15:08
Computer Connections - Computerphile
by Computerph...
4 days ago ∗ Views: 67,869
Recently we took an old Sun server to pieces - Dr Bagley uses it to explain how most computers connect together http://www.facebook.com/computerphile ...
15:39
Sound Recognition - Computerphile
by Computerph...
6 days ago ∗ Views: 74,760
How do you go about making a device recognise individual sounds? Audio Analytic's Dr Chris Mitchell on how they approached the problem. Digital Audio ...
17:22
How WanaCrypt Encrypts Your Files - Computerphile
by Computerph...
1 week ago ∗ Views: 174,604
Wanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work. Original Wana Decrypt0r video: ...
15:19
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
by Computerph...
2 weeks ago ∗ Views: 550,479
or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds. How Wana Decrypt0r encrypts files: https://youtu.be/pL...
07:49
Internet of Things Problems - Computerphile
by Computerph...
3 weeks ago ∗ Views: 98,674
A hacked car that could kill you should be more worrying than a thousand lightbulbs taking Facebook offline. University of Cambridge's Professor Ross ...
13:32
Data Harvesting Problem - Computerphile
by Computerph...
3 weeks ago ∗ Views: 89,473
How do we control our own data while allowing it to be mined? Dr Richard Mortier of The University of Cambridge discusses some of the issues behind da...
07:06
Digital Audio Compression - Computerphile
by Computerph...
4 weeks ago ∗ Views: 68,717
How does rich audio compress to stream across the internet with little quality loss? Audio Analytic's Dr Chris Mitchell explains. Audio Analytic is a ...
08:09
MegaProcessor - Computerphile
by Computerph...
4 weeks ago ∗ Views: 160,758
Walk around inside a working processor and see all the components operating. Jason Fitzpatrick shows us the Centre for Computer History's MegaProcesso...
16:49
Sun Microsystems Tear Down - Computerphile
by Computerph...
1 month ago ∗ Views: 102,671
Computerphile helps Dr Steve Bagley clean up the Computer Science department's Sun server from the '80s Music during 'duster buster' sequence: Split ....
05:32
Magic "Nothing Up My Sleeve" Numbers - Computerphile
by Computerph...
1 month ago ∗ Views: 75,939
How are encryption standards constants chosen? Dr Mike Pound explains these not-so-magic numbers. http://www.facebook.com/computerphile ...
08:51
Avoid the Middle-Man (Smart Contracts) - Computerphile
by Computerph...
2 months ago ∗ Views: 65,352
Could Smart Contracts be the end for Uber, Amazon and eBay? Blockchain technology as an escrow service, Christopher Ellis explains.
10:21
SHA: Secure Hashing Algorithm - Computerphile
by Computerph...
2 months ago ∗ Views: 138,102
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings. EXTRA BITS: ...
16:31
Reed-Muller Code (64 Shades of Grey pt2) - Computerphile
by Computerph...
2 months ago ∗ Views: 46,468
Deriving the Reed-Muller Code, used by Mariner 9 to send back pictures from Mars. Professor Brailsford shows how it can be coded recursively. EXTRA BI...
09:29
64 Shades of Martian Grey - Computerphile
by Computerph...
2 months ago ∗ Views: 65,332
NASA had to implement error correction for the spacecraft that travelled to Mars - Professor Brailsford explains how the Mariner series managed to sen...
08:12
End to End Encryption (E2EE) - Computerphile
by Computerph...
2 months ago ∗ Views: 125,207
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Dr Mike Pound explains. ...