ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

346,363 results

Computerphile
Network Basics - Transport Layer and User Datagram Protocol Explained - Computerphile

Breaking the network layer model into pieces, starting top-down, Richard G Clegg of Queen Mary University London explains the ...

15:21
Network Basics - Transport Layer and User Datagram Protocol Explained - Computerphile

25,928 views

3 days ago

Computerphile
Internationalis(z)ing Code - Computerphile

Audible free book: http://www.audible.com/computerphile Catering for a global audience is difficult, Tom takes us through a ...

8:18
Internationalis(z)ing Code - Computerphile

1,109,023 views

11 years ago

Computerphile
Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ...

22:49
Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

689,450 views

11 years ago

Computerphile
Memory Mapping - Computerphile

Huge memory addresses mean that not every address is valid. Matt Godbolt explains how the addresses are actually used.

26:14
Memory Mapping - Computerphile

76,530 views

6 months ago

Computerphile
The Next Big SHA? SHA3 Sponge Function Explained - Computerphile

Learn more about the Jane Street internship at https://jane-st.co/internship-computerphile-25 If a bug is found in SHA2, SHA3 is ...

27:37
The Next Big SHA? SHA3 Sponge Function Explained - Computerphile

155,473 views

5 months ago

Computerphile
'Forbidden' AI Technique - Computerphile

The so-called 'Forbidden Technique' with Chana Messinger -- Check out Brilliant's courses and start for free at ...

9:49
'Forbidden' AI Technique - Computerphile

228,241 views

8 months ago

Computerphile
How Secure Shell Works (SSH) - Computerphile

Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ...

9:20
How Secure Shell Works (SSH) - Computerphile

903,767 views

7 years ago

Computerphile
Generative AI's Greatest Flaw - Computerphile

Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ...

12:23
Generative AI's Greatest Flaw - Computerphile

581,927 views

11 months ago

Computerphile
Password Cracking - Computerphile

'Beast' cracks billions of passwords a second, Dr Mike Pound demonstrates why you should probably change your passwords.

20:20
Password Cracking - Computerphile

3,522,873 views

9 years ago

Computerphile
Where GREP Came From - Computerphile

Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains. EXTRA ...

10:07
Where GREP Came From - Computerphile

1,291,372 views

7 years ago

Computerphile
Verifying AI 'Black Boxes' - Computerphile

How to we check to see if a black box system is giving us the right result for the right reason? Even a broken clock is correct twice ...

13:43
Verifying AI 'Black Boxes' - Computerphile

65,810 views

3 years ago

Computerphile
HyperLogLog Hit Counter - Computerphile

How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm 'Hyperloglog ...

4:20
HyperLogLog Hit Counter - Computerphile

30,049 views

4 months ago

Computerphile
Generating 3D Models with Diffusion - Computerphile

When the 3D dataset is too small to create models of frogs on stilts we have to think of a different way - Lewis Stuart is based at the ...

16:17
Generating 3D Models with Diffusion - Computerphile

29,493 views

10 days ago

Computerphile
What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: ...

6:50
What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

436,092 views

1 year ago

Computerphile
Where did Bytes Come From? - Computerphile

Why do we have 8 bits in a byte? Professor Brailsford on the origins of the humble byte. Why Use Binary?

11:31
Where did Bytes Come From? - Computerphile

559,540 views

7 years ago

Computerphile
Elliptic Curves - Computerphile

Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike's myriad Diffie-Hellman ...

8:42
Elliptic Curves - Computerphile

618,698 views

8 years ago

Computerphile
Secret Key Exchange (Diffie-Hellman) - Computerphile

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...

8:40
Secret Key Exchange (Diffie-Hellman) - Computerphile

1,073,673 views

8 years ago

Computerphile
How TOR Works- Computerphile

What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works. This video was ...

14:19
How TOR Works- Computerphile

1,821,145 views

8 years ago

Computerphile
Characters, Symbols and the Unicode Miracle - Computerphile

Audible free book: http://www.audible.com/computerphile Representing symbols, characters and letters that are used worldwide is ...

9:37
Characters, Symbols and the Unicode Miracle - Computerphile

2,097,138 views

12 years ago

Computerphile
Emulation - Computerphile

Emulation sounds difficult, begins to look simple and then ends up being difficult after all! Dr Steve Bagley explains.

22:36
Emulation - Computerphile

219,686 views

3 years ago