You need to be logged in to mark episodes as watched. Log in or sign up.
Season 2017
Dijkstra's Algorithm finds the shortest path between two points. Dr Mike Pound explains how it works.
Dijkstra's Algorithm finds the shortest path between two points. Dr Mike Pound explains how it works.
Functional Programming is often considered the stuffy tool of academics, but can it be used for creative and entertainment applications? Dr Henrik Nilsson demonstrates one application built with Reactive Functional Programming.
Functional Programming is often considered the stuffy tool of academics, but can it be used for creative and entertainment applications? Dr Henrik Nilsson demonstrates one application built with Reactive Functional Programming.
As computers are used more and more to confirm proofs, is it time to take computer science's contribution to mathematics further? Dr Thorsten Altenkirch discusses Type Theory vs Set Theory.
As computers are used more and more to confirm proofs, is it time to take computer science's contribution to mathematics further? Dr Thorsten Altenkirch discusses Type Theory vs Set Theory.
In day to day life interruptions are annoying, but in computing they're essential. James Fowkes explains using an Arduino.
In day to day life interruptions are annoying, but in computing they're essential. James Fowkes explains using an Arduino.
The original version of text messaging had a flaw, but how can we investigate problems with software quickly and easily? Professor John Hughes shows us how a modern tool can automate the process of code checking.
The original version of text messaging had a flaw, but how can we investigate problems with software quickly and easily? Professor John Hughes shows us how a modern tool can automate the process of code checking.
Linked Lists explained: Dr Alex Pinkney returns to Computerphile.
Linked Lists explained: Dr Alex Pinkney returns to Computerphile.
Characteristically ahead of his time, Clive Sinclair built his version of the iPad, back in the late '80's. Spencer shows us his "Cambridge Computer" Z88.
Characteristically ahead of his time, Clive Sinclair built his version of the iPad, back in the late '80's. Spencer shows us his "Cambridge Computer" Z88.
The basis of almost all functional programming, Professor Graham Hutton explains Lambda Calculus.
The basis of almost all functional programming, Professor Graham Hutton explains Lambda Calculus.
Dicussing implementation with Professor Brailsford.
Dicussing implementation with Professor Brailsford.
Bringing digital into interactive theatre. Roma Patel is a designer and member of the Mixed Reality Laboratory who is looking to computing to provide extra engagement with young theatre-goers.
Bringing digital into interactive theatre. Roma Patel is a designer and member of the Mixed Reality Laboratory who is looking to computing to provide extra engagement with young theatre-goers.
As communications become more complicated, the amount of bits required to succesfully correct an error increases, but by how much? Professor Brailsford talks multi-dimensional parity bits.
As communications become more complicated, the amount of bits required to succesfully correct an error increases, but by how much? Professor Brailsford talks multi-dimensional parity bits.
Turning exquisitely painted miniatures into high definition 3d models using a camera and a turntable. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
Turning exquisitely painted miniatures into high definition 3d models using a camera and a turntable. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
Improving on Dijkstra, A* takes into account the direction of your goal. Dr Mike Pound explains.
Improving on Dijkstra, A* takes into account the direction of your goal. Dr Mike Pound explains.
Using Optical Flow to position augmented reality content above wargaming scenes. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
Using Optical Flow to position augmented reality content above wargaming scenes. Dimitri Darzentas is a Horizon CDT PhD student & member of the Mixed Reality Lab.
The powers of two and the algorithm that helps them correct errors. Professor Brailsford explains how to fix those one-bit blips.
The powers of two and the algorithm that helps them correct errors. Professor Brailsford explains how to fix those one-bit blips.
Putting search algorithms into practice. Dr Mike Pound reveals he likes nothing more in his spare time, than sitting in front of the TV coding.
Putting search algorithms into practice. Dr Mike Pound reveals he likes nothing more in his spare time, than sitting in front of the TV coding.
Part 1 of a Series on AI Safety Research with Rob Miles. Rob heads away from his 'Killer Stamp Collector' example to find a more concrete example of the problem.
Part 1 of a Series on AI Safety Research with Rob Miles. Rob heads away from his 'Killer Stamp Collector' example to find a more concrete example of the problem.
How do you implement an on/off switch on a General Artificial Intelligence? Rob Miles explains the perils.
How do you implement an on/off switch on a General Artificial Intelligence? Rob Miles explains the perils.
Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains.
Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains.
Taking Augmented Reality to the next level, Google's Tango uses depth cameras and lasers. Dimitri Darzentas demonstrates.
Taking Augmented Reality to the next level, Google's Tango uses depth cameras and lasers. Dimitri Darzentas demonstrates.
Superb integration, but a limited field of view, Dimitri Darzentas demonstrates the incredible Microsoft Hololens.
Superb integration, but a limited field of view, Dimitri Darzentas demonstrates the incredible Microsoft Hololens.
Bubbles in the pipeline? Some of the basic operations at the heart of the CPU explained by Dr Steve Bagley.
Bubbles in the pipeline? Some of the basic operations at the heart of the CPU explained by Dr Steve Bagley.
Blockchain is the underlying technology behind cryptocurrencies bringing together Merkle trees, Hashing & Distributed Architecture. Christopher Ellis explains.
Blockchain is the underlying technology behind cryptocurrencies bringing together Merkle trees, Hashing & Distributed Architecture. Christopher Ellis explains.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Dr Mike Pound explains.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Dr Mike Pound explains.
NASA had to implement error correction for the spacecraft that travelled to Mars - Professor Brailsford explains how the Mariner series managed to send back pictures from another planet.
NASA had to implement error correction for the spacecraft that travelled to Mars - Professor Brailsford explains how the Mariner series managed to send back pictures from another planet.
Deriving the Reed-Muller Code, used by Mariner 9 to send back pictures from Mars. Professor Brailsford shows how it can be coded recursively.
Deriving the Reed-Muller Code, used by Mariner 9 to send back pictures from Mars. Professor Brailsford shows how it can be coded recursively.
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.
Could Smart Contracts be the end for Uber, Amazon and eBay? Blockchain technology as an escrow service, Christopher Ellis explains.
Could Smart Contracts be the end for Uber, Amazon and eBay? Blockchain technology as an escrow service, Christopher Ellis explains.
How are encryption standards constants chosen? Dr Mike Pound explains these not-so-magic numbers.
How are encryption standards constants chosen? Dr Mike Pound explains these not-so-magic numbers.
Walk around inside a working processor and see all the components operating. Jason Fitzpatrick shows us the Centre for Computer History's MegaProcessor .
Walk around inside a working processor and see all the components operating. Jason Fitzpatrick shows us the Centre for Computer History's MegaProcessor .
How does rich audio compress to stream across the internet with little quality loss? Audio Analytic's Dr Chris Mitchell explains.
How does rich audio compress to stream across the internet with little quality loss? Audio Analytic's Dr Chris Mitchell explains.
How do we control our own data while allowing it to be mined? Dr Richard Mortier of The University of Cambridge discusses some of the issues behind data harvesting.
How do we control our own data while allowing it to be mined? Dr Richard Mortier of The University of Cambridge discusses some of the issues behind data harvesting.
A hacked car that could kill you should be more worrying than a thousand lightbulbs taking Facebook offline. University of Cambridge's Professor Ross Anderson explains why safety should be higher on the agenda than privacy.
A hacked car that could kill you should be more worrying than a thousand lightbulbs taking Facebook offline. University of Cambridge's Professor Ross Anderson explains why safety should be higher on the agenda than privacy.
$300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds.
$300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds.
Wanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work.
Wanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work.
How do you go about making a device recognise individual sounds? Audio Analytic's Dr Chris Mitchell on how they approached the problem.
How do you go about making a device recognise individual sounds? Audio Analytic's Dr Chris Mitchell on how they approached the problem.
Recently we took an old Sun server to pieces - Dr Bagley uses it to explain how most computers connect together
Recently we took an old Sun server to pieces - Dr Bagley uses it to explain how most computers connect together
What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works.
What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works.
A movie where you're deciding the edits, consciously and subconsciously. Richard Ramchurn and his brain controlled movies.
A movie where you're deciding the edits, consciously and subconsciously. Richard Ramchurn and his brain controlled movies.
The Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains.
The Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains.
We ask Bell Labs alumnus and 'C' expert Professor Brian Kernighan about research at Bell Labs
We ask Bell Labs alumnus and 'C' expert Professor Brian Kernighan about research at Bell Labs
AI Safety isn't just Rob Miles' hobby horse, he shows us a published paper from some of the field's leading minds.
AI Safety isn't just Rob Miles' hobby horse, he shows us a published paper from some of the field's leading minds.
Computerphile helps Dr Steve Bagley clean up the Computer Science department's Sun server from the '80s
Computerphile helps Dr Steve Bagley clean up the Computer Science department's Sun server from the '80s
Brian Kernighan, the man who wrote the definitive book on C programming brings us up to date on his work over the last couple of years.
Brian Kernighan, the man who wrote the definitive book on C programming brings us up to date on his work over the last couple of years.
Why can't we just disconnect a malevolent AI? Rob Miles on some of the simplistic solutions to AI safety.
Why can't we just disconnect a malevolent AI? Rob Miles on some of the simplistic solutions to AI safety.
The iPhone is ten years old, Dr Bagley looks at life before the ubiquitous smartphone
The iPhone is ten years old, Dr Bagley looks at life before the ubiquitous smartphone
It's three steps forward and two steps back as Dr Bagley continues his quest to restore the venerable Sun server...
It's three steps forward and two steps back as Dr Bagley continues his quest to restore the venerable Sun server...
OCR isn't just about scanning documents and digitizing old books. Explaining how it can work in a practical setting is Professor Steve Simske (Honorary Professor at the University of
.. show full overview
OCR isn't just about scanning documents and digitizing old books. Explaining how it can work in a practical setting is Professor Steve Simske (Honorary Professor at the University of Nottingham as well as Director & Chief Technologist at HP Labs' Security Printing Solutions)
Which is faster? The results *may* just surprise you. Dr 'Heartbleed' Bagley gives us an in depth shoot-out - Arrays vs Linked Lists...
Which is faster? The results *may* just surprise you. Dr 'Heartbleed' Bagley gives us an in depth shoot-out - Arrays vs Linked Lists...
Another home computer hits the big 3 0 ! But even if you've never heard of it, the Acorn Archimedes is the reason the ARM chip exists...
Another home computer hits the big 3 0 ! But even if you've never heard of it, the Acorn Archimedes is the reason the ARM chip exists...
We ask Professor Steve Simske of HP Labs what it's like to interview for one of the big computing companies, what they're looking for and about his experiences of hiring...
We ask Professor Steve Simske of HP Labs what it's like to interview for one of the big computing companies, what they're looking for and about his experiences of hiring...
Facebook & fake news - Dr Stuart Moran is part of a team using eye-tracking to look at how people get conned by fake news stories.
Facebook & fake news - Dr Stuart Moran is part of a team using eye-tracking to look at how people get conned by fake news stories.
Rob Miles talks editing with GNU/Linux & free software.
Rob Miles talks editing with GNU/Linux & free software.
After seemingly insurmountable issues with Artificial General Intelligence, Rob Miles takes a look at a promising solution: Cooperative Inverse Reinforcement Learning
After seemingly insurmountable issues with Artificial General Intelligence, Rob Miles takes a look at a promising solution: Cooperative Inverse Reinforcement Learning
The 'Swiss Army Knife' of data structures, Professor Brian Kernighan talks about the associative array with beer & pizza.
The 'Swiss Army Knife' of data structures, Professor Brian Kernighan talks about the associative array with beer & pizza.
Encoding recursion in the Lambda calculus, one of Professor Graham Hutton's favourite functions.
Encoding recursion in the Lambda calculus, one of Professor Graham Hutton's favourite functions.
Pointers are fundamental in programming and Professor Brailsford couldn't live without them!
Pointers are fundamental in programming and Professor Brailsford couldn't live without them!
Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains.
Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains.
Why is C such an influential language? We asked ardent C fan Professor Brailsford.
Why is C such an influential language? We asked ardent C fan Professor Brailsford.
Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor authentication.
Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor authentication.
The 'magic' trick of pointers to pointers - Professor Brailsford explains how what might seem complicated will actually simplify your code. (See Extra Bits video for a code walkthrough)
The 'magic' trick of pointers to pointers - Professor Brailsford explains how what might seem complicated will actually simplify your code. (See Extra Bits video for a code walkthrough)
Building blocks and strawberry laces make collaborative software design childsplay - Dr Max Wilson
Building blocks and strawberry laces make collaborative software design childsplay - Dr Max Wilson
Cellphone providers routinely collect data from you - Data science PhD researcher and hackathon enthusiast Gregor Engelmann breaks it down.
Cellphone providers routinely collect data from you - Data science PhD researcher and hackathon enthusiast Gregor Engelmann breaks it down.
Discussing how Social Media interfaces work with Dr Max Wilson.
Discussing how Social Media interfaces work with Dr Max Wilson.
Converting a single 2D photo into a 3D model of your face. Convolutional Neural Networks are clever things. Aaron Jackson is part of the Computer Vision Laboratory at University of Nottingham.
Converting a single 2D photo into a 3D model of your face. Convolutional Neural Networks are clever things. Aaron Jackson is part of the Computer Vision Laboratory at University of Nottingham.
Programming loops are great, but there's a point where they aren't enough. Professor Brailsford explains.
Programming loops are great, but there's a point where they aren't enough. Professor Brailsford explains.
Mathematics once again meets Computer Science as Professor Altenkirch continues to discuss Type Theory
Mathematics once again meets Computer Science as Professor Altenkirch continues to discuss Type Theory
Pointers are an essential element of computing. Dr Steve Bagley explains how everything rests on pointers.
Pointers are an essential element of computing. Dr Steve Bagley explains how everything rests on pointers.
Generating YouTube comments with a neural network trained on YouTube comments. What could possibly go wrong? Dr Mike Pound replied to our comment...
Generating YouTube comments with a neural network trained on YouTube comments. What could possibly go wrong? Dr Mike Pound replied to our comment...
Voevodsky took his knowledge of abstract geometry and applied it to Computer Science, then took Computer Science principles and applied them to Mathematics. Professor Thorsten Altenkirch remembers him.
Voevodsky took his knowledge of abstract geometry and applied it to Computer Science, then took Computer Science principles and applied them to Mathematics. Professor Thorsten Altenkirch remembers him.
A true essential, the subroutine saves time, effort and helps avoid bugs. Dr Bagley explains why he has two essentials!
A true essential, the subroutine saves time, effort and helps avoid bugs. Dr Bagley explains why he has two essentials!
Discussing Homotopy Type Theory with Professor Thorsten Altenkirch.
Discussing Homotopy Type Theory with Professor Thorsten Altenkirch.
Secure WiFi is broken - Dr Mike Pound & Dr Steve Bagley on the Krack Attack discovered by researchers in Belgium.
Secure WiFi is broken - Dr Mike Pound & Dr Steve Bagley on the Krack Attack discovered by researchers in Belgium.
This episode has no summary.
This episode has no summary.
What's going on when we search for *.docx? Dr Steve Bagley talks us through wild cards.
What's going on when we search for *.docx? Dr Steve Bagley talks us through wild cards.
What's going on when we search for *.docx? Dr Steve Bagley talks us through wild cards.
What's going on when we search for *.docx? Dr Steve Bagley talks us through wild cards.
Scaling up blockchains is far from simple - Dr Shehar Bano of the Information Security Group at UCL dicusses some of the problems.
Scaling up blockchains is far from simple - Dr Shehar Bano of the Information Security Group at UCL dicusses some of the problems.
Just how far can we go with processing speed? Physicist Professor Phil Moriarty talks about the hard limits of computing.
Just how far can we go with processing speed? Physicist Professor Phil Moriarty talks about the hard limits of computing.
How do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains.
How do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains.
In 1991 the web could only do text, but scientists at Cambridge Computer Laboratory were working with networked video.... Quentin Stafford-Fraser explains how this led to the first webcam.
In 1991 the web could only do text, but scientists at Cambridge Computer Laboratory were working with networked video.... Quentin Stafford-Fraser explains how this led to the first webcam.
Sinclair computers (Timex in the US) was born out of a little known kit machine produced by 'Science of Cambridge' - Jason Fitzpatrick is from the Centre for Computing History in Cambridge.
Sinclair computers (Timex in the US) was born out of a little known kit machine produced by 'Science of Cambridge' - Jason Fitzpatrick is from the Centre for Computing History in Cambridge.
Discussing Bitcoin scaling - Mustafa Al-Bassam of the UCL Security group talks about on-chain and off-Chain ideas.
Discussing Bitcoin scaling - Mustafa Al-Bassam of the UCL Security group talks about on-chain and off-Chain ideas.
MIDI is still going strong after 34 years - Where is it used and how does it work? We asked David Domminney Fowler, Musician, Producer and Coder.
MIDI is still going strong after 34 years - Where is it used and how does it work? We asked David Domminney Fowler, Musician, Producer and Coder.
Monads sound scary, but Professor Graham Hutton breaks down how handy they can be.
Monads sound scary, but Professor Graham Hutton breaks down how handy they can be.
The current debate about Net Neutrality may not be as clear cut as you'd imagine. Professor Derek McAuley lays out the details.
The current debate about Net Neutrality may not be as clear cut as you'd imagine. Professor Derek McAuley lays out the details.
Malware comes in many shapes and sizes, here's an overview of how some of it works. Enrico Mariconti is part of the UCL Security group.
Malware comes in many shapes and sizes, here's an overview of how some of it works. Enrico Mariconti is part of the UCL Security group.
Keeping data anonymous seems easy, but keeping identities separate is a big problem. Professor Derek McAuley explains.
Keeping data anonymous seems easy, but keeping identities separate is a big problem. Professor Derek McAuley explains.
What's being done to stop criminals in online banking? Dr Steven Murdoch (Principal Research Fellow) in the UCL Info Security Group.
What's being done to stop criminals in online banking? Dr Steven Murdoch (Principal Research Fellow) in the UCL Info Security Group.
How do Bluetooth devices maintain audio/video sync? Dr Steve Bagley on the subtleties of sync.
How do Bluetooth devices maintain audio/video sync? Dr Steve Bagley on the subtleties of sync.
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens.
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens.
Correction : as oodles of commenters have pointed out, the clock face should go from 0 to n-1. Also, worth reminding people that Mike has simplified the notation in this video (as he mentions).
Correction : as oodles of commenters have pointed out, the clock face should go from 0 to n-1. Also, worth reminding people that Mike has simplified the notation in this video (as he mentions).
Fractals aren't just fascinating computer generated patterns, they could also be the key to future computer architecture. Professor Phil Moriarty explains.
Fractals aren't just fascinating computer generated patterns, they could also be the key to future computer architecture. Professor Phil Moriarty explains.
Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in...
Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in...
If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:
Request show update
Update requested