Computerphile

Computerphile

Videos about computers & computer stuff. Supported by Jane Street - https://jane-st.co/computerphile Sister channel of ...

@Computerphile subscribers

'Forbidden' AI Technique - Computerphile

Computerphile

'Forbidden' AI Technique - Computerphile

1 month ago - 9:49

Where GREP Came From - Computerphile

Computerphile

Where GREP Came From - Computerphile

7 years ago - 10:07

Generative AI's Greatest Flaw - Computerphile

Computerphile

Generative AI's Greatest Flaw - Computerphile

4 months ago - 12:23

The Problem with Time & Timezones - Computerphile

Computerphile

The Problem with Time & Timezones - Computerphile

11 years ago - 10:13

How Secure Shell Works (SSH) - Computerphile

Computerphile

How Secure Shell Works (SSH) - Computerphile

6 years ago - 9:20

SHA: Secure Hashing Algorithm - Computerphile

Computerphile

SHA: Secure Hashing Algorithm - Computerphile

8 years ago - 10:21

Where did Bytes Come From? - Computerphile

Computerphile

Where did Bytes Come From? - Computerphile

7 years ago - 11:31

Secret Key Exchange (Diffie-Hellman) - Computerphile

Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

7 years ago - 8:40

Reinforcement Learning - Computerphile

Computerphile

Reinforcement Learning - Computerphile

3 weeks ago - 15:06

How TOR Works- Computerphile

Computerphile

How TOR Works- Computerphile

8 years ago - 14:19

What is CUDA? - Computerphile

Computerphile

What is CUDA? - Computerphile

2 months ago - 11:41

Has Generative AI Already Peaked? - Computerphile

Computerphile

Has Generative AI Already Peaked? - Computerphile

1 year ago - 12:48

Elliptic Curves - Computerphile

Computerphile

Elliptic Curves - Computerphile

7 years ago - 8:42

AI Sandbagging - Computerphile

Computerphile

AI Sandbagging - Computerphile

1 month ago - 11:40

"C" Programming Language: Brian Kernighan - Computerphile

Computerphile

"C" Programming Language: Brian Kernighan - Computerphile

9 years ago - 8:26

Cracking Enigma in 2021 - Computerphile

Computerphile

Cracking Enigma in 2021 - Computerphile

4 years ago - 21:20

How CPU Memory & Caches Work - Computerphile

Computerphile

How CPU Memory & Caches Work - Computerphile

5 months ago - 34:54

Monte Carlo Tree Search - Computerphile

Computerphile

Monte Carlo Tree Search - Computerphile

1 month ago - 32:55

The Most Difficult Program to Compute? - Computerphile

Computerphile

The Most Difficult Program to Compute? - Computerphile

11 years ago - 14:55

CPU Kernel Mode - Computerphile

Computerphile

CPU Kernel Mode - Computerphile

9 days ago - 13:27

Rust and RAII Memory Management - Computerphile

Computerphile

Rust and RAII Memory Management - Computerphile

2 years ago - 24:22

Multithreading Code - Computerphile

Computerphile

Multithreading Code - Computerphile

6 years ago - 15:54

Elliptic Curve Back Door - Computerphile

Computerphile

Elliptic Curve Back Door - Computerphile

7 years ago - 12:24

Exploiting the Tiltman Break - Computerphile

Computerphile

Exploiting the Tiltman Break - Computerphile

6 years ago - 25:33

What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

Computerphile

What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

6 months ago - 6:50

What are Digital Signatures? - Computerphile

Computerphile

What are Digital Signatures? - Computerphile

4 years ago - 10:17

How to Choose a Password - Computerphile

Computerphile

How to Choose a Password - Computerphile

8 years ago - 11:33

Turing's Enigma Problem (Part 1) - Computerphile

Computerphile

Turing's Enigma Problem (Part 1) - Computerphile

10 years ago - 19:00

Laziness in Python - Computerphile

Computerphile

Laziness in Python - Computerphile

4 years ago - 14:21

Programming Paradigms - Computerphile

Computerphile

Programming Paradigms - Computerphile

11 years ago - 10:44

Hashing Algorithms and Security - Computerphile

Computerphile

Hashing Algorithms and Security - Computerphile

11 years ago - 8:12

CPU Pipeline - Computerphile

Computerphile

CPU Pipeline - Computerphile

1 year ago - 21:48

Von Neumann Architecture - Computerphile

Computerphile

Von Neumann Architecture - Computerphile

7 years ago - 16:20

Running an SQL Injection Attack - Computerphile

Computerphile

Running an SQL Injection Attack - Computerphile

9 years ago - 17:11

Secret Key Exchange (Diffie-Hellman) - Computerphile

Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

7 years ago - 8:40

What is CUDA? - Computerphile

Computerphile

What is CUDA? - Computerphile

2 months ago - 11:41

No Regrets - What Happens to AI Beyond Generative? - Computerphile

Computerphile

No Regrets - What Happens to AI Beyond Generative? - Computerphile

4 months ago - 27:44

World Foundation Models - Computerphile

Computerphile

World Foundation Models - Computerphile

2 weeks ago - 12:48

Dijkstra's Algorithm - Computerphile

Computerphile

Dijkstra's Algorithm - Computerphile

8 years ago - 10:43

Monte Carlo Tree Search - Computerphile

Computerphile

Monte Carlo Tree Search - Computerphile

1 month ago - 32:55

A* (A Star) Search Algorithm - Computerphile

Computerphile

A* (A Star) Search Algorithm - Computerphile

8 years ago - 14:04

Why Electronic Voting is a BAD Idea - Computerphile

Computerphile

Why Electronic Voting is a BAD Idea - Computerphile

10 years ago - 8:21

Subroutines in Low Level Code - Computerphile

Computerphile

Subroutines in Low Level Code - Computerphile

2 months ago - 32:08

Cracking Enigma in 2021 - Computerphile

Computerphile

Cracking Enigma in 2021 - Computerphile

4 years ago - 21:20

Floating Point Numbers - Computerphile

Computerphile

Floating Point Numbers - Computerphile

11 years ago - 9:16

How DNS Works - Computerphile

Computerphile

How DNS Works - Computerphile

5 years ago - 8:04

Unix Pipeline (Brian Kernighan) - Computerphile

Computerphile

Unix Pipeline (Brian Kernighan) - Computerphile

9 years ago - 5:16

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

Computerphile

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

4 days ago - 5:13

Hacking Websites with SQL Injection - Computerphile

Computerphile

Hacking Websites with SQL Injection - Computerphile

11 years ago - 8:59

Public Key Cryptography - Computerphile

Computerphile

Public Key Cryptography - Computerphile

10 years ago - 6:20

AES Explained (Advanced Encryption Standard) - Computerphile

Computerphile

AES Explained (Advanced Encryption Standard) - Computerphile

5 years ago - 14:14

MikeBot3000: Can We Build an AI Mike from Open Source Tools? - Computerphile

Computerphile

MikeBot3000: Can We Build an AI Mike from Open Source Tools? - Computerphile

1 month ago - 23:43

What on Earth is Recursion? - Computerphile

Computerphile

What on Earth is Recursion? - Computerphile

11 years ago - 9:40

Welcome to Computerphile!

Computerphile

Welcome to Computerphile!

12 years ago - 1:41

Turing Machines Explained - Computerphile

Computerphile

Turing Machines Explained - Computerphile

10 years ago - 5:25

Turing, Tutte & Tunny - Computerphile

Computerphile

Turing, Tutte & Tunny - Computerphile

6 years ago - 37:34

Turing & The Halting Problem - Computerphile

Computerphile

Turing & The Halting Problem - Computerphile

10 years ago - 6:14

End to End Encryption (E2EE) - Computerphile

Computerphile

End to End Encryption (E2EE) - Computerphile

8 years ago - 8:12

Internationalis(z)ing Code - Computerphile

Computerphile

Internationalis(z)ing Code - Computerphile

10 years ago - 8:18

Functional Programming & Haskell - Computerphile

Computerphile

Functional Programming & Haskell - Computerphile

8 years ago - 9:19

Lambda Calculus - Computerphile

Computerphile

Lambda Calculus - Computerphile

8 years ago - 12:40

How Password Managers Work - Computerphile

Computerphile

How Password Managers Work - Computerphile

6 years ago - 12:09

Cracking Websites with Cross Site Scripting - Computerphile

Computerphile

Cracking Websites with Cross Site Scripting - Computerphile

11 years ago - 8:34

Holy Grail of AI (Artificial Intelligence) - Computerphile

Computerphile

Holy Grail of AI (Artificial Intelligence) - Computerphile

10 years ago - 7:40

Python Hash Sets Explained & Demonstrated - Computerphile

Computerphile

Python Hash Sets Explained & Demonstrated - Computerphile

1 year ago - 18:39

Glitch Tokens - Computerphile

Computerphile

Glitch Tokens - Computerphile

2 years ago - 19:29

Cross Site Request Forgery - Computerphile

Computerphile

Cross Site Request Forgery - Computerphile

11 years ago - 9:20

ChatGPT with Rob Miles - Computerphile

Computerphile

ChatGPT with Rob Miles - Computerphile

2 years ago - 36:02

How Blurs & Filters Work - Computerphile

Computerphile

How Blurs & Filters Work - Computerphile

9 years ago - 7:52

DeepSeek is a Game Changer for AI - Computerphile

Computerphile

DeepSeek is a Game Changer for AI - Computerphile

5 months ago - 19:58

Key Exchange Problems - Computerphile

Computerphile

Key Exchange Problems - Computerphile

7 years ago - 9:18

Bug in Binary Search - Computerphile

Computerphile

Bug in Binary Search - Computerphile

1 year ago - 11:31

Computer Timescales Mapped onto Human Timescales - Computerphile

Computerphile

Computer Timescales Mapped onto Human Timescales - Computerphile

6 months ago - 28:41

Parsing Explained - Computerphile

Computerphile

Parsing Explained - Computerphile

5 years ago - 14:58

Generative Adversarial Networks (GANs) - Computerphile

Computerphile

Generative Adversarial Networks (GANs) - Computerphile

7 years ago - 21:21

MapReduce - Computerphile

Computerphile

MapReduce - Computerphile

6 years ago - 6:41

Securing Stream Ciphers (HMAC) - Computerphile

Computerphile

Securing Stream Ciphers (HMAC) - Computerphile

7 years ago - 9:24

Taming Kerberos - Computerphile

Computerphile

Taming Kerberos - Computerphile

5 years ago - 16:06

AI's Version of Moore's Law? - Computerphile

Computerphile

AI's Version of Moore's Law? - Computerphile

2 months ago - 13:06

Functional Parsing - Computerphile

Computerphile

Functional Parsing - Computerphile

5 years ago - 22:46

Why Use Binary? - Computerphile

Computerphile

Why Use Binary? - Computerphile

9 years ago - 8:29

How YouTube Works - Computerphile

Computerphile

How YouTube Works - Computerphile

11 years ago - 8:25

Garbage Collection (Mark & Sweep) - Computerphile

Computerphile

Garbage Collection (Mark & Sweep) - Computerphile

2 years ago - 16:22

TLS Handshake Explained - Computerphile

Computerphile

TLS Handshake Explained - Computerphile

4 years ago - 16:59

Just In Time (JIT) Compilers - Computerphile

Computerphile

Just In Time (JIT) Compilers - Computerphile

2 years ago - 10:41

What's Virtual Memory? - Computerphile

Computerphile

What's Virtual Memory? - Computerphile

3 years ago - 22:40

CPU vs GPU (What's the Difference?) - Computerphile

Computerphile

CPU vs GPU (What's the Difference?) - Computerphile

9 years ago - 6:39

AI Language Models & Transformers - Computerphile

Computerphile

AI Language Models & Transformers - Computerphile

6 years ago - 20:39

Optimising Code - Computerphile

Computerphile

Optimising Code - Computerphile

1 year ago - 19:43

Why do CPUs Need Caches? - Computerphile

Computerphile

Why do CPUs Need Caches? - Computerphile

9 years ago - 6:06

Prime Numbers & RSA Encryption Algorithm - Computerphile

Computerphile

Prime Numbers & RSA Encryption Algorithm - Computerphile

4 years ago - 15:06

Why Information Theory is Important - Computerphile

Computerphile

Why Information Theory is Important - Computerphile

3 years ago - 12:33

Magic "Nothing Up My Sleeve" Numbers - Computerphile

Computerphile

Magic "Nothing Up My Sleeve" Numbers - Computerphile

8 years ago - 5:32

Creating Your Own Programming Language - Computerphile

Computerphile

Creating Your Own Programming Language - Computerphile

8 months ago - 21:15

Resizing Images - Computerphile

Computerphile

Resizing Images - Computerphile

8 years ago - 9:22

How Bitcoin Works - Computerphile

Computerphile

How Bitcoin Works - Computerphile

9 years ago - 7:30

Colossus & Bletchley Park - Computerphile

Computerphile

Colossus & Bletchley Park - Computerphile

10 years ago - 8:42

Feistel Cipher - Computerphile

Computerphile

Feistel Cipher - Computerphile

5 years ago - 7:31

Almost All Web Encryption Works Like This (SP Networks) - Computerphile

Computerphile

Almost All Web Encryption Works Like This (SP Networks) - Computerphile

5 years ago - 12:19

The Perfect Code - Computerphile

Computerphile

The Perfect Code - Computerphile

8 years ago - 8:27

Turing Machine Primer - Computerphile

Computerphile

Turing Machine Primer - Computerphile

10 years ago - 5:52

Shortest Path Algorithm Problem - Computerphile

Computerphile

Shortest Path Algorithm Problem - Computerphile

3 months ago - 7:04

K-d Trees - Computerphile

Computerphile

K-d Trees - Computerphile

3 years ago - 13:20

Secrets Hidden in Images (Steganography) - Computerphile

Computerphile

Secrets Hidden in Images (Steganography) - Computerphile

9 years ago - 13:14

Computers Without Memory - Computerphile

Computerphile

Computers Without Memory - Computerphile

9 years ago - 8:52

Bitcoin Problems - Computerphile

Computerphile

Bitcoin Problems - Computerphile

9 years ago - 6:25

Turing Complete - Computerphile

Computerphile

Turing Complete - Computerphile

9 years ago - 6:26

Apache Spark - Computerphile

Computerphile

Apache Spark - Computerphile

6 years ago - 7:40