DiscoverAsk Developer
Ask Developer
Claim Ownership

Ask Developer

Author: Bashmohandes (noreply@blogger.com)

Subscribed: 148Played: 1,213
Share

Description

Weekly Podcast discussing the Egyptian IT industry, and various other technology related topics


راديو عربي على الانترنت من المبرمجين المصريين للمبرمجين, باللغة العربية و باللهجة المصرية
52 Episodes
Reverse
- Quick history ○ Distance learning ○ Open educational resource movement ○ MOOC coined in 2008 by Dave Cormier ○ Khan Academy, P2PU, and Udemy ○ Udemy has tools for pros to create courses and publish (also attracting corporate trainers to create courses for enterprises) ○ Udacity growing out of Stanford CS courses by Sebastian Thrun ○ Coursera growing out of Stanford's Andrew Ng and Daphne Koller ○ MITx launched by MIT in response to commercialization of MOOC, then joined by Harvard and renamed edX - Cost ○ Content is free ○ edX offers certificate for 100$ for most courses ○ Coursera have some quizzes and grading exercises only for paying students ○ Udacity has nano-degrees with projects reviewed only for paying students - Interdisciplinary learning ○ Importance ○ Examples - For credit leaning ○ Georgia Tech masters 2013 with Udacity ○ edX have MicroMasters which offers for credit courses and earn 25% credit of on campus masters § RIT cybersecurity § University of Pennsylvania Robotics § British Columbia Software Development § Boston University Digital Leadership § MIT Supply Chain Management § University System of Maryland Cloud Computing § Columbia Business Analytics, AI § San Diego Data Science § Michigan UX Research and Design § Others ○ Coursera masters with § Illinois MBA, Accounting and CS (Data Science) HEC (innovation and entrepreneurship) بعض الروابط التي ذكرت في الحلقة كورسات كلية الحاسبات و المعلومات جامعة حلوان https://www.youtube.com/user/FCIHOCW Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe
من هو المبرمج الصنايعي من هو المبرمج المهندس الموضوع مش بالشهادات سؤال الفرق بين المبرمج والمهندس الألقاب تأثير الثانوية العامة علي ترتيب الوظائف في البرمجة المهندس الكويس مش شرط يكون حرفي كويس علاقة المهن في البرمجة بالوظائف الإدراية سؤال "أنا ما أعرفش أي حاجة، وعايز أدخل المجال" سواء أخدت شهادة أو ما أخدتش شهادة، إيه هي الحاجات اللي المفروض أتعلمها؟
- Follow up on Encryption episode (Google blocking Symantec certs) ○ Sep 2015 incident (Thawte issuing a goolge.com cert without authorization. Attributed to employee error and resolved by termination § Oct 2015 Symantec disclosed 23 test certs issued without owners knowledge, more certs uncovered by Certificate Transparency logs, symantec extended the audit and found additional 164 certs, and 2458 certs issued for domains never registered https://security.googleblog.com/2015/10/sustaining-digital-certificate-security.html § Jan 19 2017, Mozilla reported more misuse https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/fyJ3EK2YOP8/yvjS5leYCAAJ § Mar 23, 2017, google posts a report of 30,000 bad certs from symantec, proposing a gradual plan to distrust symantec till actions taken to ensure trust https://groups.google.com/a/chromium.org/forum/#!topic/blink-dev/eUAKwjihhBs%5B1-25%5D Extended validation vs. Domain validation certs (mostly technically identical -EV may use stronger enc- but different registration process with different UX presented by browsers -green bar-) • How the Television age reflected a scarcity of communication channels. • How the Internet created an abundance of communication channels. • Creators and audience choose platforms based on cost, ease of use and unified user experience, not because “that’s where everybody is”. • Once made a choice, users don’t switch to another similar platform even if it’s marginally better. • Vimeo vs YouTube. Google+ vs Facebook. • Control of personal data or openness isn’t a deciding factor for most users. • User data and attention is the main product for content distributors. • The software offered by content distributors is fairly simple. • Most of the engineering effort of these companies is going in scaling for a billion users and into mining the data provided by those users. • The main components of content distribution: • Producing content • Serving content • Consuming content • Rating • Comments and discussion • Reviewing • Discovery, subscription, and notification • Saving, bookmarking, and organizing Ads
○ Digital Signatures § Goal: verify Authenticity of a message. § Based on Asymmetric Cryptography. § Basic operations 1. Public / Private keys generation (using some algorithm like RSA) 2. Signing algorithm using the private key 3. Signature verification algorithm using the corresponding public key i. Extending previous Example • Steps (Order is very important, bold stuff is the difference added to authenticate sender) ® Party 1 (Alice) 1. Generates a random AES Session Key (32 bytes / 256 bits) 2. Generates a random Initialization Vector (IV) (16 bytes / 128 bits) 3. Encrypt the message to be sent using the AES Session Key & IV 4. Calculate an HMAC of the encrypted message using the AES Session key 5. Encrypt the AES Session Key using the Public Key of Party 2 (Bob) The recipient. 6. Calculate Signature using the private signing key on the HMAC 7. Sends a packet of (Encrypted Message, Encrypted Session Key, Initialization Vector, HMAC, and Signature) to Bob ® Party 2 (Bob) 1. Decrypts Session key using his Private Key 2. Recalculates the HMAC of the encrypted message (Validates message integrity) } If HMAC check pass – Verify digital signature using Alice Public Key w If signature verification pass w Decrypts the message using the decrypted AES Session Key and Initialization Vector w Otherwise, identity of the sender couldn't not be verified, reject message. } Otherwise, rejects the message because of integrity check failure. • Why Order matters? ® Timing Side-Channel Attacks ® Padding-Oracle Attack ○ Protocols § TLS/SSL • How TLS/SSL Works? • Mitigates against ® Man in the Middle Attacks ® Authentication, so the client can be sure it is talking to the correct destination. § Public Key Infrastructure (PKI) • Certificates aka X.509 Certificate (Sha-1 Signature Issues) ® A digitally signed file ® Identifies (Computer / User / Device) ® Has Public & Private Key, only the certificate owner has the Private Key. ® Has Expiration date ® Information about the CA that issued the cert ® X.509 Extension Attributes (like Usage attribute) ® Revocation Information. • Certificate Authority (CA) (CNNIC, WoSign) ® Issues, signs and manages certificates. ® Famous certificate authorities (Verisign, GoDaddy, … etc). • Trust Chains ® CA's can delegate the signing job to subordinate CA's ◊ Root CA's signs an intermediate signing certificate to the subordinate CA ® The subordinate CA can then issue certificates ® To validate a certificate, the client validates the signatures of all the intermediate stages and make sure all of them are linked to a Trusted CA • Certificate Revocation Lists (CRL's) ® When a certificate is compromised (Private Key leaked) it will be published on the CRL, so each time the cert is validated, the CRL list is checked in case cert is revoked. 3. Takeaways 4. Books a. Understanding Cryptography: A Textbook for Students and Practitionershttps://www.amazon.com/Understanding-Cryptography-Textbook-Students-Practitioners/dp/3642041000 Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe
هل الطريقة الحالية لتقييم المطورين بالتركيز على أسئلة الخوارزميات هي الطريقة المثلى؟ روابط ذكرت في اللقاء DHH (The author of Ruby on Rails) https://twitter.com/dhh/status/834146806594433025?lang=en https://github.com/tmcw/presentations/blob/gh-pages/advice-to-the-graduate/index.md http://www.yegor256.com/2017/02/21/say-no-to-google-recruiters.html قائمة مجمعة بالشركات التي تعتمد طرق اخرى في تقييم المبرمجين https://github.com/poteto/hiring-without-whiteboards Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe
الحلقة السابقة https://soundcloud.com/askdeveloper/ep46-askdeveloper-podcast-cryptography-part-1-introduction-and-hashing ○ Encryption (Two Ways) § Symmetric Encryption □ Same key both encrypts and decrypts the data. □ Very fast, yet exchanging key is tricky □ Very Algorithmic □ Examples ® DES Data Encryption Standard (BROKEN) ◊ Uses key of 56 bit length ® Triple DES (3DES) ◊ Uses three keys (or two unique keys) of 56 bit each ® AES Advanced Encryption Standard ◊ Uses keys of 128, 192 or 256 bits long □ Attacks ® Brute force ◊ Usually mitigated via increasing key length, as difficulty increases exponentially as key size increases, for example time to crack given a modern super computer. Key Size Time To Crack 56 bits 399 seconds 128 bits 1.02 * 1018 years 192 bits 1.87 * 1037 years 256 bits 3.31 * 1056 years ◊ Side-Channel Attacks § Asymmetric Encryption □ Key pairs have mathematical relationship □ Each one can decrypt messages encrypted by the other. □ Slow, but exchanging key is trivial □ Very Mathematical □ Anyone can know the Public Key ® The Public key can only be used to encrypt data □ The Private key is kept secret, and never leaves the recipient's side. ® The Private key can only be used to decrypt data □ Examples ® RSA (Rivest, Shamir and Adelman) ® The de-facto standard in the industry ® Public and Private keys are based on large Prime Numbers § Hybrid Encryption □ Uses both Symmetric and Asymmetric encryption at the same time. □ Goals: ® Use the performance of Symmetric Crypto ® Convenience of sharing keys using Asymmetric Crypto ® HMAC for authentication. □ Steps: (Order is very important) ® Party 1 (Alice) 1. Generates a random AES Session Key (32 bytes / 256 bits) 2. Generates a random Initialization Vector (IV) (16 bytes / 128 bits) 3. Encrypt the message to be sent using the AES Session Key & IV 4. Calculate an HMAC of the encrypted message using the AES Session key 5. Encrypt the AES Session Key using the Public Key of Party 2 (Bob) The recipient. 6. Sends a packet of (Encrypted Message, Encrypted Session Key, Initialization Vector, and HMAC) to Bob ® Party 2 (Bob) 1. Decrypts Session key using his Private Key 2. Recalculates the HMAC of the encrypted message (Validates message integrity) } If HMAC check pass – Decrypts the message using the decrypted AES Session Key and Initialization Vector } Otherwise, rejects the message because of integrity check failure. Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe
Information Security 1. Introduction ○ Security by obscurity § Steganography □ Hiding data inside another form of data, like using non-used bits in image to hide a message § Cool, but not practical. § Disadvantages ◊ Algorithm secrecy vs. key secrecy ○ Cryptography is everywhere and yet if done right, you can barely see it. ○ Goals: § Confidentiality □ Secrets stay secret. § Integrity □ Data is not tampered with. § Non-Repudiation □ No party can deny sending messages. § Authentication □ Each party can ensure that the sender is what they expect. ○ Cryptography § Hashing § Encryption § Signing § Protocols ○ Random Number Generators § Extremely important, almost all encryption/hashing strength is affected by how random the random number generator is. § Don't use simple random number, use a cryptographic random number generator with a sophisticated source of entropy. § Pseudorandom number generator § Dual_EC_DRBG random generator backdoor 2. Body ○ Hashing (one Way) § Properties □ Fixed length output no matter what size the input was □ Very easy to compute the hash of a given message, however very hard to compute from a hash the corresponding input. □ Mathematically infeasible to generate a message that has a given hash □ Any modification to a message produces a completely different hash that has no relationship to the original message's hash. □ It is mathematically infeasible to find two messages with the same hash. Hash Collision § Hashing Functions □ Provides data integrity, however lacks authentication □ Examples ® MD5 ◊ Considered Insecure ® Secure Hash Family SHA-X, Sha-1, Sha-2 [Sha256, Sha512], Sha-3 ◊ Sha-1 is considered insecure. ◊ Sha-1, Sha-2 designed by NSA ◊ Sha-3 is not designed by NSA, Competition winner. □ Attacks ® Brute force ◊ CPU's are getting faster and cheaper every day. ◊ GPU's are getting faster and cheaper every day. ◊ Special Hash calculating hardware is becoming more available especially with the BitCoin push. ® Rainbow table attacks ◊ Pre-Calculated tables where you can reverse lookup a hash to a value ◊ Try www.crackstation.net § Hash Message Authentication Codes (HMAC) □ Adds authentication to integrity □ Can be used with all previous algorithms, HMACMD5, HMACShA1, HMAC256 … etc. § Salted Hash □ Adds random salt to mitigate rainbow table □ Salts are unique per record, and not a secret. § Password Based Key Derivation Function (PBKDF2) □ RSA Public Key Cryptographic Standard PKCS #5 Version 2.0 □ Internet Engineering Task Force RFC 2898 Specification ® Adds a lot of iterations to slow it just enough to mitigate brute force (default 50,000 iterations) ® Adds random salt to mitigate rainbow table □ Disadvantage: It can be easily implemented with hardware which makes it vulnerable to bruteforce even with high number of iterations § Bcrypt □ Password Hashing function □ State of the art password hashing § Usages □ Integrity Check Password Storage Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe
• What's wrong with the world as it is today? ○ Gatekeepers and Walled Gardens ○ The Master Switch by Tim Wu ▪ Tim Wu is the one who coined the Net Neutrality term. ▪ This book tells the story of how every communication medium starts a revolution that upsets the order, then eventually it gets controlled. The same thing could happen to the Internet. • Bitcoin ○ Is this about money, or about technology ○ Is this about the technology or bitcoin, or the technology of distributed money. ○ How Bitcoin works. Video. ○ Bitcoin mining in plain English. • Blockchain ○ permissionless distributed database based on the bitcoin protocol that maintains a continuously growing list of data records hardened against tampering and revision, even by its operators. The initial and most widely known application of block chain technology is the public ledger of transactions for bitcoin, which has been the inspiration for similar implementations often known as altchains ○ Trustless transactions ○ Simple explanation of how Blockchain works. • Distributed hash tables ○ class of a decentralized distributed system that provides a lookup service similar to a hash table • Git ○ Git GPG Signature • BitTorrent • IPFS: Inter-Planetary File System ○ Intro to IPFS ○ IPFS: Why We Must Distribute the Web (Video) ○ How to Use IPFS to fix NPM ○ HTTP is obsolete. It's time for the distributed permanent web ▪ This page is actually served via IPFS It covers important points: how IPFS does mutable data, how it does human-readable URLs.
AskDeveloper Podcast - 44 - Yasser walked on MARS, and can't wait to talk about it, and coverage of Build 2016 اشترك في قناتنا على يوتيوب و تابعنا على فيسبوك http://fb.com/askdeveloper http://soundcloud.com/askdeveloper http://www.askdeveloper.com http://youtube.com/bashmohandes
EP43 - Gate Keepers

EP43 - Gate Keepers

2016-02-2101:16:33

الحلقة 43 من راديو اسأل مطور, في هذه الحلقة نناقش مشاكل احتفاظ الشركات التقنية بالبيانات الشخصية و استهداف الحكومات و الأجهزة الأمنية لها و نناقش بعض الأخبار التقنية التي حدثت و المتعلقة مثل مطالبة ال FBI لشركة Apple لكسر تشفير أحد أجهزة iPhone و الذي تم اصدار حكم محكمة لالزام الشركة بهذا و على اثره قام Tim Cook المدير التنفيذي للشركة باصدار خطاب مفتوح لمستخدمين التكنولوجيا. http://www.apple.com/customer-letter/ أيضاً تحدثنا عن موضوع Where is The Fair Use #WTFU و الذي اثير مؤخراً على يوتيوب http://amreldib.com/linkblog/WhereIsTheFairUse و أيضاً صدر العدد الثانية من Ask Developer LinkSheet يمكنك الحصول عليها هنا http://amreldib.com/linkblog/AskDeveloperLinksheet2SelfParking3DPrintedBuildings العدد الأول http://amreldib.com/linkblog/AskDeveloperLinksheet1LateAsAlways اشترك في قناتنا على يوتيوب و تابعنا على فيسبوك http://fb.com/askdeveloper http://soundcloud.com/askdeveloper http://www.askdeveloper.com http://youtube.com/bashmohandes
في هذا اللقاء نناقش موضوع المشروع المقترح لنقابة مهندسي البرمجيات, و الذي تم اقتراحه عده مرات من قبل بنماذج متفاوتة. آخر نسخة مقترحة معلنة من القانون - و التي تم تقديمها لمجلس الشعب في 2012 -  http://issuu.com/esea_pr/docs/egswengs4 تسجيل اللقاء بالفيديو https://www.youtube.com/watch?v=aMs0qKMiiEI Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe
في هذه الحلقة نناقش موضوع ال VR / AR أو الواقع المعزز و الواقع الافتراضي و نتعرض لبعض المنتجات التي ظهرت أو في طريقها للظهور و الطفرة التي حدثت مؤخراً في هذا المجال. Oculus Rift, Hulu Lens, Project Morpheus (PlayStation VR) - Immersive technologies - VR history ○ Entex Adventure Vision (1982)https://en.wikipedia.org/wiki/Entex_Adventure_Vision ○ Nintendo Virtual Boy (1995)https://en.wikipedia.org/wiki/Virtual_Boy - Oculus ○ Samsung Gear VR - Cardboard - Hololens experience Show Notes Yasser goes to Redmond to visit Microsoft and gets a surprise demo of the new Hololens. A channel9 video, a tour in Microsoft museum https://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-145-Living-Computer-Museum Video about Microsoft and Apple staff in NY https://www.youtube.com/watch?v=TMATD2qk564 Glen Keane - Disney artist using Oculus Rift https://www.youtube.com/watch?v=GSbkn6mCfXE Hololens and Volvo https://www.youtube.com/watch?v=DilzwF90vec Unity 3D http://unity3d.com/ Entex Adventure Vision (1982)https://en.wikipedia.org/wiki/Entex_Adventure_Vision Nintendo Virtual Boy (1995)https://en.wikipedia.org/wiki/Virtual_Boy Black Mirror https://en.wikipedia.org/wiki/Black_Mirror_%28TV_series%29 Ask Mohamed any question https://ask.fm/bashmohandes/ Amr's blog post: How to Ask a Question http://www.amreldib.com/blog/HowToAskAQuestion/ Hitchhiker's guide answer of life is 42 https://en.wikipedia.org/wiki/42_%28number%29#The_Hitchhiker.27s_Guide_to_the_Galaxy
Mostafa Ashour an Egyptian entrepreneur who started at least two different startups in Egypt in different types of software business like Gaming with Khayal Entertainment, also worked for multinational companies such as IBM and Microsoft, and recently he decided to write a book التجربة الخيالية - قصة انتاج أول لعبة كمبوتر في مصر مصر مفيهاش مينتورزhttp://www.mostafaashour.com/%D9%85%D8%B5%D8%B1-%D9%85%D8%A7%D9%81%D9%8A%D9%87%D8%A7%D8%B4-%D9%85%D9%86%D8%AA%D9%88%D8%B1%D8%B2/ Deconstructor of Fun http://www.deconstructoroffun.com/ إشتري نسخة رقمية من كتاب التجربة الخيالية https://kotobi.com/shop/ar/%D8%A7%D9%84%D8%AA%D8%AC%D8%B1%D8%A8%D8%A9-%D8%A7%D9%84%D8%AE%D9%8A%D8%A7%D9%84%D9%8A%D8%A9 Tryvin http://www.tryvin.com/ Boxmize http://boximize.com/ Mostafa Ashour https://twitter.com/mostafaashour
الحلقة التاسعة و الثلاثون من راديو اسأل مطور, في هذه الحلقة نستضيف المهندس محمد تيسير المنضم حديثاً لفريق عمل جوجل في مدينة زيورخ في سويسرا, ليشارك معنا خبراته و نصائحه لمن يريدون التقدم في الوظائف المماثلة. Why do you want to join Google? Technical career path Innovative Move to another country You will not lose anything if you fail. There is no such thing as blacklist What they are looking for in a candidate? Smart & get things done Goes the extra mile (open-source, side projects, …) Measurable achievements College degree is not required Persistence: I failed the 1st interview but passed the 2nd How to pass the interview? Relax. It’s not the end of the world Always keep the communication line open. In other words, always think out loud. Don’t stand there silently while you are thinking Validate your assumptions with test cases & ask about edge cases to make sure you understand everything. The problem might be simpler than you think Apply for all suitable positions, not just one or two (follow @googlejobs on twitter) Prepare well (Project Euler, Top Coder, ACM, …) “Algorithm Design Manual” is a good book, but it’s heavy for some people. Go with it when you feel you have a good understanding of basic data structures See more references below Things to consider It takes time to pass the interviews, get visa & start working Google helps with relocation: papers, travel tickets, temp accommodation, but this doesn’t mean the visa is guaranteed. The imposter syndrome: I’m not good enough References Steve Yegge blog post is the best resource. http://steve-yegge.blogspot.ch/2008/03/get-that-job-at-google.html Event by Ahmad Aly https://www.facebook.com/events/252191538310698/?ref=22 Required courses http://uk.businessinsider.com/skills-for-google-engineering-jobs-2014-10?r=US Another reference http://www.businessinsider.com/qualities-google-looks-for-in-job-candidates-2014-4?IR=T There were some sessions in EgyptScholars group telling you how to prepare for Google interview https://www.facebook.com/EgyptScholars
EP38 - Package Managers

EP38 - Package Managers

2015-01-1057:291

Introduction What is a package? What is a Package Manager? Why Do we need Package Manager? Pros and Cons Pros Break your code into sharable components. Reduce build times. Easy to find well-made packages to speed up development. Resolving versioning in a clean way. Cons Sometimes packages don't play well together Too many package managers with very little differences Examples Ruby Gems (was that the first one?) Python Pip NuGet NPM apt-get OneGet Chocoloty Bower Yum pacman
Welcome to the 37th episode of AskDeveloper Podcast, in this episode we will discuss the big news that came from Microsoft last week regarding opening the source of the .net Framework as well as a new SKU of Visual Studio Community Edition for small and Open Source teams. أهلا بكم في الحلقة السابعة و الثلاثون من راديو اسأل مطور في هذه الحلقة نناقش الأخبار التي أعلنتها مايكروسوفت الأسبوع الماضي عن فتح مصدر اطار عمل دوت نت, بالاضافة الى اصدار نسخة جديدة من فيجوال ستوديو (نسخة المجتمع) و التي ستكون مجانية للفرق الصغيرة و المشاريع مفتوحة المصدر.
الحلقة السادسة و الثلاثون من راديو اسأل مطور, نناقش في هذا الأسبوع أهمية نظم حفظ و تنظيم الكود Source Control و نقارن بين أنواعها المختلفة و نتكلم باستفاضة عن Git What is source control Why do I need Source Control Source control absence from official CS curriculum is a disaster Source control can be as important as If Else statements Important for individuals. Vital for teams Types of Source Control Systems Centralized (Traditional) CVS SVN - Subversion. TFS Distributed Git Mercurial Awesome Git Features Stash Branching with no overhead Local Commits (never lose a thing) Rewriting History (rebasing) Git vs GitHub GitLab Bitbucket Using GitHub in non-programming projects
الحلقة 35 من راديو اسأل مطور, في هذه الحلقة نستعرض موضوع المنطق للمبرمجين. - Abstraction ○ 1+1 = 2 almost always not true ○ If 1 orange + another orange, what about the size of each, the taste ... etc ○ For this to be true some abstraction is required ○ Abstraction is removing some details to simplify reality modeling and perception ○ Programming is in huge part an art of abstraction ○ "Leaky abstraction" Spolsky's post.  - Perception ○ This table has four legs ○ This table is beautiful ○ The first statement the signifier and signified are adjacent while the second statement there is a space for interpretation ○ Some signifiers has wide meanings or narrow, and different people perceive it differently ○ Role of agile development in addressing perception issues - Deduction
EP34 - Freelancing

EP34 - Freelancing

2014-05-1001:01:29

ِAsk Developer Podcast الحلقة 34, في هذه الحلقة نناقش موضوع ال Freelancing و كيف تبدأ فيه و ما هو و مميزاته و عيوبه و بعض النصائح من التجارب الشخصية. What is freelancing?  Comparing freelancing to regular job How to find freelancing opportunity?  How to handle clients?  How to put your name out there?  Places To look for freelancing opportunities.  Rentacoder Guru Video version https://www.youtube.com/watch?v=k-562HWe1N4
هل محبين و متابعين التكنولوجيا في المنطقة العربية يجب عليهم التحدث و الكتابة بالعربية؟ هل من يود تعلم التكنولوجيا في المنطقة العربية عليه أن يجيد اللغة الانجليزية و يتجه للمصادر الأجنبية؟ Should Arabic technology enthusiasts and workers speak and write in Arabic? should people who wish to learn about IT go for Arabic or English resources?
loading
Comments