Computerphile

Season 2017

Videos all about computers and computer stuff. Sister channel of Numberphile.

Where to Watch Computerphile • Season 2017

92 Episodes

  • Dijkstra's Algorithm
    E1
    Dijkstra's AlgorithmDijkstra's Algorithm finds the shortest path between two points. Dr Mike Pound explains how it works.
  • Funky Music from Functional Programming
    E2
    Funky Music from Functional ProgrammingFunctional Programming is often considered the stuffy tool of academics, but can it be used for creative and entertainment applications? Dr Henrik Nilsson demonstrates one application built with Reactive Functional Programming.
  • Computer Science ∩ Mathematics (Type Theory)
    E3
    Computer Science ∩ Mathematics (Type Theory)As computers are used more and more to confirm proofs, is it time to take computer science's contribution to mathematics further? Dr Thorsten Altenkirch discusses Type Theory vs Set Theory.
  • Program, Interrupted
    E4
    Program, InterruptedIn day to day life interruptions are annoying, but in computing they're essential. James Fowkes explains using an Arduino.
  • Code Checking Automation
    E5
    Code Checking AutomationThe original version of text messaging had a flaw, but how can we investigate problems with software quickly and easily? Professor John Hughes shows us how a modern tool can automate the process of code checking.
  • Linked Lists
    E6
    Linked ListsLinked Lists explained: Dr Alex Pinkney returns to Computerphile.
  • The Portable 'Speccy'
    E7
    The Portable 'Speccy'Characteristically ahead of his time, Clive Sinclair built his version of the iPad, back in the late '80's. Spencer shows us his "Cambridge Computer" Z88.
  • Lambda Calculus
    E8
    Lambda CalculusThe basis of almost all functional programming, Professor Graham Hutton explains Lambda Calculus.
  • Implementation
    E9
    ImplementationDicussing implementation with Professor Brailsford.
  • Digital Theatre Props
    E10
    Digital Theatre PropsBringing digital into interactive theatre. Roma Patel is a designer and member of the Mixed Reality Laboratory who is looking to computing to provide extra engagement with young theatre-goers.
  • Multiple Dimension Error Correction
    E11
    Multiple Dimension Error CorrectionAs communications become more complicated, the amount of bits required to succesfully correct an error increases, but by how much? Professor Brailsford talks multi-dimensional parity bits.
  • 3D Scanning
    E12
    3D ScanningTurning exquisitely painted miniatures into high definition 3d models using a camera and a turntable. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
  • A* (A Star) Search Algorithm
    E13
    A* (A Star) Search AlgorithmImproving on Dijkstra, A* takes into account the direction of your goal. Dr Mike Pound explains.
  • Augmented Reality & Wargaming
    E14
    Augmented Reality & WargamingUsing Optical Flow to position augmented reality content above wargaming scenes. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
  • Correcting Those Errors
    E15
    Correcting Those ErrorsThe powers of two and the algorithm that helps them correct errors. Professor Brailsford explains how to fix those one-bit blips.
  • Maze Solving
    E16
    Maze SolvingPutting search algorithms into practice. Dr Mike Pound reveals he likes nothing more in his spare time, than sitting in front of the TV coding.
  • General AI Won't Want You To Fix its Code
    E17
    General AI Won't Want You To Fix its CodePart 1 of a Series on AI Safety Research with Rob Miles. Rob heads away from his 'Killer Stamp Collector' example to find a more concrete example of the problem.
  • AI "Stop Button" Problem
    E18
    AI "Stop Button" ProblemHow do you implement an on/off switch on a General Artificial Intelligence? Rob Miles explains the perils.
  • The Perfect Code
    E19
    The Perfect CodeSumming up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains.
  • Google Tango
    E20
    Google TangoTaking Augmented Reality to the next level, Google's Tango uses depth cameras and lasers. Dimitri Darzentas demonstrates.
  • Microsoft Hololens
    E21
    Microsoft HololensSuperb integration, but a limited field of view, Dimitri Darzentas demonstrates the incredible Microsoft Hololens.
  • Inside the CPU
    E22
    Inside the CPUBubbles in the pipeline? Some of the basic operations at the heart of the CPU explained by Dr Steve Bagley.
  • The Blockchain & Bitcoin
    E23
    The Blockchain & BitcoinBlockchain is the underlying technology behind cryptocurrencies bringing together Merkle trees, Hashing & Distributed Architecture. Christopher Ellis explains.
  • End to End Encryption (E2EE)
    E24
    End to End Encryption (E2EE)End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Dr Mike Pound explains.
  • 64 Shades of Martian Grey
    E25
    64 Shades of Martian GreyNASA had to implement error correction for the spacecraft that travelled to Mars - Professor Brailsford explains how the Mariner series managed to send back pictures from another planet.
  • Reed-Muller Code (64 Shades of Grey pt2)
    E26
    Reed-Muller Code (64 Shades of Grey pt2)Deriving the Reed-Muller Code, used by Mariner 9 to send back pictures from Mars. Professor Brailsford shows how it can be coded recursively.
  • SHA: Secure Hashing Algorithm
    E27
    SHA: Secure Hashing AlgorithmSecure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.
  • Avoid the Middle-Man (Smart Contracts)
    E28
    Avoid the Middle-Man (Smart Contracts)Could Smart Contracts be the end for Uber, Amazon and eBay? Blockchain technology as an escrow service, Christopher Ellis explains.
  • Magic "Nothing Up My Sleeve" Numbers
    E29
    Magic "Nothing Up My Sleeve" NumbersHow are encryption standards constants chosen? Dr Mike Pound explains these not-so-magic numbers.
  • MegaProcessor
    E30
    MegaProcessorWalk around inside a working processor and see all the components operating. Jason Fitzpatrick shows us the Centre for Computer History's MegaProcessor .
  • Digital Audio Compression
    E31
    Digital Audio CompressionHow does rich audio compress to stream across the internet with little quality loss? Audio Analytic's Dr Chris Mitchell explains.
  • Data Harvesting Problem
    E32
    Data Harvesting ProblemHow do we control our own data while allowing it to be mined? Dr Richard Mortier of The University of Cambridge discusses some of the issues behind data harvesting.
  • Internet of Things Problems
    E33
    Internet of Things ProblemsA hacked car that could kill you should be more worrying than a thousand lightbulbs taking Facebook offline. University of Cambridge's Professor Ross Anderson explains why safety should be higher on the agenda than privacy.
  • Wana Decrypt0r (Wanacry Ransomware)
    E34
    Wana Decrypt0r (Wanacry Ransomware)$300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds.
  • How WanaCrypt Encrypts Your Files
    E35
    How WanaCrypt Encrypts Your FilesWanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work.
  • Sound Recognition
    E36
    Sound RecognitionHow do you go about making a device recognise individual sounds? Audio Analytic's Dr Chris Mitchell on how they approached the problem.
  • Computer Connections
    E37
    Computer ConnectionsRecently we took an old Sun server to pieces - Dr Bagley uses it to explain how most computers connect together
  • Onion Routing
    E38
    Onion RoutingWhat goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works.
  • Brain Controlled Movie
    E39
    Brain Controlled MovieA movie where you're deciding the edits, consciously and subconsciously. Richard Ramchurn and his brain controlled movies.
  • TOR Hidden Services
    E40
    TOR Hidden ServicesThe Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains.
  • Bell Labs' Research (Prof Brian Kernighan)
    E41
    Bell Labs' Research (Prof Brian Kernighan)We ask Bell Labs alumnus and 'C' expert Professor Brian Kernighan about research at Bell Labs
  • Concrete Problems in AI Safety (Paper)
    E42
    Concrete Problems in AI Safety (Paper)AI Safety isn't just Rob Miles' hobby horse, he shows us a published paper from some of the field's leading minds.
  • Sun Microsystems (Re-Encode)
    E43
    Sun Microsystems (Re-Encode)Computerphile helps Dr Steve Bagley clean up the Computer Science department's Sun server from the '80s
  • "Code" Books (Prof Brian Kernighan)
    E44
    "Code" Books (Prof Brian Kernighan)Brian Kernighan, the man who wrote the definitive book on C programming brings us up to date on his work over the last couple of years.
  • AI? Just Sandbox it...
    E45
    AI? Just Sandbox it...Why can't we just disconnect a malevolent AI? Rob Miles on some of the simplistic solutions to AI safety.
  • iPhone at Ten
    E46
    iPhone at TenThe iPhone is ten years old, Dr Bagley looks at life before the ubiquitous smartphone
  • Sun Server Restoration (Update)
    E47
    Sun Server Restoration (Update)It's three steps forward and two steps back as Dr Bagley continues his quest to restore the venerable Sun server...
  • Optical Character Recognition (OCR)
    E48
    Optical Character Recognition (OCR)OCR isn't just about scanning documents and digitizing old books. Explaining how it can work in a practical setting is Professor Steve Simske (Honorary Professor at the University of Nottingham as well as Director & Chief Technologist at HP Labs' Security Printing Solutions)
  • Arrays vs Linked Lists
    E49
    Arrays vs Linked ListsWhich is faster? The results *may* just surprise you. Dr 'Heartbleed' Bagley gives us an in depth shoot-out - Arrays vs Linked Lists...
  • Reason for ARM (Acorn Archimedes at 30)
    E50
    Reason for ARM (Acorn Archimedes at 30)Another home computer hits the big 3 0 ! But even if you've never heard of it, the Acorn Archimedes is the reason the ARM chip exists...
  • Now Hiring? (What Computing Companies Look For)
    E51
    Now Hiring? (What Computing Companies Look For)We ask Professor Steve Simske of HP Labs what it's like to interview for one of the big computing companies, what they're looking for and about his experiences of hiring...
  • Fake News Consumers
    E52
    Fake News ConsumersFacebook & fake news - Dr Stuart Moran is part of a team using eye-tracking to look at how people get conned by fake news stories.
  • GNU/Linux & Video Editing
    E53
    GNU/Linux & Video EditingRob Miles talks editing with GNU/Linux & free software.
  • Stop Button Solution?
    E54
    Stop Button Solution?After seemingly insurmountable issues with Artificial General Intelligence, Rob Miles takes a look at a promising solution: Cooperative Inverse Reinforcement Learning
  • Essentials: Brian Kernighan on Associative Arrays
    E55
    Essentials: Brian Kernighan on Associative ArraysThe 'Swiss Army Knife' of data structures, Professor Brian Kernighan talks about the associative array with beer & pizza.
  • Essentials: Functional Programming's Y Combinator
    E56
    Essentials: Functional Programming's Y CombinatorEncoding recursion in the Lambda calculus, one of Professor Graham Hutton's favourite functions.
  • Essentials: Pointer Power!
    E57
    Essentials: Pointer Power!Pointers are fundamental in programming and Professor Brailsford couldn't live without them!
  • Securing Stream Ciphers (HMAC)
    E58
    Securing Stream Ciphers (HMAC)Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains.
  • Why C is so Influential
    E59
    Why C is so InfluentialWhy is C such an influential language? We asked ardent C fan Professor Brailsford.
  • 2FA: Two Factor Authentication
    E60
    2FA: Two Factor AuthenticationJust what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor authentication.
  • Triple Ref Pointers
    E61
    Triple Ref PointersThe 'magic' trick of pointers to pointers - Professor Brailsford explains how what might seem complicated will actually simplify your code. (See Extra Bits video for a code walkthrough)
  • Designing Software for Collaboration
    E62
    Designing Software for CollaborationBuilding blocks and strawberry laces make collaborative software design childsplay - Dr Max Wilson
  • Cellphones & Big Data
    E63
    Cellphones & Big DataCellphone providers routinely collect data from you - ‎Data science PhD researcher and hackathon enthusiast Gregor Engelmann breaks it down.
  • Reacting to Social Media
    E64
    Reacting to Social MediaDiscussing how Social Media interfaces work with Dr Max Wilson.
  • Selfie to 3D Model
    E65
    Selfie to 3D ModelConverting a single 2D photo into a 3D model of your face. Convolutional Neural Networks are clever things. Aaron Jackson is part of the Computer Vision Laboratory at University of Nottingham.
  • Programming Loops vs Recursion
    E66
    Programming Loops vs RecursionProgramming loops are great, but there's a point where they aren't enough. Professor Brailsford explains.
  • Propositions as Types
    E67
    Propositions as TypesMathematics once again meets Computer Science as Professor Altenkirch continues to discuss Type Theory
  • Essentials: Hidden Pointers
    E68
    Essentials: Hidden PointersPointers are an essential element of computing. Dr Steve Bagley explains how everything rests on pointers.
  • AI YouTube Comments
    E69
    AI YouTube CommentsGenerating YouTube comments with a neural network trained on YouTube comments. What could possibly go wrong? Dr Mike Pound replied to our comment...
  • Homotopy Type Theory: Vladimir Voevodsky
    E70
    Homotopy Type Theory: Vladimir VoevodskyVoevodsky took his knowledge of abstract geometry and applied it to Computer Science, then took Computer Science principles and applied them to Mathematics. Professor Thorsten Altenkirch remembers him.
  • ESSENTIALS: Subroutines & The Wheeler Jump
    E71
    ESSENTIALS: Subroutines & The Wheeler JumpA true essential, the subroutine saves time, effort and helps avoid bugs. Dr Bagley explains why he has two essentials!
  • Homotopy Type Theory Discussed
    E72
    Homotopy Type Theory DiscussedDiscussing Homotopy Type Theory with Professor Thorsten Altenkirch.
  • Krack Attacks (WiFi WPA2 Vulnerability)
    E73
    Krack Attacks (WiFi WPA2 Vulnerability)Secure WiFi is broken - Dr Mike Pound & Dr Steve Bagley on the Krack Attack discovered by researchers in Belgium.
  • Generative Adversarial Networks (GANs)
    E74
    Generative Adversarial Networks (GANs)
  • Wildcards
    E75
    WildcardsWhat's going on when we search for *.docx? Dr Steve Bagley talks us through wild cards.
  • Scaling Blockchains
    E76
    Scaling BlockchainsScaling up blockchains is far from simple - Dr Shehar Bano of the Information Security Group at UCL dicusses some of the problems.
  • Computing Limit
    E77
    Computing LimitJust how far can we go with processing speed? Physicist Professor Phil Moriarty talks about the hard limits of computing.
  • Zero Knowledge Proofs
    E78
    Zero Knowledge ProofsHow do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains.
  • World's First Webcam
    E79
    World's First WebcamIn 1991 the web could only do text, but scientists at Cambridge Computer Laboratory were working with networked video.... Quentin Stafford-Fraser explains how this led to the first webcam.
  • 1978's Raspberry Pi (MK14)
    E80
    1978's Raspberry Pi (MK14)Sinclair computers (Timex in the US) was born out of a little known kit machine produced by 'Science of Cambridge' - Jason Fitzpatrick is from the Centre for Computing History in Cambridge.
  • Bitcoin, Blockchain Forks & Lightning
    E81
    Bitcoin, Blockchain Forks & LightningDiscussing Bitcoin scaling - Mustafa Al-Bassam of the UCL Security group talks about on-chain and off-Chain ideas.
  • MIDI & Digital Music Making
    E82
    MIDI & Digital Music MakingMIDI is still going strong after 34 years - Where is it used and how does it work? We asked David Domminney Fowler, Musician, Producer and Coder.
  • What is a Monad?
    E83
    What is a Monad?Monads sound scary, but Professor Graham Hutton breaks down how handy they can be.
  • Net Neutrality
    E84
    Net NeutralityThe current debate about Net Neutrality may not be as clear cut as you'd imagine. Professor Derek McAuley lays out the details.
  • Malware Overview
    E85
    Malware OverviewMalware comes in many shapes and sizes, here's an overview of how some of it works. Enrico Mariconti is part of the UCL Security group.
  • The Anonymisation Problem
    E86
    The Anonymisation ProblemKeeping data anonymous seems easy, but keeping identities separate is a big problem. Professor Derek McAuley explains.
  • Anti Bank-Fraud Technology
    E87
    Anti Bank-Fraud TechnologyWhat's being done to stop criminals in online banking? Dr Steven Murdoch (Principal Research Fellow) in the UCL Info Security Group.
  • Bluetooth & Sync
    E88
    Bluetooth & SyncHow do Bluetooth devices maintain audio/video sync? Dr Steve Bagley on the subtleties of sync.
  • Secret Key Exchange (Diffie-Hellman)
    E89
    Secret Key Exchange (Diffie-Hellman)How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens.
  • Diffie Hellman -the Mathematics bit
    E90
    Diffie Hellman -the Mathematics bitCorrection : as oodles of commenters have pointed out, the clock face should go from 0 to n-1. Also, worth reminding people that Mike has simplified the notation in this video (as he mentions).
  • Festive Fractals
    E91
    Festive FractalsFractals aren't just fascinating computer generated patterns, they could also be the key to future computer architecture. Professor Phil Moriarty explains.
  • Key Exchange Problems
    E92
    Key Exchange ProblemsDiffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in...

Take Plex everywhere

Watch free anytime, anywhere, on almost any device.
See the full list of supported devices