Rule 11

Rule 11

Publication
0 followers

Networking architecture/theory blog.

Worth Reading 042226
NewsApr 22, 2026

Worth Reading 042226

A late‑2024 federal cybersecurity review labeled Microsoft’s flagship Azure cloud offering as insecure, sparking concerns for government and enterprise users. Meanwhile, research highlights the rise of neuro‑symbolic AI, which blends neural networks with symbolic reasoning, and the Linux 7.0 kernel...

By Rule 11
Hedge 302: Communications in Biological Systems
PodcastApr 17, 202654 min

Hedge 302: Communications in Biological Systems

In this episode the hosts explore how the RINA (Recursive InterNetwork Architecture) communication model maps onto biological signaling systems. Guest Emily Brown Reeves explains that processes like insulin/glucagon regulation, DNA transcription, and cellular phosphorylation exhibit the four RINA functions—multiplexing, marshalling,...

By Rule 11
Worth Reading 040626
NewsApr 6, 2026

Worth Reading 040626

Stanford researchers warn that AI chatbots are unreliable for personal advice, especially in complex, real‑world conflicts. At APRICOT 2026, APNIC and LACNIC revealed a BGP hijack that blended technical exploits with social‑engineering tactics, underscoring routing vulnerabilities. A RIPE Labs analysis challenges...

By Rule 11
Worth Reading 032826
NewsMar 28, 2026

Worth Reading 032826

Recent technical publications from NIST, APNIC, and industry commentators expose a series of systemic challenges across internet infrastructure and emerging technologies. NIST’s new DNS deployment guidelines emphasize zero‑trust controls, while APNIC highlights architectural bottlenecks that curb eBPF’s use in web...

By Rule 11
Worth Reading 032526
NewsMar 25, 2026

Worth Reading 032526

Edge inference is increasingly motivated by data‑sovereignty rules rather than latency, especially in telecom, finance, healthcare and public‑infrastructure sectors. Simultaneously, internet number resources are being framed as operational assets, not political property, reshaping governance debates. A Pew study shows over...

By Rule 11
Worth Reading 031526
NewsMar 16, 2026

Worth Reading 031526

The Worth Reading roundup highlights several pressing internet‑security and technology trends, from the persistent threat of malicious domains and India’s controversial \"lock and suspend\" DNS enforcement model to the rare leap‑second adjustment in 2016. It also marks Docker’s ten‑year milestone,...

By Rule 11
Hedge 299: 6G
PodcastMar 13, 202655 min

Hedge 299: 6G

In this episode the hosts trace the evolution of mobile networks from 2G through 5G and speculate on what 6G might look like, highlighting how each generation added digital encoding, higher frequencies, and new features like beamforming. They discuss the...

By Rule 11
Worth Reading 031026
NewsMar 10, 2026

Worth Reading 031026

CrowdStrike reports attackers now need just 29 minutes to fully compromise a network, driven by credential misuse, AI tools, and security blind spots. Experts also note lingering IPv6‑DNS interoperability challenges and warn that large language models can deanonymize pseudonymous users...

By Rule 11
Hedge 298: The 6G Hype Begins
PodcastMar 6, 202643 min

Hedge 298: The 6G Hype Begins

In this episode, Doug Dawson, a veteran telco engineer and blogger, deconstructs the hype surrounding 5G and warns that the same pattern is now repeating with 6G. He explains how the 5G rollout was driven by a manufactured "race" with...

By Rule 11
Hedge 297: MPLS
PodcastFeb 27, 202652 min

Hedge 297: MPLS

In this episode, Scott Robbin and the hosts explore the origins, design goals, and lasting impact of MPLS (Multiprotocol Label Switching). They explain how MPLS was created to address the exploding size of routing tables and forwarding complexity in the...

By Rule 11
Hedge 296: AS-SETs
PodcastFeb 20, 20260 min

Hedge 296: AS-SETs

AS-SETs were created to simplify eBGP route filtering by aggregating multiple AS numbers into a single identifier. In practice, manual maintenance and nested definitions have led to misconfigurations, routing leaks, and security concerns. Experts Job Snijders and Doug Madory discuss...

By Rule 11
Hedge 295: Specialization
PodcastFeb 13, 20260 min

Hedge 295: Specialization

Hedge 295: Specialization is a round‑table podcast where Eyvonne, Tom and Russ debate whether network engineers should double‑down on a single technology, vendor or solution or cultivate a broader skill set. The hosts outline the career benefits of deep expertise—higher salaries,...

By Rule 11
Worth Reading 021326
NewsFeb 13, 2026

Worth Reading 021326

The APNIC blog underscores how network failures during natural disasters cripple emergency response and community safety, prompting calls for more resilient architecture. In parallel, nuclear power is highlighted as a cost‑effective, reliable alternative to volatile renewable sources amid rising electricity...

By Rule 11