Computerphile

Season 2022

Videos all about computers and computer stuff. Sister channel of Numberphile.

Where to Watch Season 2022

41 Episodes

  • Man in the Middle & Needham–Schroeder Protocol
    E1
    Man in the Middle & Needham–Schroeder ProtocolThere's a reason Needham–Schroeder isn't used any more - Tim Muller demonstrates the weakness in the technique.
  • K-d Trees
    E2
    K-d TreesOne of the cleanest ways to cut down a search space when working out point proximity! Mike Pound explains K-Dimension Trees.
  • Metaverse is 30yrs old - Why Facebook is late to the party
    E3
    Metaverse is 30yrs old - Why Facebook is late to the partyThe Mixed Reality lab at the University of Nottingham has been studying virtual and augmented reality for decades. We chatted to Steve Benford, Paul Tennent & Edgard Bodiaj from the Mixed Reality Lab & Kate Wellham from Live Cinema about their system 'Bubbles' and how it fits with the current state of VR and the benefits over Zoom & Teams meetings. The VR environment shown in the video is not Meta/Facebook's 'Metaverse', it is a virtual environment created by the mixed reality lab at the University of Nottingham, used here to illustrate some of the benefits of VR over traditional online meetings.
  • Inside the Hidden Git Folder
    E4
    Inside the Hidden Git FolderGit doesn't actually perform magic, but it's pretty neat. Dr Max Wilson takes us through the various elements that make Git such a useful tool.
  • Git Version Control _final_new_final.new
    E5
    Git Version Control _final_new_final.newContinuing our look at Git, Dr Max Wilson has a quick look at versions and branches.
  • Internet Congestion Collapse
    E6
    Internet Congestion CollapseRemembering a time when connections were down to 40 bits per second, and the resulting algorithms still in use today! Dr Richard G Clegg of Queen Mary University London has the details.
  • Mythical Man Month
    E7
    Mythical Man MonthMany will have heard the phrase 'Mythical Man Month' and assume it's simply about whether manpower and time are interchangeable - the book is really about much more. Professor Brailsford explains how this all relates to the humble byte.
  • Apple M1 Ultra & NUMA
    E8
    Apple M1 Ultra & NUMAApple's latest M1 chip is two older chips bolted together, Dr. Steve Bagley explains how they made it work the same as a single chip.
  • Teamwork & Git
    E9
    Teamwork & GitComputer says no! What if two team members try to edit the same file in a project? Git has you covered - Dr Max Wilson explains how teams collaborate using Git.
  • High Level Languages & the IBM 360 Series
    E10
    High Level Languages & the IBM 360 SeriesContinuing on from the Professor's look at the Mythical Man Month, we're talking about whether IBM could have used high level languages in their groundbreaking 360 series.
  • Automating Boston Dynamics Spot Robot
    E11
    Automating Boston Dynamics Spot RobotCould robots like this be sent into nuclear facilities to autonomously deal with toxic waste? That's the plan. Nick & Michal from Oxford Robotics Institute demonstrate & explain their automation of the familiar yellow robot 'spot.' The project was the result of a collaboration between the Oxford Robotics Institute (particularly the DRS and GOALS groups) and Createc (createc.co.uk), and was supported by UKRI through the ISCF RAIN and ORCA Hubs, the AutoInspect project, and the EPSRC Programme Grant in Embodied Intelligence.
  • Square & Multiply Algorithm
    E12
    Square & Multiply AlgorithmHow do you compute a massive number raised to the power of another huge number, modulo something else? Dr Mike Pound explains the super-quick square & multiply algorithm.
  • Psychic Signatures (Java Vulnerability)
    E13
    Psychic Signatures (Java Vulnerability)The psychic paper in the TV show "Doctor Who" displays whatever the Doctor needs it to show at any given time. The Java vulnerability Neil Madden exposed is a digital version of this. Dr Mike Pound explains.
  • How WiFi Works
    E14
    How WiFi WorksWhy do WiFI speeds vary so much? Dr Steve Bagley demonstrates how even a poor signal for one person can affect those with a seemingly perfect signal!
  • Breaking RSA
    E15
    Breaking RSAIf you pick the wrong prime numbers, cracking RSA becomes a cinch. Dr Mike Pound explains the findings of researcher Hanno Böck.
  • Why Information Theory is Important
    E16
    Why Information Theory is ImportantZip files & error correction depend on information theory, Tim Muller takes us through how Claude Shannon's early Computer Science work is still essential today!
  • What's Virtual Memory?
    E17
    What's Virtual Memory?With the news Apple are implementing Virtual Memory on the iPad, Dr Steve Bagley takes us through what virtual memory is and how it works.
  • No, it's not Sentient
    E18
    No, it's not SentientA google researcher was put on leave because he apparently believed his AI project had become sentient. Dr Mike Pound discusses.
  • Reverse Engineering
    E19
    Reverse EngineeringYou just have the binary - can you work out what it does & how? Dr Steve Bagley talks about how you might reverse engineer a piece of software.
  • LaMDA Logic
    E20
    LaMDA LogicDiscussing the philosophical ideas behind AI Sentience, with Professor Mark Jago, Professor of Philosophy at University of Nottingham.
  • Computing with Soft Robots
    E21
    Computing with Soft RobotsEven the most impressive soft robots have an external control system. What if the software could be running on soft hardware? - Associate Professor Perla Maiolino explains the soft logic in soft robots.
  • Tricking AI Image Recognition
    E22
    Tricking AI Image RecognitionAI Object detection is getting better and better, but as Dr Alex Turner demonstrates, it's far from perfect, and it doesn't recognise things in the same way as us.
  • Scratch? Python? C? Kernighan on Languages for Kids Coding
    E23
    Scratch? Python? C? Kernighan on Languages for Kids CodingWe asked Brian Kernighan (author of 'C Programming Language') what language kids should try first.
  • Automated Mathematical Proofs
    E24
    Automated Mathematical ProofsCould a computer program find Fermat's Lost Theorem? Professor Altenkirch shows us how to get started with lean.
  • Coffee with Brian Kernighan
    E25
    Coffee with Brian KernighanWelcoming back the legend that is Professor Brian Kernighan! Professor Brailsford invites Brian for coffee and a chat.
  • SLAM Robot Mapping
    E26
    SLAM Robot MappingThis video features the Oxford Robotics Institute demonstrating their SLAM algorithm with their frontier device and the Boston Dynamics Spot robot. Thanks to Marco Camurri & Michal Staniaszek for their time.
  • Knowledge Graphs
    E27
    Knowledge GraphsKnowledge graphs help computers make sense of data for search, recommendations and other AI tasks, Professor Elena Simperl of Kings College London explains.
  • Alternative Uses for Blockchain
    E28
    Alternative Uses for BlockchainBlockchain has a controversial reputation, linked as it is to cryptocurrency but Professor Peter McBurney of Kings College London thinks it's an important an invention as the web itself.
  • Model Driven Software Engineering
    E29
    Model Driven Software EngineeringCould having more bespoke programming languages speed up software development? Dr Steffen Zschaler, Reader in Computer Science at KCL thinks so.
  • How AI Image Generators Work (Stable Diffusion / Dall-E)
    E30
    How AI Image Generators Work (Stable Diffusion / Dall-E)AI image generators are massive, but how are they creating such interesting images? Dr Mike Pound explains what's going on.
  • Uses of Information Theory
    E31
    Uses of Information TheoryLooking at some real world uses of information theory with Dr Tim Muller.
  • Stable Diffusion in Code (AI Image Generation)
    E32
    Stable Diffusion in Code (AI Image Generation)Mike Continues his look at AI Image Generation with Stable Diffusion.
  • Markov Decision Processes
    E33
    Markov Decision ProcessesDeterministic route finding isn't enough for the real world - Nick Hawes of the Oxford Robotics Institute takes us through some problems featuring probabilities.
  • Network Time Protocol (NTP)
    E34
    Network Time Protocol (NTP)Just how do computers synchronise clocks across the Internet? Dr Julian Onions implemented this at Nottingham after meeting the godfather of Internet time, Dave Mills!
  • Encryption & Entropy
    E35
    Encryption & EntropyInformation theory shows entropy works a little differently with encryption. Dr Tim Muller takes us through an example.
  • Legged Robots
    E36
    Legged RobotsHow do you make a legged robot robust when the environment is against it? Ioannis Havoutis of Oxford Robotics Institute walks us through it.
  • Just In Time (JIT)
    E37
    Just In Time (JIT)A look at why (under certain circumstances) JIT Compilers can be so much faster. Dr Laurence Tratt of KCL takes us through the details.
  • Verifying AI 'Black Boxes'
    E38
    Verifying AI 'Black Boxes'
  • Horrible, Helpful, http3 Hack
    E39
    Horrible, Helpful, http3 Hackhttp3 is here, but it wasn't an easy solution, Richard G Clegg of Queen Mary University London explains why he can't decide whether he loves it or hates it!
  • MDE under the Hood (Model Driven Engineering)
    E40
    MDE under the Hood (Model Driven Engineering)How does Model Driven Engineering work? Dr Steffen Zschaler, Reader in Computer Science at Kings College London takes us through it.
  • What do Computer Scientists Read?
    E41
    What do Computer Scientists Read?Throughout 2022 we asked the sound-check question "what's your favourite book?"

 

  •   
  •   
  •   
  •   
  •   
  •   
  •   

Take Plex everywhere

Watch free anytime, anywhere, on almost any device.
See the full list of supported devices