background preloader

D'ingénieur//ThinkTank

Facebook Twitter

Vi Veri Veniversum Vivus Vici!
— Faust, Johann Wolfgang von Goethe


Prerequisites —
D.Id.//Login: O.U.&D.#
A.C.

//Password: *****_******_


General Information —
This is the ALMAZed main page for all things intellective at the core of their conversations' nature. Physics, Chemistry & Maths.

Almaz//Алмаз

Mind Hacks News, Videos, Reviews and Gossip - Lifehacker. We may control a lot of what our body does, but sometimes it rebels—whether its with brain freeze, a gag reflex, or just plain bad vision. Here are our top 10 body hacks that give the power back to you. P 10. Easily Swallow Stubborn PillsP If you aren't very good at swallowing pills, you can try this trick to get them down: tilt your head forward instead of backward once its in your mouth. 9. SExpand Being able to dilate your pupils at will can help you see the world differently, and there are a number of ways you can go about it—from tensing your stomach in different ways to just focusing on objects that are far away. 8.

We all know that tingling feeling you get when your hand or foot goes to sleep, and how annoying it is. 7. When your body feels like its going to overheat from the scorching summer sun, you can lower your body temperature quickly using one of your body's quick cooling spots, like your wrist or the back of your knee. 6. 5. 4. 3. 2. 1. REMcloud is a social network that connects people through their dreams. Post your dreams every day and experience the connection. iPad & Android.

Deep Time - Interactive Infographic. Universe & Multiverse. Science with Out of this World Info. Our Future. Time Travel. Quantum Entanglement. Astronomical Paradigms. Planck Time. HAARP Home Page. To Singularity, or Not To Singularity? Nervous system & neuro. Transcranial magnetic stimulation. Here's How People Look at Your Facebook Profile -- Literally. When potential dates, employers and friends glance at your online social profiles, what do they see?

EyeTrackShop, a startup that runs eye-tracking studies for advertisers, helped Mashable find out by applying its technology to the profile pages of popular social networks. The study used the webcams of 30 participants to record their eye movements as they were shown profile pages from Facebook, Google+, LinkedIn, Flickr, YouTube, Klout, Reddit, Digg, Tumblr, Twitter, StumbleUpon and Pinterest at 10-second intervals. What participants looked at on each page and in what order is recorded in the images below. It's not a perfect study. Thirty is a small sample size, and what draws attention on a profile likely varies depending on the content displayed. But we've hazarded making a few observations: Profile pictures matter.

Take a gander at the results of the study in the gallery below, and let us know your own observations in the comments. Attention and Intelligence : The Frontal Cortex. In both humans and mice, the efficacy of working memory capacity and its related process, selective attention, are each strongly predictive of individuals’ aggregate performance in cognitive test batteries.

Because working memory is taxed during most cognitive tasks, the efficacy of working memory may have a causal influence on individuals’ performance on tests of “intelligence”. Despite the attention this has received, supporting evidence has been largely correlational in nature. Here, genetically heterogeneous mice were assessed on a battery of five learning tasks. Animals’ aggregate performance across the tasks was used to estimate their general cognitive abilities, a trait that is in some respects analogous to intelligence. Working memory training promoted an increase in animals’ selective attention and their aggregate performance on these tasks. Obviously, every discussion of general intelligence in the context of mouse performance is bracketed by lots of question marks.

TEAMZ

TEAMS. COLLAB. TEDtalks. Dan Dennett on our consciousness. Philip Zimbardo shows how people become monsters ... or heroes | Barry Schwartz on the paradox of choice. House Paradox. 70 Things Every Computer Geek Should Know. | Arrow Webzine. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. How to become a real computer Geek? 1. 2. 3. 4. 5. 6. 7. 8. 9. 64 Things Every Geek Should Know « Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. 2. How to Reset RAM If you rolled your eyes here, that is a good thing. 1. 3. How To Become A Hacker. Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?

". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2. Know the Trade. Programming Language Checklist.

Programming Language Checklist by Colin McMillen, Jason Reed, and Elly Jones. You appear to be advocating a new: [ ] functional [ ] imperative [ ] object-oriented [ ] procedural [ ] stack-based [ ] "multi-paradigm" [ ] lazy [ ] eager [ ] statically-typed [ ] dynamically-typed [ ] pure [ ] impure [ ] non-hygienic [ ] visual [ ] beginner-friendly [ ] non-programmer-friendly [ ] completely incomprehensible programming language. Your language will not work. Here is why it will not work. How to Hack: Ethical Hacking and Cyber Security | Go Hacking. Dark Reading. Hack This Site!

Hacking Basics | Arrow Webzine. This tutorial is for information purposes only, and I do not endorse any of the activities discussed within this guide. I nor anyone hosting this guide can be held responsible for anything you do after reading this. What you do with your day lies on your shoulders. Here with I am creating an Index.. 1. Learning how to hack is simple. 2.Cracking commercial quantum cryptography secure communicating boxes with their internals exposed, Alice and Bob . 3.Top 10 Password Crackers Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. 4.How to Hack a WiFi Network. you already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. 5.Common Hacking Methods. 6.

Tech-y. Free Sites to Find Music.