Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
183,322 results
Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains. EXTRA ...
933,176 views
5 years ago
What does a GPU do differently to a CPU and why don't we use them for everything? First of a series from Jem Davies, VP of ...
887,911 views
8 years ago
Enigma is known as the WWII cipher, but how does it hold up in 2021? Dr Mike Pound implemented it and shows how it stacks up ...
2,470,592 views
3 years ago
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...
946,915 views
6 years ago
Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ...
811,724 views
If you don't secure your web forms, one mistaken click could be all it takes for your users to delete their own accounts. Tom Scott ...
757,171 views
10 years ago
'Beast' cracks billions of passwords a second, Dr Mike Pound demonstrates why you should probably change your passwords.
3,462,019 views
7 years ago
This video was filmed and edited by Sean Riley. Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/ Computerphile is a ...
1,506,482 views
How did punch card systems work? Professor Brailsford delves further into the era of mainframe computing with this hands-on ...
872,289 views
The story of recursion continues as Professor Brailsford explains one of the most difficult programs to compute: Ackermann's ...
1,402,408 views
9 years ago
A web app that works out how many seconds ago something happened. How hard can coding that be? Tom Scott explains how ...
4,023,276 views
Monads sound scary, but Professor Graham Hutton breaks down how handy they can be.
594,546 views
There are different styles of programming, some quite closely resemble pure mathematics. Mathematician and Computer Scientist ...
679,144 views
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ...
1,227,615 views
Programming loops are great, but there's a point where they aren't enough. Professor Brailsford explains. EXTRA BITS: ...
1,498,792 views
Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ...
642,526 views
Before laser-printers, high quality print-outs were the domain of typesetters, expensive and tightly controlled. In 1979 a Bell Labs ...
518,238 views
Just what is functional programming? We asked a member of the team that created Haskell: John Hughes, Professor of Computer ...
659,739 views
Von Neumann Architecture is how nearly all computers are built, but who was John Von Neumann and where did the architecture ...
630,666 views
Cookie Monster isn't the only one fond of cookies - thieves on the Internet are partial too. Dr Mike Pound demonstrates & explains ...
1,178,691 views