Computerphile

Computerphile

Videos about computers & computer stuff. Supported by Jane Street - https://jane-st.co/computerphile Sister channel of ...

@Computerphile subscribers

How Secure Shell Works (SSH) - Computerphile

Computerphile

How Secure Shell Works (SSH) - Computerphile

6 years ago - 9:20

The Problem with Time & Timezones - Computerphile

Computerphile

The Problem with Time & Timezones - Computerphile

11 years ago - 10:13

Generative AI's Greatest Flaw - Computerphile

Computerphile

Generative AI's Greatest Flaw - Computerphile

4 months ago - 12:23

Where GREP Came From - Computerphile

Computerphile

Where GREP Came From - Computerphile

7 years ago - 10:07

How NOT to Store Passwords! - Computerphile

Computerphile

How NOT to Store Passwords! - Computerphile

11 years ago - 9:24

SHA: Secure Hashing Algorithm - Computerphile

Computerphile

SHA: Secure Hashing Algorithm - Computerphile

8 years ago - 10:21

How CPU Memory & Caches Work - Computerphile

Computerphile

How CPU Memory & Caches Work - Computerphile

5 months ago - 34:54

Secret Key Exchange (Diffie-Hellman) - Computerphile

Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

7 years ago - 8:40

The Most Difficult Program to Compute? - Computerphile

Computerphile

The Most Difficult Program to Compute? - Computerphile

11 years ago - 14:55

Password Cracking - Computerphile

Computerphile

Password Cracking - Computerphile

9 years ago - 20:20

Running a Buffer Overflow Attack - Computerphile

Computerphile

Running a Buffer Overflow Attack - Computerphile

9 years ago - 17:30

Characters, Symbols and the Unicode Miracle - Computerphile

Computerphile

Characters, Symbols and the Unicode Miracle - Computerphile

11 years ago - 9:37

'Forbidden' AI Technique - Computerphile

Computerphile

'Forbidden' AI Technique - Computerphile

1 month ago - 9:49

How TOR Works- Computerphile

Computerphile

How TOR Works- Computerphile

8 years ago - 14:19

Multithreading Code - Computerphile

Computerphile

Multithreading Code - Computerphile

6 years ago - 15:54

Elliptic Curves - Computerphile

Computerphile

Elliptic Curves - Computerphile

7 years ago - 8:42

A* (A Star) Search Algorithm - Computerphile

Computerphile

A* (A Star) Search Algorithm - Computerphile

8 years ago - 14:04

What are Digital Signatures? - Computerphile

Computerphile

What are Digital Signatures? - Computerphile

4 years ago - 10:17

Rust and RAII Memory Management - Computerphile

Computerphile

Rust and RAII Memory Management - Computerphile

2 years ago - 24:22

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

Computerphile

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

2 days ago - 5:13

CPU Kernel Mode - Computerphile

Computerphile

CPU Kernel Mode - Computerphile

7 days ago - 13:27

Reinforcement Learning - Computerphile

Computerphile

Reinforcement Learning - Computerphile

3 weeks ago - 15:06

How to Choose a Password - Computerphile

Computerphile

How to Choose a Password - Computerphile

8 years ago - 11:33

"C" Programming Language: Brian Kernighan - Computerphile

Computerphile

"C" Programming Language: Brian Kernighan - Computerphile

9 years ago - 8:26

World Foundation Models - Computerphile

Computerphile

World Foundation Models - Computerphile

13 days ago - 12:48

Cracking Enigma in 2021 - Computerphile

Computerphile

Cracking Enigma in 2021 - Computerphile

4 years ago - 21:20

Why Electronic Voting is a BAD Idea - Computerphile

Computerphile

Why Electronic Voting is a BAD Idea - Computerphile

10 years ago - 8:21

Ch(e)at GPT? - Computerphile

Computerphile

Ch(e)at GPT? - Computerphile

2 years ago - 13:52

What is CUDA? - Computerphile

Computerphile

What is CUDA? - Computerphile

2 months ago - 11:41

Von Neumann Architecture - Computerphile

Computerphile

Von Neumann Architecture - Computerphile

7 years ago - 16:20

Why C is so Influential - Computerphile

Computerphile

Why C is so Influential - Computerphile

7 years ago - 10:50

Programming Paradigms - Computerphile

Computerphile

Programming Paradigms - Computerphile

11 years ago - 10:44

Turing's Enigma Problem (Part 1) - Computerphile

Computerphile

Turing's Enigma Problem (Part 1) - Computerphile

10 years ago - 19:00

Dijkstra's Algorithm - Computerphile

Computerphile

Dijkstra's Algorithm - Computerphile

8 years ago - 10:43

The Art of Abstraction - Computerphile

Computerphile

The Art of Abstraction - Computerphile

12 years ago - 5:22

No Regrets - What Happens to AI Beyond Generative? - Computerphile

Computerphile

No Regrets - What Happens to AI Beyond Generative? - Computerphile

4 months ago - 27:44

Jensen Huang on GPUs - Computerphile

Computerphile

Jensen Huang on GPUs - Computerphile

3 months ago - 23:13

Transport Layer Security (TLS) - Computerphile

Computerphile

Transport Layer Security (TLS) - Computerphile

4 years ago - 15:33

Quicksort Algorithm in Five Lines of Code! - Computerphile

Computerphile

Quicksort Algorithm in Five Lines of Code! - Computerphile

5 months ago - 13:18

What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

Computerphile

What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

6 months ago - 6:50

Floating Point Numbers - Computerphile

Computerphile

Floating Point Numbers - Computerphile

11 years ago - 9:16

CPU Pipeline - Computerphile

Computerphile

CPU Pipeline - Computerphile

1 year ago - 21:48

Hashing Algorithms and Security - Computerphile

Computerphile

Hashing Algorithms and Security - Computerphile

11 years ago - 8:12

MikeBot3000: Can We Build an AI Mike from Open Source Tools? - Computerphile

Computerphile

MikeBot3000: Can We Build an AI Mike from Open Source Tools? - Computerphile

1 month ago - 23:43

Subroutines in Low Level Code - Computerphile

Computerphile

Subroutines in Low Level Code - Computerphile

2 months ago - 32:08

A* (A Star) Search Algorithm - Computerphile

Computerphile

A* (A Star) Search Algorithm - Computerphile

8 years ago - 14:04

Elliptic Curve Back Door - Computerphile

Computerphile

Elliptic Curve Back Door - Computerphile

7 years ago - 12:24

Hash Collisions & The Birthday Paradox - Computerphile

Computerphile

Hash Collisions & The Birthday Paradox - Computerphile

2 months ago - 14:21

Quick Sort - Computerphile

Computerphile

Quick Sort - Computerphile

12 years ago - 3:23

AI Language Models & Transformers - Computerphile

Computerphile

AI Language Models & Transformers - Computerphile

6 years ago - 20:39

Welcome to Computerphile!

Computerphile

Welcome to Computerphile!

12 years ago - 1:41

Computer Timescales Mapped onto Human Timescales - Computerphile

Computerphile

Computer Timescales Mapped onto Human Timescales - Computerphile

6 months ago - 28:41

Public Key Cryptography - Computerphile

Computerphile

Public Key Cryptography - Computerphile

10 years ago - 6:20

Turing Machines Explained - Computerphile

Computerphile

Turing Machines Explained - Computerphile

10 years ago - 5:25

Why Electronic Voting is a BAD Idea - Computerphile

Computerphile

Why Electronic Voting is a BAD Idea - Computerphile

10 years ago - 8:21

Ai Will Try to Cheat & Escape (aka Rob Miles was Right!) - Computerphile

Computerphile

Ai Will Try to Cheat & Escape (aka Rob Miles was Right!) - Computerphile

3 months ago - 20:17

Unix Pipeline (Brian Kernighan) - Computerphile

Computerphile

Unix Pipeline (Brian Kernighan) - Computerphile

9 years ago - 5:16

Python Hash Sets Explained & Demonstrated - Computerphile

Computerphile

Python Hash Sets Explained & Demonstrated - Computerphile

1 year ago - 18:39

Turing, Tutte & Tunny - Computerphile

Computerphile

Turing, Tutte & Tunny - Computerphile

6 years ago - 37:34

Turing & The Halting Problem - Computerphile

Computerphile

Turing & The Halting Problem - Computerphile

10 years ago - 6:14

End to End Encryption (E2EE) - Computerphile

Computerphile

End to End Encryption (E2EE) - Computerphile

8 years ago - 8:12

Internationalis(z)ing Code - Computerphile

Computerphile

Internationalis(z)ing Code - Computerphile

10 years ago - 8:18

Programming Loops vs Recursion - Computerphile

Computerphile

Programming Loops vs Recursion - Computerphile

7 years ago - 12:32

Lambda Calculus - Computerphile

Computerphile

Lambda Calculus - Computerphile

8 years ago - 12:40

Bug in Binary Search - Computerphile

Computerphile

Bug in Binary Search - Computerphile

1 year ago - 11:31

Cracking Websites with Cross Site Scripting - Computerphile

Computerphile

Cracking Websites with Cross Site Scripting - Computerphile

11 years ago - 8:34

Holy Grail of AI (Artificial Intelligence) - Computerphile

Computerphile

Holy Grail of AI (Artificial Intelligence) - Computerphile

10 years ago - 7:40

Functional Programming & Haskell - Computerphile

Computerphile

Functional Programming & Haskell - Computerphile

8 years ago - 9:19

How Password Managers Work - Computerphile

Computerphile

How Password Managers Work - Computerphile

6 years ago - 12:09

Hacking Websites with SQL Injection - Computerphile

Computerphile

Hacking Websites with SQL Injection - Computerphile

11 years ago - 8:59

DeepSeek is a Game Changer for AI - Computerphile

Computerphile

DeepSeek is a Game Changer for AI - Computerphile

5 months ago - 19:58

Cross Site Request Forgery - Computerphile

Computerphile

Cross Site Request Forgery - Computerphile

11 years ago - 9:20

How Blurs & Filters Work - Computerphile

Computerphile

How Blurs & Filters Work - Computerphile

9 years ago - 7:52

Glitch Tokens - Computerphile

Computerphile

Glitch Tokens - Computerphile

2 years ago - 19:29