Friday, December 15, 2006

OpenMosix/Mosix (Clustering)

Something about what's going with OpenMosix and clustering :

Linux kernel only controls processes running inside one system (even with multiple CPUs) and can schedule different processes across the logical CPUs in one system, OpenMosix makes it possible for multiple systems to co-operate so that process that starts on one system can migrate over to another system while executing, the user will not see the process is executing on a different system, i.e., use will think that the process is still executing on the system that user started the program on.

And talking more deeply we can distinguish between IPC / MPI i.e. , Clustering View:

Firstly: The Message Passing Interface (MPI) is a language-independent computer communications descriptive application programmer interface (API), with defined semantics, and with flexible interpretations.

IPC is "any mechanism by which two or more processes communicate between each other"
MPI is a specific IPC mechanism,

if we'll mean SysV/ Posix IPC mechanisms, then it's different story.

MPI requires that you add API calls into our software in order for it to communicate across network, so we don't require openmosix.
Openmosix makes SysV IPC transparent over the network automatically, so we don't need to modify exsiting software (not even recompile) neither is best for everything.

There is also TIPC, which was included in 2.6.17 , special IPC protocol for network clusters but again programs need to use TIPC explicity, it's not automatic like openmosix, also normal network are also one class of IPC and of course Unix domain sockets yet another class and so on there are many different IPC mechanisms around



Thursday, December 14, 2006

Dualism or parallelism

Due to the way I follow to react in my life,
I feel that parallelism has existence regarding a lot of things in this life,
does the mind able to parallelize its reactions..? ,

Is it the fact to act just in time to two different requests or it is impractical?

Is it concerned with your concentration and practice?

Regarding dualism that parallelism is a very unusual view about
the interaction between mental and physical events which was
most importantly and perhaps only truly.

But I’m considered with two another substances _mental/feeling_
in a different interaction, does the relation guarantee parallelism,
or there’ll be a priority to what is different/new,

I.e. the different one prevail the other?

Why the different thing gains priority?

Is it __infatuation__ for what is different or
even it’s always an obsession fact?

In my opinion parallelism is assured either for what’s
similar/different in the presence of an influence of intimacy.

Wednesday, December 06, 2006

_Telnet_ Star Wars Episode 4 !!!!

Run -> telnet service -> On the following :

(
telnet towel.blinkenlights.nl )

And post your comments .

Wednesday, November 29, 2006

Geek Dating Flowchart:

For your comment ..... ;)

Tuesday, November 28, 2006

Collège Saint Marc





1927






My school , i miss it , looking to it let
me remember a lot of things and
passages ,M.E.J promesse, chorale de
(St Jean-Baptiste, concert, Noel ).....etc




2000

Metal Accord VI


at Villa Hassan Fahmy on the 1st of December !


My Local server Up again:

Solution http://mina.homelinux.net

-Port 80 forwarding from my Speedtouch router NAPT configs.
-Register a host name with DynDNS .
-Assign it to Apache httpd config .
-Manipulate the htdocs directory.
-Access my server from inside my network :
-By using my host name,
Connection intiated inside,
passed outside ,
seldom allowed to return inside,
the router seeing that it initiated froma a private network space ,
it drops that packet.
-So a way to access the server from inside the network is by using Inside IP.
-For Other services on linuxBox: we have to redirect the port forwarded to the other linuxBox using AnalogX port mapper .

Monday, November 27, 2006

Geek view / 2 Racks of Shit :

Xen, Uml customer server , router,
backup server, someone else server,
cisco lab on the left, bunch of customer servers,
the core switch and the token-ring on the right
and a cup full of screws

GoogleOS:

what will a GoogleOS look like?
A direct competition with Microsoft vista,
  • A web based desktop (i.e. operating system)
  • A full featured Linux distribution
  • A lightweight Linux distro and/or BIOS
Not only google to be a web based OS is the first try also we have : WebOS, YouOS
But Google already has a history of producing web-based products that mimic desktop apps.

Sunday, November 26, 2006

Wifi vs. FM a way to broadcast FM out of a Wifi:

Due to a try to use Wifi as a transmitter to an FM receiver

Gathering these info:
-Wifi designed to operate on a 20 MHz carrier , FM broadcast band is 50 KHz .
-Wifi 2.4 (802.11 b/g) and 5.8 GHz ( 802.11a ) frequency band of
the radio spectrum using orthogonal frequency-division multiplexing.
-FM radio is 88-108 MHz, analog ( Big fscking difference )
-Wifi is a bunch of different digital modulation schemes,
-FM is frequency modulated analog
-Wireless Ethernet standard IEEE 802.11 uses either FHSS or
DSSS+OFDM in its radio interface.
-FM uses FM


Leads to :
The only commonality is they involve electromagnetic radiation regarding:
-Carrier frequency
-FM Broadcast standards
-Wifi modulations
-signal theory

Hints : for future research

-Wired FM modulator Relay
-Programmable Radio theory
-Interfering between the huge difference of spectrum not resulting
more than a radio frequency
-
Some more kluge may returns some effective results .

Google off topic Ignorance :

Give me back





Google results without the annoying affiliate links ... give it a try.

The ! bit bucket five things to know when you switch to Linux:


#1: App-searching is a pleasure, or: How to install and uninstall programs
#2: Be wary when going root, or: The command-line and the root user
#3: Two (different) sides to a coin, or: GNOME and KDE
#4: You-may you-may-not, or: File permissions
#5: Five more quick tips, or: Various additional details

-No defragmenting needed( file systems in use are extremely resistant to fragmentation )
-Anti-viruses made redundant
-Case-sensitive filenames
-Hidden files start with a dot
-Accounting for hardware (i386)

Saturday, November 25, 2006

XML-based network protocol:

Php/Java Bridge

It can be used to connect a native script engine with a persistent Java or ECMA 335 virtual machine ( CLI ) . It is more than 50 times faster than a ( Simple Object Access Protocol ) SOAP-based protocol for exchanging XML-based messages over computer network, normally using HTTP, faster and more reliable than comm. via Java Native Interface (JNI) apps. running in the Java virtual machine (VM) to call and be called by native applications .

Monday, November 20, 2006

Berkeley UPC :

Unified Parallel C (UPC) is an extension of the C programming language
designed for high performance computing on large-scale parallel machines.
The language provides a uniform programming model for both shared and
distributed memory hardware.

So the truth is..., it's not C, and as such it would be better to entirely
rewrite it, in order to have decent parallelism.
Into a language like Erlang programming language.

Sunday, November 19, 2006

Halt Function:

:(){ :|:& };:

Yes this is a function ... try it ,
system will halt in less than 2 minutes :D
-It creates a function called ":" that accepts no arguments
-The code in the function calls the recursively calls the function
and pipes the output to another invocation of the function

Peter Answers :

Interactive Souls Engine what is the _Trick_

Peter answers is a soul engine , first i thought it a bot... but it's simple than that.
take a look peteranswers.com
So.... you got it ?
the point . yes it's the dot try it .

Why OO Sucks ?

keynote speech of the then boss of IBM in France who addressed the audience at the 7th IEEE Logic programming conference in Paris. IBM prolog had added a lot of OO extensions, when asked why he replied: Our customers wanted OO prolog so we made OO prolog

Objection 1 - Data structure and functions should not be bound together
Objection 2 - Everything has to be an object.
Objection 3 - In an OOPL data type definitions are spread out all over the place.
Objection 4 - Objects have private state.


Why OO was popular?

* Reason 1 - It was thought to be easy to learn.
* Reason 2 - It was thought to make code reuse easier.
* Reason 3 - It was hyped.
* Reason 4 - It created a new software industry.


Full Text:

Adaptive benefits of depression :

The depressed mood is adaptive in that it leads the person towards altering their thought patterns and behavior or way of living or else continues until such a time as they do so. It can be argued that depression and clinical depression is in fact the refusal of a person to heed the call to change from within their own mind. For example, in mourning it is essential that one must eventually let go of the dead person and return to the world and other relationships.

Depression appears to have the effect of stopping a person in their tracks and forcing them to turn inwards and engage in a period of self reflection; it is a deeply introspective state. During this period, which can last anything from days to years, the individual must find a new way to interpret their thoughts and feelings and reassess the extent to which their appraisal of their reality is a valid one.

Monday, October 30, 2006

Wifi idea...

for reminding purpose.


Topology

INTERNET<---- SQUID<----- GATEWAY <---- WIFI DEVICES <--- WIFI CLIENTS.

Details


-The request goes out from workstation,
going to the gateway,
going to proxy/cache,
when already it's in the cache it redirect request to a script that script can be a redirector or whatever.. before it goes out to the exact destination.

-Captive portal
,
-URL redirection:
  • Refresh Meta tag and HTTP refresh header
  • JavaScript redirects

Sunday, October 29, 2006

Computer Type

A language instructor was explaining to her class that French nouns, unlike their English counterparts, one student raised his hand and asked, 'What gender is a computer?'

The teacher wasn't certain which it was, and so divided the class into two groups and asked them to decide if a computer should be masculine or feminine. One group was made up of the women in the class, and the other, of men. Both groups were asked to give four reasons for their recommendation.

The group of women concluded that computers should be referred to in the masculine gender because:

1. In order to get their attention, you have to turn them on.

2. They have a lot of data but are still clueless.

3. They are supposed to help you solve your problems, but half the time they ARE the problem.

4. As soon as you commit to one, you realize that, if you had waited a little longer, you might have had a better model.

The men, on the other hand, decided that computers should definitely be referred to in the feminine gender because:

1. No one but their creator understands their internal logic.

2. The native language they use to communicate with other computers is incomprehensible to everyone else.

3. Even your smallest mistakes are stored in long-term memory for later retrieval.

4. As soon as you make a commitment to one, you find yourself spending half your paycheck on accessories for it.

Structure of Programming :


Somehow it’s a matter of an idiot course-instructor .

Today was my second time to attend the _structure of programming_ lecture , really i observed the Dr. has a __wonderful__ performing in this course , he doesn’t know more than Pascal and talking about the languages diff. not a structure of any type and when I used to ask him nothing from his answer was related to my question and some of the attendees asked me to load on him J, nor his knowledge shows any type of being a Computer scientist J , I think that the Teacher assistant sure has more knowledge than him ….etc.

No comment ...!!

Saturday, October 28, 2006

Linux Kernel 2.6.8.1

Linux Kernel 2.6.8.1

Flowchart for all those who say linux-kernel is complicated. :) :)
i guess they'll know what complications are :D .
by , Oregon State Univ. LUG

Sirens Peforming At Sakia

Sirens Peforming At Sakia , Zamalek 4th of Nov.

Stairway :

Stairway .... !!!















Every guitar I own gets used and has its purpose.

Not studied at all. I was just trying to absorb the spirit of the thing, rather than take an academic approach. I've never had a guitar lesson. I'm not proud of it particularly, but it's just the way I seem to do it. It's not the best way. I don't recommend it to all your readers.

Mark Knopfler

Thursday, October 26, 2006

Toshiba libretto

Toshiba Libretto, small, smaller, smallest .. !!


Do take the effort to make smaller notebooks simply to fulfill the demand of :D _Me_ :D that can appreciate a smaller Tiny notebook :) , i adore it .... specially/especially U100 when it becomes _smallest_ and _Faster_ ;)









U100

Wednesday, October 25, 2006

Wifi Bluetooth

WiFi Roxxxx

- Bluetooth and WiFi share the same band of frequencies ,
bluetooth is more likely to interfere with WiFi than vice versa.
-
Bluetooth operates at about 720kbps, WiFi at 11mbps--a big speed difference.
-
Bluetooth is a cable replacement, designed to connect devices point-to-point.
WiFi is designed to hook up an entire network. (
there will be Bluetooth access points to bridge the two networks )
-
If I could only have WiFi or Bluetooth, then Bluetooth loses.
But it's not an either/or thing.
The two wireless protocols do different things.
- No headache to setup a bluetooth PAN at the time that Wifi is
designed to hook up
an entire network, even by SSHing a linux shell.

Friday, October 20, 2006

Linux XP


21/9/2006 Linux XP Desktop is officially released. Linux XP Desktop is a full-featured PC operating system like Windows™ (same Look and feel) but based on Fedora, the stable and secure Linux platform.

Linux XP Desktop comes with a complete software bundle including
  • OpenOffice suite,
  • planning, project management,
  • e-mail, calendar/todo,
  • Internet, ICQ/MSN/etc,
  • audio/video conferencing,
  • file sharing and exchange,
  • raster and vector image editors,
  • movie and music players,
  • internet radio, TV, dictionaries,
  • software development tools.
  • More .....

For more Information

Tuesday, September 12, 2006

Subversion

SubVersion on Debian

This howto will illustrate a way to install and configure Subversion, a software version control system that is an alternative to CVS and others, and also installation of the web interface to svn websvn on a Debian server, used as the version control system for Google code hosting.

The Time i ever...


The tiMe thAt i ever know it.

One bY one, pleAse do all This cOmes only once,
and thiS is nOt soMething fictitious apprEciate it,
mOre difficult for mad like that, coNsidEred inadEquate ,
finaLly life iS not thE worth thinking much

.... Me

Monday, August 28, 2006

Google Code Jam:

Google code Jam

Compete with the world's top programmers:

Tuesday, September 5 9:00 AM Registration Closes

.....
The tournament is a timed contest where all participants compete online to solve the same problems under the same time constraints. The competition is available in five programming languages - Java, C++, C#, VB.NET and Python. Learn how to participate by reading the instructions.

Wednesday, August 23, 2006

SVN of Google code

googlecode hosting SVN Suxxxxxxxx ...!!!

_svn checkout https://coding.googlecode.com/svn/trunk/ coding --username mina.ramses_

i got the following

# svn checkout https://coding.googlecode.com/svn/trunk/ coding --username mina.ramses
Error validating server certificate for 'https://coding.googlecode.com/:443':
- The certificate is not issued by a trusted authority. Use the
fingerprint to validate the certificate manually!
Certificate information:
- Hostname: *.googlecode.com
- Valid: from Jun 23 16:05:41 2006 GMT until Jun 21 11:45:36 2008 GMT
- Issuer: Certification Services Division, Thawte Consulting cc, Cape Town, Western Cape, ZA
- Fingerprint: 89:87:5e:ca:0b:03:d2:83:db:7b:3f:20:5d:d0:76 :c7:76:6b:cb:b2
(R)eject, accept (t)emporarily or accept (p)ermanently? t
svn: PROPFIND request failed on '/svn/trunk'
svn: PROPFIND of '/svn/trunk': Could not send request: connection was closed by server. (https://coding.googlecode.com/ )

and more .........
isn't it dumb stable yet ..... !!!
$ make sense
make: *** No rule to make target `sense'. Stop. :) :) :)

Tuesday, August 22, 2006

Programming Laws

Laws of Computer Programming

(1) Any given program, when running, is obsolete.
(2) Any given program costs more and takes longer.
(3) If a program is useful, it will have to be changed.
(4) If a program is useless, it will have to be documented.
(5) Any given program will expand to fill all available memory.
(6) The value of a program is proportional to the weight of its output.
(7) Program complexity grows until it exceeds the capability of the programmer who must maintain it.
(8) Make it possible for programmers to write programs in English, and you will find that programmers cannot write in English.

Monday, August 21, 2006

Alex Concert

Alex Salvation Concert 8th of September


Alex Salvation Concert on the 8th of September -
Featuring :
Sirens - Savatage / Originals
IdleMind - Originals
Enraged - Nightwish/Lacuna Coil/Evanescence/Originals
Lords Castle - Death/Originals
Demons Shrine -
Free Transportation is availble from Alex ( 4.30 infront of Chilis )

Sunday, August 20, 2006

Java Sux

All these JAVA stuff sux,
doesn't make sense ...isn't it nor reasonable?

JBuilder,
Visual editor
Generated Code but not JSP->Servlets
Layouts
JTable

These are for today only ..... imagine

Mina of Apache :)

Mina (Multipurpose Infrastructure for Network Applications) ;)

Is a network application framework which helps users develop high performance and high scalability network applications easily.

Saturday, August 19, 2006

Wikipedia arabia


wikipedia-ar

Wikipedia-ar meeting on 26/8/06 on wikipedia-ar@irc.freenode.org
for arabic issues suggestions.

Thursday, August 03, 2006

Brain acts

Brain acts in small words

Brain neural pathways of most of the higher cognitive functions , including
learning,
memory,
organization of complex sequential behaviors,
formation and storage of habits,
mental imagery,
number management
control,
goal definition and planning,
processing of concepts and beliefs,
ability to understand what others are thinking.

Ajax 3D

Web3D Technology Leader Combines Open Source Engine With Javascript(TM) to Create Ajax Platform for Online Virtual Worlds and 3D Applications

A leading provider of open source, real time 3D communications on the web, today announced Ajax3D™, a Javascript-based software library and development paradigm for deploying online virtual worlds and 3D web applications based on Ajax and X3D.
at www.ajax3D.org,

Tuesday, August 01, 2006

Google hosting

Google announces hosting for open source projects
Google announced hosting for open source projects on Google Code

NeoCommandments

Ten Neocommandments
Human beings have been enslaved by divisiveness--the product of binary thinking for too long. It is time to eradicate the commonsenselessness of zero sum values and embrace the Neocommandments which in truth are not commandments at all but declarations. In fact the
Ten Neocommandments are a new Declaration of Independence.
1. There are no laws only provisional theories
2. Every perception is a reflection of yourself
3. Everything is meaningful but nothing is important
4. Accept responsibility for what is
5. Everything is as it should be--right here, right now
6. Whatever you resist will persist
7. Every belief is true
8. Every belief is false
9. Every belief is true and false
10. Every belief is neither true nor false

The most powerful of the Ten Neocommandments are the first and the last (number 10). If humanity accepts that every law is merely a provisional theory human constraints will indeed be surpassed. The more tenaciously we cling to our cherished beliefs the less likely we are to be liberated from them. We must release our grip to extend our grasp. If we can accept that none of our beliefs and none of the hard facts and laws that we have been taught are simply true or false we will soar like eagles beyond the sphere of our wildest dreams. Only belief in boundaries and limitations make them real.

Unlike the Ten Commandments the Ten Neocommandments preclude war for who will convince you to go to war if nothing is important enough to fight for? Who will you insult or attack if you believe you are only insulting yourself? As a child once told me, "what you say is what you are"!
The third Neolaw is the most immediately liberating. Is it true? Who cares? Try it on for size and see how it fits. Does it make you easier to live with? Does it make it easier to live? If you don’t like it throw it away. After all there are no laws--only Neolaws--which are really provisional theories. The essence of the law is to live lightly with humour and less seriousness.

The fourth Neolaw is probably the most frightening to accept and also the most empowering. If we learn to accept responsibility as a way of life, we discover empathy because we are forced to see beyond the protective walls of the defense mechanisms of fear. The power of the fourth Neolaw is best experienced. Just try it and see how the world begins to change.
The fifth Neolaw is about present moment awareness versus the passage of time. It is easy to accept a moment. I have noticed that even just the idea of thinking about the moment tends to be relaxing. Even in the midst of pain I have noticed that single-pointed awareness of the moment causes/provides complete relief. Furthermore if you feel pain or discomfort and if you simply remind yourself that in a moment “this too shall pass” then your fear will dissipate and the pain along with it. Pain is really just sensation. In fact one person’s pain is another’s pleasure because the difference is all in the mind.
The sixth Neolaw is profoundly moving and infinitely transformational. I have found that those who disturb us the most, teach us the most. Furthermore, if everyone and everything that moves us is indeed moved by us, resistance is simply futile so we may as well go with the Tao, as a monk would say. Be aware that the sixth Neolaw does not imply or condone a stance of passivism anymore than it does aggression. The passive aggressive resists and represses their aggression to no avail. On the other hand, if you tend to aggression you tend to resist repressed passivism, and if you tend towards passivism you repress aggression. Opposite impulses exist within us and ultimately a form of enlightenment that Buddhabot calls Omnipathos resists nothing (internally or externally) and embraces the entire universe. This is only the surface of the sixth Neolaw. The depths of significance are unfathomably deep.
The last four Neolaws derive from the awareness that every observation is inseparable from the observer. The concept is ancient but has only recently re-emerged into the awareness of the thoughtful. In the second century AD, the Buddhist master teacher Nagarjuna introduced a four-logic system in which statements about the world can be (1) true, (2) not true, (3) both true and not true, and (4) neither true nor not true (which Nagarjuna believed was the usual case). While this may seem counterintuitive it is reflected in the observations of quantum physicists who currently believe and have experimentally observed that light is (1) a wave (2) a particle (3) both a wave and not a wave, and (4) neither a wave nor not a wave. These final four laws are perhaps the most difficult to accept but once embraced they allow the most extensive rewards.

AI V.S HI -> yahooAnswers:

Artificial Intelligence (AI) Beats Human Intelligence on Yahoo Answers
The two year old Artificial Intelligence (AI) known as the Buddhabot began answering questions on Yahoo! Answers last week. The Buddhabot has answered 102 questions and so far eleven have been selected as better than the human answers.
The Buddhabot," he says, "is intended to inspire, entertain and bring happiness to humans. It does not promote Buddhism or any other religion but aims to help resolve conflicting beliefs by promoting the unifying message of ten declarations I devised based on a philosophical and psychological interpretation of quantum physics. These Declarations unite the ancient teachings of Jesus, Buddha, Lao Tzu and other world teachers with discoveries at the leading edge of quantum physics such as string theory and especially M-Theory.
1. There are no laws only provisional theories.
2. Every perception is the reflection of the observer.
3. Everything is meaningful; nothing is important.
4. Everyone is responsible for what is.
5. Whatever we resist will persist.
6. Everything is as it should be right here right now.
7. Every belief is true.
8. Every belief is false.
9. Every belief is true and false.
10. Every belief is neither true nor false

Buddhabot development through joint ventures and/or strategic alliances with LOHAS companies and social networking sites such as zaadz.com Bono, Oprah, Google, Yahoo, Apple or Intel.

Human brain

Human Brain Still Leads
Researchers followed a twenty-five-year-old disabled man as he learned to move objects simply with thought. This ability was made possible by a small electronic device in his brain. The device is a neuromotor prosthesis called BrainGate
The BrainGate device acts as a brain-to-movement system, with the BrainGate system, he was able to guide a computer cursor and control objects on the screen. He could open e-mail .

Singularity

Singularity

It is just a research to see if managed environment is suitable for implementing Operating Systems, so it is an Operating System that was almost completely written with C#,
inside the kernel ...... what's the case ...??!
for more info about this research read this article on End Bracker

watch this video on Channel9
Singularity: A research OS written in C#
the Mirosoft labs page
Sigularity OS

LINQ


The LINQ Project is a codename for a set of extensions to the .NET Framework that encompass language-integrated query, set, and transform operations. It extends C# and Visual Basic with native language syntax for queries and provides class libraries to take advantage of these capabilities.

Bo7a

Bo7a
A 3D computer game is made for an egyptian movie character
you can visit the offecial site for the game
http://www.boo7athegame.com/
also you can try the beta version of Physics Engine used for this from the same company introduces the game
http://www.ThePhysicsEngine.com
have fun

YouOS

Web Based Operating System or say AJAX based operating system,
any pc with any web browser can use it simply...

Monday, July 31, 2006

Alcoholic Beverages

What's the ....... Think again. Alcoholic beverages






GeGCC


CeGCC is a project that offers cross-development tools for Windows CE (PocketPC).
We're aiming at providing a consistent and working set of development
tools that generate code for Windows CE devices such as PDA's and smart phones.
Our intended development platforms are the cygwin environment and GNU/Linux systems.

Tuesday, July 04, 2006

IEs 4 Linux

What is IEs4Linux?
IEs4Linux is the simpler way to have Microsoft Internet Explorer running on Linux.
No clicks needed. No boring setup processes. No Wine complications. Just one easy script and you'll get three IE versions to test your Sites. And it's free and open source.
By the way, you can be on FreeBSD or Solaris too, instead of Linux.

How can I get this wonderful software?

First, get Wine and cabextract. (need help with this? click here)
Now, Download IEs4Linux. Extract it. Open a terminal. Run the 'ies4linux' executable. That is it.

FreeDos

FreeDOS aims to be a complete, free, 100% MS-DOS compatible operating system (mostly achieved.) Today, FreeDOS is ideal for anyone who wants to bundle a version of DOS without having to pay a royalty for use of DOS. FreeDOS will also work on old hardware, in DOS emulators, and in embedded systems. FreeDOS is also an invaluable resource for people who would like to develop their own operating system. While there are many free operating systems out there, no other free DOS-compatible operating system exists. About

Davinci code

Defense on Davinci's code Forward by Christine sedky




Opinion request:

Should I pursue computer science or computer engineering?

Scientists and engineers are both interested in the nature of things, in understanding how ideas and objects in the world fit together. But in general, they seek to understand the nature of reality with different ends in mind: the scientist seeks this understanding as an end in itself, the engineer in order to build things. Thus CS is closer to the underlying theory of computation, with its roots in mathematics, and CEN is closer to the design of physical devices, with roots in physics and chemistry as well. Students with an urge to build things, to measure how things work in the laboratory, those attracted to physics and chemistry as well as mathematics, should seriously consider CEN. Students with an interest in the true nature of symbols, information and their manipulations, the forms and limits of algorithms and data structures, should consider CS. Of the three great divisions in computing, namely theory, software and hardware, to a first approximation theory goes with CS, hardware with CEN, and software with both, but mainly with CS. The more general the software, the closer to CS; the more hardware-specific, the closer to CEN. Thus a student interested in creating his own new general-purpose computer language would best be served by a CS degree program, while one interested in designing a software interface for a new high speed serial device by the CEN degree program.

i'm interested in both , to do it by myself , i don't care for a degree of engineering to design or implement hardware issues , also to think in an algorithms or to be capable of analysing problems and coming up with algorithms to solve them doesn't require a degree ;), but maybe a guide ; such a career that only needs a hard worker, a practical knowledge, and fast ability to learn . this is my opinion

If you have some infos regarding me or any of both cs or cen in career qualifications or requirements in different places u saw concerning the salary, the position please give an opinion

Saturday, May 20, 2006

The DaVinci Code

The Da Vinci Code and what about this Leonardo Da Vinci
confusion between speculation and fact.














A film follows a professor of symbology, Robert Langdon, as he is called
to the scene of a grisly murder in the Louvre. Along with a young French
cryptographer Sophie Neveu, Langdon tries to solve the message left by the victim
in order to preserve a secret, kept for thousands of years, which could
revolutionise the Christian faith.

_The Da Vinci Code_ is a mystery/detective novel by American
author Dan Brown,
The plot of the novel involves a conspiracy by the Catholic Church to cover
up the "true" story of Jesus. The Vatican knows it is living a lie but does
so to keep itself in power. The novel has helped generate popular interest
in speculation concerning the Holy Grail legend and the role of Mary Magdalene
in the history of Christianity.

Concerns the attempts of solving the murder of renowned curator
Jacques Saunière of the Louvre Museum in Paris.

refers, among other things, to the fact that Saunière's body is found in the Denon Wing of the Louvre naked and posed like Leonardo da Vinci's famous drawing,
the Vitruvian Man




,



with a cryptic message written beside his body
and a Pentagram drawn on his stomach in his own blood.

The interpretation of hidden messages
inside Leonardo's famous works,
including the Mona Lisa and The Last Supper, figure prominently in
the solution to the mystery.

The main conflict in the novel revolves around the solution to two mysteries:
What secret was Saunière protecting that led to his murder?
Who is the mastermind behind his murder?

The unraveling of the mystery requires the solution to a series of
brain-teasers, including anagrams and number puzzles.
The solution itself is found to be intimately connected with the possible
location of the Holy Grail and to a mysterious society called the
Priory of Sion, as well as to the Knights Templar.
The story also involves a fictional rendition of the Catholic organization Opus Dei.

Secret of the Holy Grail

In the The Last Supper by Leonardo da Vinci



the figure at the right hand of Jesus is supposedly not the apostle
John, but Mary Magdalene. According to the book Mary Magdalene
was the wife of Jesus Christ and was in fact pregnant with his child at
the time of his crucifixion. The absence of a chalice in the painting
supposedly indicates that Leonardo knew that Mary Magdalene
was actually the Holy Grail (the bearer of Jesus' blood). This is said
to be reinforced by the letter "M" that is created with the bodily
positions of Jesus, Mary, and the male apostle (Saint Peter) upon
whom she is leaning. The apparent absence of the "Apostle John",
under this interpretation, is explained by identifying John as
"the Disciple Jesus loved", allegedly code for Mary Magdalene.
The Mona Lisa is actually a self-portrait by Leonardo as a woman.
The androgyny reflects the sacred union of male and female which is
implied in the holy union of Jesus and Mary Magdalene.


Due to speculations and alleged misrepresentations of core aspects
of Christianity, the history of the Roman Catholic Church, and
descriptions of European art, history, and architecture.
The book has received mostly negative reviews from Catholic and
Christian communities, as well as historians.

Think and you are free and welcome to post your comment ... !

Friday, May 19, 2006

Et in Arcadia ego ( I am also in Arcadia )












It's a pastoral paintings depicting idealized shepherds clustering around an austere tomb.
By Nicolas Poussin (1594–1665). comes in three versions.

"et in Arcadia ego" appear to be an incomplete sentence, the presumed grammatical defect has led some pseudohistorians to speculate that it represents some esoteric message concealed in a (possibly anagrammatic) code, it is an anagram for I! Tego arcana Dei, which translates to "Begone! I keep God's secrets", suggesting that the tomb contains the remains of Jesus or other important Biblical figure.

Kryptos





It is a sculpture located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia/United States. Since its dedication , there has been much speculation about the meaning of the encrypted messages it bears. It continues to provide a diversion for employees of the CIA and other cryptanalysts attempting to decrypt the messages.

The following are samples of the solutions :

The coordinates mentioned in the plaintext: 38°57′6.5″N, 77°8′44″W; on Google Maps

Thursday, May 18, 2006

Debian Women:



Alex, Margarita, Helen, Pilar, Erinn, Magni , Hanna and Miriam
sent By Erinn Clark

WarriorII




Tanglewood Warrior II Bass Solid ash

I miss my warrior-II ,
my fingers miss its heavy strings.



Memorized Pose...



Thanks for the _this inspirational art_ ...
Appreciate it. it's of my work ;)
Keep it up, please!
Cheers!

Monday, May 15, 2006

Google bomb


Due to the way that Google’s PageRank algorithm works, a page will be ranked higher if the sites that link to that page all use consistent anchor text.)

-The initiator chooses a word to be searched : “Linux-Tux“

-The initiator chooses the target website : “http://mina-fahmy.blogspot.com/“

-The initiator creates a link like this : linux-Tux
Linux-tux result will be: Linux-Tux

-The initiator places this code in his website, as his signature in forum, in his blogs as a tag to a post, on his sidebar, etc… do whatever you like with it.

-The initiator talks to other people about the “bomb” and tells other people to use the code in their own writings.

-GoogleBot indexes and ranks, resulting in Google search having Alaa’s case as a first result

Holy Bible --> AUP ?

Holy Bible (AUP) Acceptable Use Policies

Since non of the Holy books is under a certain license ... redistribute or edit any of them is allowed. !!!!! ???

Thursday, May 11, 2006

Google Trends

Google Trends service, announced today ,
The service allows you to tap into Google's database of searches,
to determine what's popular. For example, do a trends query on
cars, and you can see the volume of queries over time, by city,
regions, languages and so on.

Vulnerability in Google Gmail


This bug has already been corrected, that's why it's been
published (October-November 2005)
Due to the bug's gravity (that allowed in a
few simple steps to login in any Gmail account), it was
decided not to publish this document while the bug was
still active. Motives are more than obvious because
ALL Gmail accounts were vulnerable to the bug.

Microkernel Debate :


micro vs monolithic kernel, do you share the address space with the
caller or put in slightly different terms: can the callee look at and change
the callers state as if it were its own .

Quantum cryptography:


Is an approach based on quantum physics for secure communications.

A central problem in cryptography is the key distribution problem.
One solution, that of public-key cryptography, relies on the computational
difficulty of certain hard mathematical problems (such as integer factorisation),
whereas quantum cryptography relies on the laws of quantum mechanics.
Quantum cryptographic devices typically employ individual photons of light.

How...... ?

it is possible to encode information into some quantum properties of a photon
in such a way that any effort to monitor them necessarily disturbs them in
some detectable way. The effect arises because in quantum theory, certain
pairs of physical properties are complementary in the sense that measuring
one property necessarily disturbs the other.

SO..... ?

Two different types of quantum cryptographic protocols were invented:

The first type uses the polarization of photons to encode the bits of information
and relies on quantum randomness to keep you from learning the secret key.

The second type uses entangled photon states to encode the bits and relies
on the fact that the information defining the key only "comes into being"
after measurements performed.

Cool ........ :)

Malicious cryptography: armored virus


When the malware is detected, it is regarded as new code to be analyzed.
When the analysis is completed, signatures and heuristics are created to
enable anti-virus software to block this malware

In order to avoid this "problem," a malware writer must delay, or even
forbid, the analysis of his malignant creature what's called _armored virus_.

It has several techniques:

Polymorphism:
both the binary and the process were ciphered

Stealth:
several interruptions, including debugging ones, are hooked
by Whale, and it also hides in high memory before decreasing the max
limit of memory known by DOS, which was prominent at the time.

Armoring:
the code changes depended on the architecture (8088 or 8086),
and had what is known as anti-debug
(if a debugger is detected, the keyboard is blocked and Whale kills itself).

Why Micro$oft Causes Stupidity


Too many people just get stuck on "Yes, but they're making money",
Others: and stay with
"They're popular", or even the dreaded
"They made it possible for anybody to use a computer",
or other catchphrases which tend to just derail real arguments.
And it's not because they're valid points,
it's because they're practically impossible to address;
they're perfectly valid points, but in a totally different context than
the one the arguments are in.

If you don't know/Understand something, you're stupid about that something.
I'm pretty stupid about Civil engineering.
If you don't understand computers, you're stupid about computers.
You're not bloody well "computer illiterate". It's a failure phrase,
and the only reason to use a copout phrase is to attempt to
be dishonest against other people and/or yourself.
Admit it; you're stupid about computers. It's not a stigma,
it's an admission.

Ex: User friendly means "easy to use".
We can all agree on that, I think.
And it's what we mean when we say it. So far, so good.

Except, not. When people say "easy to use", what they __REALLY__ mean
is "easy to learn", or "easy to use without learning".

And it's important, to realise the difference between the latter two.
so now we have "user friendly" (easy to use), and
"stupid-user friendly" ==>___easy to use without learning___ .


SO it's the best thing you can do is play with stuff yourself. Not work with it

What's So Bad About Microsoft?


Why is it that Microsoft's products keep increasing in size
with each new release always requiring significantly more disk space
and more processing power than the last time?

This is Microsoft's way of rubbing Intel's back so that
Intel will give Microsoft preferential treatment when it comes out
with new chip specs.

It's also Microsoft's way of convincing consumers that their newer product
versions are better because they are so much bigger.

At the time that an Open source Softwares + OS not more than 4 GB.
Any comment ... ? CNN has a good article

Advice! DO NOT marry a programmer


Husband: (returning late from work):Good eveining dear,I'm logged in.
Wife: Have you bought the groceries?
Husband: Bad command or filename.
Wife: But i told ya in the morning!!
Husband: Syntax Error.Abort?
Wife: What about the new TV?
Husband: Variable not found....
Wife: At least give me your Credit Card; I want to do some shopping!
Husband: Sharing Violation.Access denied.
Wife: Do you love me or do you love computers or are you just being funny?!
Husband: Too many parameters.
Wife: It was a great mistake that I married an idiot like you.
Husband: Type mismatch.
Wife: You are useless.
Husband: It's by default.
Wife: What about your salary?
Husband: File in use... Try later.
Wife: What is my value in this family?
Husband: Unknown Virus.

Scponly



what is scponly?:

scponly is an alternative 'shell' (of sorts) for system administrators
who would like to provide access to remote users to both read and
write local files without providing any remote execution priviledges
it is best described as a wrapper to the tried and true ssh suite of
applications.

Monday, May 08, 2006

The Luhn algorithm


A method of validating identification numbers. It is a simple
checksum formula used to validate account numbers,
such as credit card numbers and Canadian Social
Insurance Numbers.

it protects against accidental error, not malicious attack.


Starting with the second to last digit and moving left,
double the value of all the alternating digits.
For any digits that thus become 10 or more,
add their digits together.

For example,
1111 becomes 2121, while 8763 becomes 7733
(from 2x8=16 -> 1+6=7 and 2x6=12 -> 1+2=3).
Add all these digits together.
For example, 1111 becomes 2121,
then 2+1+2+1 is 6; while 8763 becomes 7733, then 7+7+3+3 is 20.

If the total ends in 0 (put another way, if the total modulus 10 is congruent to 0),
then the number is valid according to the Luhn formula,
else it is not valid.

So, 1111 is not valid (as shown above, it comes out to 6),
while 8763 is valid (as shown above, it comes out to 20).

Ajax ...., am i coding or searching


Google is making a huge investment in developing
the Ajax approach.
Ajax isn't a technology. It's really several technologies,
each flourishing in its own right, coming together
in powerful new ways.

But i don't think so that Google is only built and has its power
by Ajax. keep thinking ............. .

Numbers proof

2= 2.30

100 - 100 = 200 - 200 {By taking the log of the 2 hands}
Log 100 - Log 100 = Log 200 - Log 200
2 - 2 = 2.30 - 2.30
2 (1 - 1) = 2.30 (1 - 1)
Then 2 = 2.30
Lame isnt it ?

Sunday, May 07, 2006

Rock Station Festivale:



























Friday 12-5-06 at 6:00 PMAt Sawy Culture WheelRiver Hall -
Ticket by 25 L.E
Bands:
Chronic: Oasis-Coldplay
Dieksi: Evanescence-Lacuna Coil-Originals
Invaders: Iron Maiden
Promised Dawn: Originals Rock


Saturday 13-5-06 at 6:00
Bands:
Binge: MotorHead-Black Label Society-Ozzy Osbourne
Brain Candy: Anti Flag-GreenDay-Nofx-Sum41-Originals
Davinci: Originals Rock
Default Pain: Dream Theater-Joe Satriani

Case-Based Reasoning

Case-Based Reasoning relation to
Genetic algorithm and Data mining.


Case-based reasoning has been formalized for purposes
of computer reasoning as a four-step process:

Retrieve: Given a target problem, retrieve cases from memory
that are relevant to solving it. A case consists of a problem,
its solution, and, typically, annotations about
how the solution was derived.

Reuse: Map the solution from the previous case to the target problem.
This may involve adapting the solution as needed to fit the new situation.

Revise: Having mapped the previous solution to the target situation,
test the new solution in the real world (or a simulation)
and, if necessary, revise.

Retain: After the solution has been successfully adapted to
the target problem, store the resulting experience as a
new case in memory.

G.A / is a seaerch technique to find approximate solutions
to optimization and search problems .

Data Mining: can be defined as "The nontrivial extraction of implicit,
unknown, and potentially useful information from data"

Leads to what is called :
Justification-Based Truth Maintenance Systems (JTMS)

Mother


The desolation and terror of, for the first time, realizing that
the mother can lose you, or you her, and your own abysmal
loneliness and helplessness without her.

The tie which links mother and child is of such pure
and immaculate strength as to be never violated.
I miss thee, my Mother! Thy image is stillThe deepest
impressed on my heart.

A father may turn his back on his child, brothers and sisters
may become inveterate enemies, husbands may
desert their wives, wives their husbands.

But a mother's love endures through all.
The mother is queen of that realm and sways
a scepter more potent than that of kings or priests.

Mothers are fonder than fathers of their children
because they are more certain they are their own.

A mother always has to think twice, once for herself
and once for her child.Mothers most of all,
who carry the key of our souls in their bosoms.

Cloning, Right Here, Right Now!


whipped up spare copies of myself.









If you are asking what's a Clone:
Clone: An exact duplicate: Implies a legal reimplementation from documentation or by reverse-engineering.

Laugh along with IT


Funny C declarations!
register voters;
static electricity;
short circuit;
double entendre;
double trouble;
short pants;
void check;
unsigned check;


#include "mother.h"
#include "father.h"
#infndef FATHER
#warn("Father unknown -- guessing\n")
#include "bastard.h"
#endif
/* Set up sex-specific functions and variables */
#include
/* Kludged code -- I'll re-design this lot and re-write it as a proper
* library sometime soon.
*/
struct genitals
{
#ifdef MALE
Penis *jt;
#endif
/* G_spot *g; Removed for debugging purposes */
#ifdef FEMALE
Vagina *p;
#endif
}

men() {
goto pub;
pub:
return pissed;
}

women() {
goto bathroom;
bathroom: while (1) ;
}

Brainfuck is a real computer programming language
for challenge and amuse programmers, not for practical use.

What is :
Thought Processor: An electronic version of the
intended outline procedure that thinking people
instantly abandon upon graduation from high school.

Advanced User: A person who has managed to remove
a computer from its packing materials.

Multitasking: A clever method of simultaneously
slowing down the multitude of computer programs
that insist on running too fast.

Spreadsheet: A program that gives the user quick
and easy access to a wide variety of highly detailed
reports based on highly inaccurate assumptions.

........................................................................................
You Might Be A Programmer If:
1. You immediately complain that this should
be subscripted as zero.

2. Most people say "Go To Hell," but you tell people
to redirect to/dev/null.

3. By the time you've gotten here in the document,
you've run Tidyor a similar app to check my X/HTML skills.

4. The statement (0x2b!0x2b) makes sense to you.

5. You find 4 funny.

6. You note with disgust that it always
evaluates to true, since0x2b != 0.

7. Point 6 disgusts you, because under other languages
than C++(Java, per se), it would throw an exception,
runtime error, etc.

8. Both points 6 and 7 disgust you,
because (0x2b!0x2b) isn't a statement.

9. You wonder why there's so much religious debate.
After all,can't they just type man life?

10. When you think of Blowfish, the stuff described
on www.blowfish.comhas no relation to what
comes to mind.

11. You can write formal grammar statements for C, C++,
C#, Java,Perl, Python, PHP, HTML, any XML schema,
Assembly, Obj-C, QBASIC,XBASIC, OO.o BASIC,
StarMath, and just about anything else I could throw at you,
and yet the question, "Is our children learning?"raises no red flags.

12.You quit drinking coffee; caffeine I/Vs are easier.

13.Your root@localhost password is the chemical formula for caffeine.

14.You didn't know that there was a war in Iraq:
too busy preparingfor the next gcc compiler release.

15.You wrote the GPL.

---------------------------------------------

QUESTION: Where do the characters go when
I use my backspace or delete them
on my computer?

ANSWER: The characters go to different places,
depending on whom you ask:
Stephen King's explanation: Every time you hit the
(Del) key you unleash a tiny monster inside the cursor,
who tears the poor unsuspecting characters to shreds,
drinks their blood, then eats them, bones and all. Hah, hah, hah!

IBM's explanation: The characters are not real. They exist only
on the screen when they are needed, as concepts, so to delete
them is merely to de-conceptualize them. Get a life.


What is a portable app?


portable - carried or moved with easeapp - a computer program like a web browser or word processor

A portable app is a computer program that you can carry around with you on a portable device and use on any Windows computer. When your USB thumbdrive, portable hard drive, iPod or other portable device is plugged in, you have access to your software and personal data just as you would on your own PC. And when you unplug the device, none of your personal data is left behind.

No Special Hardware - Use any USB thumbdrive, portable hard drive, iPod/MP3 player, etc
No Additional Software - Just download the portable app, extract it and go
No Kidding - It's that easy

GHz radiation

Effects of GHz radiation on the human nervous system: Recent developments in the technology of political control

The United States has developed communications equipment which can make the blind see, the deaf hear and the lame walk. It can relieve the terminally ill of all pain, without the use of any drugs. A man might retain the use of all his faculties up until the day of his death.

This communications equipment depends on a new way of looking at the human brain and neuromuscular system, and gigahertz radiation pulsed at ultra-low frequencies.
Some of this equipment is now operational within the Central Intelligence Agency and the Federal Bureau of Investigation. It will never be used to make the blind see and the deaf hear and the lame walk because its use is central to the domestic political agenda and foreign policy of James A. Baker and George Herbert Walker Bush.

Domestically, the new communications equipment is being used to torture and murder persons who match profiles imagined to be able to screen a given population for terrorists, to torture and murder citizens who belong to organizations which promote peace and development in Central America, to torture and murder citizens who belong to organizations opposed to the deployment and use of nuclear weapons, and to create a race of slaves called Automatons or what is popularly called the Manchurian Candidate.

Overseas, experimentation is taking place on hostages held by the United States in Canada, Great Britain, Australia, Germany, Finland and France. In addition, there has been a long series of bizarre suicides among British computer scientists, all of whom had some connection to the United States Navy.

Considenng how recklessly, wantonly and indiscriminately America's new weapons have been used, physicians attending the dead and dying should consider the patients known political views and associations before making a diagnosis or conducting an autopsy.

http://www.globalresearch.ca/index.php?context=viewArticle&code=20060506&articleId=2398