The world awaits...

hardware (17)

Thinking about Secure Computing

What do you think about when you hear "secure computing"? You could think about access controls (username/password, two factor authentication, etc), encryption (of data at rest, data in transit), air-gapped networks, physical security of the…

Continue reading...

HTC 5G Hub Teardown

I bought a refurbished HTC 5G Hub to see if I could get a 5G hotspot and if it could act as a secondary internet connection if my main connection drops. The device runs Android…

Continue reading...

High Performance lewman.com

HistoryOn February 5th, 1998,  the lewman.com domain name was live on the Internet. For some reason, I've saved the original email from the registrar and hosting company. In fact, I'm pretty sure the domain was…

Continue reading...

ML Firearm Detector: Work in Progress

Out of interest in learning how machine learning works at the code level, I started building a firearm detector. There are plenty of libraries which detect a firearm, for instance, this one.  I wanted to…

Continue reading...

Investigating HomeKit Power Strips

I started looking at various HomeKit-compatible power strips. There appear to be two on the market: And one more announced, Eve Power Strip, https://www.macrumors.com/2018/08/30/eve-announces-new-light-strip-power-strip/ A few things caught my attention: I bought the Koogeek, because…

Continue reading...

The Tale of a Slow Server

In casual conversation with a friend, we're talking about scaling companies and the fun and challenges of growth at small companies (less than 50 employees). When he says, "Hey, our main log server is getting…

Continue reading...