Computerphile

Season 2018

Videos all about computers and computer stuff. Sister channel of Numberphile.

Where to Watch Season 2018

90 Episodes

  • Spectre & Meltdown
    E1
    Spectre & MeltdownSpectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU hardware design flaws on an unprecedented scale.
  • The Archive (Centre For Computing History)
    E2
    The Archive (Centre For Computing History)A rare chance to look at the archives behind the Centre for Computing History (this is probably ten videos in one!) - thanks to Museum director Jason Fitzpatrick.
  • Compaq Portable (Halt & Catch Fire)
    E3
    Compaq Portable (Halt & Catch Fire)The Compaq portable was the first IBM compatible machine and its creation inspired the AMC TV Show "Halt and Catch Fire."
  • Elliptic Curves
    E4
    Elliptic CurvesJust what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains.
  • CPUs Are Out of Order
    E5
    CPUs Are Out of OrderSpectre and Meltdown showed up holes in the hardware implementation of CPUs, but what exactly are the exploits targetting? Dr Bagley dives into the detail.
  • Web Fonts
    E6
    Web FontsIn the first days of the web, font choice was down to the viewer - Dr Tamir Hassan on how things developed.
  • High Performance Computing (HPC)
    E7
    High Performance Computing (HPC)The High Performance Computing Installation at the University of Nottingham. Data Centre Operations Manager Chris Tadman shows us round.
  • Research & High Performance Computing
    E8
    Research & High Performance ComputingA supersized game of tetris - Dr Jim Wilson on scheduling High Performance Computing jobs and helping people get the best out of Nottingham's HPC.
  • Wheeler Jump
    E9
    Wheeler JumpProfessor Brailsford returns to the Wheeler Jump (as mentioned by Doctor Bagley in the Subroutine video)
  • Diceware & Passwords
    E10
    Diceware & PasswordsHow do you pick a secure password that's memorable but truly random? Dr Mike Pound explains Diceware
  • Von Neumann Architecture
    E11
    Von Neumann ArchitectureVon Neumann Architecture is how nearly all computers are built, but who was John Von Neumann and where did the architecture come from? Professor Brailsford tells us about 'Uncle Johnny'
  • Elliptic Curve Back Door
    E12
    Elliptic Curve Back DoorThe back door that may not be a back door... The suspicion about Dual_EC_DRBG - The Dual Elliptic Curve Deterministic Random Bit Generator - with Dr Mike Pound.
  • EDSAC Simulator
    E13
    EDSAC SimulatorPlay around with one of the first Von Neumann machines (well, in simulation!) Professor Brailsford shows us what EDSAC was capable of...
  • Tanglewood Update
    E14
    Tanglewood UpdateNearing completion, Matt's baby, Tanglewood, for Sega's veteran console, is being written purely in assembler - we caught up with him and the game a year on.
  • Bootstrapping EDSAC: Initial Orders
    E15
    Bootstrapping EDSAC: Initial OrdersHow did early computers like EDSAC deal with programs? Professor Brailsford on the code David Wheeler wrote to make people's life easier.
  • Assembly Programming & Colour
    E16
    Assembly Programming & ColourThe simple task of turning a screen red takes on new complications when you have no graphics libraries and no drivers - Assembly coding for the Sega Megadrive/Genesis with Matt Phillips.
  • Computers in Film & TV
    E17
    Computers in Film & TVHow does Hollywood recreate historical computing environments? With help from people like Jason at the Centre for Computing History.
  • Cold Noses & Thermal Images
    E18
    Cold Noses & Thermal ImagesThermal imaging to determine how difficult a task is - it comes down to 'nose temperature!' - Adrian Marinescu explains.
  • Social Media Data
    E19
    Social Media DataIf you're not the customer you are the product. Dr Max Wilson on the third party apps embedded in social media.
  • Stolen Bitcoin Tracing
    E20
    Stolen Bitcoin TracingWhen bitcoin is spent, remainders are re-encoded & combined - how do you separate out any ill-gotten gains from the legitimate hard-earned lucre? Outlining his team's solution: Professor Ross Anderson of the Computer Laboratory, University of Cambridge.
  • "War Games" IMSAI 8080
    E21
    "War Games" IMSAI 8080A teenager in his bedroom playing Global Thermonuclear War 'online' via his IMSAI 8080 in the classic movie War Games - Jason from the Centre for Computing History shows us their IMSAI 8080
  • Atomic Processing
    E22
    Atomic ProcessingContinuing to look at the limits of computing, Professor Moriarty on the grand idea of computing at the atomic level.
  • Atari 2600 VCS & Adventure
    E23
    Atari 2600 VCS & AdventureThe iconic Atari 2600 VCS inspired a generation of gamers. Jason Fitzpatrick from the Centre for Computing History on arguably the worlds' first console.
  • Why Bitcoin is Not Cash
    E24
    Why Bitcoin is Not CashBitcoin shouldn't be regulated because it works like cash. Professor Ross Anderson of University of Cambridge on why Bitcoin isn't cash.
  • Privacy "Underground"
    E25
    Privacy "Underground"With data leaks becoming common, people are concerned about protecting their own privacy. Kate Green held an open yet private session to educate others about online privacy: PrivacyUG.
  • Radio Shack's TRS80
    E26
    Radio Shack's TRS80Continuing our look at historic computers that feature in the book Ready Player One, Jason from Centre for Computing History shows us the TRS80
  • GOTO, Goto & Goto
    E27
    GOTO, Goto & GotoProfessor Brailsford on why Goto is frowned upon, and yes, we didn't mention Dijkstra this time.
  • Atari 2600 VCS Programming
    E28
    Atari 2600 VCS ProgrammingDelving into the arcane world ofcode for Atari 2600 VCS - programming one of the first Video Game Consoles - here's Dr Steve Bagley
  • Where did Bytes Come From?
    E29
    Where did Bytes Come From?Why do we have 8 bits in a byte? Professor Brailsford on the origins of the humble byte.
  • DEC PDP-11 & Zork
    E30
    DEC PDP-11 & ZorkDEC's legendary PDP-11 lives on in Aaron's collection.
  • IBM, EBCDIC & A Meg-In-A-Box
    E31
    IBM, EBCDIC & A Meg-In-A-BoxRemembering when IBM were the biggest computer company in the world. Professor Brailsford on EBCDIC and the 'Meg in a Box'
  • AI Gridworlds
    E32
    AI GridworldsSponsored by Wix Code: Check them out here: http://wix.com/go/computerphile
  • Lisp, The Quantum Programmer's Choice
    E33
    Lisp, The Quantum Programmer's ChoiceQuantum computing is so new it needs a flexible language for programming - Robert Smith of Rigetti Quantum Computing explains why he uses this 60 yr old language for cutting-edge work.
  • Code vs Data (Metaprogramming)
    E34
    Code vs Data (Metaprogramming)Why are code and data so separate? Robert Smith of Rigetti Quantum Computing explains how he uses Lisp code to generate Lisp data which he can use as Lisp code...
  • Hello World (Assemblers, Considered Harmful?!)
    E35
    Hello World (Assemblers, Considered Harmful?!)Using Hello World to show how assemblers keep track of memory - but at the expense of two passes through the computer.
  • Save our Software
    E36
    Save our SoftwareSee the Steve and Sir Martyn playing the game on our chemistry channel (Periodic Videos): https://youtu.be/cylNiU0mmHg
  • Current State of Quantum Computing
    E37
    Current State of Quantum ComputingWhere are we at with Quantum computing? Robert Smith (of Rigetti Computing) explains that we're in the EDSAC/ENIAC era.... see follow up video for more technical information:
  • Quantum Instruction Set
    E38
    Quantum Instruction SetJust what can you do with a quantum computer? Robert Smith of Rigetti Computing takes us through his quantum instruction set.
  • Deep Learning
    E39
    Deep LearningDeep Learning with Convolutional Neural Networks - Dr Mike Pound explains.
  • Encoder Decoder Network
    E40
    Encoder Decoder NetworkDeep Learning continued - the Encoder-Decoder network - Dr Mike Pound. For a background on CNNs it's worth watching this first: https://youtu.be/py5byOOHZM8
  • Bitcoin Mining in 4 Minutes
    E41
    Bitcoin Mining in 4 MinutesWhen a Bitcoin Miner Mines, what is happening? Dr Mike Pound exposes the process..
  • Bitcoin Power Problem
    E42
    Bitcoin Power ProblemComputations involved in mining Bitcoin are astronomical. Professor Phil Moriarty explains how estimating the energy useage is a Fermi problem.
  • Binary Coded Decimal (BCD) & Douglas Adams' 42
    E43
    Binary Coded Decimal (BCD) & Douglas Adams' 42Just how do you go from a binary number to a printed out numeric character? Professor Brailsford takes us through Binary Coded Decimal
  • Crypto-jacking
    E44
    Crypto-jackingCrypto-jacking or Drive-By Mining is the process of embedding cryptocurrency mining code in a website. Dr Mike Pound tries it out.
  • Binary to BCD (Double Dabble Algorithm)
    E45
    Binary to BCD (Double Dabble Algorithm)Double it and Dabble where required - The neat trick that turns pure binary into binary coded decimal. Professor Brailsford performs the magic!
  • Atomic Auto-focus
    E46
    Atomic Auto-focusMachine Learning has allowed nano-scientists to Autofocus their equipment for the first time - at an atomic level. Professor Moriarty on the paper he wishes his group had published.
  • Where GREP Came From
    E47
    Where GREP Came FromCommonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains.
  • Inside a Crypto-Mining Operation
    E48
    Inside a Crypto-Mining OperationEver wondered how mining operations work? Rob Morley from ORmining showed us around their setup.
  • Video Streaming Problems
    E49
    Video Streaming ProblemsWhy does my neighbour hear the score in the big game before I do? Dr Steve Bagley looks at why video streams suffer delays.
  • Brian Kernighan Q&A
    E50
    Brian Kernighan Q&AHear Brian Kernighan on how he got into programming, the successors of C and the biggest challenges...
  • Brian Kernighan Q&A 2/3
    E51
    Brian Kernighan Q&A 2/3Watch Part 3: https://youtu.be/E6vtRm5M8I0
  • Brian Kernighan Q&A 3/3
    E52
    Brian Kernighan Q&A 3/3
  • First Microcomputer OS: CP/M
    E53
    First Microcomputer OS: CP/MCP/M was the first microcomputer OS, yet it lost out to DOS and never recovered the ground. Spencer Owen explains
  • Driverless Pods
    E54
    Driverless PodsMobility isn't just about cars with autopilot, The Transport Systems Catapult in the UK has been looking at automated pod vehicles. Senior Technologist Rebecca Advani explains the LUTZ Pod system.
  • Using CP/M
    E55
    Using CP/MFollowing on from our look at the history of CP/M, Spencer takes us through using it.
  • What Happens When I Press a Key?
    E56
    What Happens When I Press a Key?Just what happens when you hit a key on a computer's keyboard? Dr Steve Bagley takes us on the keypress' journey....
  • How Software Deals with Key Presses
    E57
    How Software Deals with Key PressesOnce you've pressed a key on the keyboard and the signal gets to the computer, what happens next? Dr Steve Bagley on the software side of a key-press.
  • Omnidirectional VR Treadmill
    E58
    Omnidirectional VR TreadmillOriginally developed for Swedish Special Forces, the Omnideck could be heading to an arcade near you! Martin Pett of the Transport Systems Catapult showed us how it works.
  • Code Libraries
    E59
    Code LibrariesStandard progamming #INCLUDEs libraries - but how do they work? Dr Steve Bagley links us to the details.
  • Autodrive Project
    E60
    Autodrive ProjectDoes driverless technology have a place in public transport? These guys at Aurrigo think so. Tom Sheridan tells us more.
  • Exploiting the Tiltman Break
    E61
    Exploiting the Tiltman BreakProfessor Brailsford returns to the subject of why Colossus was built.
  • Laser Cut Music Box
    E62
    Laser Cut Music BoxA laser-cut Music Box. Ian from Nottingham Hackspace shows us his EMF2018 Project, which uses electronic MIDI music converted to paper tape...
  • GSM Phone on a Conference Badge
    E63
    GSM Phone on a Conference BadgeThe Electromagnetic Field Festival (EMF Camp) happens every two years - as an event for makers and those interested in tech, their conference badges are a bit special... Freelance PCB designer Matt Lloyd takes us through Tilda Mk.4 (delta)
  • Why Build Colossus? (Bill Tutte)
    E64
    Why Build Colossus? (Bill Tutte)Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed counting had to be automated - enter Colossus! Professor Brailsford takes up the story.
  • Musical Glove
    E65
    Musical GloveThe MiMu electronic glove musical instrument inspired Helen Leigh to create a kids version; the MiniMu - We caught up with her at EMF Camp.
  • World's Biggest Drivable Hexapod Robot
    E66
    World's Biggest Drivable Hexapod Robot
  • Hacked Star Map
    E67
    Hacked Star MapEMF Festival hosts all kinds of projects. Sarah Spencer's star map is a web-linked interactive star map created with a robot arm on a hacked knitting machine....
  • Discussion, Consumer Tech Stasis?
    E68
    Discussion, Consumer Tech Stasis?Have we hit pause on progress? Talking "Tech Stasis" with Science and Tech journalist Charles Arthur.
  • High Speed Internet in a Field
    E69
    High Speed Internet in a FieldEMF camp prides itself on it's connectivity - but how do you connect hundreds of campers to high speed internet when even the phone signal is patchy? DavidC @emfNOC gave us a tour.
  • AI & Logical Induction
    E70
    AI & Logical InductionContinuing to address the challenges of AI safety, Rob Miles discusses a paper from the Machine Intelligence Research Institute (MIRI).
  • 3D Light Cube
    E71
    3D Light CubeLorraine Underwood created this 3D light cube and shows it around the UK and Ireland.
  • Mini Battle Robot
    E72
    Mini Battle RobotIan Hayles shows us Reach Robotics' Mekamon battle robot.
  • Hardware Hacking
    E73
    Hardware HackingWith reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
  • Detecting Faces (Viola Jones Algorithm)
    E74
    Detecting Faces (Viola Jones Algorithm)Deep learning is used for everything these days, but this face detection algorithm is so neat its still in use today. Dr Mike Pound on the Viola/Jones algorithm.
  • Turing, Tutte & Tunny
    E75
    Turing, Tutte & TunnyProfessor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in Bill Tutte's work.
  • eXploit X : "Give Me Root"
    E76
    eXploit X : "Give Me Root"One line of code can get root access on many Linux systems. Dr Steve Bagley demos the exploit.
  • How Face ID Works... Probably
    E77
    How Face ID Works... ProbablyUnlocking a phone with a face? Why doesn't the phone need thousands of example pictures before it works? Dr Mike Pound explains how it might work...
  • Infinite Data Structures: To Infinity & Beyond!
    E78
    Infinite Data Structures: To Infinity & Beyond!Infinite data structures sound impossible. Professor Graham Hutton shows how laziness can win them over.
  • What's Behind Port Smash?
    E79
    What's Behind Port Smash?The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how.
  • Instant Messaging and the Signal Protocol
    E80
    Instant Messaging and the Signal ProtocolHow do instant message apps do end to end encryption when one phone may not even be switched on yet? Dr Mike Pound on the Signal protocol at the core of most messaging apps.
  • Endianness Explained With an Egg
    E81
    Endianness Explained With an EggByte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after something from an 18th century novel....
  • Double Ratchet Messaging Encryption
    E82
    Double Ratchet Messaging EncryptionHow does instant messaging encryption protect against attack? Dr Mike Pound on the double ratchet.
  • BEAST & The GPU Cluster
    E83
    BEAST & The GPU ClusterAfter our password cracking video people wanted to see "Beast" the machine Mike used. The team have been improving the setup though... Joe Best and Aaron Jackson explain.
  • MapReduce
    E84
    MapReducePeforming operations in parallel on big data. Rebecca Tickle explains MapReduce.
  • Multiple Processor Systems
    E85
    Multiple Processor SystemsJust what does it mean to have a multi-processor system? Dr Steve Bagley on symmetric and assymmetric multi-processor systems.
  • Apache Spark
    E86
    Apache SparkAnalysing big data stored on a cluster is not easy. Spark allows you to do so much more than just MapReduce. Rebecca Tickle takes us through some code.
  • Multithreading Code
    E87
    Multithreading CodeWe take multithreaded code for granted, but what's needed to make it work properly? We need two Dr Steve Bagleys to illustrate this!
  • What's your Favourite Programming Language? (sound check Q)
    E88
    What's your Favourite Programming Language? (sound check Q)For the past year, we've been asking this as a sound-check question. Here are the results!
  • Separable Filters and a Bauble
    E89
    Separable Filters and a BaubleHow do image processing apps and realtime applications apply effects so quickly? Dr Mike Pound decides to blur his Christmas Tree...
  • Additional Processors
    E90
    Additional ProcessorsAfter the multi-processor video we look at processors that are central-ish.... Dr Steve Bagley takes apart the old IBM PC.

 

  •   
  •   
  •   
  •   
  •   
  •   
  •   

Take Plex everywhere

Watch free anytime, anywhere, on almost any device.
See the full list of supported devices