Weekend Reads 022125 It’s no wonder that techno-futurists trumpet a coming machine intelligence with such ease — they’ve lowered the standards so much to begin with. While companies are going to extraordinary lengths to obtain valuable compute power to satisfy artificial intelligence’s (AI) growing appetite, a group of vendors have found a way to dip into the existing infrastructure for the extra shot of compute. To ensure stability and security, every IXP enforces a set of rules — a code of conduct for its participants. These rules go beyond technical niceties; they are essential safeguards for the entire ecosystem. The terms Digital Sovereignty or Souveraineté numérique have recently risen in prominence to describe the international rule of law as it applies to information and communication technologies. In this second installment of Beyond Their Intended Scope, we analyze a recent BGP leak out of Brazil that briefly affected networks around the world. Related Posted in WEEKEND READS ← Hedge 260: The State of the DFZHedge 261: The NTIA, Spectrum, and Broadband →