Episódios
-
The last 120 years or so have seen tons of change for Korea, but what does the future hold? Tom shares what one heir is doing with their legacy.
Featuring Tom Merritt.
Episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
The predictive capabilities of ChatGPT and other programs based on Large Language Models really seem to infer an artificial intelligence. How do the applications work...and are they sentient? Tom explains why you shouldn't fear ChatGPT.
Featuring Tom Merritt.
Full transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
Estão a faltar episódios?
-
With all the talk about banning TikTok in the United States, Tom dives in to explain who actually owns and controls its parent company, ByteDance, and why there's so much discourse about security.
Featuring Tom Merritt.
Full transcript can be found here.
Hosted on Acast. See acast.com/privacy for more information.
-
What's really being celebrated on Black Friday and is it the biggest shopping day in the world?
Featuring Tom Merritt.
Full Episode Transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
The backbone of nearly every network you use on a daily basis is based on a system designed to be cheap and easy to implement.
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
What if you could have a secure password generated fresh each time you need it? Authenticator apps do just that. Tom explains how.
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
Douglas Engelbart demonstrated how two people connected over a network could work together editing a document at the same time in 1968. It took much longer to see a real product.
Featuring Tom Merritt.
Episode Transcript available here.
Hosted on Acast. See acast.com/privacy for more information.
-
Video conferencing was a vital method of communication during the COVID-19 pandemic, but it's roots go back much longer than you think.
Featuring Tom Merritt.
Full transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
How did RISC-V grab the attention of nearly every major tech company and what was the need for yet another computer processor architecture? Tom walks you through the history and use case of RISC-V.
Featuring Tom Merritt.
Full episode transcript found here.
Hosted on Acast. See acast.com/privacy for more information.
-
The Internet's directory was once a simple text file on a single computer but has evolved into many directories world-wide that enable the Internet as you know it.
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
The word processor never got "invented" as such, it just slowly developed out of things like typewriters and even slowly merged from electronic appliances into software. To understand the origin of the word processor you and I would recognize, the one with bold, italic, underline, we need to follow the journey of future space tourist Charles Simonyi.
Featuring Tom Merritt.
Episode transcript available here.
Hosted on Acast. See acast.com/privacy for more information.
-
You all know what a mouse is. It’s so common, that you probably don't even think that much about why it's called a mouse. But back in 1968, the man generally credited with the invention of the mouse, Douglas Engelbart, had to apologize for what was certainly a silly name.
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
You may have used them hundreds of times today, but the origin of hypertexts dates all the way back to at least 1963.
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
In a single 90 minute presentation, Douglas Englebart showcased technologies that would eventually find their way into nearly every computer you've ever used. And he did it in 1968.
Featuring Tom Merritt.
Hosted on Acast. See acast.com/privacy for more information.
-
Passkeys use something called public key cryptography. They have your public key. And because it’s public, it doesn’t matter if anyone gets it. That public key and your private key combine to validate who you are.
But how does that work? Wouldn’t they have to know something besides the public key that’s unique to you? No. That’s the brilliance of it.
Featuring Tom Merritt.
Link to show notes here.
Hosted on Acast. See acast.com/privacy for more information.
-
We update the history of Section 230 in light of the recent Supreme Court decisions. What it is, what it isn't and how those decisions affected or didn't affect the future of the "safe harbor" law in the US.
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
By 1998 the US had passed its Digital Millennium Copyright Act. And partly because the US generates so much copyrightable material, and partly just because it’s the US and is a little pushy on the world stage, the DMCA became the de facto way of handling copyright protections on the internet around the world.
But what is it? Why did we need the DMCA or the WIPO copyright treaty at all?
Let's help you Know a Little more about the DMCA
Featuring Tom Merritt.
Full episode transcript available here.
Hosted on Acast. See acast.com/privacy for more information.
-
Taiwan is at once one of the most vexing political situations on the globe and one of the most important to the world of technology.
But few people understand how it got to be either. And understanding that is essential to understanding what might happen next and how that matters a LOT for the technology industry.
Let's help you Know a Little More about Taiwan.
Featuring Tom Merritt.
This episode has been updated to correctly name the original four members of the United Nations Security Council.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
There's a lot of fear uncertainty and doubt being spread about OpenAI. So let's help you straighten out what it is and what it isn't.
Featuring Tom Merritt.
Full transcript here.
Hosted on Acast. See acast.com/privacy for more information.
-
You may have heard that using text messages as a second factor or 2FA code to protect your logins is less secure than other forms like apps or keys. You may even know this is because of something called SIM Swapping. Are there any legitimate uses/functions to swapping/cloning?
Featuring Tom Merritt.
Full episode transcript here.
Hosted on Acast. See acast.com/privacy for more information.
- Mostrar mais