Reading Guide & Coverage Overview

Acropalypse Now Computerphile Information Center

Get comprehensive updates, key reports, and detailed insights compiled from verified editorial sources.

Table of Contents

Background on Acropalypse Now Computerphile

Researchers stumbled upon a simple but worrying bug. Cropped images from Pixel phones contained a great deal of the original ... Language Models' Achilles heel: Rob Miles talks about "glitch" tokens, those mysterious words which, which result in gibberish ... Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works. Professor Brailsford helped Adobe with PDF. His group helped move publishing forwards by publishing a journal about publishing ... We've all got to the edge of the wifi coverage, but the idea of coverage produces a network problem, the Hidden Node Problem. The psychic paper in the TV show "Doctor Who" displays whatever the Doctor needs it to show at any given time. The Java ...

The tongue-in-cheek title refers to the fact that eBPF can be a shortcut to programming inside the kernel. Dr Richard G Clegg of ... Plausible text generation has been around for a couple of years, but how does it work - and what's next? Rob Miles on Language ... Outlining the basics of compression methods, including some of the pitfalls! Dr Steve Bagley demonstrates. How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ... Just what is happening inside a Convolutional Neural Network? Dr Mike Pound shows us the images in between the input and the ... Mike explains a paper from the University of Maryland, proposing a neat trick to 'watermark' the output of large language models ...

Core Information

Explore the key sources for Acropalypse Now Computerphile.

Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike's myriad Diffie-Hellman ... How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ... How do websites marry up to their IP addresses? Dr Mike Pound explains the Domain Name System - DNS. The 'secure' TETRA communications system has been used by police and security services for decades, it's been revealed that ... We haven't got time to label things, so can we let the computers work it out for themselves? Professor Uwe Aickelin explains ...

Developments

Stay updated on Acropalypse Now Computerphile's newest achievements.

Featured Video Reports & Highlights

Below is a handpicked selection of video coverage, expert reports, and highlights regarding Acropalypse Now Computerphile from verified contributors.

Acropalypse Now - Computerphile
VIDEO

Acropalypse Now - Computerphile

190,580 views Live Report

Researchers stumbled upon a simple but worrying bug. Cropped images from Pixel phones contained a great deal of the original ...

Glitch Tokens - Computerphile
VIDEO

Glitch Tokens - Computerphile

346,374 views Live Report

Language Models' Achilles heel: Rob Miles talks about "glitch" tokens, those mysterious words which, which result in gibberish ...

Oblivious Transfer - Computerphile
VIDEO

Oblivious Transfer - Computerphile

58,856 views Live Report

Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works.

Discussing PDF@30 Years Old - Computerphile
VIDEO

Discussing PDF@30 Years Old - Computerphile

99,613 views Live Report

Professor Brailsford helped Adobe with PDF. His group helped move publishing forwards by publishing a journal about publishing ...

Deep Dive

Data is compiled from public records and verified media reports.

Last Updated: May 23, 2026

Summary

For 2026, Acropalypse Now Computerphile remains one of the most talked-about profiles. Check back for the newest reports.

Disclaimer: