Immutability Computerphile

About on Immutability Computerphile

Newcomb's Problem is a thought experiment which, on the surface, seems obvious, but what if you're trying it out on your identical ... Monads sound scary, but Professor Graham Hutton breaks down how handy they can be. They're called 'Finite State Automata" and occupy the centre of Chomsky's Hierarchy - Professor Brailsford explains the ultimate ... Learn more and apply to Jane Street's WiSE program in New York, London or Hong Kong: ... Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of ... Could a computer program find Fermat's Lost Theorem? Professor Altenkirch shows us how to get started with lean. EXTRA BITS ...

Dicussing implementation with Professor Brailsford. Professor Brailsford emailed me after we recorded this to say that of course ... Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ... How about a Neural Net where the neurons are actual atoms? Professor Phil Moriarty shows a paper demonstrating the principle ... We're looking at how the CPU deals with the 'outside world' as Matt Godbolt continues his low-level tour of the computer! Find out ... Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works. Gödel's Incompleteness Theorem explained with Pen, Paper & Lean (the proof assistant) Professor Thorsten Altenkirch is based ...

Core Information

Explore the key sources for Immutability Computerphile.

The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how.

Developments

Stay updated on Immutability Computerphile's latest milestones.

Computers Without Memory - Computerphile
Why Multi-Threaded Code Can Sometimes Misbehave (Weak Memory Concurrency) - Computerphile
Flip Flops, Latches & Memory Details - Computerphile
Public Key Cryptography - Computerphile
Automated Mathematical Proofs - Computerphile
Implementation - Computerphile
Generative AI's Greatest Flaw - Computerphile
Atomic Brain? - Computerphile
CPU Interrupts - Computerphile
Oblivious Transfer - Computerphile
Gödel's Incompleteness Theorem - Computerphile
What's Behind Port Smash? - Computerphile

Detailed Analysis

Data is compiled from public records and verified media reports.

Last Updated: May 21, 2026

Summary

For 2026, Immutability Computerphile remains one of the most searched-for profiles. Check back for the latest updates.

Disclaimer:

Immutability - Computerphile

Immutability - Computerphile

Discussing

Editorial 10:05 99,336 views 15 November 2025

LLMs and Newcomb's Problem - Computerphile

LLMs and Newcomb's Problem - Computerphile

Newcomb's Problem is a thought experiment which, on the surface, seems obvious, but what if you're trying it out on your identical ...

Editorial 18:32 86,132 views 07 November 2025

Immutability, visually explained | Code Words

Immutability, visually explained | Code Words

Immutable

Editorial 7:08 14,740 views 11 Mei 2026

What is a Monad? - Computerphile

What is a Monad? - Computerphile

Monads sound scary, but Professor Graham Hutton breaks down how handy they can be.

Editorial 21:50 654,232 views 26 Januari 2026

Computers Without Memory - Computerphile

Computers Without Memory - Computerphile

They're called 'Finite State Automata" and occupy the centre of Chomsky's Hierarchy - Professor Brailsford explains the ultimate ...

Editorial 8:52 349,811 views 19 Januari 2026

Why Multi-Threaded Code Can Sometimes Misbehave (Weak Memory Concurrency) - Computerphile

Why Multi-Threaded Code Can Sometimes Misbehave - Computerphile

Learn more and apply to Jane Street's WiSE program in New York, London or Hong Kong: ...

Editorial 16:25 42,435 views 29 Juni 2025

Flip Flops, Latches & Memory Details - Computerphile

Flip Flops, Latches & Memory Details - Computerphile

Audible free book: http://www.audible.com/

Editorial 8:54 152,029 views 01 Februari 2026

Public Key Cryptography - Computerphile

Public Key Cryptography - Computerphile

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of ...

Editorial 6:20 978,040 views 03 Oktober 2025

Automated Mathematical Proofs - Computerphile

Automated Mathematical Proofs - Computerphile

Could a computer program find Fermat's Lost Theorem? Professor Altenkirch shows us how to get started with lean. EXTRA BITS ...

Editorial 18:02 107,112 views 29 Maret 2026

Implementation - Computerphile

Implementation - Computerphile

Dicussing implementation with Professor Brailsford. Professor Brailsford emailed me after we recorded this to say that of course ...

Editorial 5:01 65,712 views 10 April 2026

Generative AI's Greatest Flaw - Computerphile

Generative AI's Greatest Flaw - Computerphile

Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ...

Editorial 12:23 593,088 views 06 Desember 2025

Atomic Brain? - Computerphile

Atomic Brain? - Computerphile

How about a Neural Net where the neurons are actual atoms? Professor Phil Moriarty shows a paper demonstrating the principle ...

Editorial 13:30 83,704 views 19 Juli 2025

CPU Interrupts - Computerphile

CPU Interrupts - Computerphile

We're looking at how the CPU deals with the 'outside world' as Matt Godbolt continues his low-level tour of the computer! Find out ...

Editorial 16:47 70,902 views 25 Desember 2025

Oblivious Transfer - Computerphile

Oblivious Transfer - Computerphile

Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works.

Editorial 20:15 58,849 views 03 Juni 2025

Gödel's Incompleteness Theorem - Computerphile

Gödel's Incompleteness Theorem - Computerphile

Gödel's Incompleteness Theorem explained with Pen, Paper & Lean (the proof assistant) Professor Thorsten Altenkirch is based ...

Editorial 18:55 100,972 views 08 Desember 2025

What's Behind Port Smash? - Computerphile

What's Behind Port Smash? - Computerphile

The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how.

Editorial 14:06 72,197 views 15 Mei 2026