Computerphile

Computerphile

Videos about computers & computer stuff. Supported by Jane Street - https://jane-st.co/computerphile Sister channel of ...

@Computerphile subscribers

Where GREP Came From - Computerphile

Computerphile

Where GREP Came From - Computerphile

7 years ago - 10:07

Where did Bytes Come From? - Computerphile

Computerphile

Where did Bytes Come From? - Computerphile

7 years ago - 11:31

"C" Programming Language: Brian Kernighan - Computerphile

Computerphile

"C" Programming Language: Brian Kernighan - Computerphile

9 years ago - 8:26

Generative AI's Greatest Flaw - Computerphile

Computerphile

Generative AI's Greatest Flaw - Computerphile

4 months ago - 12:23

'Forbidden' AI Technique - Computerphile

Computerphile

'Forbidden' AI Technique - Computerphile

2 months ago - 9:49

How Secure Shell Works (SSH) - Computerphile

Computerphile

How Secure Shell Works (SSH) - Computerphile

6 years ago - 9:20

Password Cracking - Computerphile

Computerphile

Password Cracking - Computerphile

9 years ago - 20:20

Rust and RAII Memory Management - Computerphile

Computerphile

Rust and RAII Memory Management - Computerphile

2 years ago - 24:22

Has Generative AI Already Peaked? - Computerphile

Computerphile

Has Generative AI Already Peaked? - Computerphile

1 year ago - 12:48

Exploiting the Tiltman Break - Computerphile

Computerphile

Exploiting the Tiltman Break - Computerphile

6 years ago - 25:33

Why C is so Influential - Computerphile

Computerphile

Why C is so Influential - Computerphile

7 years ago - 10:50

Characters, Symbols and the Unicode Miracle - Computerphile

Computerphile

Characters, Symbols and the Unicode Miracle - Computerphile

11 years ago - 9:37

How NOT to Store Passwords! - Computerphile

Computerphile

How NOT to Store Passwords! - Computerphile

11 years ago - 9:24

Super Intelligence Speculation - Computerphile

Computerphile

Super Intelligence Speculation - Computerphile

1 month ago - 32:43

The Problem with Time & Timezones - Computerphile

Computerphile

The Problem with Time & Timezones - Computerphile

11 years ago - 10:13

Cracking Enigma in 2021 - Computerphile

Computerphile

Cracking Enigma in 2021 - Computerphile

4 years ago - 21:20

The Most Difficult Program to Compute? - Computerphile

Computerphile

The Most Difficult Program to Compute? - Computerphile

11 years ago - 14:55

Multithreading Code - Computerphile

Computerphile

Multithreading Code - Computerphile

6 years ago - 15:54

Secret Key Exchange (Diffie-Hellman) - Computerphile

Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

7 years ago - 8:40

Memory Mapping - Computerphile

Computerphile

Memory Mapping - Computerphile

5 days ago - 26:14

CPU Kernel Mode - Computerphile

Computerphile

CPU Kernel Mode - Computerphile

2 weeks ago - 13:27

Hash Collisions & The Birthday Paradox - Computerphile

Computerphile

Hash Collisions & The Birthday Paradox - Computerphile

2 months ago - 14:21

CPU Interrupts - Computerphile

Computerphile

CPU Interrupts - Computerphile

1 month ago - 16:47

CPU Pipeline - Computerphile

Computerphile

CPU Pipeline - Computerphile

1 year ago - 21:48

What is CUDA? - Computerphile

Computerphile

What is CUDA? - Computerphile

3 months ago - 11:41

Elliptic Curves - Computerphile

Computerphile

Elliptic Curves - Computerphile

7 years ago - 8:42

Shortest Path Algorithm Problem - Computerphile

Computerphile

Shortest Path Algorithm Problem - Computerphile

3 months ago - 7:04

What are Digital Signatures? - Computerphile

Computerphile

What are Digital Signatures? - Computerphile

4 years ago - 10:17

Reinforcement Learning - Computerphile

Computerphile

Reinforcement Learning - Computerphile

1 month ago - 15:06

SHA: Secure Hashing Algorithm - Computerphile

Computerphile

SHA: Secure Hashing Algorithm - Computerphile

8 years ago - 10:21

Von Neumann Architecture - Computerphile

Computerphile

Von Neumann Architecture - Computerphile

7 years ago - 16:20

Laziness in Python - Computerphile

Computerphile

Laziness in Python - Computerphile

4 years ago - 14:21

Subroutines in Low Level Code - Computerphile

Computerphile

Subroutines in Low Level Code - Computerphile

2 months ago - 32:08

Dijkstra's Algorithm - Computerphile

Computerphile

Dijkstra's Algorithm - Computerphile

8 years ago - 10:43

Transport Layer Security (TLS) - Computerphile

Computerphile

Transport Layer Security (TLS) - Computerphile

4 years ago - 15:33

AI "Stop Button" Problem - Computerphile

Computerphile

AI "Stop Button" Problem - Computerphile

8 years ago - 20:00

Floating Point Numbers - Computerphile

Computerphile

Floating Point Numbers - Computerphile

11 years ago - 9:16

How DNS Works - Computerphile

Computerphile

How DNS Works - Computerphile

5 years ago - 8:04

A* (A Star) Search Algorithm - Computerphile

Computerphile

A* (A Star) Search Algorithm - Computerphile

8 years ago - 14:04

Welcome to Computerphile!

Computerphile

Welcome to Computerphile!

12 years ago - 1:41

Programming Paradigms - Computerphile

Computerphile

Programming Paradigms - Computerphile

11 years ago - 10:44

MikeBot3000: Can We Build an AI Mike from Open Source Tools? - Computerphile

Computerphile

MikeBot3000: Can We Build an AI Mike from Open Source Tools? - Computerphile

1 month ago - 23:43

Multithreading Code - Computerphile

Computerphile

Multithreading Code - Computerphile

6 years ago - 15:54

Public Key Cryptography - Computerphile

Computerphile

Public Key Cryptography - Computerphile

11 years ago - 6:20

Unix Pipeline (Brian Kernighan) - Computerphile

Computerphile

Unix Pipeline (Brian Kernighan) - Computerphile

9 years ago - 5:16

Running a Buffer Overflow Attack - Computerphile

Computerphile

Running a Buffer Overflow Attack - Computerphile

9 years ago - 17:30

Turing Machines Explained - Computerphile

Computerphile

Turing Machines Explained - Computerphile

10 years ago - 5:25

World Foundation Models - Computerphile

Computerphile

World Foundation Models - Computerphile

3 weeks ago - 12:48

Cracking Enigma in 2021 - Computerphile

Computerphile

Cracking Enigma in 2021 - Computerphile

4 years ago - 21:20

Running an SQL Injection Attack - Computerphile

Computerphile

Running an SQL Injection Attack - Computerphile

9 years ago - 17:11

Hashing Algorithms and Security - Computerphile

Computerphile

Hashing Algorithms and Security - Computerphile

11 years ago - 8:12

AI Sandbagging - Computerphile

Computerphile

AI Sandbagging - Computerphile

2 months ago - 11:40

Turing & The Halting Problem - Computerphile

Computerphile

Turing & The Halting Problem - Computerphile

10 years ago - 6:14

How to Choose a Password - Computerphile

Computerphile

How to Choose a Password - Computerphile

9 years ago - 11:33

Elliptic Curve Back Door - Computerphile

Computerphile

Elliptic Curve Back Door - Computerphile

7 years ago - 12:24

Computer Timescales Mapped onto Human Timescales - Computerphile

Computerphile

Computer Timescales Mapped onto Human Timescales - Computerphile

6 months ago - 28:41

End to End Encryption (E2EE) - Computerphile

Computerphile

End to End Encryption (E2EE) - Computerphile

8 years ago - 8:12

Quick Sort - Computerphile

Computerphile

Quick Sort - Computerphile

12 years ago - 3:23

Turing's Enigma Problem (Part 1) - Computerphile

Computerphile

Turing's Enigma Problem (Part 1) - Computerphile

10 years ago - 19:00

What on Earth is Recursion? - Computerphile

Computerphile

What on Earth is Recursion? - Computerphile

11 years ago - 9:40

Ch(e)at GPT? - Computerphile

Computerphile

Ch(e)at GPT? - Computerphile

2 years ago - 13:52

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

Computerphile

Zip It! - Finding File Similarity Using Compression Utilities - Computerphile

12 days ago - 5:13

Internationalis(z)ing Code - Computerphile

Computerphile

Internationalis(z)ing Code - Computerphile

10 years ago - 8:18

No Regrets - What Happens to AI Beyond Generative? - Computerphile

Computerphile

No Regrets - What Happens to AI Beyond Generative? - Computerphile

5 months ago - 27:44

Why Use Binary? - Computerphile

Computerphile

Why Use Binary? - Computerphile

9 years ago - 8:29

PDF, What is it FOR? - Computerphile

Computerphile

PDF, What is it FOR? - Computerphile

8 years ago - 8:34

Bug in Binary Search - Computerphile

Computerphile

Bug in Binary Search - Computerphile

1 year ago - 11:31

Functional Programming & Haskell - Computerphile

Computerphile

Functional Programming & Haskell - Computerphile

8 years ago - 9:19

Deadly Truth of General AI? - Computerphile

Computerphile

Deadly Truth of General AI? - Computerphile

10 years ago - 8:30

Cracking Websites with Cross Site Scripting - Computerphile

Computerphile

Cracking Websites with Cross Site Scripting - Computerphile

11 years ago - 8:34

Key Exchange Problems - Computerphile

Computerphile

Key Exchange Problems - Computerphile

7 years ago - 9:18

How Blurs & Filters Work - Computerphile

Computerphile

How Blurs & Filters Work - Computerphile

9 years ago - 7:52

Cross Site Request Forgery - Computerphile

Computerphile

Cross Site Request Forgery - Computerphile

11 years ago - 9:20

A Helping Hand for LLMs (Retrieval Augmented Generation) - Computerphile

Computerphile

A Helping Hand for LLMs (Retrieval Augmented Generation) - Computerphile

10 months ago - 14:08

How Password Managers Work - Computerphile

Computerphile

How Password Managers Work - Computerphile

6 years ago - 12:09

Git Overview - Computerphile

Computerphile

Git Overview - Computerphile

3 years ago - 16:28

What is a Monad? - Computerphile

Computerphile

What is a Monad? - Computerphile

7 years ago - 21:50

Securing Stream Ciphers (HMAC) - Computerphile

Computerphile

Securing Stream Ciphers (HMAC) - Computerphile

7 years ago - 9:24

Parsing Explained - Computerphile

Computerphile

Parsing Explained - Computerphile

5 years ago - 14:58

Taming Kerberos - Computerphile

Computerphile

Taming Kerberos - Computerphile

5 years ago - 16:06

TLS Handshake Explained - Computerphile

Computerphile

TLS Handshake Explained - Computerphile

4 years ago - 16:59

The "Goodbye" Problem - Computerphile

Computerphile

The "Goodbye" Problem - Computerphile

9 months ago - 8:24

Just In Time (JIT) Compilers - Computerphile

Computerphile

Just In Time (JIT) Compilers - Computerphile

2 years ago - 10:41

Why do CPUs Need Caches? - Computerphile

Computerphile

Why do CPUs Need Caches? - Computerphile

9 years ago - 6:06

Garbage Collection (Mark & Sweep) - Computerphile

Computerphile

Garbage Collection (Mark & Sweep) - Computerphile

2 years ago - 16:22

Compression - Computerphile

Computerphile

Compression - Computerphile

12 years ago - 7:38

Generative Adversarial Networks (GANs) - Computerphile

Computerphile

Generative Adversarial Networks (GANs) - Computerphile

7 years ago - 21:21

Prime Numbers & RSA Encryption Algorithm - Computerphile

Computerphile

Prime Numbers & RSA Encryption Algorithm - Computerphile

4 years ago - 15:06

How YouTube Works - Computerphile

Computerphile

How YouTube Works - Computerphile

11 years ago - 8:25

Resizing Images - Computerphile

Computerphile

Resizing Images - Computerphile

8 years ago - 9:22

DeepSeek is a Game Changer for AI - Computerphile

Computerphile

DeepSeek is a Game Changer for AI - Computerphile

5 months ago - 19:58

What's Virtual Memory? - Computerphile

Computerphile

What's Virtual Memory? - Computerphile

3 years ago - 22:40

Holy Grail of AI (Artificial Intelligence) - Computerphile

Computerphile

Holy Grail of AI (Artificial Intelligence) - Computerphile

10 years ago - 7:40

The Perfect Code - Computerphile

Computerphile

The Perfect Code - Computerphile

8 years ago - 8:27

Programming Loops vs Recursion - Computerphile

Computerphile

Programming Loops vs Recursion - Computerphile

7 years ago - 12:32

How Bitcoin Works - Computerphile

Computerphile

How Bitcoin Works - Computerphile

9 years ago - 7:30

K-d Trees - Computerphile

Computerphile

K-d Trees - Computerphile

3 years ago - 13:20

DNS Cache Poisoning - Computerphile

Computerphile

DNS Cache Poisoning - Computerphile

5 years ago - 11:04

Magic "Nothing Up My Sleeve" Numbers - Computerphile

Computerphile

Magic "Nothing Up My Sleeve" Numbers - Computerphile

8 years ago - 5:32

Zig Zag Decryption - Computerphile

Computerphile

Zig Zag Decryption - Computerphile

9 years ago - 17:08

Turing Machine Primer - Computerphile

Computerphile

Turing Machine Primer - Computerphile

10 years ago - 5:52

Bitcoin Problems - Computerphile

Computerphile

Bitcoin Problems - Computerphile

9 years ago - 6:25

Double Ratchet Messaging Encryption - Computerphile

Computerphile

Double Ratchet Messaging Encryption - Computerphile

6 years ago - 11:39

Secrets Hidden in Images (Steganography) - Computerphile

Computerphile

Secrets Hidden in Images (Steganography) - Computerphile

9 years ago - 13:14

Apache Spark - Computerphile

Computerphile

Apache Spark - Computerphile

6 years ago - 7:40

Turing Complete - Computerphile

Computerphile

Turing Complete - Computerphile

9 years ago - 6:26

AI's Version of Moore's Law? - Computerphile

Computerphile

AI's Version of Moore's Law? - Computerphile

2 months ago - 13:06

How Face ID Works... Probably - Computerphile

Computerphile

How Face ID Works... Probably - Computerphile

6 years ago - 9:41

Lisp, The Quantum Programmer's Choice - Computerphile

Computerphile

Lisp, The Quantum Programmer's Choice - Computerphile

7 years ago - 6:36

ChatGPT with Rob Miles - Computerphile

Computerphile

ChatGPT with Rob Miles - Computerphile

2 years ago - 36:02

Almost All Web Encryption Works Like This (SP Networks) - Computerphile

Computerphile

Almost All Web Encryption Works Like This (SP Networks) - Computerphile

5 years ago - 12:19

BGP: Border Gateway Protocol - Computerphile

Computerphile

BGP: Border Gateway Protocol - Computerphile

9 years ago - 16:18

2FA: Two Factor Authentication - Computerphile

Computerphile

2FA: Two Factor Authentication - Computerphile

7 years ago - 12:34

Have You Been Pwned? - Computerphile

Computerphile

Have You Been Pwned? - Computerphile

6 years ago - 10:59

Deep Learning - Computerphile

Computerphile

Deep Learning - Computerphile

7 years ago - 8:27

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Computerphile

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

10 years ago - 22:49

A Universe of Triangles - Computerphile

Computerphile

A Universe of Triangles - Computerphile

11 years ago - 11:24

CPU vs GPU (What's the Difference?) - Computerphile

Computerphile

CPU vs GPU (What's the Difference?) - Computerphile

9 years ago - 6:39

Fuzzy Logic - Computerphile

Computerphile

Fuzzy Logic - Computerphile

11 years ago - 9:02

Detecting Faces (Viola Jones Algorithm) - Computerphile

Computerphile

Detecting Faces (Viola Jones Algorithm) - Computerphile

6 years ago - 12:55

Finding The Slope Algorithm (Forward Mode Automatic Differentiation) - Computerphile

Computerphile

Finding The Slope Algorithm (Forward Mode Automatic Differentiation) - Computerphile

5 months ago - 15:58

Where HTML beats C? - Computerphile

Computerphile

Where HTML beats C? - Computerphile

9 years ago - 9:48

AI Language Models & Transformers - Computerphile

Computerphile

AI Language Models & Transformers - Computerphile

6 years ago - 20:39

Spectre & Meltdown - Computerphile

Computerphile

Spectre & Meltdown - Computerphile

7 years ago - 13:45

LogJam Attack - Computerphile

Computerphile

LogJam Attack - Computerphile

2 years ago - 18:47

Why Information Theory is Important - Computerphile

Computerphile

Why Information Theory is Important - Computerphile

3 years ago - 12:33

AI's Game Playing Challenge - Computerphile

Computerphile

AI's Game Playing Challenge - Computerphile

9 years ago - 20:01

Chip & PIN Fraud Explained - Computerphile

Computerphile

Chip & PIN Fraud Explained - Computerphile

9 years ago - 8:45