Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged content

Rss Feed Group items tagged

Janos Haits

Illuminate - 0 views

  •  
    "Illuminate is an experimental technology that uses AI to adapt content to your learning preferences. Discussions are generated with AI voices and are grounded in published academic papers. Generated content is provided for informational purposes only and may sometimes be offensive or inaccurate, so you should confirm any facts independently in the original content. AI voices are experimental and may sometimes make mistakes. Your feedback is helpful in improving the technology for everyone."
Islam TeCNo

Model-view-controller - Wikipedia, the free encyclopedia - 0 views

  • Model–view–controller (MVC) is an architectural pattern used in software engineering. Successful use of the pattern isolates business logic from user interface considerations, resulting in an application where it is easier to modify either the visual appearance of the application or the underlying business rules without affecting the other. In MVC, the model represents the information (the data) of the application; the view corresponds to elements of the user interface such as text, checkbox items, and so forth; and the controller manages the communication of data and the business rules used to manipulate the data to and from the model.
    • Abdelrahman Ogail
       
      MVC one of the important patterns used at any software. Especially in Web Development, Database Systems and sure in Game Development
    • Islam TeCNo
       
      please ya zikas 7ot more comments l eni mesh fahem awi ...ana eli fahmo eni afsl el GUI 3an el core code
  • MVC is often seen in web applications, where the view is the actual HTML or XHTML page, and the controller is the code that gathers dynamic data and generates the content within the HTML or XHTML. Finally, the model is represented by the actual content, which is often stored in a database or in XML nodes, and the business rules that transform that content based on user actions.
    • Islam TeCNo
       
      i think this is like PHP or ASP page .... you just See HTML (view) that is Generated by PHP/ASP Code (controller) that gather data from Database (content)
Janos Haits

OExchange - 0 views

  •  
    OExchange makes it possible to share any URL-based content with any service on the web. It defines: A common way for services to receive content, removing any and all service-specific integration requirements A discovery feature so services can publish themselves and their endpoints, making it possible to integrate with services you didn't even know about at development time A decentralized, user-centric model for saving preferred services, making sharing more personal
Janos Haits

Vulnerability, CDR and Antivirus APIs | Metadefender - 0 views

  •  
    "Select or drop a file up to 140 MB in size for malware analysis, vulnerability check, and data sanitization (CDR; Content Disarm and Reconstruction)."
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Islam TeCNo

Uniform Resource Identifier - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 16 Jun 09 - Cached
  • In computing, a Uniform Resource Identifier (URI) consists of a string of characters used to identify or name a resource on the Internet. Such identification enables interaction with representations of the resource over a network (typically the World Wide Web) using specific protocols. Schemes specifying a specific syntax and associated protocols define each URI. Contents [hide]
    • Abdelrahman Ogail
       
      I've confused between URL & URI till reading this article !
    • Islam TeCNo
       
      URL no3 men el URI :D ....ana faker eno kont shoft el 7eta deh fe ketab 3an el HTTP bas nesetha .......Zanks Zikas Again
  • A Uniform Resource Name (URN) functions like a person's name, while a Uniform Resource Locator (URL) resembles that person's street address. The URN defines an item's identity, while the URL provides a method for finding it. The ISBN system for uniquely identifying books provides a typical example of the use of typical URNs. ISBN 0486275574 (urn:isbn:0-486-27557-4) cites unambiguously a specific edition of Shakespeare's play Romeo and Juliet. In order to gain access to this object and read the book, one would need its location: a URL address. A typical URL for this book on a unix-like operating system might look like the file path file:///home/username/RomeoAndJuliet.pdf, identifying the electronic book saved in a local hard disk. So URNs and URLs have complementary purposes.
Islam TeCNo

How to Use the Windiff.exe Utility - 0 views

  • This article describes how to use the Windiff.exe utility, a tool that graphically compares the contents of two ASCII files, or the contents of two folders that contain ASCII files, to verify whether they are the same. The file byte count and the creation date are not reliable indications.
    • Abdelrahman Ogail
       
      This is pretty useful when comparing 2 versions of code you wrote before
    • Islam TeCNo
       
      I think TortoiseSVN come with a tool for comparing files and i expect it will be better :D:D ......Thanks ZiKaS
Janos Haits

Steem.io - 0 views

  •  
    "Steem powers Smart Media Tokens Steem is a blockchain-based rewards platform for publishers to monetize content and grow community."
Janos Haits

BitTorrent (BTT) - The token that will enable blockchain mass adoption - 0 views

  •  
    "BitTorrent (BTT) allows content creators to connect with their audience, earn and spend digital currency without a middleman. By connecting the BitTorrent peer-to-peer network to the TRON blockchain, we offer a new experience to over 100M+ users."
Janos Haits

Zotero | Home - 0 views

  •  
    A personal research assistant. Zotero is the only research tool that automatically senses content, allowing you to add it to your personal library with a single click. Whether you're searching for a preprint on arXiv.org, a journal article from JSTOR, a news story from the New York Times, or a book from your university library catalog, Zotero has you covered with support for thousands of sites.
Janos Haits

IPFS is a new peer-to-peer hypermedia protocol. - 0 views

  •  
    "PFS is a new hypermedia distribution protocol, addressed by content and identities. IPFS enables the creation of completely distributed applications. It aims to make the web faster, safer, and more open. IPFS is an open source project developed by the team at Interplanetary Networks and many contributors from the open source community."
Janos Haits

IPFS Documentation | IPFS Docs - 0 views

  •  
    "IPFS Desktop bundles an IPFS node, file manager, peer manager, and content explorer into a single, easy-to-use application. Use IPFS Desktop to get acquainted with IPFS without needing to touch the terminal - or, if you're already experienced, use the powerful menubar/taskbar shortcuts alongside the command line to make your IPFS workflow faster."
Janos Haits

Tor2Web: Browse the Tor Onion Services - Onion Search Engine - 0 views

  •  
    "This gateway to Tor hidden services provides convenient access to Tor hidden services. It is a pure proxy that forwards requests to the respective hidden service. We do not store any data and are not liable for the content."
Janos Haits

Proxy: Browse WEB with Proxy - Onion Search Engine - 0 views

  •  
    "Proxy: Browse WEB Anonymous This is a Proxy to WEB for browse website anonymous. It is a pure proxy that forwards requests for browse website in anonymous. We do not store any data and are not liable for the content."
Janos Haits

Quantiki | Quantum Information Portal and Wiki - 1 views

  •  
    "The world's leading portal for everyone involved in quantum information science. No matter if you are a researcher, a student or an enthusiast of quantum theory, this is the place you are going to find useful and enjoyable! While here on Quantiki you can: browse our content, including fascinating and educative articles, then create your own account and log in to gain more editorial possibilities."
Janos Haits

Best AI Writer, Content Generator & Copywriting Assistant | Easy-Peasy.AI - 0 views

  •  
    "Why choose one AI tool when you can have them all? MARKY: ChatGPT like AI chat with real-time data, vision, and PDF AI Chat Build no-code AI Bots by training on your own data. Embed on any website or share via URL"
Janos Haits

Wikiversity - 1 views

  •  
    "Wikiversity is a project of the Wikimedia Foundation. It is a centre for the creation and use of free learning materials and activities. We host free education resources and scholarly projects. We also aim at interacting with other Wikimedia projects and support their content de"
Janos Haits

Illuminate - 0 views

  •  
    "Turn academic papers into AI-generated audio discussions About this experiment Illuminate is an experimental technology that uses AI to adapt content to your learning preferences."
Janos Haits

Meet the bright web - beam - 0 views

  •  
    "Sync & End-to-End Encryption Your content is securely end-to-end encrypted and only you can access it."
Islam TeCNo

Database - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 08 Jun 09 - Cached
  • A database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships
    • Abdelrahman Ogail
       
      Database official definition
    • Islam TeCNo
       
      yes .... bas a3taked en el wa7ed yfham ahm b keter men eno ye3ref el Definition (dah mogarad test post hehe )
    • Islam TeCNo
       
      But in File Stucter we took that database is set of related files
  • increase their speed
  • common kind of index is a sorted list of the contents of some particular table column, with pointers to the row associated with the value
  • ...1 more annotation...
  • Typically, indexes are also stored in the various forms of data-structure mentioned above (such as B-trees, hashes, and linked lists)
1 - 20 of 21 Next ›
Showing 20 items per page