Podcast Episodes
Back to SearchHedge 263: NFTs
How do Non-Fungible Tokens, or NFTs, impact value and the future of all things digital? How are they different from–and similar to–blockchain? Jaime …
11 months, 2 weeks ago
Hedge 262: Stealthy BGP Attacks
Many providers count on detection in the global routing table to discover and counter BGP route hijacks. What if there were a kind of BGP hijack that…
11 months, 3 weeks ago
Hedge 261: The NTIA, Spectrum, and Broadband
In the United States, the National Telecommunications and Infrastructure Administration manages spectrum and researches the current state of Internet…
1 year ago
Hedge 260: The State of the DFZ
Trends in the global BGP table–the Default Free Zone (DFZ) table–can tell us a lot about the state of the global Internet. Is the Internet growing? I…
1 year ago
Hedge 259: Architecture and Process
We often try to “institutionalize” things that work into repeatable processes—and most of the time, it doesn’t work. The process ends up becoming unw…
1 year ago
Hedge 258: pyATS and Testing Through Automation
We often think of network automation as a configuration tool, but automation can also be used for one-off, integration, and even continuous testing. …
1 year, 1 month ago
Hedge 257: Gaining Experience in IT
Every recruiter and hiring manager wants people with five years of experience, but you cannot get experience without being hired into a position. How…
1 year, 1 month ago
Hedge 256: The Impact of Your First Language
Richard Wexelblat published an article in 1980 titled: “The consequences of one’s first programming language.” We’ve all seen C code written like Pyt…
1 year, 1 month ago
Hedge 255: Open Multi-perspective Issuance
One of the various attack surfaces in encryption is insuring the certificates used to share the initial set of private keys are not somehow replaced …
1 year, 1 month ago