Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged Imported

Rss Feed Group items tagged

Ahmed  One

Cryptography - Wikipedia, the free encyclopedia - 0 views

  •  
    I think this Concept is very important to know.
Janos Haits

https://nectome.com - 0 views

  •  
    "Our mission is to preserve your brain well enough to keep all its memories intact: from that great chapter of your favorite book to the feeling of cold winter air, baking an apple pie, or having dinner with your friends and family. If memories can truly be preserved by a sufficiently good brain banking technique, we believe that within the century it could become feasible to digitize your preserved brain and use that information to recreate your mind. How close are we to this possibility? Currently, we can preserve the connectomes of animal brains and are working on extending our techniques to human brains in a research context. This is an important first step towards the development of a verified memory preservation protocol, as the connectome plays a vital role in memory storage."
Janos Haits

Arch Mission - 0 views

  •  
    'The Arch Mission Foundation™ is a 501(c)(3) tax-exempt non-profit corporation designed to continuously preserve and disseminate humanity's most important knowledge across time and space.'
computersciencej

ER Diagram Examples and Concepts Tutorial - 0 views

  •  
    In this er diagram examples based tutorial we will learn about some important concepts of entity relationship diagram such as er diagram definition, er diagram symbols and notations, er diagram examples and different components of er diagram
Janos Haits

Glaive - Language models for all - 0 views

  •  
    "At Glaive our vision is to democratise and commoditise AI, to enable a future where all companies and individuals have a fleet of models working for their use cases. Software changed the world and became the most significant tool for humans to solve important problems and create massive wealth and opportunities, however this was only possible because everyone today can build and truly own their software.
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Abdelrahman Ogail

Theory of mind - Wikipedia, the free encyclopedia - 0 views

  • Theory of mind is the ability to attribute mental states—beliefs, intents, desires, pretending, knowledge, etc.—to oneself and others and to understand that others have beliefs, desires and intentions that are different from one's own.[1]
  • One of the most important milestones in theory of mind development is gaining the ability to attribute false belief: that is, to recognize that others can have beliefs about the world that are wrong. To do this, it is suggested, one must understand how knowledge is formed, that people’s beliefs are based on their knowledge, that mental states can differ from reality, and that people’s behavior can be predicted by their mental states. Numerous versions of the false-belief task have been developed, based on the initial task done by Wimmer and Perner (1983).
  • In the most common version of the false-belief task (often called the ‘Sally-Anne’ task), children are told or shown a story involving two characters. For example, in one version, the child is shown two dolls, Sally and Anne, playing with a marble. The dolls put away the marble in a box, and then Sally leaves. Anne takes the marble out and plays with it again, and after she is done, puts it away in a different box. Sally returns and the child is then asked where Sally will look for the marble. The child passes the task if she answers that Sally will look in the first box where she put the marble; the child fails the task if she answers that Sally will look in the second box, where the child knows the marble is hidden, even though Sally cannot know, since she did not see it hidden there. In order to pass the task, the child must be able to understand that another’s mental representation of the situation is different from their own, and the child must be able to predict behavior based on that understanding. The results of research using false-belief tasks have been fairly consistent: most normally-developing children are unable to pass the tasks until around the age of three or four.
    • Abdelrahman Ogail
       
      Test your small brother this test if he/she under 3 years!
Islam TeCNo

Model-view-controller - Wikipedia, the free encyclopedia - 0 views

  • Model–view–controller (MVC) is an architectural pattern used in software engineering. Successful use of the pattern isolates business logic from user interface considerations, resulting in an application where it is easier to modify either the visual appearance of the application or the underlying business rules without affecting the other. In MVC, the model represents the information (the data) of the application; the view corresponds to elements of the user interface such as text, checkbox items, and so forth; and the controller manages the communication of data and the business rules used to manipulate the data to and from the model.
    • Abdelrahman Ogail
       
      MVC one of the important patterns used at any software. Especially in Web Development, Database Systems and sure in Game Development
    • Islam TeCNo
       
      please ya zikas 7ot more comments l eni mesh fahem awi ...ana eli fahmo eni afsl el GUI 3an el core code
  • MVC is often seen in web applications, where the view is the actual HTML or XHTML page, and the controller is the code that gathers dynamic data and generates the content within the HTML or XHTML. Finally, the model is represented by the actual content, which is often stored in a database or in XML nodes, and the business rules that transform that content based on user actions.
    • Islam TeCNo
       
      i think this is like PHP or ASP page .... you just See HTML (view) that is Generated by PHP/ASP Code (controller) that gather data from Database (content)
Islam TeCNo

علم الحاسب للناشئة - 0 views

shared by Islam TeCNo on 09 Jun 09 - No Cached
  • علم الحاسوب للناشئة
    • Abdelrahman Ogail
       
      Many people now feel the importance of teaching programming to children. I suggest each one try to test this with his brothers :D
    • Islam TeCNo
       
      LOL @ this picture and thanks ZiKaS
  •  
    a Page that contains some Sites and programming languages that help young to start programming
  •  
    Great Page that contains some Sites and programming languages that help young to start programming
cecilia marie

Remote PC Support: Convenient and Fast - 1 views

I was visiting my grandparents in the country one day. They own a personal computer at their house which they usually use for making important documents. One one of our visits, I used it to check m...

remote pc support

started by cecilia marie on 04 Nov 11 no follow-up yet
Janos Haits

IPFS is a new peer-to-peer hypermedia protocol. - 0 views

  •  
    "PFS is a new hypermedia distribution protocol, addressed by content and identities. IPFS enables the creation of completely distributed applications. It aims to make the web faster, safer, and more open. IPFS is an open source project developed by the team at Interplanetary Networks and many contributors from the open source community."
Janos Haits

IPFS Distributions - 0 views

  •  
    "This is the downloads website for all the official software distributions of the IPFS Project. You can find all the apps, binaries, and packages here. Every distribution has a section on this page with … the distribution name and a short description the current version number and release date"
Janos Haits

GRID - Global Research Identifier Database - 0 views

  •  
    "GRID is a free and openly available global database of research-related organisations, cataloging research-related organisations and providing each with a unique and persistent identifier. With GRID you have over 102,392 carefully curated records at hand, enabling you to identify and distinguish research-related institutions worldwide.
1 - 14 of 14
Showing 20 items per page