We want to know what you want to see on this channel - leave a comment below or contact us via social media to let us know. We're listening!
Nottingham Hackspace member Michael Erskine has built an arcade machine to run his favourite game from his teens - Defender.
Cookies are controversial and new laws governing them have been introduced in Europe.
This is extra footage from Tom Rodden on tracking cookies and some of the controversy surrounding digital data. Video filmed and edited by Sean Riley.
Floppy disk drives make sweet music, well, tuneful noises anyway. You might have seen them on YouTube before, but how do they work? Now you can find out! Featuring Alex Pinkney from the University of Nottingham's Department of Computer Science.
Just what is an algorithm? - Before Computerphile delves into complex computer theory, we define algorithms and how they are used in Computer Science.
Abstraction is at the heart of everything to do with computing. James Clewett takes us through the layers abstracting the pixels forming this text on screen from the electrons in the computer.
Email is part of the daily routine for many people, but how does a computer deal with email messages? Professor Tom Rodden explains how email is processed so quickly.
The Raspberry Pi made waves when it was announced, but what is it? How is it built and what can you do with it? Matt Lloyd, IoT engineer at Ciseco and member of Nottingham's Hackspace talks it through.
Just who chose Computer Science before it existed as an academic subject? Emeritus Professor David Brailsford talks about how he started as a computer scientist. To be continued in further videos....
The BBC Microcomputer was one of the first home computers. Physicist Richard Hill explains how it inspired him.
How well sorted is your algorithm? Choosing the right method to sort numbers has a huge effect on how quickly a computer can process a task. Alex Pinkney talks about two popular sorting algorithms and how they 'scale up.'
Most of us deal with data compression on a daily basis, but what is it and how does it work? Professor David Brailsford introduces compression with regards to text and pictures.
Quick Sort is a popular sorting algorithm, but how does it work? Alex continues our exploration of sorting algorithms with a quick look at quick sort.
We rely on computers day-to-day, for most of us they are no longer just a luxury. What does it mean from a philosophical view-point; to live in the age of Hyper History? Luciano Floridi is Professor of Philosophy and UNESCO Chair in Information and Computer Ethics at the University of Hertfordshire, and Fellow of St Cross College, Oxford.
What's the absolute minimum you can compress data to? - Entropy conjures up visions of chemistry and physics, but how does it apply to binary codes and computer science? Professor David Brailsford continues his discussion of compression.
Elite was one of the first computer games to use 3d wireframe graphics and procedurally generated environments. Physicist Richard Hill shows us the game and explains how it inspired him.
Surfing the web and Internet stacks.
See how a Pick and Place robot works to complete a circuit board at Ciseco. Matt Lloyd takes us on a tour to illustrate how they design and make components and add-ons for the Raspberry Pi.
No internet, no networking; just a screen and a keyboard, or a pile of cards to punch holes in; mainframes were a world apart from today's smartphones and integrated circuits. Professor Brailsford remembers the Unix revolution.
IP addresses explained - what do these mysterious numbers and dots mean and how are they used? Richard Mortier explains the idea of the addresses behind the internet protocol.
His career in games has stretched from the earliest home video games to the latest - now he wants to inspire youngsters to get involved and obtain the skills to have their own career in the video games industry. Ian Livingstone is Life President of Square Enix and Eidos.
Devising codes for different weather states is all well and good, but what if the weather strikes back? Electrical storms can distort codes and noisy lines can confuse things, Professor Brailsford shows us one way of building redundancy into the system.
The sights and sounds of sorting! - Alex takes inspiration from our BBC microcomputer film and combines BASIC programming with some popular sorting algorithms.
What if the Universe is just a computer simulation? What is fundamental particles are really just "bits"?
CERN is a famous centre for scientific research, but it's also where the WWW was "invented". More about CERN's computing power coming soon!!!
How did punch card systems work? Professor Brailsford delves further into the era of mainframe computing with this hands-on look at punch cards.
Extra Bits of material about punch cards from Professor Brailsford.
Professor Brailsford discusses the odd mistake that may have been made, including the omission of a certain Richard Stallman from our Mainframes & Unix film!
IPv4 ran out of space, so how are we still all looking at the internet? - NAT has the answer! - Richard Mortier explains how the IP address space was expanded upon.
There are different styles of programming, some quite closely resemble pure mathematics. Mathematician and Computer Scientist Laurence Day compares two of them. Note: In the Java code the delimiters within the 'for' loop should be semi-colons, not commas. Apologies for the error.
The CERN computer grid processes the information from the world's most powerful particle accelerator. Brady gives us a tour of the heart of the operation: CERN's Tier 0.
What good is knowing you have a problem if you can't fix it? - Professor Brailsford explains Hamming Codes and how errors can not just be detected, but also corrected.
You, the Computerphile viewers sent us your code - Brady takes a first look at some of the things you sent us!
Deleting files may not mean they're gone. Even overwriting them isn't safe. Professor Derek McAuley explains.
Derek McAuley is professor of Digital Economy at University of Nottingham's School of Computer Science.
Representing symbols, characters and letters that are used worldwide is no mean feat, but unicode managed it - how? Tom Scott explains how the web has settled on a standard.
UTF8 is fantastic, but people still have translation issues with some characters - Tom explains why.
How are gesture controls turned into game commands? How can these gestures aid people in rehabilitation? Nottingham Trent University's Interactive Systems Research Group show us their work with wii and kinect technologies.
How far have we come with Artificial Intelligence? Are there intelligent machines, or have we changed the world to allow dumb machines to behave intelligently?
News stories surface every day about how National Security Agencies have broken encryption, but what is media 'hype' and what's the truth? - Richard Mortier explains.
The number of virtual machines has swelled due to cloud computing & changes to the X86 processor, but what are Virtual Machines and how do they run legacy software alongside cutting edge code? Derek McAuley explains.
Websites can still be hacked using SQL injection - Tom explains how sites written in PHP (and other languages too) can be vulnerable and have basic security issues.
CERN developed their 'Grid' before the world wide web took off. Maria and Andrzej explain how it does a lot more than just share the reams of data the Large Hadron Collider collects.
How do we derive the most compact codes for a situation? Huffman Trees can help. Professor Brailsford explains how computer scientists like their trees to be upside down.
More about Huffman trees and how they can even work for a trinary system.
JavaScript is dangerous! Why? How are websites vulnerable to it? Find out about bug-bounties from Tom Scott.
The Cloud is a term applied to seemingly anything internet related, but what is cloud computing and how is it different? Dr Taha Osman explains how cloud computing even powers pizza ordering portals.
Text compression methods such as LZ can reduce file sizes by up to 80%. Professor Brailsford explains the nuts and bolts of how it is done.
The LZ Compression technique implicitly works out its own probabilities for a given document. Professor Brailsford explains.
How many words can you type if you are restricted to a musical typewriter? HackSocNotts competed in a hack-athon and came up with this! Hackathons are endurance coding events which can lead to all sorts of strange hybrid ideas becoming reality.
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.
How does YouTube work and why do videos buffer? See more in the full description.
Security of users' passwords should be at the forefront of every web developer's mind. Tom takes us through the insecure ways in which some websites deal with passwords.
As two new games consoles are released on to the market - Ian talks about how gaming has instead been revolutionised by stealth - via smart-phones & tablets.
We see objects all the time and our brains decode the 3D shapes, but how do computers model these shapes and why break it all down to triangles?
If you don't secure your web forms, one mistaken click could be all it takes for your users to delete their own accounts. Tom Scott explains.
The Matrix" conjures visions of Keanu Reeves as Neo on the silver screen, but matrices have a very real use in manipulating 3D graphics. John Chapman explains the true power of the matrix.
Before laser-printers, high quality print-outs were the domain of typesetters, expensive and tightly controlled. In 1979 a Bell Labs team reverse engineered one in their summer vacation. Professor Brailsford has the details.
More information on the background of Printing and Typesetting to complement "The Great 202 Jailbreak" film which can be seen here: http://youtu.be/CVxeuwlvf8w
How do we go from 3D representations within a computer to pixels on a screen? John Chapman has the details!
Arduinos are used extensively in hobbyist electronics and hacker culture, but what is an arduino & how can you use them? Joe explains how they're used in both hobby projects and space programmes....
A web app that works out how many seconds ago something happened. How hard can coding that be? Tom Scott explains how time twists and turns like a twisty-turny thing. It's not to be trifled with!
Which triangles should be in front and which should be behind? The problems computers face when collapsing 3D graphics down to 2 dimensions.
The latest film of our series on graphics sees John Chapman turning the lights off to explain how we decide if a pixel is in light or shade...
Should computers evolve to read the environment we live in or should we change the environment to make it easier for machines to read? Barcodes and QR codes are ugly, Professor Steve Benford explains a different approach.
More information on Aestheticodes
If you thought mathematics exams were difficult, you should try printing them out! - Professor Brailsford takes us through Nottingham University's path to printing their own papers.
Why can't floating point do money? It's a brilliant solution for speed of calculations in the computer, but how and why does moving the decimal point (well, in this case binary or radix point) help and how does it get currency so wrong?
Professor Martyn Poliakoff from chemistry channel periodicvideos makes a cameo here on Computerphile... More from him at: http://www.youtube.com/periodicvideos
Making fonts look good at low resolutions - many thought the problem insolvable - two men started Adobe and proved them wrong. Professor David Brailsford renders the story.
Terms & Conditions as complicated to read as the epic poem Beowulf. How many times have you clicked 'agree' without reading any further? Professor Tom Rodden explains.
More information on just what Terms and Conditions can contain, and what that can mean for your data and your details. Professor Tom Rodden from the University of Nottingham.
Our thanks to them.
Whether you are a Mac-o-phile or a Mac-o-phobe it is hard to deny the impact of the original Mac. As Mac turns 30, Professor David Brailsford takes us through what the original Mac was like and how it helped people learn to love computers.
The Mac is 30. Love it or loathe it, it certainly had a large impact on the world of computing. Professor Brailsford has some Extra Bits for us.
In this era of invisible computing how do you define a computer? Professor Tom Rodden talks to Brady about what counts and what doesn't.
EXTRA BITS of Brady's conversation with Professor Tom Rodden about what makes a computer.
Rejuvenating an 'ancient' piece of technology for free with a new operating system. As Windows XP nears end-of-life, we look at whether we can re-purpose old bits of kit for free. Joe Nash gets hacking.
EXTRA BITS on the XP to Ubuntu Story.
EXTRA BITS on the XP to Ubuntu Story, here we see Joe re-build the bootable USB stick on his own machine in Ubuntu.
EXTRA BITS on the XP to Ubuntu Story. Having tried Ubuntu first, Joe installs it permanently on the old laptop, formatting the hard drive and erasing XP and the Dell Media Centre OS in the process.
Quality printing from your own home is taken for granted, but it wasn't always that way - The Apple Laserwriter gave the original Apple Mac a purpose and cemented its place in the creative industries. We hear from Professor David Brailsford.
DoS or Denial of Service Attacks are one thing, but Amplified Denial of Service Attacks could threaten the internet itself. Tom Scott explains what they are.
A little bit of magic - bootstrapping, allows the separation of code and machine, allowing one single piece of code to run on many different machines. Professor Tom Rodden introduces the idea.
Reverse Polish, or Postfix notation is commonly used in Computer Science, particularly in reference to Stacks - but what are stacks and how does postfix work? Professor David Brailsford takes us through it.
What better way to understand how a computer works than to build one from components. Spencer built a Z80 based machine from scratch at Nottingham Hackspace.
With Code.org in the US and the Next Gen report in the UK, there's currently a real push to include Computer Science in schools, but should everybody learn to code? Professor Tom Rodden talks to Brady
Whether its the Darwin Award nominees or simply another crazy cat, animated GIFs have a lot to answer for. They're also a perfect example of one of Computer Science's fundamental principles - Tom Scott explains.
The vending machine that Tweets when you buy a Twix - Nottingham Hackspace members have improved this eBay purchase with an Arduino... James explains just what it does and why.
PostScript is more than just a 2D graphics language, it's a fully operational programming language - Professor Brailsford explains how it works.
Moore's Law has held true for 40 years, but many say it will soon end - Can chip designers avoid the laws of physics? Professor Derek McAuley explains how chips are built.
We look at and run the code that exploits the Heartbleed bug. Dr. Steven Bagley takes us through the code and shows us how it works.
YouTube's algorithm connects you with videos you might like. What signals do they use to decide if a video will appeal? More from this interview soon.
How do YouTube decide which videos to recommend? - Cristos Goodrow from YouTube's Search & Discovery chats to Brady.
Who cares about privacy? - Professor Derek McAuley chats about the various problems with privacy online.
Opening up the impenetrable Mac - Just what is inside this 30 year old Macintosh? Dr Steve Bagley opens it up in order to upgrade it and show us how it works.
Recursion; like something from the film "Inception". Even Professor Brailsford says it can be hard to get your head around - watch him make it much easier to understand...
Over Computerphile's first year, we asked each contributor the question: "Mac or PC?" as part of our sound-check. Here are the answers...
Following on from our contentious 'Mac or PC' film, we asked Professor Tom Rodden just what the actual difference is between Mac and PC. (by PC we are referring to machines running Windows or a variant of Linux)
Why use Reverse Polish Notation? How does it relate to trees in Computer Science? Professor Brailsford explains how RPN arises naturally, as a linearized form of a tree.
What's the most ridiculous activity to do via text message? Joe decided on computer programming & entered a hackathon with a 'text by code' system last year... (he didn't win, maybe its not that ridiculous?)
Many of us use Location Services & GPS on smartphones but Cell Phone Companies have been able to track us for a long time. Professor Derek McAuley explains.
Real life isn't as simple as true or false - Fuzzy logic allows you to have degrees of truth, meaning computer programmes can deal with more diverse situations.
How or why would a computer ever panic? - What actually happens when things go wrong? Our own 'Dr Heartbleed' Steve Bagley with what happens when a computer crashes.
Following on from our film on recursion, Professor Brailsford uses the Fibonacci Sequence as a further demonstration of recursive programming.
How do logic gates store information? - We explore how computer memory works with Dr. Steve "Heartbleed" Bagley
Can Virtual Reality be used on aircraft to improve in-flight comfort? The VR Hyperspace project has been exploring that idea and ahead of a series of Computerphile films on VR, Dr Mirabelle D'Cruz introduces the idea.
The story of recursion continues as Professor Brailsford explains one of the most difficult programs to compute: Ackermann's function.
The Oculus Rift isn't the only way to experience Virtual Reality - A VR CAVE uses large screens and projectors to transform your environment.
Unicode is changing, adding tons more icons and smilies - But what's new and why? Tom Scott takes us through the improvements...
Borrowing from biology and implementing in binary, AIS closely follows immunology and uses it in many areas, including system security. Dr. Julie Greensmith of the University of Nottingham introduces the subject.
The closest thing to Star Trek's 'Holodeck' - a large scale tracking lab with VR headsets used to develop everything from redirected walking to quadcopter control algorithms.
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography
Tablets are taking over from desktop computing but what if we merge the two? This prototype demonstrates something new, that builds upon something centuries old - working with paper on your desk.
Catering for a global audience is difficult, Tom takes us through a 'timezones' style explanation of the things you need to keep in mind when internationalising your code.
Artificial Immune Systems are taking on board cutting edge immunology research and creating algorithms that exploit it. Dr Julie Greensmith explains The Danger Theory.
A practical demonstration of a theory in immunology called "The Danger Theory" that provided the source for the "Dendritic Cell Algorithm" mentioned in our main 'Danger Theory' film: http://youtu.be/urd4uWJ2rH4
This giant robot arm (usually seen on the factory floor) is being used to research the effects of in flight comfort for the VR Hyperspace project.
Alan Turing almost accidentally created the blueprint for the modern day digital computer. Here Mark Jago takes us through The Halting Problem.
What are the long term effects of wearing VR head-sets? Can you use VR to shrink your body and have the illusion of more space on board an aircraft?
Turing Machines are the basis of modern computing, but what actually is a Turing Machine? Assistant Professor Mark Jago explains.
The Busy Beaver game, pointless? Or a lesson in the problems of computability? - How do you decide if something can be computed or not?
This Primer is to accompany the 'Busy Beaver Turing Machines' film which can be viewed here: http://youtu.be/CE8UhcyJS0I
Artificial Intelligence can be thought of in terms of optimization. Robert Miles explains using the evolution's algorithm.
How does ADSL work and what are those noises Modems used to make?
Hyperspace was hijacked by science fiction, but what is a space? Robert Miles explains with the use of small red rabbits and human faces.
What was the first undecidable problem? Professor Brailsford takes us on a computerphile tangent & gives us his angle on a pre-computer example of undecidability.
With images copied via instant screen-grab & websites stripping metadata clean away where does it leave the creators? Professor Derek McAuley talks about the need for a digital exchange.
3D perspective personalised to multiple viewers of the screen - cutting edge research which Alex explains.
The Barber Paradox: Professor Brailsford continues the history of undecidability.
If musical instruments could speak, what stories could they tell? Professor Benford and his team have created an instrument that documents its own life - the Carolan Guitar
Shellshock is potentially a bigger problem than Heartbleed, as Dr Steve Bagley explains.
Taking a solemn oath to promise never to write a program that analyses other programs? - That's how Professor Brailsford felt when he first understood undecidability.
Why is it that PDFs look great and yet e-books can look ropey? - Dr Steve Bagley turns Brady into a computer to find out.
Extra Bits of Brady's interview with Dr Steve Bagley about e-reader text layout problems
Routers carry the traffic of the internet, we talk to Dr Richard Mortier about how they work and what happened to YouTube when a government censorship exercise went wrong.
Every spectator is a potential camera operator, that's the basis of this research into crowd-sourced event coverage. Dr Martin Flintham explains the idea.
Extra footage about crowd-sourcing event coverage, including how rights and bandwidth provide additional challenges to the idea.
What's the technical side of the net neutrality debate? We look at how a it works with a fictitious video streaming site. Dr Richard Mortier has the details.
Indoor navigation is tricky enough but try doing it in a swimming pool! Joe tells us how he's developed technology that could give you instant feedback on your swimming.
More information about the swimming tracking technology featured in our Swim Tracking App video: http://youtu.be/-UxBdVirvJs
Why the Free Software Foundation say iTunes isn't free software. Matt Lee, Technical Lead at Creative Commons explains.
This is an explanatory video to accompany the last Computerphile entitled 'Free Software' which had a couple of technical problems. This is not a tutorial, nor is it a recommendation, it is the story of Sean trying to make a Computerphile video with GNU free software.
ISPs don't always get it right - they gamble that all of their subscribers won't use all of their bandwidth all of the time. Dr Richard Mortier explains Statistical Multiplexing.
Free as in freedom, not free as in cost, but part of the deal is that the software code is released, so if there's always the ability to get the source code, where's the money in free software? Matt Lee explains.
The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII. Professor Brailsford takes us through just what Turing and his team were up against.
What happens when you click on a link? Dr Richard Mortier explains the mechanics of connecting you with your favourite website.
Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation Game, Professor Brailsford explains how they did it.
When YouTube was created, they had no idea that a video might amass over 2 billion views. Dr Steve Bagley explains why Psy's Gangnam Style music video forced YouTube to update their system.
Voting is centuries old, why can't we move with the times and use our phones, tablets and computers? Tom Scott lays out why e-voting is such a bad idea.
How can you make your holiday decorations more interesting? Add computer control! Dr 'Heartbleed' Steve Bagley shows us his setup.
Robots Automatically loading 3D Xray machines - but why? Professor Tony Pridmore explains how computer science is helping botanists to learn more about plant roots.
Main Film: http://youtu.be/Qrl__J4vYok
This installment of the Bletchley Park series has a personal note for Professor Brailsford. He tells us what his dad did in the war.
Circuits that use latches to store data are a cornerstone of computing. Dr Steve Bagley shows us how to put one together.
Pixar researcher Tony DeRose spoke to Brady over on Numberphile, here's some extra stuff from their conversation not used in the main video.
Back to basics, at the start of a series on binary numbers Professor Brailsford tackles binary addition and just what is meant by an overflow.
This Supercomputer is doing some of the most difficult computations in the world, about things that are out of this world.
What sorts of computations does the DIRAC supercomputer do and where do you start when you decide you want to build a supercomputer? Dr Mark Wilkinson from University of Leicester.
Negative Binary Numbers - you may have heard of 'signed' numbers, but do you know how they work? Professor Brailsford explains not just how, but why we use the systems we do.
The 4th dimension? A concept Marc ten Bosch has used to create an innovative game. We talk to him about developing Miegakure.
What was The Imitation Game? It inspired the name for the recent Alan Turing's movie but just what was it? Professor Brailsford explains how Turing may have been having a joke on us.
It became the music sequencing tool of choice for countless musicians, almost by chance. The Atari ST was launched 30yrs ago and Dr. Steve "Heartbleed" Bagley shows us his own extensive collection!
How are images represented in a computer? Image analyst & Research Fellow Mike Pound gives us a snapshot. (First in a series on computer vision)
How programmers found ways to push the hardware past its design limits. Dr "Heartbleed" Bagley shows us the rest of his Atari collection.
How do digital cameras turn light into the data that computers can handle? In this second part of our computer vision series, Image Analyst Mike Pound explains the Bayer Filter.
Each BIT in memory doesn't have it's own unique wiring, they share connections - Dr 'Heartbleed' Bagley explains how we address them.
After #thedress twitter-storm about what colour a dress appears to be in a photo, we asked image analyst Mike Pound to help ink in the details.
Basic logic gates explained and all the different ways they can be drawn and represented. Professor Brailsford takes us through the AND, OR & NOT logical operations.
He was on the team that invented the ARM chip, the BBC Microcomputer and got into computing in the 1970's because he wanted to build his own flight simulator. In 2014 he was awarded the Lovelace medal & is the ICL Professor of Computer Engineering at The University of Manchester. Computerphile talks to Professor Steve Furber
How computers represent more than 2 dimensions and how those dimensions can be used. Our series on digital images and computer vision continues with Image Analyst Mike Pound.
XOR, an essential logic operation, explained by Professor Brailsford. Continues our series on logic gates/operations.
Augmented Reality, also known as AR is finding its way into all of our mobile devices, is it a gimmick or a useful piece of technology? Matt Ramirez is a developer at Jisc, the charity championing digital tech in UK education and research.
It inspired a generation of coders and was in 80% of UK schools. The BBC Micro was built by Acorn (CPU) as part of a computer literacy project. Professor Steve Furber was part of the team who designed it.
Extra material from our main film "Building the BBC Micro" : https://youtu.be/y4WG549i3YY
Before floppy disks and the internet, computers transferred data to and from paper tape. Professor Brailsford explains.
What place do wearables have in AR? We ask AR Developer Matt Ramirez from Jisc.
What's a colourspace and why do we have different ones? It's horses for courses as Image Analyst Mike Pound explains.
Computer Memory Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckoxFPyhsMOYMGqyZOeN2SDJ
Hobbyist hackers and programmers use Arduinos extensively - but what is an Arduino made of? James Fowkes from Nottingham Hackspace explains.
JPEG Isn't a file format. Image Analyst Mike Pound explains why not in our first in a series about how JPEG works.
30 years ago, Acorn Computers switched on their first ever processor, the Acorn RISC Machine, or ARM. Now, they power 95% of smartphones & 12 billion ARM chips shipped last year. Professor Steve Furber (University of Manchester) speaks about how he and Sophie Wilson started the project.
Scrapped to make space for its successor, EDSAC is now being painstakingly rebuilt at The National Museum of Computing (TNMoC). 5 years in, Andrew Herbert tells about this remarkable machine.
Why can't artificial intelligence do what humans can? Rob Miles talks about generality in intelligence.
Video tour of the Centre for Computing History in Cambridge. Assistant Curator Jeremy shows us their vintage computers.
Data mining, why it's better than pure statistics. Professor Uwe Aickelin explains the basics of data mining.
Arguably the first personal computer, the Altair 8800 is the machine that inspired Steve Jobs and Bill Gates. Jason Fitzpatrick from the Centre for Computing History explains.
This is a re-upload of 'The Computer that Changed Everything' with the 'near ultrasonic' (16k) audio noise removed.
What's inside the case of this 40yr old Altair? Jason from the Centre for Computing History opens up this early machine to find some surprising changes.
DCT is the secret to JPEG's compression. Image Analyst Mike Pound explains how the compression works.
Colossus was one of the very first electronic, special purpose, computers and it was created almost two years earlier than the better known ENIAC. We visit Bletchley Park, home of the code breakers, and TNMoC, The National Museum of Computing. Professor Brailsford shows us the Colossus replica.
An Apple I was discovered in a pile of electronics. It sold for $200,000, but why so valuable? Dr Steve Bagley talks about this seminal machine.
Searching for the known unknown. Data mining & illegal immigration. Professor Uwe Aickelin explains how to mine data you don't even have.
Never use JPEG with text. But why? Image Analyst Mike Pound explains what goes wrong when JPEG tries to compress text.
Clive Sinclair had a vision, an elegant, affordable computer. Sold as Timex 1000 in the US, the ZX81 was cheap and cheerful; for many programmers, their first rung on the ladder of computing.
The danger of assuming general artificial intelligence will be the same as human intelligence. Rob Miles explains with a simple example: The deadly stamp collector.
One of the first computers in the world, EDSAC is being rebuilt at the National Museum of Computing at Bletchley Park. Andrew Herbert takes us on a walk around inside the computer.
If not for Apple, the company making ARM processors might never have existed and ARM could have disappeared with Acorn. Professor Steve Furber explains why.
Arduino devices are well known amongst hobbyists, but how do you get them to work? James Fowkes takes us through programming a 'sketch' (Arduino-speak for a program)
Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, they had no idea what it was and code-named it 'Tunny' (Tuna). Professor Brailsford explains why this relates to the early days of Computer Science
The UK's Government Communications Headquarters deal in classified material, but how to decide if a computer is secure? - GCHQ asked Professor Uwe Aickelin and his team to investigate a means of scoring computer systems.
How do computers recognise human faces? Associate Professor Dr Michel Valstar explains how the computer discerns faces, features & our expressions.
How do you use mathematics to help design a computer's user interface? Use Fitts's Law; Dr Sarah Wiseman explains.
What computing power could businesses or educational establishments expect in the mid '60's? Jeremy Thackray demos the Elliott 903.
An app that turns your phone into a pilot? Researchers at the University of Cambridge Computer Lab have built 'Captain Buzz' - Senior Research Associate Ramsey Faragher explains.
An app that lets your phone fly which you can control from a smart watch. Researchers at the University of Cambridge Computer Lab have built 'Captain Buzz' - Olly Chick explains how they dealt with the latency issues raised in part 1.
After the deadly stamp collector, what if we can't create something so powerful? But if we design an AI that's better at AI design than us? Robert Miles continues his discussion on AI.
Bell Labs pioneered some of the most important inventions of the 20th century, what was it like to be part of that? Professor Brian Kernighan was there.
Secret services want to read people's communications, politicians talk about terrorists, but what's the reality of banning encryption? Ross Anderson, Professor of Security Engineering at the Computer Laboratory, University of Cambridge explains how history repeats itself.
Secret texts buried in a picture of your dog? Image Analyst Dr. Mike Pound explains the art of steganography in digital images.
When your computer crashes and you lose everything it's annoying at best - What if you could fix it with blu tack? Jason Fitzpatrick from The Centre for Computing History on drawbacks of the Sinclair ZX81
Search Engines are a bit like the Public Library - You wouldn't wander around hoping to find the book you want, there's a system in place. Data is the same - Dr. Max Wilson Explains.
C" is one of the most widely used programming languages of all time. Prof Brian Kernighan wrote the book on "C", well, co-wrote it - on a visit to the University of Nottingham we asked him how it came about.
Email is an unwelcome distraction, so CS legend Don Knuth simply doesn't use it. He hasn't done since 1990. Brady asked him why.
The Human Brain Project is behind this attempt to build a million core brain simulator. Professor Steve Furber of the University of Manchester & one of the pioneers behind the original ARM chip, takes us through the SpiNNaker Project.
How faces are turned into points & shapes and recognised as features. Associate Professor Dr. Michel Valstar explains how pixels 'vote' for features.
We haven't got time to label things, so can we let the computers work it out for themselves? Professor Uwe Aickelin explains supervised and un-supervised methods of machine learning.
What is the singularity and will it ever happen? Dr Sean Holden of the University of Cambridge explains just how difficult Human Level AI is.
Inside one of the mysterious buildings that holds petabytes of data and crunches big numbers. Spencer Lamb shows us around a purpose built data centre in Slough in the UK, used by an organisation called Jisc/Janet which helps connect academic institutions together.
Before and After - how a data centre looks before the clients move in. Spencer Lamb shows us around.
XOR encryption is flawed. Professor Brailsford explains the zig-zag method that can reveal the precious key stream.
How getting something completely wrong can actually help you out. Professor Uwe Aickelin explains anti-learning.
Google It" has passed into common language, but how does Google rank pages? Dr Max Wilson explains page rank.
BWK, Professor Brian Kernighan visited Nottingham, so Professor Brailsford couldn't resist an 'on-camera' chat about Unix, Bell Labs and other aspects of Brian's glittering career.
Image filters make most people think of Instagram or Camera Phone apps, but what's really going on at pixel level? Image Analyst Dr Mike Pound explains some of the most common filters.
A Computerphile viewer asked the question: Why do we need IP addresses when every network interface has its own Mac address? - I put it to Dr Richard Mortier; University Lecturer in the Computer Laboratory at the University of Cambridge
Software doesn't deal well with missing data, so what can be done about it? Professor Uwe Aickelin talks about whether we need to replace it.
We rely on Chip & PIN machines to pay for things in a safe way, so how are they being compromised? Ross Anderson is Professor of Security Engineering at the Computer Laboratory, University of Cambridge.
Big data research needs high performance computing and fast networks but so do thousands of students watching Netflix. Jisc run Janet, the network that connects academia in the UK. Jeremy Sharp, Jisc's Director of Strategic Technologies takes us through their data centre installation.
Face detection isn't just about geometry. Associate Professor Dr Michel Valstar explains how Local Binary Patterns can be used to detect the edges in our features.
Lenovo sold thousands of computers all carrying the Superfish software. Tom Scott explains what a security nightmare this became.
How does digital audio work? Programmer, Producer and Professional Musician David Domminney Fowler takes us through the basics.
Just like humans organising to meet for coffee, computers need ways of organising themselves. Heidi Howard, of the System Research Group at University of Cambridge explains the basics.
Our eyes can spot edges with no problems, but how do computers determine what's an edge and what's not? Image Analyst Dr Mike Pound explains the Sobel Edge detector.
Three or four laws to make robots and AI safe - should be simple right? Rob Miles on why these simple laws are so complicated.
Taking edges one step further with Hysteresis Thresholding - The Canny Operator explained by Image Analyst Dr Mike Pound
Just what is a pipeline in the computer science sense? We asked Computer Science guru Professor Brian Kernighan
DFB explains why three letter abbreviations are so common in computer science. Unix & Bell Labs have a lot to answer for! (Professor David F Brailsford)
We've all heard of web browser caches, but why does a super fast modern CPU need a cache? Because it's too fast. Dr Steve "Heartbleed" Bagley explains.
A Picture says a thousand words, but even more musical notes! - David Domminney Fowler wrote a program that turns images into music.
Shoot first, focus later: How does a 'light field' camera work? We asked Image Analyst Dr Mike Pound.
A $5 computer - where's the catch? Well, there doesn't seem to be one. Dr Steve "Heartbleed" Bagley explains the Raspberry Pi Zero.
Surely decimal numbers are easier to understand than binary? So why don't computers use them? Professor Brailsford explains the relationships between binary, power and simplicity.
Digital currency, how does it work, what's a data miner and will Bitcoin last? We asked Professor Ross Anderson of the University of Cambridge Computer Laboratory.
Before each Computerphile interview we asked guests and regular contributors about their first computer.
A camera that uses a micro lens array to create a depth map. Dr Mike Pound explains a more expensive type of light-field camera used in industry.
What does a GPU do differently to a CPU and why don't we use them for everything? First of a series from Jem Davies, VP of Technology at ARM.
A search engine can return thousands of web pages, but how does it know whether they are relevant or not? First step is how to measure relevance, as Dr Max Wilson explains.
Using a Brain Scanner to monitor 'Human CPU load'? Horia Maior shows us how it works.
A short jumble of letters & symbols that plays a long, musical tune? This is code Golf and Rob Miles' musical composition: "The Bitshift Variations in C minor"
Uncomputable through to finite state - Professor Brailsford explains Chomsky's hierarchy.
ARM technology dominates mobile processors, but how, when they don't actually make chips? Jem Davies from ARM explains.
They're called 'Finite State Automata" and occupy the centre of Chomsky's Hierarchy - Professor Brailsford explains the ultimate single purpose computer.
Off the peg digital cameras that digitize prehistoric rock art and turn them into huge 3D point clouds. Axel Pinz explains the 3D Pitoti Scanner.
RISC processors kept things simple, but when do you need to make your hardware more complicated and when can you leave it to the software? We asked ARM's Jem Davies.
Where did 'Angle Brackets' or 'Pointy Brackets' come from? Professor Brailsford explains some of the essential notation for Computer Science.
Safety in AI is important, but more important is to work it out before working out the AI itself. Rob Miles on AI safety.
Creating 3D models with an Octocopter, a camera and some custom software. Christian Mostegel, Research Assistant at TU Graz in Austria explains some of the technology behind the 3D Pitoti Project.
Finite State Automata meets Recursion. Professor Brailsford continues the story of computers without memory.
Bitcoin may be doomed to failure as the blockchain struggles to scale up; Professor Ross Anderson from the University of Cambridge explains.
This Lego drone has a mind of its own (kind of) - Luke Geeson shows us a Lego Mindstorm car hacked together with a Raspberry Pi.
Building a chip for a smartphone or tablet, where do you start? ARM's Jem Davies talks about the 'horse trading.'
If you've wondered how computer scientists use pairs of cameras to reconstruct a 3D scene, Image Analyst & Lecturer Dr Mike Pound explains.
Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike Pound details how it's done.
Should Apple unlock a terrorists iPhone for the FBI? Professor Ross Anderson explains how this is a "Pandora's Box" situation.
Virtual Reality is once again in fashion, devices like Oculus Rift & Hololens push VR & AR into the spotlight, Professor Steve Benford explains the concept of Mixed Reality
Using Pong to demonstrate the strengths of Object Oriented Programming. Dr Steve Bagley explains
AlphaGo beat the Go World Champion 4-1. Why do the creators not know how? Brais Martinez is a Research Fellow & Deep Learning expert at the University of Nottingham.
Websites & https what difference does the "s" make anyway? - Dr Richard Mortier of the University of Cambridge Computer Laboratory explains.
AlphaGo is beating humans at Go - What's the big deal? Rob Miles explains what AI has to do to play a game.
Also known as "Zombie Armies", what exactly are botnets? Sheharbano Khattak of the University of Cambridge Computer Lab explains.
Marco Arment made his name developing Tumblr but is now an independent app developer and technology commentator. He works mainly on web and iPhone software.
Continuing our chat with web and iPhone software developer Marco Arment - checking out his desk and equipment...
Marco Arment, among other things, is the developer of the Overcast podcast app.
A bit more from of our interview with app developer Marco Arment - who also moonlights as a podcaster and "controversial blogger?"
Why all the confusion, surely SGML, HTML & XML are just different versions of the same thing? Professor Brailsford on the perils of '*ML'
Governments can censor access to the web, but how do they restrict access? Sheharbano Khattak, Research Assistant at the University of Cambridge Computer Laboratory takes us through the methods.
Google, Facebook & Amazon all use deep learning methods, but how does it work? Research Fellow & Deep Learning Expert Brais Martinez explains.
SGML 'theologians' were at war with Internet browser 'pragmatists' after Sir Tim Berners-Lee released HTML on the world. Professor Brailsford watched it happen
A follow up chat related to Professor Brailsford's HTML videos.
The Democracy of computer collaboration, PAXOS is a method for ensuring networked computers reach agreement. Heidi Howard of the University of Cambridge Computer Laboratory explains.
There's no central control over the internet, networks have to work together. Dr Tim Griffin of the University of Cambridge & formerly Bell Labs explains whysome things can't be simplified.
Variable Data Printing (VDP) allows industrial printers to vary details on bulk print runs - Why? and how does it work? We asked Steve Simske; Honorary Professor at the University of Nottingham as well as Director & Chief Technologist at HP Labs' Security Printing Solutions
Removing voxels until the shape emerges. Space Carving is a kind of virtual sculpture. Image Analyst Dr Mike Pound explains how though it's a bit rough and ready, it can be lightning fast.
Conductive Ink, Colour Shifting Ink and clever printing algorithms are used as anti-counterfeiting measures, HP Labs' Steve Simske is an Honorary Professor at the University of Nottingham
Years of work down the drain, the convolutional neural network is a step change in image classification accuracy. Image Analyst Dr Mike Pound explains what it does.
Before flash memory became commonplace, people relied heavily on floppy disks to store their data. Dr Steve Bagley takes us through the basics of magnetic media.
The ultimate example of trouble from digital promiscuity. HTML is more tolerant than C because it has to be. Professor Brailsford explains.
Cookie Monster isn't the only one fond of cookies - thieves on the Internet are partial too. Dr Mike Pound demonstrates & explains the art of cookie stealing.
Software Defined Networking takes the control away from basic protocols and gives it to the programmers. Cutting edge companies like Google use it to manage their global Network. Dr Richard Mortier of the University of Cambridge Computer Laboratory explains.
Steve Wozniak got creative with the Apple ][ floppy drive, creating a system that used less complicated hardware and was cheaper, accomplishing much in software instead. Dr Steve Bagley explains.
Early home computing often involved soldering your machine together and fighting for time on the family TV. Jason Fitzpatrick, Director of The Centre for Computing History talks about his first computing love affair, the Nascom 2.
Just how bad is it if your site is vulnerable to an SQL Injection? Dr Mike Pound shows us how they work.
To explain the deep web and the dark web, first we lay out the basic difference between The Internet and the World Wide Web. Dr Max Wilson explains
Deep and Dark web are often getting confused - Dr Max Wilson untangles the difference.
Do we only see what we want to see in our Social Media feeds? Dr Max Wilson talks about the social media bubble and how elections and referenda aren't swayed by a few likes and shares.
The professor took a lot of stick for calling HTML a programming language - here he shows why it can be described as a language, albeit a special purpose one.
Just what is happening inside a Convolutional Neural Network? Dr Mike Pound shows us the images in between the input and the result.
What does it mean for something to be Turing Complete? Professor Brailsford explains.
Games to play, games to create, games to help shape, the National Video Arcade sets out to be a museum like no other. Director Iain Simons shows us around.
Beast' cracks billions of passwords a second, Dr Mike Pound demonstrates why you should probably change your passwords...
NOTE : if you know how the Pokémon game works skip to 4 mins in.
How do you pick the perfect password? Is it as simple as XKCD make out, or is there more to it? Dr Mike Pound follows on from his password cracking video.
The game that shows people how games are made. Alex is an engineer at the National Videogame Arcade in Nottingham.
Bletchley Park was dilapidated and running out of money. Dr Sue Black campaigned to save Bletchley, and to tell the story of the people who worked there.
Mobile apps almost always use a 'stop to interact' model, Dr Joe Marshall takes us through the design problems of mobile interfaces.
Get your soldering iron out and build your own 1970's home computer! Spencer takes us through one retro kit.
50p, 60p, 25p, not UK prices, but frame rates, but what are frame rates? Dr Steve Bagley explains why digital video looks different at different FPS.
Why do computers have such a hard time showing TV footage? Dr Steve Bagley unlaces the problem.
You can't beat physics. Why the chip manufacturers are heading for a wall. We asked nano-scientist Phil Moriarty Professor of Physics in the School of Physics and Astronomy, University of Nottingham
What's in a name badge? Well in this case a microprocessor, LCD display, Gyro, WiFi and all sorts of things. Rob Miles discusses the Electromagnetic Field 2016 name badge.
Surreal images created by Google's Deep Dream code flooded the internet in 2015 but how does deep dream do it? Image analyst Dr Mike Pound.
Steve Jobs demoed the Apple Laserwriter only after John Warnock had massaged the code. Professor Brailsford explains that if you need speed it can be worth ditching structured code and flattening your program.
Nearest Neighbour and BiLinear resize explained by Dr Mike Pound
K-means sorts data based on averages. Dr Mike Pound explains how it works.
Postscript took off like a rocket but PDF took its time, many people wondering "What's it for?" Professor Brailsford's experience with one such person - a US immigration officer...
We all rely on sat nav systems, but how do they work? Here to discuss is Steve Fuller of GRACE (Geospatial Research and Applications Centre of Excellence) at Nottingham Geospatial Institute
The IBM PC running DOS set a new standard for Personal Computing but IBM lost control, Dr Steve Bagley explains where it started.
To Conclude Professor Brailsford's series on PDF he discusses how PDFs are created.
An Ambitious project to recreate the Domesday book for the modern age, but already the machinery is obsolete. Roger Moore talks us through the BBC Domesday system.
How computers helped revolutionise the way aircraft traffic is managed. John Linford, Chairman of the TNMOC Members' Club explains.
Not enough just to crunch numbers in Air Traffic Control, you have to be able to display those numbers. John Linfield takes us through the kit.
Often described as the UK's answer to Steve Jobs, Clive Sinclair created a strong brand and his ground-breaking products and their low prices helped the UK's computing boom in the 1980's
How can a file take up no space on disk? Dr Steve Bagley explains how '0' size files can exist.
Dirty Cow has been there for years, and it affects all kinds of devices. Dr Steve Bagley demostrates how dangerous it is.
Dirty Cow is a serious security flaw. Dr Steve Bagley takes us through the details.
A security exploit using standard Windows commands which can lie undetected. Dr Steve Bagley explains the latest revealed exploit.
Dash and Bash is a videogame where you have to get physical to win. Alistair Aitcheson explains his installation at the National Videogame Arcade in Nottingham.
Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death. Dr Mike Pound explains.
Quantum Computing offers a potential sea-change in computer power, but what are the issues with it, why aren't we all using quantum iphones already? Associate Professor Dr Thorsten Altenkirch.
Charles Babbage's Analytical Engine was designed as the first Turing complete computer - before Turing was even born. Sadly it was never built. Professor Brailsford explains with the help of Sydney Padua's illustrations.
Two different sorting algorithms are actually the same. Professor Graham Hutton explains.
Scaling images is usually smoother using bicubic interpolation. Dr Mike Pound explains why.
The web didn't spring out of nothing. People had been considering & building hypertext type systems since the 40's. Dr Tim Brailsford (no relation to Professor Dave!) explains
Just what is functional programming? We asked a member of the team that created Haskell: John Hughes, Professor of Computer Science at Chalmers University of Technology in Gothenburg.
Coding an entire game in assembler. Matt Phillips is creating a brand new game for a 25 year old console.
Professor Brailsford discusses Charles Babbage, the genius behind the Analytical Engine.
Lazy eyes have been treated the same way for a hundred years. These guys have developed a system of computer games that may replace the humble eye patch. Dr Peter Blanchfield and Peter LaValle explain the project.
Just how do you turn basic number crunching into a physics system for gaming? Video Games programmer Matt Phillips explains.
Ada Lovelace became known as the world's first computer programmer - Professor Brailsford on how being poet Byron's daughter inadvertently sent her down a scientific path.
They starting coding aged 12 on the family TV and turned their passion into a big business. From Robin Hood to Chicken Run, the list of videogames is Dizzying. We went to the National Videogame Arcade in Nottingham to meet The Oliver Twins.
Discussing web links with Dr Tim Brailsford.
Dijkstra's Algorithm finds the shortest path between two points. Dr Mike Pound explains how it works.
Functional Programming is often considered the stuffy tool of academics, but can it be used for creative and entertainment applications? Dr Henrik Nilsson demonstrates one application built with Reactive Functional Programming.
As computers are used more and more to confirm proofs, is it time to take computer science's contribution to mathematics further? Dr Thorsten Altenkirch discusses Type Theory vs Set Theory.
In day to day life interruptions are annoying, but in computing they're essential. James Fowkes explains using an Arduino.
The original version of text messaging had a flaw, but how can we investigate problems with software quickly and easily? Professor John Hughes shows us how a modern tool can automate the process of code checking.
Linked Lists explained: Dr Alex Pinkney returns to Computerphile.
Characteristically ahead of his time, Clive Sinclair built his version of the iPad, back in the late '80's. Spencer shows us his "Cambridge Computer" Z88.
The basis of almost all functional programming, Professor Graham Hutton explains Lambda Calculus.
Dicussing implementation with Professor Brailsford.
Bringing digital into interactive theatre. Roma Patel is a designer and member of the Mixed Reality Laboratory who is looking to computing to provide extra engagement with young theatre-goers.
As communications become more complicated, the amount of bits required to succesfully correct an error increases, but by how much? Professor Brailsford talks multi-dimensional parity bits.
Turning exquisitely painted miniatures into high definition 3d models using a camera and a turntable. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
Improving on Dijkstra, A* takes into account the direction of your goal. Dr Mike Pound explains.
Using Optical Flow to position augmented reality content above wargaming scenes. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
The powers of two and the algorithm that helps them correct errors. Professor Brailsford explains how to fix those one-bit blips.
Putting search algorithms into practice. Dr Mike Pound reveals he likes nothing more in his spare time, than sitting in front of the TV coding.
Part 1 of a Series on AI Safety Research with Rob Miles. Rob heads away from his 'Killer Stamp Collector' example to find a more concrete example of the problem.
How do you implement an on/off switch on a General Artificial Intelligence? Rob Miles explains the perils.
Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains.
Taking Augmented Reality to the next level, Google's Tango uses depth cameras and lasers. Dimitri Darzentas demonstrates.
Superb integration, but a limited field of view, Dimitri Darzentas demonstrates the incredible Microsoft Hololens.
Bubbles in the pipeline? Some of the basic operations at the heart of the CPU explained by Dr Steve Bagley.
Blockchain is the underlying technology behind cryptocurrencies bringing together Merkle trees, Hashing & Distributed Architecture. Christopher Ellis explains.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Dr Mike Pound explains.
NASA had to implement error correction for the spacecraft that travelled to Mars - Professor Brailsford explains how the Mariner series managed to send back pictures from another planet.
Deriving the Reed-Muller Code, used by Mariner 9 to send back pictures from Mars. Professor Brailsford shows how it can be coded recursively.
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.
Could Smart Contracts be the end for Uber, Amazon and eBay? Blockchain technology as an escrow service, Christopher Ellis explains.
How are encryption standards constants chosen? Dr Mike Pound explains these not-so-magic numbers.
Walk around inside a working processor and see all the components operating. Jason Fitzpatrick shows us the Centre for Computer History's MegaProcessor .
How does rich audio compress to stream across the internet with little quality loss? Audio Analytic's Dr Chris Mitchell explains.
How do we control our own data while allowing it to be mined? Dr Richard Mortier of The University of Cambridge discusses some of the issues behind data harvesting.
A hacked car that could kill you should be more worrying than a thousand lightbulbs taking Facebook offline. University of Cambridge's Professor Ross Anderson explains why safety should be higher on the agenda than privacy.
$300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds.
Wanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work.
How do you go about making a device recognise individual sounds? Audio Analytic's Dr Chris Mitchell on how they approached the problem.
Recently we took an old Sun server to pieces - Dr Bagley uses it to explain how most computers connect together
What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works.
A movie where you're deciding the edits, consciously and subconsciously. Richard Ramchurn and his brain controlled movies.
The Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains.
We ask Bell Labs alumnus and 'C' expert Professor Brian Kernighan about research at Bell Labs
AI Safety isn't just Rob Miles' hobby horse, he shows us a published paper from some of the field's leading minds.
Computerphile helps Dr Steve Bagley clean up the Computer Science department's Sun server from the '80s
Brian Kernighan, the man who wrote the definitive book on C programming brings us up to date on his work over the last couple of years.
Why can't we just disconnect a malevolent AI? Rob Miles on some of the simplistic solutions to AI safety.
The iPhone is ten years old, Dr Bagley looks at life before the ubiquitous smartphone
It's three steps forward and two steps back as Dr Bagley continues his quest to restore the venerable Sun server...
OCR isn't just about scanning documents and digitizing old books. Explaining how it can work in a practical setting is Professor Steve Simske (Honorary Professor at the University of Nottingham as well as Director & Chief Technologist at HP Labs' Security Printing Solutions)
Which is faster? The results *may* just surprise you. Dr 'Heartbleed' Bagley gives us an in depth shoot-out - Arrays vs Linked Lists...
Another home computer hits the big 3 0 ! But even if you've never heard of it, the Acorn Archimedes is the reason the ARM chip exists...
We ask Professor Steve Simske of HP Labs what it's like to interview for one of the big computing companies, what they're looking for and about his experiences of hiring...
Facebook & fake news - Dr Stuart Moran is part of a team using eye-tracking to look at how people get conned by fake news stories.
Rob Miles talks editing with GNU/Linux & free software.
After seemingly insurmountable issues with Artificial General Intelligence, Rob Miles takes a look at a promising solution: Cooperative Inverse Reinforcement Learning
The 'Swiss Army Knife' of data structures, Professor Brian Kernighan talks about the associative array with beer & pizza.
Encoding recursion in the Lambda calculus, one of Professor Graham Hutton's favourite functions.
Pointers are fundamental in programming and Professor Brailsford couldn't live without them!
Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains.
Why is C such an influential language? We asked ardent C fan Professor Brailsford.
Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor authentication.
The 'magic' trick of pointers to pointers - Professor Brailsford explains how what might seem complicated will actually simplify your code. (See Extra Bits video for a code walkthrough)
Building blocks and strawberry laces make collaborative software design childsplay - Dr Max Wilson
Cellphone providers routinely collect data from you - Data science PhD researcher and hackathon enthusiast Gregor Engelmann breaks it down.
Discussing how Social Media interfaces work with Dr Max Wilson.
Converting a single 2D photo into a 3D model of your face. Convolutional Neural Networks are clever things. Aaron Jackson is part of the Computer Vision Laboratory at University of Nottingham.
Programming loops are great, but there's a point where they aren't enough. Professor Brailsford explains.
Mathematics once again meets Computer Science as Professor Altenkirch continues to discuss Type Theory
Pointers are an essential element of computing. Dr Steve Bagley explains how everything rests on pointers.
Generating YouTube comments with a neural network trained on YouTube comments. What could possibly go wrong? Dr Mike Pound replied to our comment...
Voevodsky took his knowledge of abstract geometry and applied it to Computer Science, then took Computer Science principles and applied them to Mathematics. Professor Thorsten Altenkirch remembers him.
A true essential, the subroutine saves time, effort and helps avoid bugs. Dr Bagley explains why he has two essentials!
Discussing Homotopy Type Theory with Professor Thorsten Altenkirch.
Secure WiFi is broken - Dr Mike Pound & Dr Steve Bagley on the Krack Attack discovered by researchers in Belgium.
What's going on when we search for *.docx? Dr Steve Bagley talks us through wild cards.
Scaling up blockchains is far from simple - Dr Shehar Bano of the Information Security Group at UCL dicusses some of the problems.
Just how far can we go with processing speed? Physicist Professor Phil Moriarty talks about the hard limits of computing.
How do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains.
In 1991 the web could only do text, but scientists at Cambridge Computer Laboratory were working with networked video.... Quentin Stafford-Fraser explains how this led to the first webcam.
Sinclair computers (Timex in the US) was born out of a little known kit machine produced by 'Science of Cambridge' - Jason Fitzpatrick is from the Centre for Computing History in Cambridge.
Discussing Bitcoin scaling - Mustafa Al-Bassam of the UCL Security group talks about on-chain and off-Chain ideas.
MIDI is still going strong after 34 years - Where is it used and how does it work? We asked David Domminney Fowler, Musician, Producer and Coder.
Monads sound scary, but Professor Graham Hutton breaks down how handy they can be.
The current debate about Net Neutrality may not be as clear cut as you'd imagine. Professor Derek McAuley lays out the details.
Malware comes in many shapes and sizes, here's an overview of how some of it works. Enrico Mariconti is part of the UCL Security group.
Keeping data anonymous seems easy, but keeping identities separate is a big problem. Professor Derek McAuley explains.
What's being done to stop criminals in online banking? Dr Steven Murdoch (Principal Research Fellow) in the UCL Info Security Group.
How do Bluetooth devices maintain audio/video sync? Dr Steve Bagley on the subtleties of sync.
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens.
Correction : as oodles of commenters have pointed out, the clock face should go from 0 to n-1. Also, worth reminding people that Mike has simplified the notation in this video (as he mentions).
Fractals aren't just fascinating computer generated patterns, they could also be the key to future computer architecture. Professor Phil Moriarty explains.
Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in...
Spectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU hardware design flaws on an unprecedented scale.
A rare chance to look at the archives behind the Centre for Computing History (this is probably ten videos in one!) - thanks to Museum director Jason Fitzpatrick.
The Compaq portable was the first IBM compatible machine and its creation inspired the AMC TV Show "Halt and Catch Fire."
Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains.
Spectre and Meltdown showed up holes in the hardware implementation of CPUs, but what exactly are the exploits targetting? Dr Bagley dives into the detail.
In the first days of the web, font choice was down to the viewer - Dr Tamir Hassan on how things developed.
The High Performance Computing Installation at the University of Nottingham. Data Centre Operations Manager Chris Tadman shows us round.
A supersized game of tetris - Dr Jim Wilson on scheduling High Performance Computing jobs and helping people get the best out of Nottingham's HPC.
Professor Brailsford returns to the Wheeler Jump (as mentioned by Doctor Bagley in the Subroutine video)
How do you pick a secure password that's memorable but truly random? Dr Mike Pound explains Diceware
Von Neumann Architecture is how nearly all computers are built, but who was John Von Neumann and where did the architecture come from? Professor Brailsford tells us about 'Uncle Johnny'
The back door that may not be a back door... The suspicion about Dual_EC_DRBG - The Dual Elliptic Curve Deterministic Random Bit Generator - with Dr Mike Pound.
Play around with one of the first Von Neumann machines (well, in simulation!) Professor Brailsford shows us what EDSAC was capable of...
Nearing completion, Matt's baby, Tanglewood, for Sega's veteran console, is being written purely in assembler - we caught up with him and the game a year on.
How did early computers like EDSAC deal with programs? Professor Brailsford on the code David Wheeler wrote to make people's life easier.
The simple task of turning a screen red takes on new complications when you have no graphics libraries and no drivers - Assembly coding for the Sega Megadrive/Genesis with Matt Phillips.
How does Hollywood recreate historical computing environments? With help from people like Jason at the Centre for Computing History.
Thermal imaging to determine how difficult a task is - it comes down to 'nose temperature!' - Adrian Marinescu explains.
If you're not the customer you are the product. Dr Max Wilson on the third party apps embedded in social media.
When bitcoin is spent, remainders are re-encoded & combined - how do you separate out any ill-gotten gains from the legitimate hard-earned lucre? Outlining his team's solution: Professor Ross Anderson of the Computer Laboratory, University of Cambridge.
A teenager in his bedroom playing Global Thermonuclear War 'online' via his IMSAI 8080 in the classic movie War Games - Jason from the Centre for Computing History shows us their IMSAI 8080
Continuing to look at the limits of computing, Professor Moriarty on the grand idea of computing at the atomic level.
The iconic Atari 2600 VCS inspired a generation of gamers. Jason Fitzpatrick from the Centre for Computing History on arguably the worlds' first console.
Bitcoin shouldn't be regulated because it works like cash. Professor Ross Anderson of University of Cambridge on why Bitcoin isn't cash.
With data leaks becoming common, people are concerned about protecting their own privacy. Kate Green held an open yet private session to educate others about online privacy: PrivacyUG.
Continuing our look at historic computers that feature in the book Ready Player One, Jason from Centre for Computing History shows us the TRS80
Professor Brailsford on why Goto is frowned upon, and yes, we didn't mention Dijkstra this time.
Delving into the arcane world ofcode for Atari 2600 VCS - programming one of the first Video Game Consoles - here's Dr Steve Bagley
Why do we have 8 bits in a byte? Professor Brailsford on the origins of the humble byte.
DEC's legendary PDP-11 lives on in Aaron's collection.
Remembering when IBM were the biggest computer company in the world. Professor Brailsford on EBCDIC and the 'Meg in a Box'
Sponsored by Wix Code: Check them out here: http://wix.com/go/computerphile
Quantum computing is so new it needs a flexible language for programming - Robert Smith of Rigetti Quantum Computing explains why he uses this 60 yr old language for cutting-edge work.
Why are code and data so separate? Robert Smith of Rigetti Quantum Computing explains how he uses Lisp code to generate Lisp data which he can use as Lisp code...
Using Hello World to show how assemblers keep track of memory - but at the expense of two passes through the computer.
See the Steve and Sir Martyn playing the game on our chemistry channel (Periodic Videos): https://youtu.be/cylNiU0mmHg
Where are we at with Quantum computing? Robert Smith (of Rigetti Computing) explains that we're in the EDSAC/ENIAC era.... see follow up video for more technical information:
Just what can you do with a quantum computer? Robert Smith of Rigetti Computing takes us through his quantum instruction set.
Deep Learning with Convolutional Neural Networks - Dr Mike Pound explains.
Deep Learning continued - the Encoder-Decoder network - Dr Mike Pound. For a background on CNNs it's worth watching this first: https://youtu.be/py5byOOHZM8
When a Bitcoin Miner Mines, what is happening? Dr Mike Pound exposes the process..
Computations involved in mining Bitcoin are astronomical. Professor Phil Moriarty explains how estimating the energy useage is a Fermi problem.
Just how do you go from a binary number to a printed out numeric character? Professor Brailsford takes us through Binary Coded Decimal
Crypto-jacking or Drive-By Mining is the process of embedding cryptocurrency mining code in a website. Dr Mike Pound tries it out.
Double it and Dabble where required - The neat trick that turns pure binary into binary coded decimal. Professor Brailsford performs the magic!
Machine Learning has allowed nano-scientists to Autofocus their equipment for the first time - at an atomic level. Professor Moriarty on the paper he wishes his group had published.
Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains.
Ever wondered how mining operations work? Rob Morley from ORmining showed us around their setup.
Why does my neighbour hear the score in the big game before I do? Dr Steve Bagley looks at why video streams suffer delays.
Hear Brian Kernighan on how he got into programming, the successors of C and the biggest challenges...
Watch Part 3: https://youtu.be/E6vtRm5M8I0
CP/M was the first microcomputer OS, yet it lost out to DOS and never recovered the ground. Spencer Owen explains
Mobility isn't just about cars with autopilot, The Transport Systems Catapult in the UK has been looking at automated pod vehicles. Senior Technologist Rebecca Advani explains the LUTZ Pod system.
Following on from our look at the history of CP/M, Spencer takes us through using it.
Just what happens when you hit a key on a computer's keyboard? Dr Steve Bagley takes us on the keypress' journey....
Once you've pressed a key on the keyboard and the signal gets to the computer, what happens next? Dr Steve Bagley on the software side of a key-press.
Originally developed for Swedish Special Forces, the Omnideck could be heading to an arcade near you! Martin Pett of the Transport Systems Catapult showed us how it works.
Standard progamming #INCLUDEs libraries - but how do they work? Dr Steve Bagley links us to the details.
Does driverless technology have a place in public transport? These guys at Aurrigo think so. Tom Sheridan tells us more.
Professor Brailsford returns to the subject of why Colossus was built.
A laser-cut Music Box. Ian from Nottingham Hackspace shows us his EMF2018 Project, which uses electronic MIDI music converted to paper tape...
The Electromagnetic Field Festival (EMF Camp) happens every two years - as an event for makers and those interested in tech, their conference badges are a bit special... Freelance PCB designer Matt Lloyd takes us through Tilda Mk.4 (delta)
Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed counting had to be automated - enter Colossus! Professor Brailsford takes up the story.
The MiMu electronic glove musical instrument inspired Helen Leigh to create a kids version; the MiniMu - We caught up with her at EMF Camp.
EMF Festival hosts all kinds of projects. Sarah Spencer's star map is a web-linked interactive star map created with a robot arm on a hacked knitting machine....
Have we hit pause on progress? Talking "Tech Stasis" with Science and Tech journalist Charles Arthur.
EMF camp prides itself on it's connectivity - but how do you connect hundreds of campers to high speed internet when even the phone signal is patchy? DavidC @emfNOC gave us a tour.
Continuing to address the challenges of AI safety, Rob Miles discusses a paper from the Machine Intelligence Research Institute (MIRI).
Lorraine Underwood created this 3D light cube and shows it around the UK and Ireland.
Ian Hayles shows us Reach Robotics' Mekamon battle robot.
With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
Deep learning is used for everything these days, but this face detection algorithm is so neat its still in use today. Dr Mike Pound on the Viola/Jones algorithm.
Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in Bill Tutte's work.
One line of code can get root access on many Linux systems. Dr Steve Bagley demos the exploit.
Unlocking a phone with a face? Why doesn't the phone need thousands of example pictures before it works? Dr Mike Pound explains how it might work...
Infinite data structures sound impossible. Professor Graham Hutton shows how laziness can win them over.
The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how.
How do instant message apps do end to end encryption when one phone may not even be switched on yet? Dr Mike Pound on the Signal protocol at the core of most messaging apps.
Byte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after something from an 18th century novel....
How does instant messaging encryption protect against attack? Dr Mike Pound on the double ratchet.
After our password cracking video people wanted to see "Beast" the machine Mike used. The team have been improving the setup though... Joe Best and Aaron Jackson explain.
Peforming operations in parallel on big data. Rebecca Tickle explains MapReduce.
Just what does it mean to have a multi-processor system? Dr Steve Bagley on symmetric and assymmetric multi-processor systems.
Analysing big data stored on a cluster is not easy. Spark allows you to do so much more than just MapReduce. Rebecca Tickle takes us through some code.
We take multithreaded code for granted, but what's needed to make it work properly? We need two Dr Steve Bagleys to illustrate this!
For the past year, we've been asking this as a sound-check question. Here are the results!
How do image processing apps and realtime applications apply effects so quickly? Dr Mike Pound decides to blur his Christmas Tree...
After the multi-processor video we look at processors that are central-ish.... Dr Steve Bagley takes apart the old IBM PC.
Moving on from crude error correction to more sophisticated methods, Professor Brailsford demostrates using the ISBN 'book code'.
Why some numbers just dont work when you're creating error proof codes. Professor Brailsford continues with the story of ISBN.
Netflix's interactive film 'Black Mirror: Bandersnatch' included an Easter Egg. Dr Bagley uses it to explain how computers used to store data on audio cassettes.
Secure Copy is flawed, and the flaw goes back over 30 years. Dr Steve Bagley explains just how 'secure' it is.
Nottingham Hackspace, or Nottinghack has starred in the background of numerous Computerphile videos, but what is a hack-space? We asked 'Fire-pong' and 'Laser-cut Pipe Organ' maker & Nottinghack Trustee Ian Dickinson for a tour.
Why encrypted group messaging isn't as secure as point to point. Dr Mike Pound explains this ongoing problem.
Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley.
Snake-like locomotion has all sorts of possible applications for robots. Dr Henry C. Astley from the Biomimicry Research & Innovation Center at the University of Akron, USA shows us their robo-snake.
Fish locomotion is being researched by Stephen Howe at the Biomimicry Research & Innovation Center at the University of Akron, USA
How do Madden, FIFA, PGA Tour get that lovely shallow depth of field in real time? Dr Mike Pound explains how Complex Gaussian Blurs can be separable.
Parsing applies to human language as much as computer code. Giancarlo Sandoval on the basics of parsing.
A high level look at Reed Solomon - Professor Brailsford explains the basics of this complicated encoding technique.
Can deep learning improve your gaming experience? We have no idea but we know how it works. Dr Mike Pound on Deep Learned Super Sampling
Swarm robotics involve multiple robots cooperating. Researchers at Kirstin Petersen's Lab at Cornell are looking at soft robots as an affordable option. Grad Student Steven Ceron showed us some of the projects in the lab.
How much does a floating point processor improve floating point operations? Dr Bagley installed one to find out - and explains how computers store the bits.
Continuation of Dr Bagley's explanation of Floating Point Numbers: https://youtu.be/f4ekifyijIg
Would you type your password into a random box on the internet? Dr Mike Pound on ensuring your password hasn't already been hacked.
What's the simplest program you can write? Dr Steve Bagley on the layers of abstraction that bulk up Hello World.
Why has it gone quiet on graphene? We asked Sixty Symbols' Professor Laurence Eaves, who was part of the team who built the first graphene transistor.
How do we represent multiple greys with simple black or white pixels? Dr Bagley joins the dots!
Wires, chips, hand-written key caps, somehow this early version of the Sinclair ZX Spectrum survived. Jason Fitzpatrick of the Centre for Computing History demonstrates.
Machine Learning where you put in a fraction of the effort? What's not to like? - Dr Michel Valstar explains Active & Cooperative Learning.
The smarter way to dither. Dr Bagley takes us through the Floyd-Steinberg error diffusion dithering technique.
Commodore was a massive US computer company, but this machine was almost unknown outside a few European countries. CCH's Adrian shows us the 116, part of his personal collection.
Who's in control? The real difference between programming for command line, or programming for GUI. Dr Steve Bagley introduces the differences between the two.
On the "C16," Commodore slashed costs while other manufacturers added RAM - This didn't stop marketing from selling the machine though. Software houses had to do their best....
Taking chatbots to the next level, with emotion recognition and gesture control. Dr Michel Valstar on Virtual Humans.
Password1 is a terrible password, but how can I remember different secure passwords for each login? Use a password manager. Dr Mike Pound explains how they work.
Drawing windows and responding to events - what's going on 'under the hood' in your GUI? Dr Steve Bagley.
Understanding one of the most commonly used methods of transferring data from one machine to another.
With all this talk of Big Data, we got Rebecca Tickle to explain just what makes data into Big Data.
Before typed code, there was toggled code. We get hands on with a PDP recreation based on a Raspberry Pi.
Big Data is one thing, but what do you do if that data is constantly changing? Rebecca Tickle on Dynamic data.
After a recent collaboration with an artist, Professor Moriarty is exploring whether the physics within patterns and art can be exploited for computation.
How do you compile a compiler? Professor Brailsford starts to unpick the idea of bootstrapping.
Fingerprint scanners are everywhere, Dr Isaac Triguero talks about how your fingerprint can identify you.
Plausible text generation has been around for a couple of years, but how does it work - and what's next? Rob Miles on Language Models and Transformers.
We talk to Alex from LowSpecGamer about how he gets modern games to run on less capable hardware.
GPT-2, the Language model that shocked the world with its entirely fictitious story about the unicorns inhabiting a secret South American valley. Rob Miles explains
Dr Mike Pound introduces a ten videos on data analysis: From 0-9.
Big Data does not equate to Big Knowledge - unless you use data analysis. This is part 0 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
What is data? Dr Mike Pound begins to formalise this much used word. This is part 1 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
Seeing is believing - Dr Mike Pound helps us understand how to turn our datapoints into Powerpoints. This is part 2 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
A clean sweep. How to get rid of the unnecessary clutter in your data 'house' - Dr Mike Pound on Data Cleaning. This is part 3 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
A litre of fuel but a pint of milk - time to get all your data in the right units. Don't let Dr Mike's measuring habits put you off! This is part 4 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
Too much data? Dr Mike Pound on how best to reduce your dataset. This is part 5 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
PCA - Principle Component Analysis - finally explained in an accessible way, thanks to Dr Mike Pound. This is part 6 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
Grouping similar things together - either users with similar habits, or products in an online shop. Dr Mike Pound on Clustering. This is part 7 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
For your eyes only! Classifying data isn't a spy trick. Dr Mike Pound creates a decision tree automatically from a data set. This is part 8 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
Real life doesn't fit into neat categories - Dr Mike Pound on some different ways to regress your data. This is part 9 of the Data Analysis Learning Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckpfMu_4Ff8E7Z1behQks5ba
More examples of how GPT-2 pays attention to things. Rob Miles
Using T-Diagrams, Professor Brailsford shows us how to take our compiler to the next level.
Why didn't OpenAI release their "Unicorn" GPT2 large transformer? Rob Miles suggests why it might not just be a a PR stunt.
Professor Brailsford with an example of what he had to do when Computer A didn't talk to Computer B.
GANs are powerful but difficult to balance - Dr Mike Pound explores the CycleGAN - two GANs set up together.
Multitasking is a hoax - clever techniques mean that your CPU is shuffling between lots of tasks, but doing them one at a time. Dr Steve Bagley regenerates his clones to explain...
Substitution-permutation networks are the basis for almost all modern symmetric cryptography. Dr Mike Pound explains.
A quick tour of the Raspberry Pi 4 edited on the Raspberry Pi 4. Dr Steve Bagley gets out his knife.dll to unbox Sean's purchases!
Prehistoric WiFi? Converting bits into audio and broadcasting them via radio - Dr Aaron Jackson demos packet radio.
With nefarious big tech companies wanting all your data, could Web 3.0 be the answer? Discussing with Professor Derek McAuley.
We've been asking "What's your favourite (favorite) shortcut key?" as a soundcheck question (this slightly overlapped the "What's your favourite programming language" question) for the last year.
Cross compile or 'invade' the machine you want to work with - Professor Brailsford discusses various options to making a system work.
Can there be a universal intermediate programming language? Sounds like Esperanto to us - Professor Brailsford has more.
How does an operating system juggle different programs? Dr Steve Bagley explains Context Switching.
Scanning objects for use in VR is one thing - but how do you get that haptic feel? Print the object and skin it in VR. Dr Dimitrios Darzentas shows us the kit.
2GHz ≠ 2GHz - Well sometimes! Dr Steve Bagley on why the clock cycles of a CPU aren't enough to measure its speed.
Recursion can be tricky to grasp. Professor Thorsten Altenkirch uses Python to demonstrate an example taken from his latest book.
Taking T-Diagrams to the next level, Professor Brailsford tries to improve last episode's intermediate codes.
No need to understand Turing machines to comprehend the halting problem. Professor Thorsten Altenkirch has a way of using Python to demonstrate the issue.
Concluding his series on compilers and porting, Professor Brailsford takes the plunge and "T-Diagrams" his way over to a new machine.
Pixel level movement in images - Dr Andy French takes us through the idea of Optic or Optical Flow.
Optical Flow solutions - following on from Dr French's previous video explaining Optic Flow, we dive in to some ways to tackle the problem.
How do you represent a word in AI? Rob Miles reveals how words can be formed from multi-dimensional vectors - with some unexpected results.
Using VR to capture visitors' commentary on museum pieces. Jocelyn Spence talks us through the VRtefacts system.
The Internet is 50 - Dr Julian Onions recalls working to bring the Internet to Nottingham.
50 Years since the first packet was sent from one university to another, we asked about first memories of using the Internet.
How ambiguity is dangerous! Professor Brailsford simplifies parsing.
Smart speakers & voice controlled assistants are used more and more, but just how do those systems work? Dr Stuart Reeves of Nottingham's Mixed Reality Lab explains
We look at where the ubiquitous AES came from. Dr Mike Pound introduces the Rijndael algorithm.
Advanced Encryption Standard - Dr Mike Pound explains this ubiquitous encryption technique.
Having explained the top-down method, Professor Brailsford flips to bottom up Parsing.
Discussing Immutability with Francesco Cesarini, Technical Director of Erlang Solutions
Professor Brailsford points his parsing program towards a galaxy far, far away....
Introducing Erlang - with Francesco Cesarini Technical Director of Erlang Solutions.
Looking at the Alderson Loop with Dr Steve Bagley.
Was the Y2K bug a complete non-event? Dr Steve Bagley on why it was 'a thing' and how it was worked around.
Professor Brailsford on one of our most requested topics.
Atari to Zelda, the National Videogame Museum has it covered - Conor Clarke gave Computerphile a personal tour.
In the early days the UK had its own thoughts on how email addresses should look. Dr Julian Onions was there!
Hello World on the Sega Megadrive/Genesis - its quite an involved process to write Hello World on a machine that doesn't even have an operating system. Matt Phillips, of Big Evil Corp demostrates the 'wonky R'
Professor Brailsford takes the theory of RegEx and puts it into practice.
Rob Miles discusses the idea of a gym for training AI algorithms.
Functional or Combinator Parsing explained by Professor Graham Hutton.
How do computers represent multi-dimensional data? Dr Mike Pound explains the mapping.
Fun comes in many forms - playing puzzles, or writing programs that solve the puzzles for you. Professor Thorsten Altenkirch on a recursive Sudoku solver.
Why are some cameras faster to focus than others? Dr Andy French explains the different approaches the computers inside cameras use to focus.
One of the most elegant solutions for cryptography. Dr Mike Pound explains one of his most favourite ciphers.
Working with regular expressions to decode Roman Numerals. Professor Brailsford is on the case.
For Mathematics, trees are more useful than strings. Professor Thorsten Altenkirch takes us through a functional approach to coding them in Python.
Bring Donkey Kong home! - The unenviable task given to Masayuki Uemura by Nintendo bosses in the early '80s. Unimpressed by Atari's 2600 they set out to bring a true videogame arcade experience into the home.
What do the various levels of encryption mean, and why use one over another? Dr Mike Pound takes us through the cryptic world of encryption levels.
To save silicon, RAM is built to forget. Dr Steve Bagley explains how dynamic memory saves on space but at a cost.
As we move towards a remote working culture, Dr Steve Bagley remotely connects to explain what VPN is & how it works.
It's all about the input. You can't always give all a function's inputs at the same time. Professor Graham Hutton explains about curried functions.
Kerberos is an authentication method - Dr Mike Pound explains how it works so neatly.
Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP...
As we contemplate life after lock-down, what technology could help the health services to work out how viruses can spread? Dr Mike Pound & Dr Steve Bagley chat to Sean.
Professor Brailsford on why he's updating his OS and Hardware while in isolation (with remote support from Dr Bagley)
Zoom, House Party, Teams, Skype or whatever. Dr Steve Bagley on the trade-offs all platforms must balance to keep you connected.
You don't just 'run a cipher' - you need a mode of operation. Dr Mike Pound explains some relative to the Feistel cipher.
Improve the efficiency of recursive code by re-writing it to be tail recursive. Professor Graham Hutton explains.
ALGOL 60, a brand new programming language, 60 years ago! Professor Brailsford used to have to teach it - here he shows us some of the code.
In this mini-series, Dr Isaac Triguero walks us through creating a simple Pong-like game in Python, using the PyGame library.
The second part of Dr Isaac Triguero's walkthrough of creating a Pong-like game in Python, using PyGame.
Squash-Pong needs a ball and a paddle - Dr Isaac Triguero continues the PyGame mini-series.
Taking the Squash Pong game and using data science to make it AI powered! Dr Isaac Triguero uses regression & nearest neighbour.
Coding Partial Derivatives in Python is a good way to understand what Machine Learning "secret sauce" has to do. Professor Thorsten Altenkirch explains what it means, and then demos in Python.
Basic mathematics from a language model? Rob Miles on GPT3, where it seems like size does matter!
How do websites marry up to their IP addresses? Dr Mike Pound explains the Domain Name System - DNS.
What's in an eBook file? Dr Steve Bagley delves inside 'Beautiful Code' to find out. As we used "Beautiful Code" as our example, here's a link to the publish...
Discussing "Real" Programmers from the early days of computing with Dr Julian Onions.
We put some of your questions to Dr Mike Pound.
Pascal evolved from Algol 60. Professor Brailsford discusses the rift in the Algol committee that lead to its creation.
How 'not to code' with our "real" programmer - who, as Julian explains, is demoing what NOT to do. Dr Julian Onions tells us more about Mel.
Laziness is a virtue - well, in programming anyway! Professor Thorsten Altenkirch on how you can use the 'yield' to compute certain things "on demand"
The highest signed 32bit integer is a ticking timebomb - sort of... Dr Tim Muller explains why it's his #MegaFavNumber
Memristors, Artificial Synapses & Neomorphic Computing. Dr Phil Moriarty on the limitations of the Von Neumann architecture and what could be next.
Virtual Backgrounds and grainy webcams - what else can we do to improve video conferencing? Dr Max Wilson on a couple of innovations you can try today.
Computer Scientists had to make choices for what system to use for different student use cases. Professor Brailsford on whether to choose Algol 68 or Pascal. Or both.
Tournament selection, roulette selection, mutation, crossover - all processes used in genetic algorithms. Dr Alex Turner explains using the Knapsack Problem.
Breaking the unbreakable loop. More on how self-modifying code can be a neat hack, that's almost unmaintainable. Dr Julian Onions recalls the "Real Programmer" story that circulated in the early '80s.
Millions of lines of code - how do you keep them bug free? Facebook's Professor Peter O'Hearn talks us through "Infer" their code checker which dallies with the idea of undecidability.
It's absolutely everywhere, but what is TLS and where did it come from? Dr Mike Pound explains the background behind this ubiquitous Internet security protocol.
In November 1988 the first worm caused huge problems on the Internet. Dr Julian Onions remembers the story.
How does your computer arrange with a server to start talking in code? Dr Mike Pound explains the TLS handshake where the server and client organise everything.
Demonstrating how complex systems can arise from simple rules, random boolean networks also have some surprising properties... sometimes! Dr Alex Turner generates some.
Underpinning the Internet are countless network routers - how do they work out the route to send your data along? Dr Richard G Clegg of Queen Mary University London explains the Bellman Ford distance vector algorithm.
Program Correctness is incredibly important in computing - particularly in hardware design. Professor Graham Hutton takes us through a simple example using arithmetic.
When Sun added network abilities to a messaging feature, one user managed to contact more people than he'd bargained for. Dr Julian Onions takes us through the rwall incident of 1987.
How do you verify that someone is who they say they are? Dr Mike Pound on digital signatures.
Billions of possibilities - Dr Alex Turner borrowed some cluster time to obtain all of the potential results from all the possible games of Countdown's Numbers Game.
Used by millions every day we're dissecting mice today. Dr Steve Bagley takes us through the workings, starting with a ball-powered rodent.
How do you share a 1960's computer across a bunch of islands? Wireless networking of course - although, like Norman Abramson & his team, you'd have to invent it first. Dr Steve Bagley on Hawaii's Aloha Net.
Could Dave recreate audio from a wav file preview image grabbed from a screen cap?
How many times have you been asked to share 'anonymous' location data? Andrea shows just how simple it can be to work out who's who.
Traceroute is a standard networking tool, but can it be used to recreate all those film scenes where a 'trace' is put on a signal? Dr Richard G Clegg, Queen Mary University of London shows us the neat hack that makes it work and has a go at that supervillain map!
RFCs are standards. Aren't they? - Dr Julian Onions on how Request for Comments started, and aren't always what they seem.
The Internet of Things wouldn't be here if not for Mark Weiser and the team at Xerox Parc. Dr Stuart Reeves explains the vision.
The only viable alternative to AES? Dr Mike Pound unravels the clever ChaCha cipher.
The hidden technology that's behind apps like Visual Studio Code & Skype is web based. David Domminney Fowler chats Google's V8, node.js & HTML5
Professor Brailsford recalls the advent of Unix v7 and AT&T's licensing procedure.
Looking at the audio mechanics and algorithms behind music identifier apps. David Domminney Fowler built a demo you can try yourself.
Professor Brailsford discusses Ken Thompson's ACM Turing Award acceptance paper "Reflections on Trusting Trust"
Games like rogue were revolutionary for terminal based Unix systems - Dr Julian Onions on some of the tricks they used.
How about a Neural Net where the neurons are actual atoms? Professor Phil Moriarty shows a paper demonstrating the principle from researchers at Radboud University in The Netherlands.
Enigma is known as the WWII cipher, but how does it hold up in 2021? Dr Mike Pound implemented it and shows how it stacks up against his laptop.
Build a virtual switching network inside your own computer. Dr Richard G Clegg of Queen Mary University London demonstrates building a software network configured with Python.
To send binary files via a text based system, they'll need encoding. Dr Steve Bagley takes us through the attachment system used in email.
When you relocate a robot, how does it work out where it is? Dr Ayse Kucukyilmaz explains how there's uncertainty at every turn.
Once the Unix games arrived, it wasn't long before coders were looking for ways to game the games. Enter Rog-O-Matic - the program designed to play Rogue. Dr Julian Onions has been tweaking his copy for decades!
With dozens of affordable 3D printers out there, why re-invent the (filament) wheel? Feng Zhou has a plan, to improve the strength of 3D printed objects.
Professor Brailsford has been toiling away on a faithful recreation of Unix co-creator Dennis Ritchie's unsubmitted PhD thesis.
How much of a problem is DeepFake, the ability to swap people's faces around? Dr Mike Pound decided to try it with colleague Dr Steve Bagley.
Exponential growth is a term that's used a lot, but our intuition can play tricks on understanding it. Dr Tim Muller takes us through some examples that demonstrate just how quickly things get out of hand.
"Just send me a PDF!" - but what kind of PDF? As Professor Brailsford explains, PDF is simply a wrapper which can contain a variety of joys!
Discussing autonomous vehicles aka driverless cars with Prof. Subramanian "Ram" Ramamoorthy, Personal Chair of Robot Learning and Autonomy, University of Edinburgh.
Matching pictures on playing cards could have something in common with trying to guess which router has the correct routing table. Dr Tim Muller takes us through 'Gobble'!
Computer bugs were found to be the reason many sub-postmasters and sub-postmistresses were wrongly convicted of stealing and false accounting. Professor Steven Murdoch, a professor of Security Engineering and a Royal Society University Research Fellow at UCL explains the sorts of faults that were found.
How does the "mystical" mind-reading computer program work? Spoiler, it can't read minds. Dr Tim Muller shows us a trick you can play on people.
With new operating systems requiring security hardware, what is this hardware and why do we need it? Dr Steve Bagley takes Sean's bet to see how many times he can mention Trusted Platform Module in one video!
Equality sounds a straightforward idea, but there are subtle problems in theoretical computer science. Professor Thorsten Altenkirch explains how his late friend Martin Hofmann solved one of the biggest problems.
When the World Wide Web was born, there was no World Wide Web, so it took a while before it was widely adopted. Professor Brailsford takes us through what he was up to in 1991.
Big Data sounds like a buzz word, and is hard to quantify, but the problems with large data sets are very real. Dr Isaac Triguero explains some of the challenges.
A language designed to eliminate run-time errors? Professor Thorsten Altenkirch demonstrates programming Type Theory with Agda.
Multiple ways to break through restrictions in a network* demonstrated by Dr Richard G Clegg of Queen Mary University London.
Continuing our look at the Agda programming language, Professor Thorsten Altenkirch shows us how you can work with proofs, which could be invaluable in some industrial situations.
A simple bit-shift operation can generate amazing random strings of numbers. Dr Mike Pound explains then codes it in Python.
The Bit Blit algorithm dates back to Xerox PARC, but was famously used to sell the Amiga home computer among others. Dr Steve Bagley takes us through how it works.
Sinclair Computers drove a computing revolution in the UK. At last you could purchase a computer for less than £100 (Approx. $230 in 1980) RIP Sir Clive Sinclair, the man behind the ZX80, ZX81 & ZX Spectrum (30 July 1940 – 16 September 2021)
Just what was it that took Facebook, Instagram & WhatsApp offline on 4th October 2021? - Dr Steve Bagley investigates!
If your job involves simulating the creation of the universe, you're going to need a big computer. Dr Julian Onions on the practicalities of saving your universe simulation when it's terabytes in size, and in a different country!
We've all got to the edge of the wifi coverage, but the idea of coverage produces a network problem, the Hidden Node Problem. Dr Steve Bagley explains.
Parting the veil of mystery on quantum superposition using waves. Professor Phil Moriarty takes us through it.
Depth can be a useful addition to image data. Mike Pound shows off a realsense camera and explains how it can help with Deep Learning.
With the hype around Apple's M1 chip, Dr Steve Bagley discusses what the big deal is with the system on chip approach to building computers - spoiler, it's not a new thing!
The Spectrum kick started an entire generation of computer coders. Dr Steve Vickers was involved in developing software for both the ZX81 and Spectrum, he even wrote the manuals!
You've scanned a room or object and now you have lots of discrete scans you want to fit together. Dr Mike Pound explains how the Iterative Closest Point Algorithm is used.
The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected Mike's own code!
One of the most useful tools in code development, Git protects your code from yourself and others! Dr Max Wilson gives us an overview.
There's a reason Needham–Schroeder isn't used any more - Tim Muller demonstrates the weakness in the technique.
One of the cleanest ways to cut down a search space when working out point proximity! Mike Pound explains K-Dimension Trees.
The Mixed Reality lab at the University of Nottingham has been studying virtual and augmented reality for decades. We chatted to Steve Benford, Paul Tennent & Edgard Bodiaj from the Mixed Reality Lab & Kate Wellham from Live Cinema about their system 'Bubbles' and how it fits with the current state of VR and the benefits over Zoom & Teams meetings. The VR environment shown in the video is not Meta/Facebook's 'Metaverse', it is a virtual environment created by the mixed reality lab at the University of Nottingham, used here to illustrate some of the benefits of VR over traditional online meetings.
Git doesn't actually perform magic, but it's pretty neat. Dr Max Wilson takes us through the various elements that make Git such a useful tool.
Continuing our look at Git, Dr Max Wilson has a quick look at versions and branches.
Remembering a time when connections were down to 40 bits per second, and the resulting algorithms still in use today! Dr Richard G Clegg of Queen Mary University London has the details.
Many will have heard the phrase 'Mythical Man Month' and assume it's simply about whether manpower and time are interchangeable - the book is really about much more. Professor Brailsford explains how this all relates to the humble byte.
Apple's latest M1 chip is two older chips bolted together, Dr. Steve Bagley explains how they made it work the same as a single chip.
Computer says no! What if two team members try to edit the same file in a project? Git has you covered - Dr Max Wilson explains how teams collaborate using Git.
Continuing on from the Professor's look at the Mythical Man Month, we're talking about whether IBM could have used high level languages in their groundbreaking 360 series.
Could robots like this be sent into nuclear facilities to autonomously deal with toxic waste? That's the plan. Nick & Michal from Oxford Robotics Institute demonstrate & explain their automation of the familiar yellow robot 'spot.' The project was the result of a collaboration between the Oxford Robotics Institute (particularly the DRS and GOALS groups) and Createc (createc.co.uk), and was supported by UKRI through the ISCF RAIN and ORCA Hubs, the AutoInspect project, and the EPSRC Programme Grant in Embodied Intelligence.
How do you compute a massive number raised to the power of another huge number, modulo something else? Dr Mike Pound explains the super-quick square & multiply algorithm.
The psychic paper in the TV show "Doctor Who" displays whatever the Doctor needs it to show at any given time. The Java vulnerability Neil Madden exposed is a digital version of this. Dr Mike Pound explains.
Why do WiFI speeds vary so much? Dr Steve Bagley demonstrates how even a poor signal for one person can affect those with a seemingly perfect signal!
If you pick the wrong prime numbers, cracking RSA becomes a cinch. Dr Mike Pound explains the findings of researcher Hanno Böck.
Zip files & error correction depend on information theory, Tim Muller takes us through how Claude Shannon's early Computer Science work is still essential today!
With the news Apple are implementing Virtual Memory on the iPad, Dr Steve Bagley takes us through what virtual memory is and how it works.
A google researcher was put on leave because he apparently believed his AI project had become sentient. Dr Mike Pound discusses.
You just have the binary - can you work out what it does & how? Dr Steve Bagley talks about how you might reverse engineer a piece of software.
Discussing the philosophical ideas behind AI Sentience, with Professor Mark Jago, Professor of Philosophy at University of Nottingham.
Even the most impressive soft robots have an external control system. What if the software could be running on soft hardware? - Associate Professor Perla Maiolino explains the soft logic in soft robots.
AI Object detection is getting better and better, but as Dr Alex Turner demonstrates, it's far from perfect, and it doesn't recognise things in the same way as us.
We asked Brian Kernighan (author of 'C Programming Language') what language kids should try first.
Could a computer program find Fermat's Lost Theorem? Professor Altenkirch shows us how to get started with lean.
Welcoming back the legend that is Professor Brian Kernighan! Professor Brailsford invites Brian for coffee and a chat.
This video features the Oxford Robotics Institute demonstrating their SLAM algorithm with their frontier device and the Boston Dynamics Spot robot. Thanks to Marco Camurri & Michal Staniaszek for their time.
Knowledge graphs help computers make sense of data for search, recommendations and other AI tasks, Professor Elena Simperl of Kings College London explains.
Blockchain has a controversial reputation, linked as it is to cryptocurrency but Professor Peter McBurney of Kings College London thinks it's an important an invention as the web itself.
Could having more bespoke programming languages speed up software development? Dr Steffen Zschaler, Reader in Computer Science at KCL thinks so.
AI image generators are massive, but how are they creating such interesting images? Dr Mike Pound explains what's going on.
Looking at some real world uses of information theory with Dr Tim Muller.
Mike Continues his look at AI Image Generation with Stable Diffusion.
Deterministic route finding isn't enough for the real world - Nick Hawes of the Oxford Robotics Institute takes us through some problems featuring probabilities.
Just how do computers synchronise clocks across the Internet? Dr Julian Onions implemented this at Nottingham after meeting the godfather of Internet time, Dave Mills!
Information theory shows entropy works a little differently with encryption. Dr Tim Muller takes us through an example.
How do you make a legged robot robust when the environment is against it? Ioannis Havoutis of Oxford Robotics Institute walks us through it.
A look at why (under certain circumstances) JIT Compilers can be so much faster. Dr Laurence Tratt of KCL takes us through the details.
http3 is here, but it wasn't an easy solution, Richard G Clegg of Queen Mary University London explains why he can't decide whether he loves it or hates it!
How does Model Driven Engineering work? Dr Steffen Zschaler, Reader in Computer Science at Kings College London takes us through it.
Throughout 2022 we asked the sound-check question "what's your favourite book?"
Do anti virus programs use machine learning? Dr Fabio Pierazzi looks at the trends and challenges.
Emulation sounds difficult, begins to look simple and then ends up being difficult after all! Dr Steve Bagley explains.
How does memory management work? In C you had to manage things yourself, but modern languages take care of a lot of it for you - Laurence Tratt of Kings College London explains.
A massive topic deserves a massive video. Rob Miles discusses ChatGPT and how it may not be dangerous, yet.
Discussing the challenges of dealing with code from the COBOL era that's still needed! - Dr Kevin Lano Reader in Software Engineering at Kings College London.
Mike explains a paper from the University of Maryland, proposing a neat trick to 'watermark' the output of large language models such as ChatGPT. Dr Mike Pound is an image analyst at the University of Nottingham.
Rust has memory management built in. Ian Knight takes us through some of its features.
Turning data into something visual helps humans make sense of things. Kai explains and shows an open source tool for tracking your research.
Language Models' Achilles heel: Rob Miles talks about "glitch" tokens, those mysterious words which, which result in gibberish when entered into some large language models.
Taking the theory of Deterministic Finite Automata and plugging it into Python with Professor Thorsten Altenkirch of the University of Nottingham.
AI moves quickly, this conversation was recorded March 3rd 2023. Microsoft have incorporated a large language model into the Bing search engine. Rob Miles discusses how it's been going.
Researchers stumbled upon a simple but worrying bug. Cropped images from Pixel phones contained a great deal of the original image in the cropped file. Drs Steve Bagley & Mike Pound explain.
Following a look at 'Sensemaking' Associate Professor Dr Kai Xu delves into some more tricks of the visualisation trade.
An oldie but a goodie, Dr Mike Pound revisits the Log-Jam attack.
Professor Brailsford helped Adobe with PDF. His group helped move publishing forwards by publishing a journal about publishing using the actual processes the journal described!
Non deterministic finite state automata described and then shown in Python by Professor Thorsten Altenkirch
"Ethernet" was named because the inventor believed that the standard could transcend different types of media & 50 yrs on, we still use it! Dr Steve Bagley explains and demos the idea
The four underlying principles of Quantum. Part one of a series on Quantum Computing, Victor V. Albert is a Theoretical physicist at University of Maryland and NIST.
Continuing our look at the world of quantum, we're looking at the application of quantum technologies, from quantum cryptography to quantum computing. Victor V. Albert is a Theoretical physicist at University of Maryland and NIST.
Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr Mike Pound! Author’s page on the attack: Video-Based Cryptanalysis
What's actually possible vs what's theoretically possible vs what's actually useful with quantum computing? Victor V. Albert of University of Maryland and NIST simplifies!
Coping with code to constantly count configurations of cubes can cause considerable consternation. Can Computerphile contributor Mike’s concoction continue calculating complete cube configurations or culminate in catastrophe?
How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science at King’s College London.
There's a lot of talk of image and text AI with large language models and image generators generating media (in both senses of the word) - but what about graphs? Dr David Kohan Marzagao specialises in Machine Learning for Graph-Structured Data and takes us through some simple examples.
At the heart of Bzip2 is the Burrows Wheeler Transform. Dr Steve Bagley (and a live studio audience) explains how & why it works.
Can you replicate millions of dollars of tech with a webcam and an arduino?| Not really, but you can get pretty close! Dr Alex Turner took to the motorways of Britain to prove a point!
Share part of a secret without knowing which part?| Dr Tim Muller explains how Oblivious Transfer works.
Programs aren't capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
Legendary cyber-security expert Professor Gene Spafford joins us to try to define what cyber-security even is! "Spaf" as he's known, is a faculty member at Purdue University and now Honorary Professor at the University of Nottingham. Dr Spafford is a Fellow of the American Academy of Arts and Sciences, the Association for the Advancement of Science, the ACM, the IEEE, and the (ISC)2; a Distinguished Fellow of the ISSA; and a member of the Cyber Security Hall of Fame, the only person to ever hold all these distinctions.
Ahead of an upcoming Python implementation, Professor Thorsten Altenkirch goes through the details and definitions of Regular Expressions.
Progress bars, what are they and how do they work? Dr Valerio Giuffrida explains and goes through an implementation of a progress bar.
Matt Godbolt continues the story of the CPU and explains how machines do addition
Hash Sets in Python work a little bit like the index of a book, giving you a shortcut to looking for a value in a list. Dr Mike Pound explains how they work and demos with some code.
Digital Twin - a new buzz word or a useful piece of technology? We asked Dr Steffen Zschaler, Reader in Computer Science at Kings College London.
A graphical problem seems intuitive to a human, but how do you explain something formally to a machine? Dr. Mohammad Abdulaziz, Lecturer in Artificial Intelligence, King's College London
Just how simple can a web server be? Laurence Tratt, Shopify / Royal Academy of Engineering Research Chair in Language Engineering at Kings College London builds it up.
Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system!
With Large Language Models becoming used across all areas of computing, security researcher Dr Tim Muller explores how they can be used for all kinds of unintended purposes.
How do CPUs make the most efficient use of their compute time? Matt Godbolt takes us through the pipeline - allowing the CPU to do work as many ticks of the system clock as possible!
With the explosion of AI image generators, AI images are everywhere, but how do they 'know' how to turn text strings into plausible images? Dr Mike Pound expands on his explanation of Diffusion models.
How does branch prediction speed up operations? Matt Godbolt continues the deep dive into the inner workings of the CPU
How CPUs that are capable can manage to complete tasks simultaneously without the program knowing. Matt Godbolt continues his series on how processors work.
Nearly nine million Windows machines were taken out by the Crowdstrike problem in July 2024, but why was the impact so problematic? Dr Steve Bagley and Dr Mike Pound of the University of Nottingham discuss the problem.
Mike Pound discusses how Retrieval Augmented Generation can improve the performance of Large Language Models.
The 2024 Nobel Prize in Physics is awarded to John Hopfield and Geoffrey Hinton “for foundational discoveries and inventions that enable machine learning with artificial neural networks”.
You say "bye" first! - no, you say "bye" first! - how do you know when to close the connection? Dr Richard G. Clegg of Queen Mary University London talks us through this frustrating network problem.
Ray Tracing seems straightforward, but what about reflections and refractions? Lewis Stuart explains how these are managed by a spot of recursion!
Malleable encryption means you can flip a bit in the encrypted message and the corresponding bit is flipped in the unencrypted plain text. Dr Tim Muller gives us some examples.
Modern CPUs manage to speed up even the simplest code, Matt Godbolt explains how there's a lot of juggling going on even in the simple use of registers.
What's in a language? Dr Laurie Tratt breaks it down by creating a brand new programming language by writing an interpreter in a few lines of code.
Bayesian logic is already helping to improve Machine Learning results using statistical models. Professor Mike Osborne drew us some sausage plots to explain the idea.
As quantum devices become more accessible, there's a whole area of software engineering opening up. Mohammad Mousavi specialises in software engineering for quantum computing.
Path Tracing takes into account all sorts of indirect light sources to make graphics look real. Building on the previous videos on Ray Tracing, Lewis Stuart demonstrates how Path tracing samples indirect light to create these super scenes.
The XZ Exploit was an incredible near miss. Dr Richard G Clegg of Queen Mary University London explains how a seemingly helpful contributor hid some code in part of a ubiquitous piece of software.
Returning to the Markov Decision Process, this time with a solution. Nick Hawes of the ORI takes us through the algorithm, strap in for an epic episode!
Quicksort is a well known algorithm for sorting, Professor Graham Hutton shows how it works and then how to implement it in just five lines of code!
An AI model that changed the fortunes of silicon valley overnight. Deep Seek has been released open source, and requires far less hardware and investment. Mike Pound is based at the University of Nottingham.
Relatively speedy-to-access cache saves your computer having to trudge over to the RAM, but with multiple levels of cache memory, how does it all work?
The algorithm for differentiation relies on some pretty obscure mathematics, but it works! Mark Williams demonstrates Forward Mode Automatic Differentiation.
Discussing ideas of what happens after Generative AI plateaus, Dr Jakob Foerster is based at the University of Oxford.
Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains how it is like SQL Injection, except not...
Carbon is a brand new programming language still under development. It aims to dethrone C++ by being interoperable & compatible in both directions. Dr Guiffreida from the University of Nottingham gives us the lowdown on this ambitious new programming language.
GTC AI Conference is held each year by Nvidia and showcases AI and related technologies. This year Computerphile visited, here's a taste of what we saw. Full interviews coming soon, and yes, we did speak to him!
Nvidia CEO and co-founder Jensen Huang on various applications of GPUs and the rise of AI in all aspects of parallel processing.
As Large Language Models improve, the tokens they predict form ever more complicated and nuanced outcomes. Rob Miles and Ryan Greenblatt discuss "Alignment Faking" a paper Ryan's team created - ideas about which Rob made a series of videos on Computerphile in 2017.
Discussing how scammers take advantage of the way certain online systems work to leverage the delays. Dr Tim Muller is based at the University of Nottingham.
A seemingly simple problem that's "in general" incredibly difficult! CEO of Redwood Research Buck Shlegeris explains his favourite algorithmic fact!
What is Cuda and why do we need it? An Nvidia invention, Cuda is used in many aspects of parallel computing. We spoke to Stephen Jones, one of the architects of Cuda at the recent GTC conference.
Research suggests the rate at which AI is able to stay 'on task' is doubling every seven months. Is this the AI equivalent of Moore's Law? - Sydney Von Arx works on adversarial stress-testing at METR (Model Evaluation & Threat Research.)