Media Summary: How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm ' Head to to get a 30-day free trial. The first 200 people will get 20% off their annual subscription. The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected ...

Hyperloglog Hit Counter Computerphile - Detailed Analysis & Overview

How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm ' Head to to get a 30-day free trial. The first 200 people will get 20% off their annual subscription. The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected ... Taking T-Diagrams to the next level, Professor Brailsford tries to improve last episode's intermediate codes. Grateful thanks to Dr ... Looking at the Alderson Loop with Dr Steve Bagley. Behind the scenes on the camera rig used for this episode: ... Matt Godbolt continues the story of the CPU and explains how machines do addition

You've scanned a room or object and now you have lots of discrete scans you want to fit together. Dr Mike Pound explains how ... Just how far can we go with processing speed? Physicist Professor Phil Moriarty talks about the hard limits of computing. How does branch prediction speed up operations? Matt Godbolt continues the deep dive into the inner workings of the CPU ... Program Correctness is incredibly important in computing - particularly in hardware design. Professor Graham Hutton takes us ... If you run out of headroom with your chosen sample rate, how do you avoid the problems of unwanted harmonics? Tracking unique users, hashtags, or events at scale is a massive challenge in big data.

Billions of possibilities - Dr Alex Turner borrowed some cluster time to obtain all of the potential results from all the possible games ... Here are some of the resources used for this video: ** Erratum ** - What The original version of text messaging had a flaw, but how can we investigate problems with software quickly and easily?

Photo Gallery

HyperLogLog Hit Counter - Computerphile
A problem so hard even Google relies on Random Chance
Log4J & JNDI Exploit: Why So Bad? - Computerphile
Improving Intermediate Codes - Computerphile
Hyperloglog  Explained | Counting things at scale.
Alderson Loop - Computerphile
Hyperloglog: Facebook's algorithm to count distinct elements
How CPUs Do Math(s) - Computerphile
Iterative Closest Point (ICP) - Computerphile
Computing Limit - Computerphile
HyperLogLog Algorithm Counting Unique IDs Efficiently
How Branch Prediction Works in CPUs - Computerphile
Sponsored
Sponsored
View Detailed Profile
Sponsored
Sponsored