You need to be logged in to mark episodes as watched. Log in or sign up.
Season 2021
RSA is widespread on the Internet, and uses large prime numbers - but how does it work? Dr Tim Muller takes us through the details.
RSA is widespread on the Internet, and uses large prime numbers - but how does it work? Dr Tim Muller takes us through the details.
Could Dave recreate audio from a wav file preview image grabbed from a screen cap?
Could Dave recreate audio from a wav file preview image grabbed from a screen cap?
How many times have you been asked to share 'anonymous' location data? Andrea shows just how simple it can be to work out who's who.
How many times have you been asked to share 'anonymous' location data? Andrea shows just how simple it can be to work out who's who.
2021x4
How Traceroute Works (Building a Movie Scene 'Trace' Map)
Episode overview
Traceroute is a standard networking tool, but can it be used to recreate all those film scenes where a 'trace' is put on a signal? Dr Richard G Clegg, Queen Mary University of London
.. show full overview
Traceroute is a standard networking tool, but can it be used to recreate all those film scenes where a 'trace' is put on a signal? Dr Richard G Clegg, Queen Mary University of London shows us the neat hack that makes it work and has a go at that supervillain map!
RFCs are standards. Aren't they? - Dr Julian Onions on how Request for Comments started, and aren't always what they seem.
RFCs are standards. Aren't they? - Dr Julian Onions on how Request for Comments started, and aren't always what they seem.
The Internet of Things wouldn't be here if not for Mark Weiser and the team at Xerox Parc. Dr Stuart Reeves explains the vision.
The Internet of Things wouldn't be here if not for Mark Weiser and the team at Xerox Parc. Dr Stuart Reeves explains the vision.
The only viable alternative to AES? Dr Mike Pound unravels the clever ChaCha cipher.
The only viable alternative to AES? Dr Mike Pound unravels the clever ChaCha cipher.
The hidden technology that's behind apps like Visual Studio Code & Skype is web based. David Domminney Fowler chats Google's V8, node.js & HTML5
The hidden technology that's behind apps like Visual Studio Code & Skype is web based. David Domminney Fowler chats Google's V8, node.js & HTML5
Professor Brailsford recalls the advent of Unix v7 and AT&T's licensing procedure.
Professor Brailsford recalls the advent of Unix v7 and AT&T's licensing procedure.
Looking at the audio mechanics and algorithms behind music identifier apps. David Domminney Fowler built a demo you can try yourself.
Looking at the audio mechanics and algorithms behind music identifier apps. David Domminney Fowler built a demo you can try yourself.
Professor Brailsford discusses Ken Thompson's ACM Turing Award acceptance paper "Reflections on Trusting Trust"
Professor Brailsford discusses Ken Thompson's ACM Turing Award acceptance paper "Reflections on Trusting Trust"
Games like rogue were revolutionary for terminal based Unix systems - Dr Julian Onions on some of the tricks they used.
Games like rogue were revolutionary for terminal based Unix systems - Dr Julian Onions on some of the tricks they used.
How about a Neural Net where the neurons are actual atoms? Professor Phil Moriarty shows a paper demonstrating the principle from researchers at Radboud University in The Netherlands.
How about a Neural Net where the neurons are actual atoms? Professor Phil Moriarty shows a paper demonstrating the principle from researchers at Radboud University in The Netherlands.
Enigma is known as the WWII cipher, but how does it hold up in 2021? Dr Mike Pound implemented it and shows how it stacks up against his laptop.
Enigma is known as the WWII cipher, but how does it hold up in 2021? Dr Mike Pound implemented it and shows how it stacks up against his laptop.
Build a virtual switching network inside your own computer. Dr Richard G Clegg of Queen Mary University London demonstrates building a software network configured with Python.
Build a virtual switching network inside your own computer. Dr Richard G Clegg of Queen Mary University London demonstrates building a software network configured with Python.
To send binary files via a text based system, they'll need encoding. Dr Steve Bagley takes us through the attachment system used in email.
To send binary files via a text based system, they'll need encoding. Dr Steve Bagley takes us through the attachment system used in email.
When you relocate a robot, how does it work out where it is? Dr Ayse Kucukyilmaz explains how there's uncertainty at every turn.
When you relocate a robot, how does it work out where it is? Dr Ayse Kucukyilmaz explains how there's uncertainty at every turn.
Once the Unix games arrived, it wasn't long before coders were looking for ways to game the games. Enter Rog-O-Matic - the program designed to play Rogue. Dr Julian Onions has been tweaking his copy for decades!
Once the Unix games arrived, it wasn't long before coders were looking for ways to game the games. Enter Rog-O-Matic - the program designed to play Rogue. Dr Julian Onions has been tweaking his copy for decades!
With dozens of affordable 3D printers out there, why re-invent the (filament) wheel? Feng Zhou has a plan, to improve the strength of 3D printed objects.
With dozens of affordable 3D printers out there, why re-invent the (filament) wheel? Feng Zhou has a plan, to improve the strength of 3D printed objects.
Professor Brailsford has been toiling away on a faithful recreation of Unix co-creator Dennis Ritchie's unsubmitted PhD thesis.
Professor Brailsford has been toiling away on a faithful recreation of Unix co-creator Dennis Ritchie's unsubmitted PhD thesis.
How much of a problem is DeepFake, the ability to swap people's faces around? Dr Mike Pound decided to try it with colleague Dr Steve Bagley.
How much of a problem is DeepFake, the ability to swap people's faces around? Dr Mike Pound decided to try it with colleague Dr Steve Bagley.
Exponential growth is a term that's used a lot, but our intuition can play tricks on understanding it. Dr Tim Muller takes us through some examples that demonstrate just how quickly things get out of hand.
Exponential growth is a term that's used a lot, but our intuition can play tricks on understanding it. Dr Tim Muller takes us through some examples that demonstrate just how quickly things get out of hand.
"Just send me a PDF!" - but what kind of PDF? As Professor Brailsford explains, PDF is simply a wrapper which can contain a variety of joys!
"Just send me a PDF!" - but what kind of PDF? As Professor Brailsford explains, PDF is simply a wrapper which can contain a variety of joys!
Discussing autonomous vehicles aka driverless cars with Prof. Subramanian "Ram" Ramamoorthy, Personal Chair of Robot Learning and Autonomy, University of Edinburgh.
Discussing autonomous vehicles aka driverless cars with Prof. Subramanian "Ram" Ramamoorthy, Personal Chair of Robot Learning and Autonomy, University of Edinburgh.
Matching pictures on playing cards could have something in common with trying to guess which router has the correct routing table. Dr Tim Muller takes us through 'Gobble'!
Matching pictures on playing cards could have something in common with trying to guess which router has the correct routing table. Dr Tim Muller takes us through 'Gobble'!
Computer bugs were found to be the reason many sub-postmasters and sub-postmistresses were wrongly convicted of stealing and false accounting. Professor Steven Murdoch, a professor of
.. show full overview
Computer bugs were found to be the reason many sub-postmasters and sub-postmistresses were wrongly convicted of stealing and false accounting. Professor Steven Murdoch, a professor of Security Engineering and a Royal Society University Research Fellow at UCL explains the sorts of faults that were found.
How does the "mystical" mind-reading computer program work? Spoiler, it can't read minds. Dr Tim Muller shows us a trick you can play on people.
How does the "mystical" mind-reading computer program work? Spoiler, it can't read minds. Dr Tim Muller shows us a trick you can play on people.
With new operating systems requiring security hardware, what is this hardware and why do we need it? Dr Steve Bagley takes Sean's bet to see how many times he can mention Trusted Platform Module in one video!
With new operating systems requiring security hardware, what is this hardware and why do we need it? Dr Steve Bagley takes Sean's bet to see how many times he can mention Trusted Platform Module in one video!
Equality sounds a straightforward idea, but there are subtle problems in theoretical computer science. Professor Thorsten Altenkirch explains how his late friend Martin Hofmann solved one of the biggest problems.
Equality sounds a straightforward idea, but there are subtle problems in theoretical computer science. Professor Thorsten Altenkirch explains how his late friend Martin Hofmann solved one of the biggest problems.
When the World Wide Web was born, there was no World Wide Web, so it took a while before it was widely adopted. Professor Brailsford takes us through what he was up to in 1991.
When the World Wide Web was born, there was no World Wide Web, so it took a while before it was widely adopted. Professor Brailsford takes us through what he was up to in 1991.
Big Data sounds like a buzz word, and is hard to quantify, but the problems with large data sets are very real. Dr Isaac Triguero explains some of the challenges.
Big Data sounds like a buzz word, and is hard to quantify, but the problems with large data sets are very real. Dr Isaac Triguero explains some of the challenges.
A language designed to eliminate run-time errors? Professor Thorsten Altenkirch demonstrates programming Type Theory with Agda.
A language designed to eliminate run-time errors? Professor Thorsten Altenkirch demonstrates programming Type Theory with Agda.
Multiple ways to break through restrictions in a network* demonstrated by Dr Richard G Clegg of Queen Mary University London.
Multiple ways to break through restrictions in a network* demonstrated by Dr Richard G Clegg of Queen Mary University London.
Continuing our look at the Agda programming language, Professor Thorsten Altenkirch shows us how you can work with proofs, which could be invaluable in some industrial situations.
Continuing our look at the Agda programming language, Professor Thorsten Altenkirch shows us how you can work with proofs, which could be invaluable in some industrial situations.
2021x35
Random Numbers with LFSR (Linear Feedback Shift Register)
Episode overview
A simple bit-shift operation can generate amazing random strings of numbers. Dr Mike Pound explains then codes it in Python.
A simple bit-shift operation can generate amazing random strings of numbers. Dr Mike Pound explains then codes it in Python.
The Bit Blit algorithm dates back to Xerox PARC, but was famously used to sell the Amiga home computer among others. Dr Steve Bagley takes us through how it works.
The Bit Blit algorithm dates back to Xerox PARC, but was famously used to sell the Amiga home computer among others. Dr Steve Bagley takes us through how it works.
Sinclair Computers drove a computing revolution in the UK. At last you could purchase a computer for less than £100 (Approx. $230 in 1980)
RIP Sir Clive Sinclair, the man behind the ZX80, ZX81 & ZX Spectrum (30 July 1940 – 16 September 2021)
Sinclair Computers drove a computing revolution in the UK. At last you could purchase a computer for less than £100 (Approx. $230 in 1980)
RIP Sir Clive Sinclair, the man behind the ZX80, ZX81 & ZX Spectrum (30 July 1940 – 16 September 2021)
Just what was it that took Facebook, Instagram & WhatsApp offline on 4th October 2021? - Dr Steve Bagley investigates!
Just what was it that took Facebook, Instagram & WhatsApp offline on 4th October 2021? - Dr Steve Bagley investigates!
If your job involves simulating the creation of the universe, you're going to need a big computer. Dr Julian Onions on the practicalities of saving your universe simulation when it's terabytes in size, and in a different country!
If your job involves simulating the creation of the universe, you're going to need a big computer. Dr Julian Onions on the practicalities of saving your universe simulation when it's terabytes in size, and in a different country!
We've all got to the edge of the wifi coverage, but the idea of coverage produces a network problem, the Hidden Node Problem. Dr Steve Bagley explains.
We've all got to the edge of the wifi coverage, but the idea of coverage produces a network problem, the Hidden Node Problem. Dr Steve Bagley explains.
Parting the veil of mystery on quantum superposition using waves. Professor Phil Moriarty takes us through it.
Parting the veil of mystery on quantum superposition using waves. Professor Phil Moriarty takes us through it.
Depth can be a useful addition to image data. Mike Pound shows off a realsense camera and explains how it can help with Deep Learning.
Depth can be a useful addition to image data. Mike Pound shows off a realsense camera and explains how it can help with Deep Learning.
With the hype around Apple's M1 chip, Dr Steve Bagley discusses what the big deal is with the system on chip approach to building computers - spoiler, it's not a new thing!
With the hype around Apple's M1 chip, Dr Steve Bagley discusses what the big deal is with the system on chip approach to building computers - spoiler, it's not a new thing!
The Spectrum kick started an entire generation of computer coders. Dr Steve Vickers was involved in developing software for both the ZX81 and Spectrum, he even wrote the manuals!
The Spectrum kick started an entire generation of computer coders. Dr Steve Vickers was involved in developing software for both the ZX81 and Spectrum, he even wrote the manuals!
You've scanned a room or object and now you have lots of discrete scans you want to fit together. Dr Mike Pound explains how the Iterative Closest Point Algorithm is used.
You've scanned a room or object and now you have lots of discrete scans you want to fit together. Dr Mike Pound explains how the Iterative Closest Point Algorithm is used.
The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected Mike's own code!
The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected Mike's own code!
One of the most useful tools in code development, Git protects your code from yourself and others! Dr Max Wilson gives us an overview.
One of the most useful tools in code development, Git protects your code from yourself and others! Dr Max Wilson gives us an overview.
If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:
Request show update
Update requested