Find out what a giant wooden horse and your cyber security have in common!
Zip Zop Zoom! Learn the super cool logic behind 'ZIP' Files!
Forks are used in software development to describe how projects and software work.
Welcome to the far away land of the Ein Lifon where the number of appendages you have changes how you count!
Learn how asymmetric encryption and prime numbers help keep you safe online!
What in the world is a video redundancy? Find out that and more in this crash course on encoding!
How can we apply the Konigsberg Bridge problem to real life and even make a game out of it? With Spouts of course!
Bogons are not an evil race of aliens. But they do shine a light on one part of the internet little known outside of a few security technologists.
Aim for their Motherboard! This time we are talking about Computer Zombies!
Ever wonder if a computer could shake hands? It happens more than you would think!
Be wary of these password pitfalls that hackers love and learn how to keep your data secure!
Yee-ha! In the wild wild west of the internet, antivirus software is a must-have partner.
What do bubbles, pancakes, and spaghetti all have in common? They're all great for sorting!
Exploring the concept of RAM and how it helps your MInecraft game run better.
Breaking down big problems into smaller ones is a great way to solve them. Let's see how recursion helps us do this!
Programs are constantly being patched and improved. How do we keep track of all this new code?
Dive into the nitty-gritty details of binary numbers: how they work, why they’re used, and where they come from.
Learn about the smallest, simplest computers and where they’re still used today.
Learn about the key software that keeps your computer safe from viruses.
From the start of computing history, people have tried to optimize the software programming process. This includes having two coders work together to code software.
Take a peek into the importance — and the struggle — of getting truly random data.
500 words Learn More
500 words Learn More
Learn the delicious-sounding secrets that websites use to keep your passwords safe from hackers.
A simple, quirky theorem with big applications, from picking socks to counting hairs.
There are pros and cons to networking all the “smart” devices in your home. What surprises does the future hold?
Is it possible to steal software? And how do we know who owns code?
Eating dog food doesn't sound like much fun but it's an important part of creating software.
Why does your computer need special hardware to render graphics? And what’s the deal with all those pixels, anyways?
A quick primer to the ins and outs of typed vs untyped programming languages.