Technology

Hardware, software, networking, and development

500 episodes Page 3 of 25

#2671: How Your Phone Helps Strangers Find Lost Wallets

Your phone silently helps strangers find lost items. Here's how the cryptography and mesh networks actually work.

cryptographyprivacysustainability

#2670: Portable Projectors: What Actually Matters

Brightness, screens, and software longevity — what to look for when buying a portable projector.

display-technologyhardware-engineeringaudio-engineering

#2667: Lost Phone, Found Tension: Security vs. Returnability

Can you secure your Android without killing the chance a good Samaritan returns it? We break down the tradeoffs.

backup-strategiesdata-securityandroid

#2660: Where the World's Best Dry Cider Lives

From Normandy's keeved ciders to Asturian sidra that argues with you — a global tour of craft cider's real hotspots.

diycider-makingheirloom-apples

#2659: How to Make Mead: Ancient Honey Wine's Revival

Mead predates the wheel. Here's how to brew it at home — and why it's making a comeback.

diymeadhoney-wine

#2658: Off-Broadway vs Broadway: Seat Counts & Show Economics

Off-Broadway isn't just smaller Broadway—it's a different legal, economic, and artistic universe defined by seat counts.

urban-planninglabor-ethicscultural-bias

#2646: Smart Locks & Networks: What Actually Works

Z-Wave vs Zigbee vs Wi-Fi for smart locks. What's reliable enough to trust with your front door?

smart-homezigbeehome-network

#2629: Frankincense to Attar: Ancient Perfume Oils Today

How a frankincense obsession led to discovering perfume oils — a 4,000-year-old tradition that's being rediscovered today.

supply-chaincultural-biasperfumery

#2626: Smart Curtains vs Smart Glass: Bedroom Lighting Automation

Smart glass vs smart curtains for circadian health — what works in a rental bedroom without owning the walls?

circadian-rhythmsmart-homelighting-design

#2621: How 4 Batteries Produce 230 Volts

Four 18650 cells can't stack to 230V. The secret is switching, not stacking.

electronic-warfareemergency-preparednesspower-supply-units

#2620: How Atomic Clocks Actually Keep Time

Why the second is defined by a cesium atom, not the Earth's rotation — and why leap seconds are causing chaos.

time-synchronizationinfrastructureaviation-technology

#2608: Building a House with KNX: Smart Home Infrastructure That Lasts

Can you wire your house like a hotel? Here's what KNX costs, how it works, and how to connect it to Home Assistant.

smart-homehome-labdiy

#2600: Circadian Lighting Gradients in Home Assistant

How to build a smooth, override-friendly circadian lighting system using Adaptive Lighting in Home Assistant.

circadian-rhythmsmart-homelighting-design

#2599: Home 3D Printing in 2025: Keycaps, Cables & Real Costs

What $200 buys you for printing keycaps, cable housings, and small parts at home — with real material and environmental math.

diyopen-sourcehome-lab

#2597: Voice Control for Renters: $25 Per Room, No Wall Damage

Distributed voice control on a budget with wake words, centralized processing, and zero wall damage — perfect for rentals.

voice-firstsmart-homehome-lab

#2596: Systems Integrators vs MSPs: The Hidden Tech Career

Two parallel tech worlds: industrial systems integrators and IT managed service providers. How they differ, and why one pays $300/hour.

industrial-automationhvac-technologynetworking

#2595: Baby-Proofing a Small Rental: Survival Strategies

Practical strategies for surviving the mobile baby phase in a small Jerusalem apartment without losing your security deposit.

child-developmenttenant-rightsurban-design

#2594: The Hierarchy of Immutable Code

From mask ROM to e-fuses: how hardware enforces a hierarchy of mutability in every computing device.

hardware-engineeringhardware-reliabilitysecurity

#2592: Inside the Hidden World of Specialist Keyboards

From IBM terminals to Stream Decks — how macro keyboards evolved under the radar for decades.

hardware-engineeringergonomicshuman-computer-interaction

#2587: DNS Blocking Showdown: Pi-hole vs AdGuard Home

DNS-level ad and tracker blocking compared — where each tool shines, where they fall short, and the real tradeoffs.

network-securityprivacyiot-protocols