE]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020040</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-286.png" alt="" width="400" class="alignnone" />

It's time again for Tom, Eyvonne, and Russ to talk about current articles they've run across in their day-to-day reading. This time we talk about WiFi in the home, how often users think a global problem is really local, and why providers have a hard time supporting individual homes and businesses. The second topic is one no one really cares about ... apathy. What causes apathy? How can we combat it? Join us for this episode of the Hedge ... if you can bring yourself to care!]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s time again for Tom, Eyvonne, and Russ to talk about current articles they&#8217;ve run across in their day-to-day reading. This time we talk about WiFi in the home, how often users think a global problem is really local, and why providers have a hard time supporting individual homes and businesses. The second topic is one no one really cares about &#8230; apathy. What causes apathy? How can we combat it? Join us for this episode of the Hedge &#8230; if you can bring yourself to care!<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020040-21" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-286.mp3?_=21" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-286.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-286.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-286.mp3"><em>download</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rule11.tech/hedge-286/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-286.mp3" length="60274638" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>41:51</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/149594486-62847.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020040</post-id>	</item>
		<item>
		<title>Worth Reading 102425</title>
		<link>https://rule11.tech/wr-102425/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 24 Oct 2025 15:05:00 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020034</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-102425.png" alt="" width="400" class="alignnone" />


<blockquote><a href="https://blog.apnic.net/2025/10/10/analysing-cctld-anycast/">
I get the sense that hosting a ccTLD today is challenging, not because of the technical stack, but due to Distributed Denial-of-Service (DDoS) concerns</a></blockquote>

<blockquote><a href="https://packetpushers.net/podcasts/heavy-strategy/hs114-in-or-out-deciding-which-it-functions-to-bring-in-or-push-out/">
In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key functions need to re-examine the reasoning and scrutinize the results.</a></blockquote>

<blockquote><a href="https://www.networkworld.com/article/4072308/major-network-vendors-team-to-advance-ethernet-for-scale-up-ai-networking.html">
Another multivendor development group, the Ultra Accelerator Link (UALink) consortium, recently published its first specification aimed at delivering an open standard interconnect for AI clusters.</a></blockquote>

<blockquote><a href="https://potsandpansbyccg.com/2025/10/16/wifi-is-the-problem/">
The company conducted a nationwide survey of  3,790 people that asked about real-world experiences and expectations around home WiFi performance. I think every ISP I know could have predicted the gist of the responses, but I think ISPs might be surprised at the percentage of people who are unhappy with WiFi.</a></blockquote>

<blockquote><a href="https://circleid.com/posts/understanding-dnssec-best-practices-and-implementation-challenges">
DNS was not originally designed with security in mind, making it easy for common threats such as DNS spoofing and man-in-the-middle attacks to reroute unsuspecting users to malicious sites, often without detection.</a></blockquote>

]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://blog.apnic.net/2025/10/10/analysing-cctld-anycast/"><br />
I get the sense that hosting a ccTLD today is challenging, not because of the technical stack, but due to Distributed Denial-of-Service (DDoS) concerns</a></p></blockquote>
<blockquote><p><a href="https://packetpushers.net/podcasts/heavy-strategy/hs114-in-or-out-deciding-which-it-functions-to-bring-in-or-push-out/"><br />
In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key functions need to re-examine the reasoning and scrutinize the results.</a></p></blockquote>
<blockquote><p><a href="https://www.networkworld.com/article/4072308/major-network-vendors-team-to-advance-ethernet-for-scale-up-ai-networking.html"><br />
Another multivendor development group, the Ultra Accelerator Link (UALink) consortium, recently published its first specification aimed at delivering an open standard interconnect for AI clusters.</a></p></blockquote>
<blockquote><p><a href="https://potsandpansbyccg.com/2025/10/16/wifi-is-the-problem/"><br />
The company conducted a nationwide survey of  3,790 people that asked about real-world experiences and expectations around home WiFi performance. I think every ISP I know could have predicted the gist of the responses, but I think ISPs might be surprised at the percentage of people who are unhappy with WiFi.</a></p></blockquote>
<blockquote><p><a href="https://circleid.com/posts/understanding-dnssec-best-practices-and-implementation-challenges"><br />
DNS was not originally designed with security in mind, making it easy for common threats such as DNS spoofing and man-in-the-middle attacks to reroute unsuspecting users to malicious sites, often without detection.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020034</post-id>	</item>
		<item>
		<title>Hedge 285: Post Quantum Crypto</title>
		<link>https://rule11.tech/hedge-285/</link>
					<comments>https://rule11.tech/hedge-285/#comments</comments>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 24 Oct 2025 14:52:03 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020029</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-285.png" alt="" width="400" class="alignnone" />

Is quantum really an immediate and dangerous threat to current cryptography systems, or are we pushing to hastily adopt new technologies we won't necessarily need for a few more years? Should we allow the quantum pie to bake a few more years before slicing a piece and digging in? George Michaelson joins Russ and Tom to discuss.]]></description>
										<content:encoded><![CDATA[<p>Is quantum really an immediate and dangerous threat to current cryptography systems, or are we pushing to hastily adopt new technologies we won&#8217;t necessarily need for a few more years? Should we allow the quantum pie to bake a few more years before slicing a piece and digging in? George Michaelson joins Russ and Tom to discuss.</p>
<audio class="wp-audio-shortcode" id="audio-1020029-22" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-285.mp3?_=22" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-285.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-285.mp3</a></audio>
<p><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-285.mp3"><em>download</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rule11.tech/hedge-285/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-285.mp3" length="66251240" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>46:00</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">1020029</post-id>	</item>
		<item>
		<title>Hedge 284: Netops and Corporate Culture</title>
		<link>https://rule11.tech/hedge-284/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 12:20:30 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[CULTURE]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020022</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-284.png" alt="" width="400" class="alignnone" />

We all know netops, NRE, and devops can increase productivity, increase Mean Time Between Mistakes (MTBM), and decrease MTTR--but how do we deploy and use these tools? We often think of the technical hurdles you face in their deployment, but most of the blockers are actually cultural. Chris Grundemann, Eyvonne, Russ, and Tom discuss the cultural issues with deploying netops on this episode of the Hedge.]]></description>
										<content:encoded><![CDATA[<p>We all know netops, NRE, and devops can increase productivity, increase Mean Time Between Mistakes (MTBM), and decrease MTTR&#8211;but how do we deploy and use these tools? We often think of the technical hurdles you face in their deployment, but most of the blockers are actually cultural. Chris Grundemann, Eyvonne, Russ, and Tom discuss the cultural issues with deploying netops on this episode of the Hedge.<br />
&nbsp;<br />
<audio class="wp-audio-shortcode" id="audio-1020022-23" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-284.mp3?_=23" /><a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-284.mp3">https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-284.mp3</a></audio><br />
&nbsp;<br />
<a href="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-284.mp3"><em>download</em></a></p>
]]></content:encoded>
					
		
				<enclosure url="https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-284.mp3" length="65607434" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>45:33</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/149276576-62226.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020022</post-id>	</item>
		<item>
		<title>Worth Reading 101725</title>
		<link>https://rule11.tech/wr-101725/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 11:45:19 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020018</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/WR-101725.png" alt="" width="600" height="241" class="alignnone" />

<blockquote><a href="https://www.thepublicdiscourse.com/2025/10/99076/">
The ease with which those images and videos traveled, the thoughtless way in which we shared them, reveals the sinister side of technological advancement. It exposes the degree to which social media has desensitized us, stripped us of the natural horror that ought to accompany the spectacle of death, and conditioned us to consume human suffering as one more item in an endless buffet of digital content.</a></blockquote>

<blockquote><a href="https://blog.cr.yp.to/20251004-weakened.html">
It's normal for post-quantum cryptography to be rolled out as an extra layer of security on top of traditional pre-quantum cryptography, rather than as a replacement.</a></blockquote>

<blockquote><a href="https://potsandpansbyccg.com/2025/10/07/limiting-large-network-outages/">
Not that many years ago, telephone and broadband networks were structured in such a way that most outages were local events. A fiber cut might kill service to a neighborhood; an electronics failure might kill service to a larger area, but for the most part, outages were contained within a discrete and local area.</a></blockquote>

<blockquote><a href="https://thehackernews.com/2025/10/new-research-ai-is-already-1-data.html">
Far from a future concern, AI is already the single largest uncontrolled channel for corporate data exfiltration—bigger than shadow SaaS or unmanaged file sharing.</a></blockquote>

<blockquote><a href="https://potsandpansbyccg.com/2025/10/09/a-new-security-risk/">
A new security risk has recently been brought to my attention. I was on a Teams call that included an attorney who would not let the call continue while an AI notetaker was present. </a></blockquote>

]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.thepublicdiscourse.com/2025/10/99076/"><br />
The ease with which those images and videos traveled, the thoughtless way in which we shared them, reveals the sinister side of technological advancement. It exposes the degree to which social media has desensitized us, stripped us of the natural horror that ought to accompany the spectacle of death, and conditioned us to consume human suffering as one more item in an endless buffet of digital content.</a></p></blockquote>
<blockquote><p><a href="https://blog.cr.yp.to/20251004-weakened.html"><br />
It&#8217;s normal for post-quantum cryptography to be rolled out as an extra layer of security on top of traditional pre-quantum cryptography, rather than as a replacement.</a></p></blockquote>
<blockquote><p><a href="https://potsandpansbyccg.com/2025/10/07/limiting-large-network-outages/"><br />
Not that many years ago, telephone and broadband networks were structured in such a way that most outages were local events. A fiber cut might kill service to a neighborhood; an electronics failure might kill service to a larger area, but for the most part, outages were contained within a discrete and local area.</a></p></blockquote>
<blockquote><p><a href="https://thehackernews.com/2025/10/new-research-ai-is-already-1-data.html"><br />
Far from a future concern, AI is already the single largest uncontrolled channel for corporate data exfiltration—bigger than shadow SaaS or unmanaged file sharing.</a></p></blockquote>
<blockquote><p><a href="https://potsandpansbyccg.com/2025/10/09/a-new-security-risk/"><br />
A new security risk has recently been brought to my attention. I was on a Teams call that included an attorney who would not let the call continue while an AI notetaker was present. </a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020018</post-id>	</item>
		<item>
		<title>Worth Reading 101025</title>
		<link>https://rule11.tech/worth-reading-101025/</link>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 23:05:44 +0000</pubDate>
				<category><![CDATA[WORTH READING]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020010</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/wr-101025.png" alt="" width="400" class="alignnone" />

<blockquote><a href="https://www.networkworld.com/article/4058889/ethernet-infiniband-and-omni-path-battle-for-the-ai-optimized-data-center.html">
A number of recent changes have helped to push Ethernet forward, advancing its capabilities to better meet the needs of AI.</a></blockquote>

<blockquote><a href="https://www.theregister.com/2025/09/18/cloudflare_ddosed_itself/">
Cloudflare has confessed to a coding error using a React useEffect hook, notorious for being problematic if not handled carefully, that caused an outage for the platform's dashboard and many of its APIs.</a></blockquote>

<blockquote><a href="https://stubarea51.net/2025/09/22/evpn-vxlan-interop-ipv4-ipv6-mikrotik-ip-infusion/">
Working with MikroTik and IP Infusion’s OcNOS to interop EVPN/VxLAN has been on my wish list for a long time. </a></blockquote>]]></description>
										<content:encoded><![CDATA[<blockquote><p><a href="https://www.networkworld.com/article/4058889/ethernet-infiniband-and-omni-path-battle-for-the-ai-optimized-data-center.html"><br />
A number of recent changes have helped to push Ethernet forward, advancing its capabilities to better meet the needs of AI.</a></p></blockquote>
<blockquote><p><a href="https://www.theregister.com/2025/09/18/cloudflare_ddosed_itself/"><br />
Cloudflare has confessed to a coding error using a React useEffect hook, notorious for being problematic if not handled carefully, that caused an outage for the platform&#8217;s dashboard and many of its APIs.</a></p></blockquote>
<blockquote><p><a href="https://stubarea51.net/2025/09/22/evpn-vxlan-interop-ipv4-ipv6-mikrotik-ip-infusion/"><br />
Working with MikroTik and IP Infusion’s OcNOS to interop EVPN/VxLAN has been on my wish list for a long time. </a></p></blockquote>
<blockquote><p><a href="https://labs.ripe.net/author/ties/working-with-bgp-data/"><br />
Have you heard about MRT dumps, but never tried to use them because the bar seems too high? Or are you tired of doing “parse -> grep -> process” every time you touch BGP MRT dumps?</a></p></blockquote>
<blockquote><p><a href="https://mindmatters.ai/2025/09/why-openai-will-collapse-llms-are-not-economical/"><br />
Unfortunately, history is again being rewritten. It is rapidly becoming clear that LLMs are not economical. </a></p></blockquote>
<blockquote><p><a href="https://labs.ripe.net/author/Arlin/edge-cases-in-dnssec-validation-with-multiple-algorithms/"><br />
As part of our research into post-quantum cryptography (PQC) for DNSSEC, we test PQC as a drop-in replacement for classical algorithms. We explore a transition where both run simultaneously, analysing how resolvers validate records, edge cases, and the feasibility and impact of such a period.</a></p></blockquote>
<blockquote><p><a href="https://pulse.internetsociety.org/blog/bandwidth-is-dead-long-live-latency"><br />
In much of the world, we are in an era that I like to call the “post-gigabit era”. Many users have access to gigabit connections—or at least hundreds of Mbps—and have moved from an era of bandwidth scarcity to bandwidth abundance. </a></p></blockquote>
<blockquote><p><a href="https://www.potaroo.net/ispcol/2025-09/starlinkgeo.html"><br />
&#8220;Where are you?&#8221; is not an easy question to answer on the Internet. The telephone system&#8217;s address plan embedded a certain amount of physical location information in the fixed line network, and a full E.164 telephone number indicated your location in terms of your country, and your area within that country.</a></p></blockquote>
<blockquote><p><a href="https://packetpushers.net/podcasts/heavy-strategy/hs113-bad-tech-romance-five-signs-youre-in-an-abusive-it-relationship/"><br />
Sure, some days you hate your job. But how do you know when an IT position has gone from being run-of-the-mill annoying to truly toxic</a></p></blockquote>
<blockquote><p><a href="https://circleid.com/posts/why-the-future-of-the-internet-is-subscription-based"><br />
The digital world is shifting toward access rather than ownership, and nothing shows this more clearly than the rise of subscription-based business models.</a></p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020010</post-id>	</item>
		<item>
		<title>Hedge 283: Technical Planning</title>
		<link>https://rule11.tech/hedge-283/</link>
					<comments>https://rule11.tech/hedge-283/#comments</comments>
		
		<dc:creator><![CDATA[Russ]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 22:58:58 +0000</pubDate>
				<category><![CDATA[AUDIO]]></category>
		<category><![CDATA[HEDGE]]></category>
		<guid isPermaLink="false">https://rule11.tech/?p=1020006</guid>

					<description><![CDATA[<img src="https://rule11.tech/wp-content/uploads/hedge-283.png" alt="" width="400" class="alignnone" />

We network engineers often find ourselves without a viable plan--our plans always seem to go awry, to the point that many network engineers just give up on planning. Is "giving up" the right solution? Or can we learn to be better planners? Jonathan Adams and Tim McConnaughy join Russ to discussion planning for network engineers.]]></description>
										<content:encoded><![CDATA[<p>We network engineers often find ourselves without a viable plan&#8211;our plans always seem to go awry, to the point that many network engineers just give up on planning. Is &#8220;giving up&#8221; the right solution? Or can we learn to be better planners? Jonathan Adams and Tim McConnaughy join Russ to discussion planning for network engineers.</p>
<audio class="wp-audio-shortcode" id="audio-1020006-24" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-283.mp3?_=24" /><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-283.mp3">https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-283.mp3</a></audio>
<p><a href="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-283.mp3"><em>download</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rule11.tech/hedge-283/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
				<enclosure url="https://media.blubrry.com/hedge/media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-283.mp3" length="52699495" type="audio/mpeg" />

				<itunes:author>Russ White</itunes:author>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>36:35</itunes:duration>
		<podcast:transcript url="https://transcripts.blubrry.com/hedge/149130286-61927.srt" language="en" type="application/srt" rel="captions" />
<post-id xmlns="com-wordpress:feed-additions:1">1020006</post-id>	</item>
	</channel>
</rss>
