You’ve always been told that pi is 3.14. This is true, but this number is based on how we measure distance. Find out what happens to pi when we change the way we measure distance.
You’ve always been told that pi is 3.14. This is true, but this number is based on how we measure distance. Find out what happens to pi when we change the way we measure distance.
2017x2 Can a Chess Piece Explain Markov Chains? Episode overview
Air date
Jan 12, 2017
In this episode probability mathematics and chess collide. What is the average number of steps it would take before a randomly moving knight returned to its starting square?
In this episode probability mathematics and chess collide. What is the average number of steps it would take before a randomly moving knight returned to its starting square?
Mathematician Kelsey Houston-Edwards explains how to defeat a seemingly undefeatable monster using a rather unexpected mathematical proof. In this episode you’ll see mathematician vs .. show full overview
Mathematician Kelsey Houston-Edwards explains how to defeat a seemingly undefeatable monster using a rather unexpected mathematical proof. In this episode you’ll see mathematician vs monster, thought vs ferocity, cardinal vs ordinal. You won’t want to miss it.
Peano arithmetic proves many theories in mathematics but does have its limits. In order to prove certain things you have to step beyond these axioms. Sometimes you need infinity.
Peano arithmetic proves many theories in mathematics but does have its limits. In order to prove certain things you have to step beyond these axioms. Sometimes you need infinity.
You can find out how to fairly divide rent between three different people even when you don’t know the third person’s preferences! Find out how with Sperner’s Lemma.
You can find out how to fairly divide rent between three different people even when you don’t know the third person’s preferences! Find out how with Sperner’s Lemma.
Only 4 steps stand between you and the secrets hidden behind RSA cryptography. Find out how to crack the world’s most commonly used form of encryption.
Only 4 steps stand between you and the secrets hidden behind RSA cryptography. Find out how to crack the world’s most commonly used form of encryption.
2017x15 Hacking at Quantum Speed with Shor's Algorithm Episode overview
Air date
Apr 27, 2017
Classical computers struggle to crack modern encryption. But quantum computers using Shor’s Algorithm make short work of RSA cryptography. Find out how.
Classical computers struggle to crack modern encryption. But quantum computers using Shor’s Algorithm make short work of RSA cryptography. Find out how.
Find out why Cantor’s Function is nicknamed the Devil’s Staircase.
Find out why Cantor’s Function is nicknamed the Devil’s Staircase.
2017x19 Dissecting Hypercubes with Pascal's Triangle Episode overview
Air date
Jun 01, 2017
This episode has no summary.
This episode has no summary.
2017x20 Pantographs and the Geometry of Complex Functions Episode overview
Air date
Jun 08, 2017
This episode has no summary.
This episode has no summary.
2017x21 Voting Systems and the Condorcet Paradox Episode overview
Air date
Jun 15, 2017
What is the best voting system? Voting seems relatively straightforward, yet four of the most widely used voting systems can produce four completely different winners.
What is the best voting system? Voting seems relatively straightforward, yet four of the most widely used voting systems can produce four completely different winners.
The theory of social networks allows us to mathematically model and analyze the relationships between governments, organizations and even the rival factions warring on Game of Thrones.
The theory of social networks allows us to mathematically model and analyze the relationships between governments, organizations and even the rival factions warring on Game of Thrones.
The answer lies in the weirdness of floating-point numbers and the computer's perception of a number line.
The answer lies in the weirdness of floating-point numbers and the computer's perception of a number line.
2017x26 The Honeycombs of 4-Dimensional Bees ft. Joe Hanson Episode overview
Air date
Aug 03, 2017
Why is there a hexagonal structure in honeycombs? Why not squares? Or asymmetrical blobby shapes? In 36 B.C., the Roman scholar Marcus Terentius Varro wrote about two of the leading .. show full overview
Why is there a hexagonal structure in honeycombs? Why not squares? Or asymmetrical blobby shapes? In 36 B.C., the Roman scholar Marcus Terentius Varro wrote about two of the leading theories of the day. First: bees have six legs, so they must obviously prefer six-sided shapes. But that charming piece of numerology did not fool the geometers of day. They provided a second theory: Hexagons are the most efficient shape. Bees use wax to build the honeycombs -- and producing that wax expends bee energy. The ideal honeycomb structure is one that minimizes the amount of wax needed, while maximizing storage -- and the hexagonal structure does this best.
What happens when you try to empty an urn full of infinite balls? It turns out that whether the vase is empty or full at the end of an infinite amount of time depends on what order you .. show full overview
What happens when you try to empty an urn full of infinite balls? It turns out that whether the vase is empty or full at the end of an infinite amount of time depends on what order you try to empty it in. Check out what happens when randomness and the Ross-Littlewood Paradox collide.
Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with .. show full overview
Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with a given key can only be decrypted with the same key, Alice and Bob can exchange secure messages once they agree on a key. But what if Alice and Bob are strangers who can only communicate over a channel monitored by eavesdroppers like Eve? How do they agree on a secret key in the first place?