You need to be logged in to mark episodes as watched. Log in or sign up.
Season 2017
You’ve always been told that pi is 3.14. This is true, but this number is based on how we measure distance. Find out what happens to pi when we change the way we measure distance.
You’ve always been told that pi is 3.14. This is true, but this number is based on how we measure distance. Find out what happens to pi when we change the way we measure distance.
In this episode probability mathematics and chess collide. What is the average number of steps it would take before a randomly moving knight returned to its starting square?
In this episode probability mathematics and chess collide. What is the average number of steps it would take before a randomly moving knight returned to its starting square?
Mathematician Kelsey Houston-Edwards explains exactly what singularities are and how they exist right under our noses.
Mathematician Kelsey Houston-Edwards explains exactly what singularities are and how they exist right under our noses.
Mathematician Kelsey Houston-Edwards explains how to defeat a seemingly undefeatable monster using a rather unexpected mathematical proof. In this episode you’ll see mathematician vs
.. show full overview
Mathematician Kelsey Houston-Edwards explains how to defeat a seemingly undefeatable monster using a rather unexpected mathematical proof. In this episode you’ll see mathematician vs monster, thought vs ferocity, cardinal vs ordinal. You won’t want to miss it.
Peano arithmetic proves many theories in mathematics but does have its limits. In order to prove certain things you have to step beyond these axioms. Sometimes you need infinity.
Peano arithmetic proves many theories in mathematics but does have its limits. In order to prove certain things you have to step beyond these axioms. Sometimes you need infinity.
What is the math behind quantum computers? And why are quantum computers so amazing? Find out on this episode of Infinite Series.
What is the math behind quantum computers? And why are quantum computers so amazing? Find out on this episode of Infinite Series.
You can find out how to fairly divide rent between three different people even when you don’t know the third person’s preferences! Find out how with Sperner’s Lemma.
You can find out how to fairly divide rent between three different people even when you don’t know the third person’s preferences! Find out how with Sperner’s Lemma.
How long will it take to win a game of chess on an infinite chessboard?
How long will it take to win a game of chess on an infinite chessboard?
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
Only 4 steps stand between you and the secrets hidden behind RSA cryptography. Find out how to crack the world’s most commonly used form of encryption.
Only 4 steps stand between you and the secrets hidden behind RSA cryptography. Find out how to crack the world’s most commonly used form of encryption.
Classical computers struggle to crack modern encryption. But quantum computers using Shor’s Algorithm make short work of RSA cryptography. Find out how.
Classical computers struggle to crack modern encryption. But quantum computers using Shor’s Algorithm make short work of RSA cryptography. Find out how.
Using the harmonic series we can build an infinitely long bridge. It takes a very long time though. A faster method was discovered in 2009.
Using the harmonic series we can build an infinitely long bridge. It takes a very long time though. A faster method was discovered in 2009.
Can you turn your pants inside out without taking your feet off the ground?
Can you turn your pants inside out without taking your feet off the ground?
Find out why Cantor’s Function is nicknamed the Devil’s Staircase.
Find out why Cantor’s Function is nicknamed the Devil’s Staircase.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
What is the best voting system? Voting seems relatively straightforward, yet four of the most widely used voting systems can produce four completely different winners.
What is the best voting system? Voting seems relatively straightforward, yet four of the most widely used voting systems can produce four completely different winners.
The bizarre Arrow’s Impossibility Theorem, or Arrow’s Paradox, shows a counterintuitive relationship between fair voting procedures and dictatorships.
The bizarre Arrow’s Impossibility Theorem, or Arrow’s Paradox, shows a counterintuitive relationship between fair voting procedures and dictatorships.
The theory of social networks allows us to mathematically model and analyze the relationships between governments, organizations and even the rival factions warring on Game of Thrones.
The theory of social networks allows us to mathematically model and analyze the relationships between governments, organizations and even the rival factions warring on Game of Thrones.
What happened when a gambler asked for help from a mathematician? The formal study of Probability
What happened when a gambler asked for help from a mathematician? The formal study of Probability
The answer lies in the weirdness of floating-point numbers and the computer's perception of a number line.
The answer lies in the weirdness of floating-point numbers and the computer's perception of a number line.
Why is there a hexagonal structure in honeycombs? Why not squares? Or asymmetrical blobby shapes? In 36 B.C., the Roman scholar Marcus Terentius Varro wrote about two of the leading
.. show full overview
Why is there a hexagonal structure in honeycombs? Why not squares? Or asymmetrical blobby shapes? In 36 B.C., the Roman scholar Marcus Terentius Varro wrote about two of the leading theories of the day. First: bees have six legs, so they must obviously prefer six-sided shapes. But that charming piece of numerology did not fool the geometers of day. They provided a second theory: Hexagons are the most efficient shape. Bees use wax to build the honeycombs -- and producing that wax expends bee energy. The ideal honeycomb structure is one that minimizes the amount of wax needed, while maximizing storage -- and the hexagonal structure does this best.
What happens when you try to empty an urn full of infinite balls? It turns out that whether the vase is empty or full at the end of an infinite amount of time depends on what order you
.. show full overview
What happens when you try to empty an urn full of infinite balls? It turns out that whether the vase is empty or full at the end of an infinite amount of time depends on what order you try to empty it in. Check out what happens when randomness and the Ross-Littlewood Paradox collide.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
2017x30
Your Mind Is Eight-Dimensional - Your Brain as Math Part 3
Episode overview
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
This episode has no summary.
Despite what many believe, the essence of encryption isn’t really about factoring or prime numbers. So what is it about?
Despite what many believe, the essence of encryption isn’t really about factoring or prime numbers. So what is it about?
Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with
.. show full overview
Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with a given key can only be decrypted with the same key, Alice and Bob can exchange secure messages once they agree on a key. But what if Alice and Bob are strangers who can only communicate over a channel monitored by eavesdroppers like Eve? How do they agree on a secret key in the first place?
What exactly is a topological space?
What exactly is a topological space?
If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:
Request show update
Update requested