Technology

Hardware, software, networking, and development

301 episodes Page 10 of 13

#312: Digital Stone Carving: The Secret Life of Optical Media

Think CDs are dead? Discover why tech giants and hospitals are turning back to "digital stone carving" to save the world's most important data.

optical-mediaworm-storagem-disc-technology

#311: Why Can’t a Train Just Slam on the Brakes?

Discover the high-stakes world of rail dispatching, where physics, logic, and "dark territory" meet to keep thousands of tons of steel on track.

rail-traffic-controlpositive-train-controlrailway-signaling

#310: The Hidden Hierarchy: Why Your Mobile Plan Might Be Slower

Ever wonder why your budget phone plan slows down in a crowd? Herman and Corn explore the hidden hierarchy of mobile network priority.

mobile-network-operatorsmvno-deprioritizationquality-of-service

#309: Beyond Matter: Decoding the IoT Alphabet Soup

Will Matter replace Zigbee and LoRa? Herman and Corn dive into the physics of radio waves and why one smart home standard can't rule them all.

iot-protocolsmatter-standardlora-technology

#305: Is Your Typing Style More Secure Than Your Password?

Tired of 2FA codes? Herman and Corn explore how passkeys and behavioral biometrics are creating a future of "invisible" security.

passkey-authenticationbehavioral-biometricspasswordless-security

#304: The Hardware Vault: How TPM Chips Secure Our Digital World

Discover how a tiny chip on your motherboard is becoming the ultimate anchor for security and truth in an era of deepfakes and cyber threats.

trusted-platform-modulehardware-securityremote-attestation

#302: Hardware Trust: How C2PA is Saving Digital Reality

Explore how hardware-level signatures from Sony and Google are creating a "nutrition label" for digital media to fight the rise of deepfakes.

c2pa-standardcontent-authenticity-initiativehardware-provenance

#296: Sonic Sorcery: Mapping Spatial Audio in Small Spaces

Discover how spatial audio and room mapping can turn a tiny rental bedroom into a cinematic powerhouse without drilling a single hole.

spatial-audioacoustic-telemetryroom-mapping

#269: Mission Critical: Inside the World of Command Centers

Discover how high-stakes command centers manage global chaos through specialized design, AI, and the "Common Operating Picture" philosophy.

command-center-designhuman-factors-engineeringcrisis-management-systems

#266: The Telemetry Trap: Why Your Devices Won't Stop Talking

Herman and Corn dive into the hidden world of telemetry, exploring why our devices phone home and whether "anonymous" data is actually a myth.

telemetry-datadigital-privacydata-anonymization

#263: Beyond the Table: Why AI is Moving to Graph Databases

Herman and Corn explore why SQL is losing ground to graph and vector databases. Discover why the "edge" is the new gold standard for AI accuracy.

graph-databasesknowledge-graphsindex-free-adjacency

#262: Beyond Git: Version Control for the Solo Creator

Is Git overkill for your projects? Herman and Corn dive into the "war" that created Git and explore simpler tools for solo developers.

version-control-alternativessolo-developer-toolsgit-overkill

#253: The Future of Privacy: Quantum Threats and Backdoors

Explore the shift to post-quantum encryption and why intelligence agencies rarely need to "break" the math to access your private data.

post-quantum-cryptographyharvest-now-decrypt-laterlattice-based-math

#250: The Hidden Tech Behind Lane-Level Navigation

Explore how AI, computer vision, and crowdsourced data allow navigation apps to map every painted line on the road with precision.

lane-level-navigationcomputer-vision-mappingdigital-mapping-technology

#246: The SFP+ Revolution: Future-Proofing Your Home Network

Stop the bottleneck! Learn why SFP+ fiber backbones are the ultimate upgrade for modern high-speed internet and future-proof home networking.

sfp-plusfiber-optic-networkinghome-network-upgrade

#245: Bandwidth vs. Speed: Decoding Your Digital Plumbing

Is your 10-gig plan actually fast? Herman and Corn dive into the difference between bandwidth and speed in the modern fiber era.

bandwidth-vs-speedoversubscription-ratiosinternet-infrastructure

#244: Goodbye 2FA: Why Passkeys are the Future of Security

Tired of hunting for 2FA codes? Herman and Corn explore how passkeys are killing the password and making the internet faster and more secure.

passkey-authenticationfido-alliancepasswordless-security

#241: Why Your Old Battery Backup is Garbage (and What’s Next)

Transform your UPS into a mini-generator. Herman and Corn explore sustainable battery tech and the future of home energy resilience.

home-energy-storageuninterruptible-power-supplybattery-chemistry

#238: The Death of Call Recording: Why Your Phone is Hiding It

Ever wonder why your phone won’t let you record calls anymore? We dive into the legal and technical shift killing this essential feature.

call-recording-lawsandroid-accessibility-apiprivacy-compliance

#237: Beyond the 404: Building a Permanent Web with IPFS

Tired of 404 errors? Explore how IPFS and content addressing are solving the internet's link rot problem to preserve digital history.

interplanetary-file-systemcontent-addressinglink-rot

#236: How ECC Fixes Your Data: From QR Codes to Cosmic Rays

Discover how the brilliant math of ECC allows damaged QR codes and distant space probes to transmit perfect data across noisy channels.

error-correction-codehamming-codesreed-solomon-codes

#235: Digital Fingerprints: The Secret Math Saving Your Data

Learn why those random strings of characters on download pages are the only thing keeping your files safe from corruption and hackers.

checksum-verificationdata-integritydigital-provenance

#234: Deep Shelter Data: Building Emergency Mesh Networks

Learn how to bypass thick concrete walls and bring high-speed internet into deep shelters using portable mesh networks and Starlink technology.

emergency-mesh-networksunderground-connectivityfaraday-cage-bypass

#232: The Command Line Resurgence: Why the Terminal is Back

From punch cards to AI agents, discover why the command line remains the ultimate power tool for modern developers in an AI-driven world.

command-line-interfaceunix-philosophyterminal-emulation

#231: Can Hackers Steal Your Signal Messages by Rerouting the Internet?

Explore how BGP hijacking allows governments to reroute the web, threatening privacy and exposing metadata despite encrypted apps like Signal.

bgp-hijackinginternet-routingmetadata-security