Computerphile

Season 2015

Videos all about computers and computer stuff. Sister channel of Numberphile.

Where to Watch Computerphile • Season 2015

93 Episodes

  • Enigma, TypeX and Dad
    E1
    Enigma, TypeX and DadThis installment of the Bletchley Park series has a personal note for Professor Brailsford. He tells us what his dad did in the war.
  • Flip Flops, Latches & Memory Details
    E2
    Flip Flops, Latches & Memory DetailsCircuits that use latches to store data are a cornerstone of computing. Dr Steve Bagley shows us how to put one together.
  • More from Numberphile's Pixar Video
    E3
    More from Numberphile's Pixar VideoPixar researcher Tony DeRose spoke to Brady over on Numberphile, here's some extra stuff from their conversation not used in the main video.
  • Binary Addition & Overflow
    E4
    Binary Addition & OverflowBack to basics, at the start of a series on binary numbers Professor Brailsford tackles binary addition and just what is meant by an overflow.
  • Supercomputer and the Milky Way
    E5
    Supercomputer and the Milky WayThis Supercomputer is doing some of the most difficult computations in the world, about things that are out of this world.
  • Binary: Plusses & Minuses (Why We Use Two's Complement)
    E6
    Binary: Plusses & Minuses (Why We Use Two's Complement)Negative Binary Numbers - you may have heard of 'signed' numbers, but do you know how they work? Professor Brailsford explains not just how, but why we use the systems we do.
  • Indie Games & the Fourth Dimension
    E7
    Indie Games & the Fourth DimensionThe 4th dimension? A concept Marc ten Bosch has used to create an innovative game. We talk to him about developing Miegakure.
  • The Turing Test
    E8
    The Turing TestWhat was The Imitation Game? It inspired the name for the recent Alan Turing's movie but just what was it? Professor Brailsford explains how Turing may have been having a joke on us.
  • Atari ST: Accidental Musical Workhorse
    E9
    Atari ST: Accidental Musical WorkhorseIt became the music sequencing tool of choice for countless musicians, almost by chance. The Atari ST was launched 30yrs ago and Dr. Steve "Heartbleed" Bagley shows us his own extensive collection!
  • Digital Images
    E10
    Digital ImagesHow are images represented in a computer? Image analyst & Research Fellow Mike Pound gives us a snapshot. (First in a series on computer vision)
  • Pushing the Atari Limits
    E11
    Pushing the Atari LimitsHow programmers found ways to push the hardware past its design limits. Dr "Heartbleed" Bagley shows us the rest of his Atari collection.
  • Capturing Digital Images (The Bayer Filter)
    E12
    Capturing Digital Images (The Bayer Filter)How do digital cameras turn light into the data that computers can handle? In this second part of our computer vision series, Image Analyst Mike Pound explains the Bayer Filter.
  • Addressing Memory (Pt1)
    E13
    Addressing Memory (Pt1)Each BIT in memory doesn't have it's own unique wiring, they share connections - Dr 'Heartbleed' Bagley explains how we address them.
  • True Colour of 'The Dress' #thedress (colours in digital images)
    E14
    True Colour of 'The Dress' #thedress (colours in digital images)After #thedress twitter-storm about what colour a dress appears to be in a photo, we asked image analyst Mike Pound to help ink in the details.
  • AND OR NOT - Logic Gates Explained
    E15
    AND OR NOT - Logic Gates ExplainedBasic logic gates explained and all the different ways they can be drawn and represented. Professor Brailsford takes us through the AND, OR & NOT logical operations.
  • The Path Towards ARM & BBC B
    E16
    The Path Towards ARM & BBC BHe was on the team that invented the ARM chip, the BBC Microcomputer and got into computing in the 1970's because he wanted to build his own flight simulator. In 2014 he was awarded the Lovelace medal & is the ICL Professor of Computer Engineering at The University of Manchester. Computerphile talks to Professor Steve Furber
  • 3D & Multiple Dimensions in Digital Images
    E17
    3D & Multiple Dimensions in Digital ImagesHow computers represent more than 2 dimensions and how those dimensions can be used. Our series on digital images and computer vision continues with Image Analyst Mike Pound.
  • XOR & the Half Adder
    E18
    XOR & the Half AdderXOR, an essential logic operation, explained by Professor Brailsford. Continues our series on logic gates/operations.
  • Augmented Reality (AR)
    E19
    Augmented Reality (AR)Augmented Reality, also known as AR is finding its way into all of our mobile devices, is it a gimmick or a useful piece of technology? Matt Ramirez is a developer at Jisc, the charity championing digital tech in UK education and research.
  • Building the BBC Micro (The Beeb)
    E20
    Building the BBC Micro (The Beeb)It inspired a generation of coders and was in 80% of UK schools. The BBC Micro was built by Acorn (CPU) as part of a computer literacy project. Professor Steve Furber was part of the team who designed it.
  • 5 Hole Paper Tape
    E21
    5 Hole Paper TapeBefore floppy disks and the internet, computers transferred data to and from paper tape. Professor Brailsford explains.
  • Wearables and Augmented Reality
    E22
    Wearables and Augmented RealityWhat place do wearables have in AR? We ask AR Developer Matt Ramirez from Jisc.
  • Colourspaces (JPEG Pt0)
    E23
    Colourspaces (JPEG Pt0)What's a colourspace and why do we have different ones? It's horses for courses as Image Analyst Mike Pound explains.
  • Total Recall (Memory Addressing Pt2)
    E24
    Total Recall (Memory Addressing Pt2)Computer Memory Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckoxFPyhsMOYMGqyZOeN2SDJ
  • Arduino Hardware
    E25
    Arduino HardwareHobbyist hackers and programmers use Arduinos extensively - but what is an Arduino made of? James Fowkes from Nottingham Hackspace explains.
  • JPEG 'files' & Colour (JPEG Pt1)
    E26
    JPEG 'files' & Colour (JPEG Pt1)JPEG Isn't a file format. Image Analyst Mike Pound explains why not in our first in a series about how JPEG works.
  • ARM Processor - Sowing the Seeds of Success
    E27
    ARM Processor - Sowing the Seeds of Success30 years ago, Acorn Computers switched on their first ever processor, the Acorn RISC Machine, or ARM. Now, they power 95% of smartphones & 12 billion ARM chips shipped last year. Professor Steve Furber (University of Manchester) speaks about how he and Sophie Wilson started the project.
  • EDSAC Rebuild (Cambridge University's 1st Computer)
    E28
    EDSAC Rebuild (Cambridge University's 1st Computer)Scrapped to make space for its successor, EDSAC is now being painstakingly rebuilt at The National Museum of Computing (TNMoC). 5 years in, Andrew Herbert tells about this remarkable machine.
  • Holy Grail of AI (Artificial Intelligence)
    E29
    Holy Grail of AI (Artificial Intelligence)Why can't artificial intelligence do what humans can? Rob Miles talks about generality in intelligence.
  • Computing Aladdin's Cave
    E30
    Computing Aladdin's CaveVideo tour of the Centre for Computing History in Cambridge. Assistant Curator Jeremy shows us their vintage computers.
  • Nuggets of Data Gold
    E31
    Nuggets of Data GoldData mining, why it's better than pure statistics. Professor Uwe Aickelin explains the basics of data mining.
  • The Computer That Changed Everything (Altair 8800)
    E32
    The Computer That Changed Everything (Altair 8800)Arguably the first personal computer, the Altair 8800 is the machine that inspired Steve Jobs and Bill Gates. Jason Fitzpatrick from the Centre for Computing History explains.
  • Computer That Changed Everything (Altair 8800) - AUDIO FIX
    E33
    Computer That Changed Everything (Altair 8800) - AUDIO FIXThis is a re-upload of 'The Computer that Changed Everything' with the 'near ultrasonic' (16k) audio noise removed.
  • IT Crowd Altair - Lifting the Lid
    E34
    IT Crowd Altair - Lifting the LidWhat's inside the case of this 40yr old Altair? Jason from the Centre for Computing History opens up this early machine to find some surprising changes.
  • JPEG DCT, Discrete Cosine Transform (JPEG Pt2)
    E35
    JPEG DCT, Discrete Cosine Transform (JPEG Pt2)DCT is the secret to JPEG's compression. Image Analyst Mike Pound explains how the compression works.
  • Colossus & Bletchley Park
    E36
    Colossus & Bletchley ParkColossus was one of the very first electronic, special purpose, computers and it was created almost two years earlier than the better known ENIAC. We visit Bletchley Park, home of the code breakers, and TNMoC, The National Museum of Computing. Professor Brailsford shows us the Colossus replica.
  • Apple's $200,000 Computer
    E37
    Apple's $200,000 ComputerAn Apple I was discovered in a pile of electronics. It sold for $200,000, but why so valuable? Dr Steve Bagley talks about this seminal machine.
  • Illegal Immigration & the Known Unknowns
    E38
    Illegal Immigration & the Known UnknownsSearching for the known unknown. Data mining & illegal immigration. Professor Uwe Aickelin explains how to mine data you don't even have.
  • The Problem with JPEG
    E39
    The Problem with JPEGNever use JPEG with text. But why? Image Analyst Mike Pound explains what goes wrong when JPEG tries to compress text.
  • People's Computer: Sinclair ZX81
    E40
    People's Computer: Sinclair ZX81Clive Sinclair had a vision, an elegant, affordable computer. Sold as Timex 1000 in the US, the ZX81 was cheap and cheerful; for many programmers, their first rung on the ladder of computing.
  • Deadly Truth of General AI?
    E41
    Deadly Truth of General AI?The danger of assuming general artificial intelligence will be the same as human intelligence. Rob Miles explains with a simple example: The deadly stamp collector.
  • Inside the Computer (EDSAC)
    E42
    Inside the Computer (EDSAC)One of the first computers in the world, EDSAC is being rebuilt at the National Museum of Computing at Bletchley Park. Andrew Herbert takes us on a walk around inside the computer.
  • Why ARM Owes Apple
    E43
    Why ARM Owes AppleIf not for Apple, the company making ARM processors might never have existed and ARM could have disappeared with Acorn. Professor Steve Furber explains why.
  • Arduino Programs & Sketches
    E44
    Arduino Programs & SketchesArduino devices are well known amongst hobbyists, but how do you get them to work? James Fowkes takes us through programming a 'sketch' (Arduino-speak for a program)
  • Fishy Codes: Bletchley's Other Secret
    E45
    Fishy Codes: Bletchley's Other SecretHitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, they had no idea what it was and code-named it 'Tunny' (Tuna). Professor Brailsford explains why this relates to the early days of Computer Science
  • How GCHQ Classifies Computer Security
    E46
    How GCHQ Classifies Computer SecurityThe UK's Government Communications Headquarters deal in classified material, but how to decide if a computer is secure? - GCHQ asked Professor Uwe Aickelin and his team to investigate a means of scoring computer systems.
  • Smile Detection
    E47
    Smile DetectionHow do computers recognise human faces? Associate Professor Dr Michel Valstar explains how the computer discerns faces, features & our expressions.
  • Mouse Pointers & Fitts's Law
    E48
    Mouse Pointers & Fitts's LawHow do you use mathematics to help design a computer's user interface? Use Fitts's Law; Dr Sarah Wiseman explains.
  • 1966 Computing Power (Elliott 903)
    E49
    1966 Computing Power (Elliott 903)What computing power could businesses or educational establishments expect in the mid '60's? Jeremy Thackray demos the Elliott 903.
  • Captain Buzz: Smartphone Pilot
    E50
    Captain Buzz: Smartphone PilotAn app that turns your phone into a pilot? Researchers at the University of Cambridge Computer Lab have built 'Captain Buzz' - Senior Research Associate Ramsey Faragher explains.
  • Captain Buzz pt2: Smart Watches and Latency
    E51
    Captain Buzz pt2: Smart Watches and LatencyAn app that lets your phone fly which you can control from a smart watch. Researchers at the University of Cambridge Computer Lab have built 'Captain Buzz' - Olly Chick explains how they dealt with the latency issues raised in part 1.
  • AI Self Improvement
    E52
    AI Self ImprovementAfter the deadly stamp collector, what if we can't create something so powerful? But if we design an AI that's better at AI design than us? Robert Miles continues his discussion on AI.
  • The Factory of Ideas: Working at Bell Labs
    E53
    The Factory of Ideas: Working at Bell LabsBell Labs pioneered some of the most important inventions of the 20th century, what was it like to be part of that? Professor Brian Kernighan was there.
  • Could We Ban Encryption?
    E54
    Could We Ban Encryption?Secret services want to read people's communications, politicians talk about terrorists, but what's the reality of banning encryption? Ross Anderson, Professor of Security Engineering at the Computer Laboratory, University of Cambridge explains how history repeats itself.
  • Secrets Hidden in Images (Steganography)
    E55
    Secrets Hidden in Images (Steganography)Secret texts buried in a picture of your dog? Image Analyst Dr. Mike Pound explains the art of steganography in digital images.
  • Wobbly RAM & ZX81 Drawbacks
    E56
    Wobbly RAM & ZX81 DrawbacksWhen your computer crashes and you lose everything it's annoying at best - What if you could fix it with blu tack? Jason Fitzpatrick from The Centre for Computing History on drawbacks of the Sinclair ZX81
  • How Search Engines Treat Data
    E57
    How Search Engines Treat DataSearch Engines are a bit like the Public Library - You wouldn't wander around hoping to find the book you want, there's a system in place. Data is the same - Dr. Max Wilson Explains.
  • "C" Programming Language: Brian Kernighan
    E58
    "C" Programming Language: Brian KernighanC" is one of the most widely used programming languages of all time. Prof Brian Kernighan wrote the book on "C", well, co-wrote it - on a visit to the University of Nottingham we asked him how it came about.
  • Why Don Knuth Doesn't Use Email
    E59
    Why Don Knuth Doesn't Use EmailEmail is an unwelcome distraction, so CS legend Don Knuth simply doesn't use it. He hasn't done since 1990. Brady asked him why.
  • Silicon Brain: 1,000,000 ARM cores
    E60
    Silicon Brain: 1,000,000 ARM coresThe Human Brain Project is behind this attempt to build a million core brain simulator. Professor Steve Furber of the University of Manchester & one of the pioneers behind the original ARM chip, takes us through the SpiNNaker Project.
  • Geometric Face Recognition
    E61
    Geometric Face RecognitionHow faces are turned into points & shapes and recognised as features. Associate Professor Dr. Michel Valstar explains how pixels 'vote' for features.
  • Machine Learning Methods
    E62
    Machine Learning MethodsWe haven't got time to label things, so can we let the computers work it out for themselves? Professor Uwe Aickelin explains supervised and un-supervised methods of machine learning.
  • The Singularity & Friendly AI?
    E63
    The Singularity & Friendly AI?What is the singularity and will it ever happen? Dr Sean Holden of the University of Cambridge explains just how difficult Human Level AI is.
  • Inside a Data Centre
    E64
    Inside a Data CentreInside one of the mysterious buildings that holds petabytes of data and crunches big numbers. Spencer Lamb shows us around a purpose built data centre in Slough in the UK, used by an organisation called Jisc/Janet which helps connect academic institutions together.
  • Empty Data Centre
    E65
    Empty Data CentreBefore and After - how a data centre looks before the clients move in. Spencer Lamb shows us around.
  • Zig Zag Decryption
    E66
    Zig Zag DecryptionXOR encryption is flawed. Professor Brailsford explains the zig-zag method that can reveal the precious key stream.
  • Anti-Learning (So Bad, it's Good)
    E67
    Anti-Learning (So Bad, it's Good)How getting something completely wrong can actually help you out. Professor Uwe Aickelin explains anti-learning.
  • Page Ranking and Search Engines
    E68
    Page Ranking and Search EnginesGoogle It" has passed into common language, but how does Google rank pages? Dr Max Wilson explains page rank.
  • UNIX Special: Profs Kernighan & Brailsford
    E69
    UNIX Special: Profs Kernighan & BrailsfordBWK, Professor Brian Kernighan visited Nottingham, so Professor Brailsford couldn't resist an 'on-camera' chat about Unix, Bell Labs and other aspects of Brian's glittering career.
  • How Blurs & Filters Work
    E70
    How Blurs & Filters WorkImage filters make most people think of Instagram or Camera Phone apps, but what's really going on at pixel level? Image Analyst Dr Mike Pound explains some of the most common filters.
  • Why Do We Need IP Addresses?
    E71
    Why Do We Need IP Addresses?A Computerphile viewer asked the question: Why do we need IP addresses when every network interface has its own Mac address? - I put it to Dr Richard Mortier; University Lecturer in the Computer Laboratory at the University of Cambridge
  • The Trouble with Missing Data
    E72
    The Trouble with Missing DataSoftware doesn't deal well with missing data, so what can be done about it? Professor Uwe Aickelin talks about whether we need to replace it.
  • Chip & PIN Fraud Explained
    E73
    Chip & PIN Fraud ExplainedWe rely on Chip & PIN machines to pay for things in a safe way, so how are they being compromised? Ross Anderson is Professor of Security Engineering at the Computer Laboratory, University of Cambridge.
  • Connecting Universities
    E74
    Connecting UniversitiesBig data research needs high performance computing and fast networks but so do thousands of students watching Netflix. Jisc run Janet, the network that connects academia in the UK. Jeremy Sharp, Jisc's Director of Strategic Technologies takes us through their data centre installation.
  • Faces & the Local Binary Pattern
    E75
    Faces & the Local Binary PatternFace detection isn't just about geometry. Associate Professor Dr Michel Valstar explains how Local Binary Patterns can be used to detect the edges in our features.
  • Man in the Middle Attacks & Superfish
    E76
    Man in the Middle Attacks & SuperfishLenovo sold thousands of computers all carrying the Superfish software. Tom Scott explains what a security nightmare this became.
  • How Digital Audio Works
    E77
    How Digital Audio WorksHow does digital audio work? Programmer, Producer and Professional Musician David Domminney Fowler takes us through the basics.
  • Consensus & Organising Coffee
    E78
    Consensus & Organising CoffeeJust like humans organising to meet for coffee, computers need ways of organising themselves. Heidi Howard, of the System Research Group at University of Cambridge explains the basics.
  • Finding the Edges (Sobel Operator)
    E79
    Finding the Edges (Sobel Operator)Our eyes can spot edges with no problems, but how do computers determine what's an edge and what's not? Image Analyst Dr Mike Pound explains the Sobel Edge detector.
  • Why Asimov's Laws of Robotics Don't Work
    E80
    Why Asimov's Laws of Robotics Don't WorkThree or four laws to make robots and AI safe - should be simple right? Rob Miles on why these simple laws are so complicated.
  • Canny Edge Detector
    E81
    Canny Edge DetectorTaking edges one step further with Hysteresis Thresholding - The Canny Operator explained by Image Analyst Dr Mike Pound
  • Unix Pipeline (Brian Kernighan)
    E82
    Unix Pipeline (Brian Kernighan)Just what is a pipeline in the computer science sense? We asked Computer Science guru Professor Brian Kernighan
  • TLU Three Letter Username Obsession
    E83
    TLU Three Letter Username ObsessionDFB explains why three letter abbreviations are so common in computer science. Unix & Bell Labs have a lot to answer for! (Professor David F Brailsford)
  • Why do CPUs Need Caches?
    E84
    Why do CPUs Need Caches?We've all heard of web browser caches, but why does a super fast modern CPU need a cache? Because it's too fast. Dr Steve "Heartbleed" Bagley explains.
  • Pixel Noise (Music from Images)
    E85
    Pixel Noise (Music from Images)A Picture says a thousand words, but even more musical notes! - David Domminney Fowler wrote a program that turns images into music.
  • Light-field Camera
    E86
    Light-field CameraShoot first, focus later: How does a 'light field' camera work? We asked Image Analyst Dr Mike Pound.
  • Raspberry Pi Zero - the $5 Computer
    E87
    Raspberry Pi Zero - the $5 ComputerA $5 computer - where's the catch? Well, there doesn't seem to be one. Dr Steve "Heartbleed" Bagley explains the Raspberry Pi Zero.
  • Why Use Binary?
    E88
    Why Use Binary?Surely decimal numbers are easier to understand than binary? So why don't computers use them? Professor Brailsford explains the relationships between binary, power and simplicity.
  • How Bitcoin Works
    E89
    How Bitcoin WorksDigital currency, how does it work, what's a data miner and will Bitcoin last? We asked Professor Ross Anderson of the University of Cambridge Computer Laboratory.
  • What Was Your 1st Computer?
    E90
    What Was Your 1st Computer?Before each Computerphile interview we asked guests and regular contributors about their first computer.
  • Industrial Light-field Magic
    E91
    Industrial Light-field MagicA camera that uses a micro lens array to create a depth map. Dr Mike Pound explains a more expensive type of light-field camera used in industry.
  • CPU vs GPU (What's the Difference?)
    E92
    CPU vs GPU (What's the Difference?)What does a GPU do differently to a CPU and why don't we use them for everything? First of a series from Jem Davies, VP of Technology at ARM.
  • Search Engine Relevance
    E93
    Search Engine RelevanceA search engine can return thousands of web pages, but how does it know whether they are relevant or not? First step is how to measure relevance, as Dr Max Wilson explains.

 

  •   
  •   
  •   
  •   
  •   
  •   
  •   

Take Plex everywhere

Watch free anytime, anywhere, on almost any device.
See the full list of supported devices