The Science of Information: From Language to Black Holes
the great courses signature collection

The Science of Information: From Language to Black Holes

免费试享 The Great Courses Signature Collection 或购买

相关条款适用

The science of information is the most influential, yet perhaps least appreciated field in science today. Never before have we been able to acquire, record, communicate, and use information in so many different forms. This revolution goes far beyond the limitless content that fills our lives, because information also underlies our understanding of ourselves, the natural world, and the universe.
IMDb 7.2/102015第 1 季
TV-PG
24 集
  • The Transformability of Information - 1

    The Transformability of Information - 1

    What is information? Explore the surprising answer of American mathematician Claude Shannon, who concluded that information is the ability to distinguish reliably among possible alternatives. Consider why this idea was so revolutionary, and see how it led to the concept of the bit - the basic unit of information.
    What is information? Explore the surprising answer of American mathematician Claude Shannon, who concluded that information is the ability to distinguish reliably among possible alternatives. Consider why this idea was so revolutionary, and see how it led to the concept of the bit - the basic unit of information.
    TV-PG
    33 分钟
    2015年12月10日
  • Computation and Logic Gates - 2

    Computation and Logic Gates - 2

    Accompany the young Claude Shannon to the Massachusetts Institute of Technology, where in 1937 he submitted a master's thesis proving that Boolean algebra could be used to simplify the unwieldy analog computing devices of the day. Drawing on Shannon's ideas, learn how to design a simple electronic circuit that performs basic mathematical calculations.
    Accompany the young Claude Shannon to the Massachusetts Institute of Technology, where in 1937 he submitted a master's thesis proving that Boolean algebra could be used to simplify the unwieldy analog computing devices of the day. Drawing on Shannon's ideas, learn how to design a simple electronic circuit that performs basic mathematical calculations.
    TV-PG
    31 分钟
    2015年12月10日
  • Measuring Information - 3

    Measuring Information - 3

    How is information measured and how is it encoded most efficiently? Get acquainted with a subtle but powerful quantity that is vital to the science of information: entropy. Measuring information in terms of entropy sheds light on everything from password security to efficient binary codes to how to design a good guessing game.
    How is information measured and how is it encoded most efficiently? Get acquainted with a subtle but powerful quantity that is vital to the science of information: entropy. Measuring information in terms of entropy sheds light on everything from password security to efficient binary codes to how to design a good guessing game.
    TV-PG
    31 分钟
    2015年12月10日
  • Entropy and the Average Surprise - 4

    Entropy and the Average Surprise - 4

    Intuition says we measure information by looking at the length of a message. But Shannon's information theory starts with something more fundamental: how surprising is the message? Through illuminating examples, discover that entropy provides a measure of the average surprise.
    Intuition says we measure information by looking at the length of a message. But Shannon's information theory starts with something more fundamental: how surprising is the message? Through illuminating examples, discover that entropy provides a measure of the average surprise.
    TV-PG
    31 分钟
    2015年12月10日
  • Data Compression and Prefix-Free Codes - 5

    Data Compression and Prefix-Free Codes - 5

    Probe the link between entropy and coding. In the process, encounter Shannon's first fundamental theorem, which specifies how far information can be squeezed in a binary code, serving as the basis for data compression. See how this works with a text such as Conan Doyle's The Return of Sherlock Holmes.
    Probe the link between entropy and coding. In the process, encounter Shannon's first fundamental theorem, which specifies how far information can be squeezed in a binary code, serving as the basis for data compression. See how this works with a text such as Conan Doyle's The Return of Sherlock Holmes.
    TV-PG
    31 分钟
    2015年12月10日
  • Encoding Images and Sounds - 6

    Encoding Images and Sounds - 6

    Learn how some data can be compressed beyond the minimum amount of information required by the entropy of the source. Typically used for images, music, and video, these techniques drastically reduce the size of a file without significant loss of quality. See how this works in the MP3, JPEG, and MPEG formats.
    Learn how some data can be compressed beyond the minimum amount of information required by the entropy of the source. Typically used for images, music, and video, these techniques drastically reduce the size of a file without significant loss of quality. See how this works in the MP3, JPEG, and MPEG formats.
    TV-PG
    30 分钟
    2015年12月10日
  • Noise and Channel Capacity - 7

    Noise and Channel Capacity - 7

    One of the key issues in information theory is noise: the message received may not convey everything about the message sent. Discover Shannon's second fundamental theorem, which proves that error correction is possible and can be built into a message with only a modest slowdown in transmission rate.
    One of the key issues in information theory is noise: the message received may not convey everything about the message sent. Discover Shannon's second fundamental theorem, which proves that error correction is possible and can be built into a message with only a modest slowdown in transmission rate.
    TV-PG
    31 分钟
    2015年12月10日
  • Error-Correcting Codes - 8

    Error-Correcting Codes - 8

    Dig into different techniques for error correction. Start with a game called word golf, which demonstrates the perils of mistaking one letter for another and how to guard against it. Then graduate to approaches used for correcting errors in computer operating systems, CDs, and data transmissions from the Voyager spacecraft.
    Dig into different techniques for error correction. Start with a game called word golf, which demonstrates the perils of mistaking one letter for another and how to guard against it. Then graduate to approaches used for correcting errors in computer operating systems, CDs, and data transmissions from the Voyager spacecraft.
    TV-PG
    32 分钟
    2015年12月10日
  • Signals and Bandwidth - 9

    Signals and Bandwidth - 9

    Twelve billion miles from Earth, the Voyager spacecraft is sending back data with just a 20-watt transmitter. Make sense of this amazing feat by delving into the details of the Nyquist-Shannon sampling theorem, signal-to-noise ratio, and bandwidth - concepts that apply to many types of communication.
    Twelve billion miles from Earth, the Voyager spacecraft is sending back data with just a 20-watt transmitter. Make sense of this amazing feat by delving into the details of the Nyquist-Shannon sampling theorem, signal-to-noise ratio, and bandwidth - concepts that apply to many types of communication.
    TV-PG
    31 分钟
    2015年12月10日
  • Cryptography and Key Entropy - 10

    Cryptography and Key Entropy - 10

    The science of information is also the science of secrets. Investigate the history of cryptography starting with the simple cipher used by Julius Caesar. See how entropy is a useful measure of the security of an encryption key, and follow the deciphering strategies that cracked early codes.
    The science of information is also the science of secrets. Investigate the history of cryptography starting with the simple cipher used by Julius Caesar. See how entropy is a useful measure of the security of an encryption key, and follow the deciphering strategies that cracked early codes.
    TV-PG
    29 分钟
    2015年12月10日
  • Cryptanalysis and Unraveling the Enigma - 11

    Cryptanalysis and Unraveling the Enigma - 11

    Unravel the analysis that broke the super-secure Enigma code system used by the Germans during World War II. Led by British mathematician Alan Turing, the code breakers had to repeat their feat every day throughout the war. Also examine Claude Shannon's revolutionary views on the nature of secrecy.
    Unravel the analysis that broke the super-secure Enigma code system used by the Germans during World War II. Led by British mathematician Alan Turing, the code breakers had to repeat their feat every day throughout the war. Also examine Claude Shannon's revolutionary views on the nature of secrecy.
    TV-PG
    31 分钟
    2015年12月10日
  • Unbreakable Codes and Public Keys - 12

    Unbreakable Codes and Public Keys - 12

    The one-time pad may be in principle unbreakable, but consider the common mistakes that make this code system vulnerable. Focus on the Venona project that deciphered Soviet intelligence messages encrypted with one-time pads. Close with the mathematics behind public key cryptography, which makes modern transactions secure - for now.
    The one-time pad may be in principle unbreakable, but consider the common mistakes that make this code system vulnerable. Focus on the Venona project that deciphered Soviet intelligence messages encrypted with one-time pads. Close with the mathematics behind public key cryptography, which makes modern transactions secure - for now.
    TV-PG
    31 分钟
    2015年12月10日
  • What Genetic Information Can Do - 13

    What Genetic Information Can Do - 13

    Learn how DNA and RNA serve as the digital medium for genetic information. Also see how shared features of different life forms allow us to trace our origins back to an organism known as LUCA - the last universal common ancestor - which lived 3.5 to 4 billion years ago.
    Learn how DNA and RNA serve as the digital medium for genetic information. Also see how shared features of different life forms allow us to trace our origins back to an organism known as LUCA - the last universal common ancestor - which lived 3.5 to 4 billion years ago.
    TV-PG
    31 分钟
    2015年12月10日
  • Life’s Origins and DNA Computing - 14

    Life’s Origins and DNA Computing - 14

    DNA, RNA, and the protein molecules they assemble are so interdependent that it's hard to picture how life got started in the first place. Survey a selection of intriguing theories, including the view that genetic information in living cells results from eons of natural computation.
    DNA, RNA, and the protein molecules they assemble are so interdependent that it's hard to picture how life got started in the first place. Survey a selection of intriguing theories, including the view that genetic information in living cells results from eons of natural computation.
    TV-PG
    31 分钟
    2015年12月10日
  • Neural Codes in the Brain - 15

    Neural Codes in the Brain - 15

    Study the workings of our innermost information system: the brain. Take both top-down and bottom-up approaches, focusing on the world of perception, experience, and external behavior on the one hand versus the intricacies of neuron activity on the other. Then estimate the total information capacity of the brain.
    Study the workings of our innermost information system: the brain. Take both top-down and bottom-up approaches, focusing on the world of perception, experience, and external behavior on the one hand versus the intricacies of neuron activity on the other. Then estimate the total information capacity of the brain.
    TV-PG
    31 分钟
    2015年12月10日
  • Entropy and Microstate Information - 16

    Entropy and Microstate Information - 16

    Return to the concept of entropy, tracing its origin to thermodynamics, the branch of science dealing with heat. Discover that here the laws of nature and information meet. Understand the influential second law of thermodynamics, and conduct a famous thought experiment called Maxwell's demon.
    Return to the concept of entropy, tracing its origin to thermodynamics, the branch of science dealing with heat. Discover that here the laws of nature and information meet. Understand the influential second law of thermodynamics, and conduct a famous thought experiment called Maxwell's demon.
    TV-PG
    30 分钟
    2015年12月10日
  • Erasure Cost and Reversible Computing - 17

    Erasure Cost and Reversible Computing - 17

    Maxwell's demon has startling implications for the push toward ever-faster computers. Probe the connection between the second law of thermodynamics and the erasure of information, which turns out to be a practical barrier to computer processing speed. Learn how computer scientists deal with the demon.
    Maxwell's demon has startling implications for the push toward ever-faster computers. Probe the connection between the second law of thermodynamics and the erasure of information, which turns out to be a practical barrier to computer processing speed. Learn how computer scientists deal with the demon.
    TV-PG
    31 分钟
    2015年12月10日
  • Horse Races and Stock Markets - 18

    Horse Races and Stock Markets - 18

    One of Claude Shannon's colleagues at Bell Labs was the brilliant scientist and brash Texan John Kelly. Explore Kelly's insight that information is the advantage we have in betting on possible alternatives. Apply his celebrated log-optimal strategy to horse racing and stock trading.
    One of Claude Shannon's colleagues at Bell Labs was the brilliant scientist and brash Texan John Kelly. Explore Kelly's insight that information is the advantage we have in betting on possible alternatives. Apply his celebrated log-optimal strategy to horse racing and stock trading.
    TV-PG
    32 分钟
    2015年12月10日
  • Turing Machines and Algorithmic Information - 19

    Turing Machines and Algorithmic Information - 19

    Contrast Shannon's code- and communication-based approach to information with a new, algorithmic way of thinking about the problem in terms of descriptions and computations. See how this idea relates to Alan Turing's theoretical universal computing machine, which underlies the operation of all digital computers.
    Contrast Shannon's code- and communication-based approach to information with a new, algorithmic way of thinking about the problem in terms of descriptions and computations. See how this idea relates to Alan Turing's theoretical universal computing machine, which underlies the operation of all digital computers.
    TV-PG
    31 分钟
    2015年12月10日
  • Uncomputable Functions and Incompleteness - 20

    Uncomputable Functions and Incompleteness - 20

    Algorithmic information is plagued by a strange impossibility that shakes the very foundations of logic and mathematics. Investigate this drama in four acts, starting with a famous conundrum called the Berry Paradox and including Turing's surprising proof that no single computer program can determine whether other programs will ever halt.
    Algorithmic information is plagued by a strange impossibility that shakes the very foundations of logic and mathematics. Investigate this drama in four acts, starting with a famous conundrum called the Berry Paradox and including Turing's surprising proof that no single computer program can determine whether other programs will ever halt.
    TV-PG
    31 分钟
    2015年12月10日
  • Qubits and Quantum Information - 21

    Qubits and Quantum Information - 21

    Enter the quantum realm to see how this revolutionary branch of physics is transforming the science of information. Begin with the double-slit experiment, which pinpoints the bizarre behavior that makes quantum information so different. Work your way toward a concept that seems positively magical: the quantum computer.
    Enter the quantum realm to see how this revolutionary branch of physics is transforming the science of information. Begin with the double-slit experiment, which pinpoints the bizarre behavior that makes quantum information so different. Work your way toward a concept that seems positively magical: the quantum computer.
    TV-PG
    30 分钟
    2015年12月10日
  • Quantum Cryptography via Entanglement - 22

    Quantum Cryptography via Entanglement - 22

    Learn how a feature of the quantum world called entanglement is the key to an unbreakable code. Review the counterintuitive rules of entanglement. Then play a game based on The Newlywed Game that illustrates the monogamy of entanglement. This is the principle underlying quantum cryptography.
    Learn how a feature of the quantum world called entanglement is the key to an unbreakable code. Review the counterintuitive rules of entanglement. Then play a game based on The Newlywed Game that illustrates the monogamy of entanglement. This is the principle underlying quantum cryptography.
    TV-PG
    32 分钟
    2015年12月10日
  • It from Bit: Physics from Information - 23

    It from Bit: Physics from Information - 23

    Physicist John A. Wheeler's phrase "It from bit" makes a profound point about the connection between reality and information. Follow this idea into a black hole to investigate the status of information in a place of unlimited density. Also explore the information content of the entire universe!
    Physicist John A. Wheeler's phrase "It from bit" makes a profound point about the connection between reality and information. Follow this idea into a black hole to investigate the status of information in a place of unlimited density. Also explore the information content of the entire universe!
    TV-PG
    31 分钟
    2015年12月10日
  • The Meaning of Information - 24

    The Meaning of Information - 24

    Survey the phenomenon of information from pre-history to the projected far future, focusing on the special problem of anti-cryptography - designing an understandable message for future humans or alien civilizations. Close by revisiting Shannon's original definition of information and ask, "What does the theory of information leave out?"
    Survey the phenomenon of information from pre-history to the projected far future, focusing on the special problem of anti-cryptography - designing an understandable message for future humans or alien civilizations. Close by revisiting Shannon's original definition of information and ask, "What does the theory of information leave out?"
    TV-PG
    33 分钟
    2015年12月10日
  • The Science of Information: From Language to Black Holes
    IMDb 7.2/102015第 1 季
    The science of information is the most influential, yet perhaps least appreciated field in science today. Never before have we been able to acquire, record, communicate, and use information in so many different forms. This revolution goes far beyond the limitless content that fills our lives, because information also underlies our understanding of ourselves, the natural world, and the universe.
    创作者和演职人员
    导演
    Mario Hernández
    制片商
    The Great Courses
    演员
    Benjamin Schumacher
    工作室
    The Great Courses
    评论
    1. 5 星
      0%
    2. 4 星
      0%
    3. 3 星
      0%
    4. 2 星
      0%
    5. 1 星
      0%
    阅读所有评论
    音频语言
    English
    字幕
    English [CC]
    订购或观看即表示您同意我们的条款。由 Amazon.com Services LLC 出售。

    反馈