Computerphile

Computerphile

Videos about computers & computer stuff. Supported by Jane Street - https://jane-st.co/computerphile Sister channel of ...

@Computerphile subscribers

'Forbidden' AI Technique - Computerphile

Computerphile

'Forbidden' AI Technique - Computerphile

1 month ago - 9:49

Where GREP Came From - Computerphile

Computerphile

Where GREP Came From - Computerphile

7 years ago - 10:07

How CPU Memory & Caches Work - Computerphile

Computerphile

How CPU Memory & Caches Work - Computerphile

5 months ago - 34:54

Generative AI's Greatest Flaw - Computerphile

Computerphile

Generative AI's Greatest Flaw - Computerphile

4 months ago - 12:23

How TOR Works- Computerphile

Computerphile

How TOR Works- Computerphile

8 years ago - 14:19

What is CUDA? - Computerphile

Computerphile

What is CUDA? - Computerphile

2 months ago - 11:41

SHA: Secure Hashing Algorithm - Computerphile

Computerphile

SHA: Secure Hashing Algorithm - Computerphile

8 years ago - 10:21

Where did Bytes Come From? - Computerphile

Computerphile

Where did Bytes Come From? - Computerphile

7 years ago - 11:31

How Secure Shell Works (SSH) - Computerphile

Computerphile

How Secure Shell Works (SSH) - Computerphile

6 years ago - 9:20

The Problem with Time & Timezones - Computerphile

Computerphile

The Problem with Time & Timezones - Computerphile

11 years ago - 10:13

"C" Programming Language: Brian Kernighan - Computerphile

Computerphile

"C" Programming Language: Brian Kernighan - Computerphile

9 years ago - 8:26

Transport Layer Security (TLS) - Computerphile

Computerphile

Transport Layer Security (TLS) - Computerphile

4 years ago - 15:33

Rust and RAII Memory Management - Computerphile

Computerphile

Rust and RAII Memory Management - Computerphile

2 years ago - 24:22

Secret Key Exchange (Diffie-Hellman) - Computerphile

Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

7 years ago - 8:40

The Most Difficult Program to Compute? - Computerphile

Computerphile

The Most Difficult Program to Compute? - Computerphile

11 years ago - 14:55

Reinforcement Learning - Computerphile

Computerphile

Reinforcement Learning - Computerphile

3 weeks ago - 15:06

AI Sandbagging - Computerphile

Computerphile

AI Sandbagging - Computerphile

1 month ago - 11:40

Running a Buffer Overflow Attack - Computerphile

Computerphile

Running a Buffer Overflow Attack - Computerphile

9 years ago - 17:30

Monte Carlo Tree Search - Computerphile

Computerphile

Monte Carlo Tree Search - Computerphile

1 month ago - 32:55

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

Computerphile

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

3 days ago - 5:13

CPU Kernel Mode - Computerphile

Computerphile

CPU Kernel Mode - Computerphile

8 days ago - 13:27

Hash Collisions & The Birthday Paradox - Computerphile

Computerphile

Hash Collisions & The Birthday Paradox - Computerphile

2 months ago - 14:21

How to Choose a Password - Computerphile

Computerphile

How to Choose a Password - Computerphile

8 years ago - 11:33

Turing's Enigma Problem (Part 1) - Computerphile

Computerphile

Turing's Enigma Problem (Part 1) - Computerphile

10 years ago - 19:00

No Regrets - What Happens to AI Beyond Generative? - Computerphile

Computerphile

No Regrets - What Happens to AI Beyond Generative? - Computerphile

4 months ago - 27:44

Elliptic Curve Back Door - Computerphile

Computerphile

Elliptic Curve Back Door - Computerphile

7 years ago - 12:24

CPU Interrupts - Computerphile

Computerphile

CPU Interrupts - Computerphile

1 month ago - 16:47

Exploiting the Tiltman Break - Computerphile

Computerphile

Exploiting the Tiltman Break - Computerphile

6 years ago - 25:33

CPU Pipeline - Computerphile

Computerphile

CPU Pipeline - Computerphile

1 year ago - 21:48

What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

Computerphile

What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

6 months ago - 6:50

Has Generative AI Already Peaked? - Computerphile

Computerphile

Has Generative AI Already Peaked? - Computerphile

1 year ago - 12:48

Subroutines in Low Level Code - Computerphile

Computerphile

Subroutines in Low Level Code - Computerphile

2 months ago - 32:08

Elliptic Curves - Computerphile

Computerphile

Elliptic Curves - Computerphile

7 years ago - 8:42

AI "Stop Button" Problem - Computerphile

Computerphile

AI "Stop Button" Problem - Computerphile

8 years ago - 20:00

World Foundation Models - Computerphile

Computerphile

World Foundation Models - Computerphile

2 weeks ago - 12:48

Hashing Algorithms and Security - Computerphile

Computerphile

Hashing Algorithms and Security - Computerphile

11 years ago - 8:12

Von Neumann Architecture - Computerphile

Computerphile

Von Neumann Architecture - Computerphile

7 years ago - 16:20

Monte Carlo Tree Search - Computerphile

Computerphile

Monte Carlo Tree Search - Computerphile

1 month ago - 32:55

Programming Paradigms - Computerphile

Computerphile

Programming Paradigms - Computerphile

11 years ago - 10:44

What are Digital Signatures? - Computerphile

Computerphile

What are Digital Signatures? - Computerphile

4 years ago - 10:17

Ch(e)at GPT? - Computerphile

Computerphile

Ch(e)at GPT? - Computerphile

2 years ago - 13:52

Laziness in Python - Computerphile

Computerphile

Laziness in Python - Computerphile

4 years ago - 14:21

A* (A Star) Search Algorithm - Computerphile

Computerphile

A* (A Star) Search Algorithm - Computerphile

8 years ago - 14:04

Why Use Binary? - Computerphile

Computerphile

Why Use Binary? - Computerphile

9 years ago - 8:29

Why Electronic Voting is a BAD Idea - Computerphile

Computerphile

Why Electronic Voting is a BAD Idea - Computerphile

10 years ago - 8:21

AES Explained (Advanced Encryption Standard) - Computerphile

Computerphile

AES Explained (Advanced Encryption Standard) - Computerphile

5 years ago - 14:14

Ai Will Try to Cheat & Escape (aka Rob Miles was Right!) - Computerphile

Computerphile

Ai Will Try to Cheat & Escape (aka Rob Miles was Right!) - Computerphile

3 months ago - 20:17

Quick Sort - Computerphile

Computerphile

Quick Sort - Computerphile

12 years ago - 3:23

Welcome to Computerphile!

Computerphile

Welcome to Computerphile!

12 years ago - 1:41

Public Key Cryptography - Computerphile

Computerphile

Public Key Cryptography - Computerphile

10 years ago - 6:20

Turing Machines Explained - Computerphile

Computerphile

Turing Machines Explained - Computerphile

10 years ago - 5:25

ChatGPT with Rob Miles - Computerphile

Computerphile

ChatGPT with Rob Miles - Computerphile

2 years ago - 36:02

Unix Pipeline (Brian Kernighan) - Computerphile

Computerphile

Unix Pipeline (Brian Kernighan) - Computerphile

9 years ago - 5:16

Computer Timescales Mapped onto Human Timescales - Computerphile

Computerphile

Computer Timescales Mapped onto Human Timescales - Computerphile

6 months ago - 28:41

How DNS Works - Computerphile

Computerphile

How DNS Works - Computerphile

5 years ago - 8:04

Shortest Path Algorithm Problem - Computerphile

Computerphile

Shortest Path Algorithm Problem - Computerphile

3 months ago - 7:04

Python Hash Sets Explained & Demonstrated - Computerphile

Computerphile

Python Hash Sets Explained & Demonstrated - Computerphile

1 year ago - 18:39

A Helping Hand for LLMs (Retrieval Augmented Generation) - Computerphile

Computerphile

A Helping Hand for LLMs (Retrieval Augmented Generation) - Computerphile

10 months ago - 14:08

Turing, Tutte & Tunny - Computerphile

Computerphile

Turing, Tutte & Tunny - Computerphile

6 years ago - 37:34

Turing & The Halting Problem - Computerphile

Computerphile

Turing & The Halting Problem - Computerphile

10 years ago - 6:14

End to End Encryption (E2EE) - Computerphile

Computerphile

End to End Encryption (E2EE) - Computerphile

8 years ago - 8:12

Internationalis(z)ing Code - Computerphile

Computerphile

Internationalis(z)ing Code - Computerphile

10 years ago - 8:18

Holy Grail of AI (Artificial Intelligence) - Computerphile

Computerphile

Holy Grail of AI (Artificial Intelligence) - Computerphile

10 years ago - 7:40

Cracking Websites with Cross Site Scripting - Computerphile

Computerphile

Cracking Websites with Cross Site Scripting - Computerphile

11 years ago - 8:34

Functional Programming & Haskell - Computerphile

Computerphile

Functional Programming & Haskell - Computerphile

8 years ago - 9:19

How Password Managers Work - Computerphile

Computerphile

How Password Managers Work - Computerphile

6 years ago - 12:09

Hacking Websites with SQL Injection - Computerphile

Computerphile

Hacking Websites with SQL Injection - Computerphile

11 years ago - 8:59

Glitch Tokens - Computerphile

Computerphile

Glitch Tokens - Computerphile

2 years ago - 19:29

Cross Site Request Forgery - Computerphile

Computerphile

Cross Site Request Forgery - Computerphile

11 years ago - 9:20

How Blurs & Filters Work - Computerphile

Computerphile

How Blurs & Filters Work - Computerphile

9 years ago - 7:52

Generative Adversarial Networks (GANs) - Computerphile

Computerphile

Generative Adversarial Networks (GANs) - Computerphile

7 years ago - 21:21

Key Exchange Problems - Computerphile

Computerphile

Key Exchange Problems - Computerphile

7 years ago - 9:18

DeepSeek is a Game Changer for AI - Computerphile

Computerphile

DeepSeek is a Game Changer for AI - Computerphile

5 months ago - 19:58

What on Earth is Recursion? - Computerphile

Computerphile

What on Earth is Recursion? - Computerphile

11 years ago - 9:40

MapReduce - Computerphile

Computerphile

MapReduce - Computerphile

6 years ago - 6:41

TLS Handshake Explained - Computerphile

Computerphile

TLS Handshake Explained - Computerphile

4 years ago - 16:59

Parsing Explained - Computerphile

Computerphile

Parsing Explained - Computerphile

5 years ago - 14:58

Securing Stream Ciphers (HMAC) - Computerphile

Computerphile

Securing Stream Ciphers (HMAC) - Computerphile

7 years ago - 9:24

Running an SQL Injection Attack - Computerphile

Computerphile

Running an SQL Injection Attack - Computerphile

9 years ago - 17:11

Taming Kerberos - Computerphile

Computerphile

Taming Kerberos - Computerphile

5 years ago - 16:06

AI's Version of Moore's Law? - Computerphile

Computerphile

AI's Version of Moore's Law? - Computerphile

2 months ago - 13:06

Lambda Calculus - Computerphile

Computerphile

Lambda Calculus - Computerphile

8 years ago - 12:40

Functional Parsing - Computerphile

Computerphile

Functional Parsing - Computerphile

5 years ago - 22:46

Deadly Truth of General AI? - Computerphile

Computerphile

Deadly Truth of General AI? - Computerphile

10 years ago - 8:30

The Art of Abstraction - Computerphile

Computerphile

The Art of Abstraction - Computerphile

12 years ago - 5:22

Garbage Collection (Mark & Sweep) - Computerphile

Computerphile

Garbage Collection (Mark & Sweep) - Computerphile

2 years ago - 16:22

How YouTube Works - Computerphile

Computerphile

How YouTube Works - Computerphile

11 years ago - 8:25

Compression - Computerphile

Computerphile

Compression - Computerphile

12 years ago - 7:38

Just In Time (JIT) Compilers - Computerphile

Computerphile

Just In Time (JIT) Compilers - Computerphile

2 years ago - 10:41

CPU vs GPU (What's the Difference?) - Computerphile

Computerphile

CPU vs GPU (What's the Difference?) - Computerphile

9 years ago - 6:39