Technology

Hardware, software, networking, and development

482 episodes Page 2 of 25

#2694: Borg vs Restic vs Kopia: Best Linux Server Backup Tool

Borg, Restic, and Kopia compared for whole-server incremental backups on Ubuntu Docker hosts.

backup-strategiesdata-redundancydata-integrity

#2679: Can a VPN Protect You from SS7 Phone Spying?

SS7 is the hidden backbone of global phone networks—and it's wide open to spies. Here's what a VPN does and doesn't fix.

privacytelecommunicationssecurity

#2671: How Your Phone Helps Strangers Find Lost Wallets

Your phone silently helps strangers find lost items. Here's how the cryptography and mesh networks actually work.

cryptographyprivacysustainability

#2670: Portable Projectors: What Actually Matters

Brightness, screens, and software longevity — what to look for when buying a portable projector.

display-technologyhardware-engineeringaudio-engineering

#2667: Lost Phone, Found Tension: Security vs. Returnability

Can you secure your Android without killing the chance a good Samaritan returns it? We break down the tradeoffs.

backup-strategiesdata-securityandroid

#2660: Where the World's Best Dry Cider Lives

From Normandy's keeved ciders to Asturian sidra that argues with you — a global tour of craft cider's real hotspots.

diycider-makingheirloom-apples

#2659: How to Make Mead: Ancient Honey Wine's Revival

Mead predates the wheel. Here's how to brew it at home — and why it's making a comeback.

diymeadhoney-wine

#2658: Off-Broadway vs Broadway: Seat Counts & Show Economics

Off-Broadway isn't just smaller Broadway—it's a different legal, economic, and artistic universe defined by seat counts.

urban-planninglabor-ethicscultural-bias

#2646: Smart Locks & Networks: What Actually Works

Z-Wave vs Zigbee vs Wi-Fi for smart locks. What's reliable enough to trust with your front door?

smart-homezigbeehome-network

#2629: Frankincense to Attar: Ancient Perfume Oils Today

How a frankincense obsession led to discovering perfume oils — a 4,000-year-old tradition that's being rediscovered today.

supply-chaincultural-biasperfumery

#2626: Smart Curtains vs Smart Glass: Bedroom Lighting Automation

Smart glass vs smart curtains for circadian health — what works in a rental bedroom without owning the walls?

circadian-rhythmsmart-homelighting-design

#2621: How 4 Batteries Produce 230 Volts

Four 18650 cells can't stack to 230V. The secret is switching, not stacking.

electronic-warfareemergency-preparednesspower-supply-units

#2620: How Atomic Clocks Actually Keep Time

Why the second is defined by a cesium atom, not the Earth's rotation — and why leap seconds are causing chaos.

time-synchronizationinfrastructureaviation-technology

#2608: Building a House with KNX: Smart Home Infrastructure That Lasts

Can you wire your house like a hotel? Here's what KNX costs, how it works, and how to connect it to Home Assistant.

smart-homehome-labdiy

#2600: Circadian Lighting Gradients in Home Assistant

How to build a smooth, override-friendly circadian lighting system using Adaptive Lighting in Home Assistant.

circadian-rhythmsmart-homelighting-design

#2599: Home 3D Printing in 2025: Keycaps, Cables & Real Costs

What $200 buys you for printing keycaps, cable housings, and small parts at home — with real material and environmental math.

diyopen-sourcehome-lab

#2597: Voice Control for Renters: $25 Per Room, No Wall Damage

Distributed voice control on a budget with wake words, centralized processing, and zero wall damage — perfect for rentals.

voice-firstsmart-homehome-lab

#2596: Systems Integrators vs MSPs: The Hidden Tech Career

Two parallel tech worlds: industrial systems integrators and IT managed service providers. How they differ, and why one pays $300/hour.

industrial-automationhvac-technologynetworking

#2595: Baby-Proofing a Small Rental: Survival Strategies

Practical strategies for surviving the mobile baby phase in a small Jerusalem apartment without losing your security deposit.

child-developmenttenant-rightsurban-design

#2594: The Hierarchy of Immutable Code

From mask ROM to e-fuses: how hardware enforces a hierarchy of mutability in every computing device.

hardware-engineeringhardware-reliabilitysecurity