Technology

Hardware, software, networking, and development

301 episodes · Page 2 of 13

#1540: Why Gnome 50 is Breaking Your Voice-to-Text Tools

Explore the engineering battle to bring low-latency AI voice input to Linux while navigating the strict security of Wayland and GNOME 50.

voice-to-textlocal-inferencelatency

#1539: The Voice Keyboard: Killing the "Digital Sandwich"

Stop shouting at your phone. Discover how dedicated hardware and local AI are making instant, private voice-to-text a reality.

speech-recognitionedge-computinghardware-engineering

#1534: The Rise of the Agentic Terminal: Beyond the Command Line

Stop drowning in terminal tabs. Discover how tools like Zellij and Ghostty are transforming the command line into an Agentic Development Environment.

ai-agentsgpu-accelerationsoftware-development

#1530: Concrete Noses and $11M Pilots: The F-35’s Software Crisis

Why are new F-35s flying with blocks of concrete in their noses? Explore the software crisis and the $11 million cost of training "mission managers."

#1506: The Apache Way: Powering the Global Digital Backbone

Explore how the Apache Software Foundation governs the world's most critical data tools and why "Community Over Code" is the secret to its success.

open-sourcedistributed-systemsinfrastructure

#1503: The Death of the Annual Audit: Real-Time SOC 2 Compliance

Move beyond the "once-a-year fire drill." Discover how AI agents and continuous monitoring are redefining SOC 2 compliance in 2026.

cybersecurityai-agents2026

#1483: The Recall-Per-Dollar Era: Mastering Vector Database Tuning

Stop burning money on unoptimized vector searches. We dive into HNSW tuning, distance metrics, and the vital "recall-per-dollar" metric.

#1475: Why Your Cloud Folders Are a Lie: The S3 Revolution

Folders are a lie in the cloud. Explore why Amazon S3 uses flat namespaces and "keys" instead of traditional file hierarchies.

cloud-computingdata-storagecloud-repatriation

#1474: The End of API Keys: Securing Non-Human Identity

Stop leaving your digital keys under the mat. Learn how workload identity federation is replacing the dangerous "secret management grind."

digital-identityzero-trustai-security

#1471: The Cursor Incident: Why Chinese AI Models are Winning

The Cursor leak revealed a shocking truth: Western AI dominance is fading. Discover the Chinese labs rewriting the rules of code and efficiency.

large-language-modelsgeopoliticssoftware-development

#1454: Code and Craft: The Future of Tactile Digital Design

Discover how the tension between AI-driven web design and physical printmaking is shaping the "Museumcore" aesthetic of 2026.

2026ai-agentshuman-computer-interaction

#1435: Why Space is Faster Than Fiber

Discover why the vacuum of space is 47% faster than fiber and how satellites are becoming autonomous data centers in the sky.

#1363: How Shenzhen Clones Your Tech Before the Keynote Ends

Discover the "AliExpress Paradox" where $12 earbuds rival $200 flagships, and the high-speed ecosystem turning global IP law on its head.

hardware-engineeringintellectual-propertymodular-hardware

#1346: The Measurement Trap: Why More Data Means Less Truth

We’re measuring more than ever, yet understanding less. Discover why our obsession with data is creating a "measurement trap" that hides reality.

#1317: The First Second: Why Your PC Still Needs a BIOS

Explore the high-stakes drama of the BIOS, the "Root of Trust" that teaches your computer how to be a computer every time you hit the power button.

architecturehardware-engineeringcybersecurity

#1311: Beyond the Reel: Mastering Long-Form Documentary

Move beyond 60-second edits. Learn how to manage the technical debt and narrative weight of creating your first feature-length documentary.

generative-aidigital-preservationproductivity

#1299: Stop the Drop: The Future of Custom-Fit Earbuds

Tired of earbuds falling out? Explore the world of custom molds, memory foam tips, and the tech ending the "one-size-fits-all" era for good.

#1292: The Visibility Trap: Dissent in the Digital Age

In the digital age, we have the right to speak but not the right to be heard. Discover the new architecture of algorithmic censorship.

free-speechauthoritarianismsocial-engineering

#1281: Is Your Smart Home Spying? The Truth About IoT Traffic

Your smart bulb might be doing more than just dimming the lights. Learn how to spot suspicious "calling home" behavior in your home IoT devices.

#1280: Laptop Farms: North Korea’s Invisible Hardware Backdoor

Discover how North Korean operatives use "laptop farms" and IP-KVM hardware to bypass security and infiltrate the US workforce.

cybersecurityespionagesupply-chain-security

#1267: Beyond the Save Button: The Git-ification of Everything

Tired of "final_v2_revised.docx"? Discover how Git-based workflows are transforming documentation, project management, and competitive research.

version-controlknowledge-managementsoftware-development

#1242: The Physical Backbone: Rebuilding the Internet for AI

Forget the "cloud" metaphor. Explore the massive physical pipes, Tier-1 providers, and new fiber tech powering the 2026 AI revolution.

infrastructurenetworkingfiber-optics

#1239: Why Can't We All Use the Same Screw?

Explore how mismatched screw threads and telegraph wires shaped the invisible technical rules that govern our modern world.

hardware-standardsgeopolitical-strategyinternational-relations

#1234: Digital Plutonium: Bridging the Anonymization Gap

Learn how to bridge the "anonymization gap" and protect sensitive data without destroying its utility for analysis.

privacytokenizationdata-integrity

#1233: Why "Just Use Postgres" Isn't Always Enough

Can one database do it all? Explore why hardware constraints and data geometry keep specialized databases like Snowflake and ClickHouse alive.

data-storagearchitecturedistributed-systems