Atomic Processing Computerphile - Detailed Analysis
Continuing to look at the limits of computing, Professor Moriarty on the grand idea of computing at the How about a Neural Net where the neurons are actual Machine Learning has allowed nano-scientists to Autofocus their equipment for the first time - at an The Internet is 50 - Dr Julian Onions recalls working to bring the Internet to Nottingham. Just what can you do with a quantum computer? Robert Smith of Rigetti Computing takes us through his quantum instruction set. If your job involves simulating the creation of the universe, you're going to need a big computer. Dr Julian Onions on the ...
Can deep learning improve your gaming experience? We have no idea but we know how it works. Dr Mike Pound on Deep ... Ever wondered how mining operations work? Rob Morley from ORmining showed us around their setup. Bubbles in the pipeline? Some of the basic operations at the heart of the CPU explained by Dr Steve Bagley. EXTRA BITS: ... Hobbyist hackers and programmers use Arduinos extensively - but what is an Arduino made of? James Fowkes from Nottingham ... The back door that may not be a back door... The suspicion about Dual_EC_DRBG - The Dual Elliptic Curve Deterministic ... A security exploit using standard Windows commands which can lie undetected. Dr Steve Bagley explains the latest revealed ...
Spectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU ... Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ... Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death. See the Steve and Sir Martyn playing the game on our chemistry channel (Periodic Videos): Links ...
Photo Gallery

















