ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

346,817 results

Computerphile

2.61M subscribers

Latest from Computerphile

Computerphile
Generating 3D Models with Diffusion - Computerphile

When the 3D dataset is too small to create models of frogs on stilts we have to think of a different way - Lewis Stuart is based at the ...

16:17
Generating 3D Models with Diffusion - Computerphile

21,312 views

3 days ago

Computerphile
Implementing Passkeys in Practice - Computerphile

Build your own passkey system like Mike! -- Check out Brilliant for free at https://brilliant.org/computerphile/ (30-day free trial and ...

14:53
Implementing Passkeys in Practice - Computerphile

81,616 views

9 days ago

Computerphile
LLMs and Newcomb's Problem - Computerphile

Newcomb's Problem is a thought experiment which, on the surface, seems obvious, but what if you're trying it out on your identical ...

18:32
LLMs and Newcomb's Problem - Computerphile

76,263 views

2 weeks ago

Computerphile
Do Computer Scientists Prefer Tea or Coffee? (Microphone Sound Check Question 2025)  - Computerphile

Whenever we're setting up to record a video we ask a question to get the contributor to talk so we can check their microphone is ...

10:00
Do Computer Scientists Prefer Tea or Coffee? (Microphone Sound Check Question 2025) - Computerphile

24,758 views

4 weeks ago

Computerphile
The Return of Festive Flashing Lights - Computerphile

Steve gets all festive and tries to improve on the festive lights he built a mere 11 years ago... Dr Steve Bagley is based at the ...

17:54
The Return of Festive Flashing Lights - Computerphile

29,953 views

1 month ago

Computerphile
How Passkeys Work - Computerphile

Passkey pop up everywhere, Mike Pound explains what they are! Check out Brilliant's courses and start for free at ...

19:07
How Passkeys Work - Computerphile

385,924 views

1 month ago

Computerphile
Gen AI & Reinforcement Learning- Computerphile

The real-world doesn't graph well. Sydney Von Arx discusses GenAI & RL -- See Jane Street's training programs in New York, ...

16:10
Gen AI & Reinforcement Learning- Computerphile

31,501 views

1 month ago

Computerphile
Procedural Generation in Games - Computerphile

Procedural generation is the idea of using simple rules to generate more complicated items - used in games such as Minecraft ...

35:11
Procedural Generation in Games - Computerphile

57,186 views

1 month ago

Computerphile
The Hard Problem of Controlling Powerful AI Systems - Computerphile

As AI systems become more capable, rule-based safeguards, hard-coded restrictions, and simple alignment strategies start to ...

21:21
The Hard Problem of Controlling Powerful AI Systems - Computerphile

54,126 views

1 month ago

Computerphile
Code Optimisation via Memoization - Computerphile

Learn this caching trick for faster code from Dr Mike Pound -- Check out Brilliant's courses and start for free at ...

18:16
Code Optimisation via Memoization - Computerphile

133,680 views

2 months ago

Computerphile
Generative AI's Greatest Flaw - Computerphile

Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ...

12:23
Generative AI's Greatest Flaw - Computerphile

580,502 views

11 months ago

Computerphile
Memory Mapping - Computerphile

Huge memory addresses mean that not every address is valid. Matt Godbolt explains how the addresses are actually used.

26:14
Memory Mapping - Computerphile

76,171 views

6 months ago

Computerphile
Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ...

22:49
Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

689,146 views

11 years ago

Computerphile
'Forbidden' AI Technique - Computerphile

The so-called 'Forbidden Technique' with Chana Messinger -- Check out Brilliant's courses and start for free at ...

9:49
'Forbidden' AI Technique - Computerphile

228,007 views

8 months ago

Computerphile
Password Cracking - Computerphile

'Beast' cracks billions of passwords a second, Dr Mike Pound demonstrates why you should probably change your passwords.

20:20
Password Cracking - Computerphile

3,522,329 views

9 years ago

Computerphile
What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: ...

6:50
What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

435,840 views

1 year ago

Computerphile
HyperLogLog Hit Counter - Computerphile

How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm 'Hyperloglog ...

4:20
HyperLogLog Hit Counter - Computerphile

29,877 views

4 months ago

Computerphile
How Secure Shell Works (SSH) - Computerphile

Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ...

9:20
How Secure Shell Works (SSH) - Computerphile

903,129 views

7 years ago

Computerphile
Emulation - Computerphile

Emulation sounds difficult, begins to look simple and then ends up being difficult after all! Dr Steve Bagley explains.

22:36
Emulation - Computerphile

219,528 views

3 years ago

Computerphile
"C" Programming Language: Brian Kernighan - Computerphile

"C" is one of the most widely used programming languages of all time. Prof Brian Kernighan wrote the book on "C", well, co-wrote ...

8:26
"C" Programming Language: Brian Kernighan - Computerphile

2,014,668 views

10 years ago

Computerphile
Where did Bytes Come From? - Computerphile

Why do we have 8 bits in a byte? Professor Brailsford on the origins of the humble byte. Why Use Binary?

11:31
Where did Bytes Come From? - Computerphile

559,368 views

7 years ago

Computerphile
Why C is so Influential - Computerphile

Why is C such an influential language? We asked ardent C fan Professor Brailsford. Brian Kernighan Playlist: ...

10:50
Why C is so Influential - Computerphile

1,996,825 views

8 years ago

Computerphile
Running an SQL Injection Attack - Computerphile

Just how bad is it if your site is vulnerable to an SQL Injection? Dr Mike Pound shows us how they work. Cookie Stealing: ...

17:11
Running an SQL Injection Attack - Computerphile

4,579,219 views

9 years ago

Computerphile
How TOR Works- Computerphile

What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works. This video was ...

14:19
How TOR Works- Computerphile

1,820,149 views

8 years ago

Computerphile
Characters, Symbols and the Unicode Miracle - Computerphile

Audible free book: http://www.audible.com/computerphile Representing symbols, characters and letters that are used worldwide is ...

9:37
Characters, Symbols and the Unicode Miracle - Computerphile

2,096,242 views

12 years ago

Computerphile
The Problem with A.I. Slop! - Computerphile

Researchers suggested there's more AI generated content appearing on the web than human generated content - Mike Pound ...

14:58
The Problem with A.I. Slop! - Computerphile

592,050 views

2 months ago

Computerphile
Secret Key Exchange (Diffie-Hellman) - Computerphile

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...

8:40
Secret Key Exchange (Diffie-Hellman) - Computerphile

1,072,282 views

8 years ago

Computerphile
Where GREP Came From - Computerphile

Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains. EXTRA ...

10:07
Where GREP Came From - Computerphile

1,291,067 views

7 years ago