Technology

Hardware, software, networking, and development

428 episodes Page 18 of 22

#386: Beyond Blue Light: The Real Science of Display Eye Strain

Is blue light the real enemy? Herman and Corn dive into the physics of eye strain, PWM flicker, and the dream of the e-ink desktop monitor.

sensory-processingdisplay-technologydigital-eye-strain

#385: The Unkillable Workstation: Building for Total Redundancy

Can you build a PC that never dies? Herman and Corn explore redundant power, memory mirroring, and high-availability clusters for home servers.

hardware-redundancyfault-tolerancedata-integrity

#368: The Geometry of Secrets: How SSH Keys Protect the Web

Ever wonder why your SSH keys are so secure? Herman and Corn dive into the "trapdoor" math and elliptic curves powering the modern web.

elliptic-curve-cryptographyssh-keystrapdoor-functions

#352: The Death of the Camcorder: Future-Proofing News Gear

Are bulky news cameras history? Herman and Corn explore how smartphones and AI are redefining professional journalism in 2026.

mobile-journalismelectronic-news-gatheringsoftware-defined-camera

#349: Beyond the Squiggly Line: How Digital Signatures Work

Think a digital signature is just a picture of your name? Think again. Herman and Corn dive into the math and hardware behind secure PDFs.

public-key-infrastructuredigital-certificatespdf-signatures

#347: Beyond the Drive: Scaling Your Business with Google Cloud

Discover how to use Google Cloud buckets and Vertex AI to turn a cluttered Drive into a scalable, AI-powered knowledge base.

google-cloud-storagegoogle-workspace-gcpvertex-ai-integration

#346: GPU Scaling: The "Go Wide or Go Tall" Dilemma

Should you use a fleet of cheap GPUs or one powerhouse? Learn the math behind serverless GPU costs, cold starts, and batching efficiency.

serverless-gpugpu-scalingmemory-bandwidth

#341: Behind the Iron Firewall: North Korea’s Secret Tech

Explore the walled garden of North Korea’s intranet, from the Mac-inspired Red Star OS to hardware that screenshots your every move.

north-korea-techred-star-oskwangmyong-intranet

#340: Carving Bits in Stone: The Power of WORM Technology

In an era of AI and deepfakes, how do we prove data is real? Explore WORM technology: the digital equivalent of carving records in stone.

worm-technologydata-immutabilitydigital-forensics

#331: From Hotel Hacks to Digital Resistance: The Travel Router

Discover how a hotel billing hack became a tool for digital resistance and how a Linksys "accident" changed internet privacy forever.

travel-routerdigital-privacyopenwrt-firmware

#317: Why Are We Still Using Physical SIM Cards in 2026?

Corn and Herman explore why the tiny plastic SIM card refuses to die and how carrier politics are slowing down the digital revolution.

networkingtelecommunicationsesim

#313: Digital Forever? Bit Rot and the Return of Physical Media

Why is our fastest tech also the most forgetful? Herman and Corn dive into bit rot, LTO tape, and the quest for 1,000-year digital permanence.

data-archivingmagnetic-tapebit-rot

#312: Digital Stone Carving: The Secret Life of Optical Media

Think CDs are dead? Discover why tech giants and hospitals are turning back to "digital stone carving" to save the world's most important data.

optical-mediaworm-storagem-disc-technology

#311: Why Can’t a Train Just Slam on the Brakes?

Discover the high-stakes world of rail dispatching, where physics, logic, and "dark territory" meet to keep thousands of tons of steel on track.

rail-traffic-controlpositive-train-controlrailway-signaling

#310: The Hidden Hierarchy: Why Your Mobile Plan Might Be Slower

Ever wonder why your budget phone plan slows down in a crowd? Herman and Corn explore the hidden hierarchy of mobile network priority.

mobile-network-operatorsmvno-deprioritizationquality-of-service

#309: Beyond Matter: Decoding the IoT Alphabet Soup

Will Matter replace Zigbee and LoRa? Herman and Corn dive into the physics of radio waves and why one smart home standard can't rule them all.

iot-protocolsmatter-standardlora-technology

#305: Is Your Typing Style More Secure Than Your Password?

Tired of 2FA codes? Herman and Corn explore how passkeys and behavioral biometrics are creating a future of "invisible" security.

passkey-authenticationbehavioral-biometricspasswordless-security

#304: The Hardware Vault: How TPM Chips Secure Our Digital World

Discover how a tiny chip on your motherboard is becoming the ultimate anchor for security and truth in an era of deepfakes and cyber threats.

trusted-platform-modulehardware-securityremote-attestation

#302: Hardware Trust: How C2PA is Saving Digital Reality

Explore how hardware-level signatures from Sony and Google are creating a "nutrition label" for digital media to fight the rise of deepfakes.

c2pa-standardcontent-authenticity-initiativehardware-provenance

#296: Sonic Sorcery: Mapping Spatial Audio in Small Spaces

Discover how spatial audio and room mapping can turn a tiny rental bedroom into a cinematic powerhouse without drilling a single hole.

spatial-audioacoustic-telemetryroom-mapping