Multiple Processor Systems – Computerphile

From Computerphile. Just what does it mean to have a multi-processor system? Dr Steve Bagley on symmetric and assymmetric multi-processor systems. https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com

BEAST & The GPU Cluster – Computerphile

From Computerphile. After our password cracking video people wanted to see “Beast” the machine Mike used. The team have been improving the setup though… Rogue, 4 Titan X Maxwell Beast, 4 Titan X Maxwell Deadpool, 4 Titan XP Storm, 8 1080 Ti Havok, 8 Titan XP Magneto, 4 1080 Ti Gambit, 4 1080 Ti Zorin,…

Double Ratchet Messaging Encryption – Computerphile

From Computerphile. How does instant messaging encryption protect against attack? Dr Mike Pound on the double ratchet. Diffie Hellman Key Exchange Explained: https://youtu.be/NmM9HA2MQGI Signal Protocol: https://youtu.be/DXv1boalsDI Endianness Explained with an Egg: https://youtu.be/NcaiHcBvDR4 https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister…

Endianness Explained With an Egg – Computerphile

From Computerphile. Byte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after something from an 18th century novel…. The copy of Gulliver’s Travels used in the graphics was found at archive.org and can be viewed here: http://bit.ly/C_Gulliver https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by…

What’s Behind Port Smash? – Computerphile

From Computerphile. The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how. Spectre & Meltdown: https://youtu.be/I5mRwzVvFGE Out of Order CPUs: https://youtu.be/_qvOlL8nhN4 Zig Zag Decryption: https://www.youtube.com/watch?v=yxx3Bkmv3ck Physics of Computer Chips: https://www.youtube.com/watch?v=xkLAhU74f3s&t=74s Digital Images: https://www.youtube.com/watch?v=06OHflWNCOE&t=12s Deadly Truth of General AI: https://www.youtube.com/watch?v=tcdVC4e6EV4&t=11s https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was…

Infinite Data Structures: To Infinity & Beyond! – Computerphile

From Computerphile. Infinite data structures sound impossible. Professor Graham Hutton shows how laziness can win them over. EXTRA BITS: https://youtu.be/yCyBdeJmHM0 https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com

To Infinity & Beyond – Computerphile

From Computerphile. Infinite data structures sound impossible. Professor Graham Hutton shows how laziness can win them over. EXTRA BITS: https://youtu.be/yCyBdeJmHM0 https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com

How Face ID Works… Probably – Computerphile

From Computerphile. Unlocking a phone with a face? Why doesn’t the phone need thousands of example pictures before it works? Dr Mike Pound explains how it might work… https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s…

eXploit X : “Give Me Root, Now” – Computerphile

From Computerphile. One line of code can get root access on many Linux systems. Dr Steve Bagley demos the exploit, initially discovered by people at Qualys and dubbed “Mutagen Astronomy” http://bit.ly/C_ExploitX to find out more from The Register https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of…

Turing, Tutte & Tunny – Computerphile

From Computerphile. Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in Bill Tutte’s work. Colossus Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckrSWWIDJ_3To7ro5-naSk8v Enigma Playlist: https://www.youtube.com/playlist?list=PLzH6n4zXuckodsatCTEuxaygCHizMS0_I What Happens When I Press a Key?: Choosing a Password: https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at…

Detecting Faces (Viola Jones Algorithm) – Computerphile

From Computerphile. Deep learning is used for everything these days, but this face detection algorithm is so neat its still in use today. Dr Mike Pound on the Viola/Jones algorithm. Hardware Hacking: https://youtu.be/eOPLQxGNmHA EXTRA BITS: https://youtu.be/s2ciAt7KtZc https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer…