Tags / devices

Tagged with “devices” (40) activity chart

  1. Craig Venter: Life at the Speed of Light : NPR

    In his new book Life at the Speed of Light: From the Double Helix to the Dawn of Digital Life, Craig Venter writes of the brave new world synthetic biology may some day deliver: from consumer devices that print out the latest flu vaccine to instruments on Mars landers that analyze Martian DNA and teleport it back to Earth to be studied�"or recreated.

    http://www.npr.org/2013/10/25/240751591/craig-venter-life-at-the-speed-of-light

    —Huffduffed by slechno one month ago

  2. Mac Power Users 178: The Contacts Show | Mac Power Users

    David and Katie discuss the best practices for managing, syncing and organizing contacts.

    Thanks to MPU listener

    Hay Oborn for assistance with the shownotes this week!

    Links for this episode:

    MPU 042: Contacts and Calendars | Mac Power Users

    In this episode, Katie and David tackle managing contacts and calendars on your Mac and iOS Devices.

    Mac App Store – Contacts Cleaner

    Google Sync

    Sync your Google services to your phone, tablet, and desktop programs so that you can always access what’s important to you

    Contacts Sync For Google Gmail

    Contacts (Mavericks): Group contacts

    Use groups and folders (for Exchange accounts) to organize your contacts by categories, or to easily send email to several people at once.

    TextExpander: Mac Typing Shortcut Utility Saves You Time

    Type more with less effort! TextExpander saves your fingers and your keyboard, expanding custom keyboard shortcuts into frequently-used text and pictures…

    How Mac experts deal with their contacts | Macworld

    1Password

    Cobook Contacts – the unfied address book for Mac

    Flexibits | Fantastical

    LaunchBar 5

    A single keyboard shortcut lets you access and control every aspect of your digital life. Whatever you want to accomplish on your Mac – with LaunchBar it’s only a few keystrokes away.

    Alfred App – Productivity App for Mac OS X

    Alfred saves you time when you search for files online or on your Mac. Be more productive with hotkeys, keywords and file actions at your fingertips.

    Dialvetica Contacts on the App Store on iTunes

    Your app should be smart enough to know who your favorites are. It should know what number you want to call. It should know who you mean when you type someone’s initials.

    Smartr Contacts for iPhone on the App Store on iTunes

    What if you had a magic address book that automatically identified the name and contact information for everyone you’ve ever communicated with?

    Chambers Daily

    Your iPhone Address Book Is Not A Rolodex — Chambers Daily

    Learning To Love Evernote — Chambers Daily

    Evernote Hello | Evernote

    Delete Contacts Fast – DeleteQ on the App Store on iTunes

    “DeleteQ” is the best way to delete contacts quickly.You can quickly and easily select multiple contacts and delete them from address book on your iPhone.

    Evernote Adds Business Card Scanning — KatieFloyd.me

    How to Export Your iPhone Contacts

    Please support our sponsors for this episode:

    1PasswordHave you ever forgotten a password? Now you don’t have to worry about that anymore.

    The Omni GroupWe’re passionate about productivity for Mac, iPhone and iPad.

    Squarespace Everything you need to create an amazing website.

    HoverDomains and email management made simple.

    Podcast: Play in new window

    | Download (Duration: 1:39:29 — 45.9MB)

    http://www.macpowerusers.com/2014/02/23/mac-power-users-178-the-contacts-show/

    —Huffduffed by telonaes one month ago

  3. MPU 042: Contacts and Calendars | Mac Power Users

    In this episode, Katie and David tackle managing contacts and calendars on your Mac and iOS Devices.

    Links of note

    Apple Address Book

    iCal

    ABContacts

    Dialvetica

    Calvetica

    BusyCal

    BusySync

    BusyToDo

    37signals Highrise

    iCalShare

    iCal Calendars Downloads

    Setup Google Sync on an iDevice

    Sync Yahoo Contacts with iDevice

    Sync Yahoo Contacts with Address Book

    Enable Google Calendar in iCal

    Thanks BusyMac for a 20% listener discount through February 15, 2011. Coupon Code: MACPOWERUSERS

    Find Katie and David at Macworld Expo 2011

    Please support our sponsors:

    Smile

    Makers of PDFpen

    1Password

    Save 20% off the price of 1Password using coupon code MacPowerUsers or through the above link:

    The Omni Group

    Makers of fine Mac productivity software

    Podcast: Play in new window

    | Download (36.3MB)

    http://www.macpowerusers.com/2011/01/22/mpu-042-contacts-and-calendars/

    —Huffduffed by bulkorder one month ago

  4. Mac Power Users 154: Apple TV | Mac Power Users

    David and Katie dive deep on the Apple TV and discuss how they use the Apple TV for work and play.

    Thanks to MPU listener

    Jigar Talati for assistance with the shownotes this week!

    Links for this episode:

    Apple TV – Apple Store (U.S.)

    Apple TV gives you access to the best 1080p HD content — including blockbuster movies, your music and photos, and more — right on your widescreen TV. You can even play content from your iOS devices on your TV using AirPlay. Apple TV requires one HDMI cable

    Roku Streaming Player

    Apple TV Tech Specs (1st, 2nd, 3rd Generation)

    Apple TV – Wikipedia, the free encyclopedia

    Mac Power Users #126: The Mac Home Server

    Special guest Shawn Blanc joins Katie and David to talk about setting up a Mac to use as a home server. We talk configuration, use cases, media applications, automation tools and more.

    Mac Power Users #38: iTunes Intensive

    5by5 | The Incomparable

    An award-winning weekly show about geeky cultural topics in numerous media, including books, movies, TV, comics, and games.

    E.T. the Extra-Terrestrial (1982) – IMDb

    A meek and alienated little boy finds a stranded extraterrestrial. He has to find the courage to defy the authorities to help the alien return to its home planet.

    Blu-ray Disc – Wikipedia, the free encyclopedia

    Apple – Support – iTunes

    Apple – Apps – Remote

    Put your iPhone, iPad, or iPod touch in charge of the show.

    K760 Wireless Solar Keyboard for Mac, iPad or iPhone – Logitech

    Apple – Apple Wireless Keyboard – The thin, cable-free keyboard.

    Mac Power Users #62: Cutting The Cable

    TiVo

    Can I Stream.It?

    Search Netflix, Hulu, Google Play, iTunes, and more, for movies to stream instantly, rent, and buy.

    Apple TV – Channels

    Hulu | Watch TV. Watch Movies. | Online | Free

    Netflix

    Presenting Wirelessly with an Apple TV — MacSparky

    Apple – Mac – AirPort Express

    Apple – AirPlay — Play content from iOS devices on Apple TV.

    QuickTip: Enable AirPlay Mirroring on iPhone or iPad — KatieFloyd.me

    Reflector – AirPlay mirror your iPhone or iPad to any Mac or PC, wirelessly.

    Kanex ATV Pro

    AirPlay Mirroring for VGA Projector

    Apple TV Hacks — Get more from your shiny box of joy

    Plex – A Complete Media Solution

    XBMC | Open Source Home Theatre Software

    ScreenCastsOnline – SCOI0126 PlexConnect on Apple TV

    Drobo 5N

    Synology Network Attached Storage – NEW NAS Experience

    Meet Xbox One – Xbox.com

    Whose Line Is It Anyway?

    Mac Power Users #137: Workflows with Aisha Tyler

    aisha tyler’s site

    Tuff-‘N’-Tiny USB Drive

    HFS Plus – Wikipedia, the free encyclopedia

    HFS Plus or HFS+ is a file system developed by Apple Inc. to replace their Hierarchical File System (HFS) as the primary file system used in Macintosh computers (or other systems running Mac OS).

    exFAT – Wikipedia, the free encyclopedia

    exFAT (Extended File Allocation Table) is a Microsoft file system optimized for flash drives.

    File Allocation Table – Wikipedia, the free encyclopedia

    File Allocation Table (FAT) is the name of a computer file system architecture and a family of industry standard file systems utilizing it.

    Mac Power Users #153: Hardware Development with Geoff Barrall

    Mac Power Users #152: Back to School

    Please support our exclusive sponsor for this episode: Smile: With productivity boosters like TextExpander and PDFpen, Smile makes you a Mac Power User.

    Podcast: Play in new window

    | Download (Duration: 1:27:56 — 40.6MB)

    http://www.macpowerusers.com/2013/09/08/mac-power-users-154-apple-tv/

    —Huffduffed by rtadtabot 2 months ago

  5. 1: Bicycle for the Mind

    Horace Dediu and Guy English discuss the future of TV, how we consume media, and the fate of console-style devices. From Apple to Nintendo and beyond, is there one box to rule them all, or can there be?Interview segment: Cinematographer Barry Braverman talks about working with director Wes Anderson (uncut version to be posted as Screen Time #54)Apple TV Gains its Own Shopping Category | AppleInsiderHorace wrote one of my favorite Asymco articles in 2011 that applies here: Hiding in Plain SightAirPlay Configuration Files Hint at Next-Gen Apple TV Hardware |AppleInsiderMobile Gamers Aren’t Playing NIntendo-Style Games | ConsulGamerBarry Braverman’s website, and his IMDb credits.Bicycle Thieves, aka The Bicycle Thief aka Ladri di bicciclette | WikipediaBottle Rocket (and Murita Cycles) | The Criterion CollectionUmberto D (click through for restored trailer) | The Criterion CollectionSponsored by:Squarespace: everything you need to get started making a website. Use the offer code mentioned in the show for 10% offSmile: get PDFPen Scan+ in the App Store for $4.99, or PDFPen 6 in the Mac App Store for $59.99Drobo: smart storage to protect what matters. Use offer code MOISES for $50 off any Drobo model at Drobostore.com

    http://www.esn.fm/electric-shadow/1-bicycle-for-the-mind

    —Huffduffed by eromberg 2 months ago

  6. FLOSS Weekly 256 | TWiT.TV

    Serenity for Android is a Plex Media Server client for tablets and Google TV devices.

    http://twit.tv/show/floss-weekly/256

    —Huffduffed by brianmfranklin 3 months ago

  7. The Rise of al Qaeda in the Middle East and the US Response

    Guest host Judy Muller looks at al Qaeda’s resurgence in the Middle East and what it means to the United States.

    http://www.kcrw.com/news/programs/tp/tp140109the_rise_of_al_qaeda

    —Huffduffed by jeffhammett 3 months ago

  8. HbbTV Security

    HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV devices. The idea is to bundle broadcast media content with online content which can be retrieved by the TV set through an Internet connection.

    Mechanisms that allow the online content to be accessed by the TV set can be attacked and might put the TV user’s privacy at stake. The presentation highlights possible attack vectors of HbbTV-capable TV sets and introduces possible mitigations.

    The Hybrid Broadcast Broadband TV consortium aims to define a standardized way on how content from so-called entertainment providers (e.g. broadcast stations, online media providers) is delivered on connected TVs. Starting as a Pan-European effort, the HbbTV consortium wants to create a globally adopted standard for hybrid entertainment services. Especially within the so-called Declarative Application Environment (DAE) – the HbbTV browser – another standard for connected TVs is being adopted: The Open IPTV Forum standard for Internet protocol TVs (IPTV). This standard seems to cover the device-specific part for Internet functionality.

    This new standard in the entertainment industry is currently rolled out in an increasing number of countries in- and outside of Europe. Besides concerns about privacy, this technology also raises concerns about security. Possible attack vectors and possible mitigations are introduced in this presentation.

    http://events.ccc.de/congress/2013/Fahrplan/events/5398.html

    Day: 2013-12-27 Start time: 23:00 Duration: 01:00 Room: Saal 2 Track: Security & Safety Language: en

    —Huffduffed by Jonny007MKD 3 months ago

  9. Firmware Fat Camp

    We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware binaries from common embedded devices to drastically reduce the attack surface of these devices. We present a brief theoretical explanation of Firmware Fat Camp, a collection of "before" and "after" photos of graduates of FFC, along with a set of live demonstrations of FFC in action on common embedded devices.

    Modern embedded systems such as VoIP phones, network printers and routers typically ship with all available features compiled into its firmware image. A small subset of these features is activated at any given time on individual devices based on its specific configuration. An even smaller subset of features is actually used, as some unused and insecure features cannot are typically enabled by default and cannot be disabled. However, all embedded devices still contain a large amount of code and data that should never be executed or read according to its current configuration. This unnecessary binary is not simply a waste of memory; it contains vulnerable code and data that can be used by an attacker to exploit the system. This “dead code” provides an ideal attack surface. Automated minimization of this attack surface will significantly improve the security of the device without any impact to the device’s functionality.

    We propose a set of methods of hardening existing embedded systems against attack by employing Binary Autotomy or the automated removal of unnecessary binaries from each embedded device according to its current configuration.

    The configuration of the embedded device to be protected is analyzed. The firmware binary corresponding to the features enabled in the configuration is kept. The firmware corresponding to features not enabled in the configuration is removed from the firmware image. The firmware to be removed is determined by applying static and dynamic binary code analysis on the original firmware image. This analysis maps each configurable feature with a set of binary executable code within the firmware image. When a particular configuration is analyzed, a list of enabled features is built from this file. Using the feature to code mapping created from the original dynamic and static analysis, autotomic binary reduction simply removes all code that belongs to features that are not enabled, or should not be used, in the particular configuration file in question.

    We present quantitative analysis of the effectiveness of Binary Autotomy algorithms on a collection of common embedded devices along with several live demonstrations of embedded devices running post FFC firmware images. How much unnecessary binary can be ripped out of XYZ*? Come and find out!

    • XYZ = {Home routers | Enterprise routers | VoIP phones | Printers | Web Cams}

    http://events.ccc.de/congress/2013/Fahrplan/events/5356.html

    Day: 2013-12-27 Start time: 23:00 Duration: 01:00 Room: Saal 6 Track: Security & Safety Language: en

    —Huffduffed by Jonny007MKD 3 months ago

  10. Technical Difficulties - 061 - Taming WiFi with Bradley Chambers

    Bradley Chambers drops by to help Gabe and Erik understand how to make WiFi work in the home. Along the way they talk about the way wireless signals propagate and interfere, how to select the best hardware, and how to configure your router’s software to ensure a secure and reliable wireless network.

    Guest Spotlight: Bradley Chambers

    Bradley Chambers

    Producer’s Note

    This week marks our second episode with a guest expert. Before we begin, here is a bit more about Bradley Chambers, this week’s guide to the tricky world of WiFi.

    Bradley’s sparse Twitter bio sums him up as “Jesus follower, husband, father,” and that’s a good place to start. He lives in Chattanooga, TN with his wife and two sons and serves as Director of Information Technology for Brainerd Baptist School.

    Bradley can be regularly heard on the Out of School podcast discussing educational technology with his co-host Fraser Speirs. He also blogs (not daily) at Chambers Daily and the content there is of the same high quality you’d expect from the author of Learning to Love Evernote and Learning to Love Photo Management.

    You can find Bradley online via Twitter, ADN, and LinkedIn.

    When was the last time you re-thought how you’re doing your WiFi?

    Listen to this section on SoundCloud: 0:00

    Gabe begins the episode by asking Erik a silly question about whether he has reconsidered how he does a thing – WiFi in this case.

    Skype problems caused Erik’s most recent clean sweep and (as is so often the case in the world of tech) the new setup completely failed to solve his actual problem, but he liked it better anyway. Since this opens a can of worms, Gabe and Erik invited someone with both a broader and deeper knowledge of WiFi onto the show to help them dive deeper. Enter Bradley Chambers.

    Mass per Unit Volume

    This material is very dense and while the show doesn’t stray much, you can certainly tell this is a complicated subject when listening. The show notes here will occasionally fall down some of the rabbit holes that the hosts were able to avoid, but in general, I will also try to hit the high points, while offering some useful links that provide additional depth.

    When Bradley started his IT job in 2009 or so, WiFi was not ubiquitous, but now it’s included in previously dumb household items, is the default network connection for television doohickeys, and shares its frequency with baby monitors and microwaves. This ubiquity means that WiFi tools and support for the protocol have never been better, but it has also spawned a host of interference and bandwidth challenges.

    A firm foundation of what Wifi really is

    Listen to this section on SoundCloud: 4:55

    WiFi, in its most basic from, is very easy to understand: a wireless way to network computers. Reduced another step in tech complexity, WiFi just means “internet.”

    Behind this simple veneer, however, there is immeasurable complexity. No one knows this better than Bradley Chambers, whose day job involves ensuring WiFi delivers the interwebs in the same automatic way that a faucet delivers water.

    Water

    Or in the same automatic way that a faucet delivers beer in the Weatherhead house

    The keezer is near complete. pic.twitter.com/MGMATldF— macdrifter (@macdrifter) February 2, 2013

    A network hub is really just a dumb version of a network switch, the latter of which you may remember from the Ethernetworking episode of Technical Difficulties. The main difference between these two devices is that the hub rebroadcasts its signals, rather than trying to properly address its communication. When Bradley calls WiFi “hubs in the air,” this is the distinction. Wireless access points broadcast their signals omnidirectionally, so that all participating devices can “see” the signals.

    2.4 vs 5

    When we consider the transmission of individual ethernet frames for an increasing number of devices, the radio signal itself becomes important. In common use are both 2.4 GHz and 5 GHz.

    Generally speaking, 2.4 is widely considered the “junk band” and can be compared to the lanes nearest merging onramps of a congested highway, while the 5 GHz band is like the passing lane. Continuing this traffic metaphor, the passing lane is faster when there aren’t too many cars in it, and since the 2.4 GHz band is the most commonly used industrial, scientific, and medical (ISM) bands, there is a lot of merging traffic. Even considering only WiFi traffic, 2.4 has an increased problem with Co-channel interference, because it is only 72 MHz wide, while the 5 GHz band is 910 MHz wide.

    WLAN Channel Overlap

    To beat up my metaphor a bit more, 5 GHz has more lanes.

    Also, note that a channel just refers to a small, 5 MHz

    segment of its respective band. Its easier than saying your WiFi router is on channel 11 rather than 2.462 GHz.

    Congestion and interference aren’t the only reasons that 5 GHz is faster though. Since the 2.4 and 5 band represent the frequency of the carrier wave that the WiFi router is using to transmit its information, all else being equal, moving to the higher frequency band would carry information slightly more than twice as fast.

    One trade-off with a higher frequency signal is range. I am unqualified to talk about the physics involved here, but all waves are attenuated as they travel through a medium, but lower frequency waves can travel further before they are attenuated to an unusable level.

    An illustration of an extreme extension of this principle in action is the communication with submarines using extremely low frequency waves, often using frequencies as low as 3 Hz which penetrate seawater to a submarine’s operating depths.

    You may want to use 2.4 GHz, even with all of its negatives, in an old house with lath-and-plaster walls, in order to get sufficient range. As Gabe notes, old houses can also resist Cat-6 cable installation in many creative ways.

    For more information on interference, here are a few additional resources.

    You could also focus on selecting the best channel.

    The 802.11 protocol you choose may decide your band anyway.

    Channels and Speed

    We didn’t cover channel width because it doesn’t affect home users as much, but it does affect speeds. Learn more here.

    Channel width and QAM is very important in 802.11ac to see max speeds. Learn even more here.

    Planning your network

    Listen to this section on SoundCloud: 10:00

    Very fancy hardware can also band steer and select the best band available, and dual-band routers are becoming pretty commonplace. You can really customize your wireless if you have ethernet everywhere.

    “My rule is that everything that is stationary gets plugged in to ethernet”

    Adding access points will increase the airtime available for other devices. Additionally, the available WiFi bandwidth won’t be limited by devices streaming data at a high bitrate.

    Bradley has provided some very good guidance about the eventual transition to 802.11ac, but a lot of deals can be found on 802.11n hardware, and for most people, he recommends getting the older AirPort Extreme and an Airport Express.

    If you want to do it all with one router, you can go the route Gabe did and leave the walled garden, which will allow you to buy huge antennas if you need more range.

    Wirecutter says “Wait

    The Wirecutter has their “Best Wifi Router” – currently Gabe’s Asus RT-N66u – in its “Wait!” status due to current versions all being 802.11AC. As discussed in this show, there is not currently an obvious need to go AC, but if you are at all concerned about being future-proof (for a bit longer, at least), then it might be good to wait, if you are happy with your current setup.

    For my part, this router has had an average price on Amazon of $144.95, but it was last at an historic low of $124.99 and is out of Amazon’s stock. This seems to indicate the end of the current part’s run, so I will also add the less-revered “potatowire Wait!” status to it.

    Having multiple access points should allow effortless physical movement through the network’s coverage. This is sometimes called a roaming network, and is built in to enterprise hardware and Apple’s and other high-end consumer equipment.

    WiFi Configuration Clarification

    The best possible setup is to configure multiple access points, connected through Ethernet, and broadcasting on the same SSID. Most devices can then roam from one access point (AP) to another as needed. If you do this using Apple AirPort base stations connected by Ethernet, then setup is as easy as having them broadcast the same network SSID. Ideally they would broadcast on different channels.

    Extending a network wirelessly by repeating the WiFi signal itself typically works in a hub-and-spoke model. Only one central base station’s transmission can be repeated, and while you can have multiple repeaters, they all are repeating the same signal. This has reduced throughput in most cases because the same antenna is used to transmit and receive. The alternative is to repeat with multiple APs or to utilize multiple-input and multiple-output (MIMO) technology, which has the same effect but is executed through the use of multiple antennas in a base station. Extending a network in either of these ways is called a mesh network, and you may remember this term from our Sonos episode.

    If you have multiple access points connected by ethernet, it is easy to connect something like a File Transporter or other NAS, without worrying about how it affects your network’s speed.

    Channels and Speed

    At 20:45 in the show, I meant you can’t run Ethernet, not “WiFi,” though a Cambridge apartment.

    As Erik alluded to, sometimes you can have a network whose strength goes to 11, and the FCC doesn’t have a very big investigative arm, does it?

    Managing what you’ve got

    Listen to this section on SoundCloud: 23:49

    If you have a modern dual-band router you have the benefit of serving 802.11ac to some devices but also broadcasting a 802.11n signal to older devices. There are real benefits to this too.

    If you have to extend your network wirelessly, you will likely notice the effect on speed on anything but newer 802.11ac equipment.

    When you have visitors, you may only want to secure your own network while allowing them to share your bandwidth. It is worth checking how your router’s guest configuration works, beacuse it might steal some bandwidth from your main network. If so, it may only make sense to turn it on when you have guests.

    AirPort Utility Guest Network Configuration

    When it comes to uninvited guests on your network, we asked friend of the show Sean Korzdorfer for a quick security assessment.

    Korzdorfer on WiFi Security

    My default answer to any security question is: “It depends.” I know, it’s not what you want to hear. I have more bad news: most of what you know about security is probably wrong. It’s okay. It happens to everyone. The important thing to keep in mind is security is a balancing act between risk and convenience … And since we’re talking about home WiFi networks, let’s throw performance into the mix. Easy-Peasy. All I need to know is: What are you securing? Who do you trust? What are the threats to the first question? How new is your hardware? Does your ISP allow you admin privileges to their hardware? Do your kids have video game consoles / toys that connect to WiFi? Do you work from home? Do you stream video? Do you have lath and plaster walls? How creepy are your neighbors? Getting the idea?

    Keeping Bad Guys Out Is the Easy Part

    Change your router’s default login and password.

    Password protect your network.

    Don’t use WEP.

    Unless you have old hardware that doesn’t support WPA2. (It’s better than nothing.)

    Do use WPA2 Personal.

    Yes, everyone behind the router is using a shared cryptographic key and can easily sniff each other’s packets. Good thing you’re sharing that password with people you trust.

    Use a long password. Size matters.

    Use a unique password.

    Be wary of WiFi extenders.

    Encryption is dependent upon the vendor.

    Slower performance.

    Flip side: easier and cheaper than running an Ethernet backbone.

    MAC filtering will not protect anything.

    MAC_Find

    Hiding your SSID is silly.

    Understand: the most nefarious external attack a home network will (probably) have to withstand is harmless wardriving from a child’s video game.

    It’s What on the Inside that Counts

    The actual risk to your home network is an Insider Problem.

    Not all developers use secure programming practices.

    How many apps on your phone were developed by good people cutting their teeth on Objective-C?

    Does their app call home?

    What information are they transmitting?

    Are they using HTTPS?

    Are there any bugs that might create a vulnerability?

    Use Little Snitch on your Mac.

    Convenient Features Might Increase Risk.

    Back to My Mac.

    Air Drop.

    File Sharing.

    Internet Sharing.

    Bluetooth Sharing.

    Printer Sharing.

    People are always the weakest link.

    Do you share your network password with guests?

    Do you have children who share your network password with friends?

    Are you using a VPN for transmitting sensitive information or email?

    I know, this can be a little overwhelming and scary. What if I told you there is no such thing as a secured network? Don’t panic. The good news is your personal data isn’t as valuable as you want to believe it is … And on the off chance you do have something worth committing a felony for, brute forcing your network password takes time and effort. I’d probably just break a window instead

    Using AirDrop without wireless

    WiFi in exchange for chores

    Bradley bragged about Chattanooga’s internet access, and Gabe let us in on the fiery hatred for Comcast that burns within his soul

    “I don’t even want their hardware touching my house”

    IP address management is one of the tweaks that may be required in a heavily-networked home. DHCP can fail in some cases, and setting a static IP can help if you are noticing addressing conflicts. DNS settings are another area where you can customize the way your network runs. As Bradley mentioned, OpenDNS offers services to restrict some internet access.

    Enterprise Concerns

    Listen to this section on SoundCloud: 48:46

    The old model of thin access points that rely on single controllers don’t allow the redundancy required by Enterprise, and the new models are very advanced and finely tuned to suit unique needs. Scalability is the specialty of companies like Aerohive and JAMF. It is probably out of your price range.

    Producer’s Note

    As Gabe mentioned, boiling tea can truly affect your WiFi, since most consumer microwaves operate at 2.45 GHz. Since this is in the heart of the 2.4 GHz band, it is only the microwave’s shielding that minimizes the effect. As was talked about in the audio, this is a radio frequency (RF) problem not a WiFi one. Moving to the 5 GHz band will help, but your best bet to reduce the effect of interference and also improve your available bandwidth is to expand your WiFi network using Cat-6 cable. When considering hardware, an AirPort Extreme paired with an AirPort Express or two is tough to beat. This will offer the most capable, yet easiest-to-use option for the average user.

    TL;DR Version? WiFi is hard.

    Well, that’s all for this week. If you have anything that you’d like to add to or correct in the show notes you can find me on Twitter @potatowire or feel free to send an email to me at potatowire dot com.

    http://technicaldifficulties.us/episodes/061-taming-wifi-with-bradley-chambers

    —Huffduffed by justinajparker 3 months ago

Page 1 of 4