Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged SOFTWARE

Rss Feed Group items tagged

Abdelrahman Ogail

Common Gateway Interface - Wikipedia, the free encyclopedia - 0 views

  • The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server, commonly a web server. The task of such an information server is to respond to requests (in the case of web servers, requests from client web browsers) by returning output. Each time a request is received, the server analyzes what the request asks for, and returns the appropriate output. The two basic methods for the server to do this are the following: If the request identifies a file stored on disk, then return the contents of that file. If the request identifies an executable command and possibly arguments, then run the command and return its output. CGI defines a standard way of doing the second. It defines how information about the server and the request is passed to the command in the form of arguments and environment variables, and how the command can pass back extra information about the output (such as the type) in the form of headers.
Islam TeCNo

Scalability - Wikipedia, the free encyclopedia - 0 views

  • In telecommunications and software engineering, scalability is a desirable property of a system, a network, or a process, which indicates its ability to either handle growing amounts of work in a graceful manner, or to be readily enlarged.[1] For example, it can refer to the capability of a system to increase total throughput under an increased load when resources (typically hardware) are added. An analogous meaning is implied when the word is used in a commercial context, where scalability of a company implies that the underlying business model offers the potential for economic growth within the company.
    • Abdelrahman Ogail
       
      In web applications, the client objects are removed from the server when they are sent to the client browser. This is great for scalability, but it can hurt the user and developer experience
    • Islam TeCNo
       
      mesh fahem ya Zikas commentak :D. we men el examples 3ala el scalabilty ...Gooogle we Gmail
    • Abdelrahman Ogail
       
      In Web applications client data are saved on the server (then the server memory is decreased that decreases the scalability - الإستيعاب-) So removing the client data improvers scalability becuase it saves server memory
    • Islam TeCNo
       
      ahaa :D Keshta.... ya3ni by3mlo delete 3ala el server ba3d lama el client ye3mel download :D hehe
Islam TeCNo

Rich Internet application - Wikipedia, the free encyclopedia - 0 views

  • Rich Internet applications (RIAs) are web applications that have some of the characteristics of desktop applications, typically delivered by way of a proprietary web browser plug-ins or independently via sandboxes or virtual machines[1]. Examples of RIA frameworks include Curl (programming language), Adobe Flash/Adobe Flex/AIR, Java/JavaFX[2], uniPaaS[3] and Microsoft Silverlight[4].
    • Abdelrahman Ogail
       
      RIA Application Definition. Seems to be applications that could be used to Web and Desktop Development as Java
    • Islam TeCNo
       
      (Y) .....ana bardo kont 3ayez a3ref eh RIA deh :D
  •  
    Very clear document :D .....need no explanation :D
Islam TeCNo

3APL - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 24 Jun 09 - Cached
Ahmed One liked it
  • An Abstract Agent Programming Language or Artificial Autonomous Agents Programming Language or 3APL (pronounced triple-A-P-L) is an experimental tool and programming language for the development, implementation and testing of multiple cognitive agents using the Belief-Desire-Intention (BDI) approach. The newest incarnation of 3APL is 2APL (A Practical Agent Programming Language).
    • Abdelrahman Ogail
       
      Anyone get anything about 2APL kindly tell me :D
    • Islam TeCNo
       
      wad7 enha 7aga 7elwa awi !
Abdelrahman Ogail

Mutation testing - Wikipedia, the free encyclopedia - 1 views

  • Mutation testing (or Mutation analysis) is a method of software testing, which involves modifying program's source code in small ways.[1] These, so-called mutations, are based on well-defined mutation operators that either mimic typical programming errors (such as using the wrong operator or variable name) or force the creation of valuable tests (such as driving each expression to zero). The purpose is to help the tester develop effective tests or locate weaknesses in the test data used for the program or in sections of the code that are seldom or never accessed during execution.
  • For example, consider the following C++ code fragment: if (a && b) c = 1; else c = 0; The condition mutation operator would replace '&&' with '||' and produce the following mutant: if (a || b) c = 1; else c = 0;
  • Many mutation operators can produce equivalent mutants. For example, consider the following code fragment: int index=0; while (...) { . . .; index++; if (index==10) break; } Boolean relation mutation operator will replace "==" with ">=" and produce the following mutant: int index=0; while (...) { . . .; index++; if (index>=10) break; }
Janos Haits

The CLIP OS Project | CLIP OS - 0 views

  •  
    "The CLIP OS project is an open source project maintained by the ANSSI (National Cybersecurity Agency of France) that aims to build a hardened, multi-level operating system, based on the Linux kernel and a lot of free and open source software."
Janos Haits

The Freenet Project - /index - 0 views

  •  
    Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in "darknet" mode, where users only connect to their friends, is very difficult to detect. Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security! "
computersciencej

Resources to Learn Coding - 0 views

  •  
    In this post we are going to tell about the websites which are preferred to learn coding. In a survey It is found that most of the Indian software developers and students are self taught to learn coding.
Janos Haits

AV-ATLAS - The Threat Intelligence Platform by AV-TEST - 0 views

  •  
    "The Threat Intelligence Platform by AV-TEST The threat situation around dangerous URLs, spam mails and software downloads is always in view thanks to up-to-date data in real time. With AV-ATLAS, the AV-TEST Institute presents you the Threat Intelligence Platform, which offers comprehensive Cyber Security Services for the defense against cyber threats."
Janos Haits

AV-ATLAS - The Threat Intelligence Platform by AV-TEST - 0 views

  •  
    "The Threat Intelligence Platform by AV-TEST The threat situation around dangerous URLs, spam mails and software downloads is always in view thanks to up-to-date data in real time. With AV-ATLAS, the AV-TEST Institute presents you the Threat Intelligence Platform, which offers comprehensive Cyber Security Services for the defense against cyber threats."
Janos Haits

Google Open Source - opensource.google.com - 0 views

  •  
    "Bringing better technology to the world by promoting open source"
Janos Haits

Made with Code | Google - 0 views

  •  
    "First, complete a coding activity to build a Snapchat Geofilter that expresses your vision for the future. Then write a statement about the future you envision and how you plan to achieve it. Submit both to the #MyFutureMe Challenge for a chance to build your own live Snapchat lens and more!"
computersciencej

Difference Between File Transfer Protocol and Hyper Text Transfer Protocol - 0 views

  •  
    In this post under Computer Science Study Material for Gate, we are going to tell the differences between File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). File Transfer Protocol FTP and HTTP both were developed to make Internet transmission better. FTP is used to exchange files between computer accounts, to transfer files between an account and a desktop computer (upload), or to access software archives on the Internet. It 's also commonly used to download programs and other files to your computer from other servers. It transfers files in two different formats ASCII for text files and Binary format for binary files. To Read full Article click on folowing link http://www.computersciencejunction.in/2017/11/differences-between-ftp-and-http.html
Janos Haits

Wekinator | Software for real-time, interactive machine learning - 0 views

  •  
    "The Wekinator allows users to build new interactive systems by demonstrating human actions and computer responses, instead of writing programming code."
Janos Haits

DevoPedia.org - 0 views

  •  
    for developers, by developers
Janos Haits

IPFS Distributions - 0 views

  •  
    "This is the downloads website for all the official software distributions of the IPFS Project. You can find all the apps, binaries, and packages here. Every distribution has a section on this page with … the distribution name and a short description the current version number and release date"
Janos Haits

Onion.Ws Tor2Web Gateway - 0 views

  •  
    "Onion.ws is a darknet gateway or Tor2Web proxy. Simply replace .onion with .onion.ws in your browsers url bar, press go and you will be redirected to that darknet site without the need to download or configure any new software such as Tor and I2P."
Janos Haits

Onion.Ws Tor2Web Gateway - 0 views

  •  
    "Onion.ws is a darknet gateway or Tor2Web proxy. Simply replace .onion with .onion.ws in your browsers url bar, press go and you will be redirected to that darknet site without the need to download or configure any new software such as Tor and I2P."
Janos Haits

The Internet Computer | DFINITY - 0 views

  •  
    "We believe that "smart contracts" that run on a public blockchain are a vastly superior new form of software. However, traditional blockchains provide hosting frameworks for smart contracts that are highly limiting. We believe that once these limitations are removed by a next generation blockchain, a "blockchain singularity" will occur, in which the majority of the world's systems and services will be rebuilt entirely from smart contracts. In the process, these sys"
Janos Haits

Freenet - 0 views

  •  
    "Introducing Freenet-a decentralized replacement for the World Wide Web. Acting as a global, shared computing platform, Freenet can be accessed via a standard web browser or embedded into software via an API."
‹ Previous 21 - 40 of 71 Next › Last »
Showing 20 items per page