Media Summary: Should computers evolve to read the environment we live in or should we change the environment to make it easier for machines ... More information on Aestheticodes MAIN FILM - Why some numbers just dont work when you're creating error proof codes. Professor Brailsford continues with the story of ISBN.

The Penguin Barcode Computerphile - Detailed Analysis & Overview

Should computers evolve to read the environment we live in or should we change the environment to make it easier for machines ... More information on Aestheticodes MAIN FILM - Why some numbers just dont work when you're creating error proof codes. Professor Brailsford continues with the story of ISBN. Conductive Ink, Colour Shifting Ink and clever printing algorithms are used as anti-counterfeiting measures, HP Labs' Steve ... UTF8 is fantastic, but people still have translation issues with some characters - Tom explains why. More from Tom Scott: ... Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains. EXTRA BITS: ...

Security of users' passwords should be at the forefront of every web developer's mind. Tom takes us through the insecure ways in ... Cookies are controversial and new laws governing them have been introduced in Europe. Extra footage: ... Reverse Polish, or Postfix notation is commonly used in Computer Science, particularly in reference to Stacks - but what are ... How do QR codes work? The checkerboard patterns taking over the world, demystified. Go to and use ... How do you pick a secure password that's memorable but truly random? Dr Mike Pound explains Diceware The Diceware ... If you don't secure your web forms, one mistaken click could be all it takes for your users to delete their own accounts. Tom Scott ...

Pi has quickly become my favorite coding agent. It's fast, minimal, and you can customize it to an insane degree... Thank you ... A web app that works out how many seconds ago something happened. How hard can coding that be? Tom Scott explains how ...

Photo Gallery

The Penguin Barcode - Computerphile
EXTRA BITS: More on Barcodes - Computerphile
Characters, Symbols and the Unicode Miracle - Computerphile
X & the Book Code - Computerphile
Anti-Counterfeiting & Conductive Inks - Computerphile
EXTRA BITS - UTF-8 'nearly' works - Computerphile
The Perfect Code - Computerphile
How NOT to Store Passwords! - Computerphile
Follow the Cookie Trail - Computerphile
Internationalis(z)ing Code - Computerphile
Reverse Polish Notation and The Stack - Computerphile
I built a QR code with my bare hands to see how it works
View Detailed Profile
The Penguin Barcode - Computerphile

The Penguin Barcode - Computerphile

Should computers evolve to read the environment we live in or should we change the environment to make it easier for machines ...

EXTRA BITS: More on Barcodes - Computerphile

EXTRA BITS: More on Barcodes - Computerphile

More information on Aestheticodes MAIN FILM -

Characters, Symbols and the Unicode Miracle - Computerphile

Characters, Symbols and the Unicode Miracle - Computerphile

Audible free book: http://www.audible.com/

X & the Book Code - Computerphile

X & the Book Code - Computerphile

Why some numbers just dont work when you're creating error proof codes. Professor Brailsford continues with the story of ISBN.

Anti-Counterfeiting & Conductive Inks - Computerphile

Anti-Counterfeiting & Conductive Inks - Computerphile

Conductive Ink, Colour Shifting Ink and clever printing algorithms are used as anti-counterfeiting measures, HP Labs' Steve ...

EXTRA BITS - UTF-8 'nearly' works - Computerphile

EXTRA BITS - UTF-8 'nearly' works - Computerphile

UTF8 is fantastic, but people still have translation issues with some characters - Tom explains why. More from Tom Scott: ...

The Perfect Code - Computerphile

The Perfect Code - Computerphile

Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains. EXTRA BITS: ...

How NOT to Store Passwords! - Computerphile

How NOT to Store Passwords! - Computerphile

Security of users' passwords should be at the forefront of every web developer's mind. Tom takes us through the insecure ways in ...

Follow the Cookie Trail - Computerphile

Follow the Cookie Trail - Computerphile

Cookies are controversial and new laws governing them have been introduced in Europe. Extra footage: ...

Internationalis(z)ing Code - Computerphile

Internationalis(z)ing Code - Computerphile

Audible free book: http://www.audible.com/

Reverse Polish Notation and The Stack - Computerphile

Reverse Polish Notation and The Stack - Computerphile

Reverse Polish, or Postfix notation is commonly used in Computer Science, particularly in reference to Stacks - but what are ...

I built a QR code with my bare hands to see how it works

I built a QR code with my bare hands to see how it works

How do QR codes work? The checkerboard patterns taking over the world, demystified. Go to https://Saily.com/veritasium and use ...

Diceware & Passwords - Computerphile

Diceware & Passwords - Computerphile

How do you pick a secure password that's memorable but truly random? Dr Mike Pound explains Diceware The Diceware ...

Home-Made Code - Computerphile

Home-Made Code - Computerphile

You, the

Shellshock Code & the Bash Bug - Computerphile

Shellshock Code & the Bash Bug - Computerphile

Audible free book: http://www.audible.com/

Cross Site Request Forgery - Computerphile

Cross Site Request Forgery - Computerphile

If you don't secure your web forms, one mistaken click could be all it takes for your users to delete their own accounts. Tom Scott ...

How I Turned Pi Into the Ultimate Coding Agent

How I Turned Pi Into the Ultimate Coding Agent

Pi has quickly become my favorite coding agent. It's fast, minimal, and you can customize it to an insane degree... Thank you ...

The Problem with Time & Timezones - Computerphile

The Problem with Time & Timezones - Computerphile

A web app that works out how many seconds ago something happened. How hard can coding that be? Tom Scott explains how ...