I’ve now solved the first 15 Project Euler challenges in C. But then, I’ve hit a road block. Let me explain.

Read More

After a long time of being complacent with my skills, I thought I should up my InfoSec game. So far I’ve been mainly busy with figuring out how to enhance application security in my work. That means I learned how to

Read More

Let’s look at how 大切、大事、重要 are different.

Read More

Uber Rush provides cost-effective on-demand courier services. It is an exciting service that will allow companies to start delivering to local customers faster. Uber tries to make the process as easy as possible by providing an API which can be easily integrated into existing shop solutions and lets customers order cheap and easy shipping. For a high-level overview, please refer to this document.

Read More

Being part of the all-singing, all-dancing trap can make us forget our individual selves. A recent conversation with Daniel Hastik in May gave me a few jolts of inspiration to write about something that’s been bugging me.

Read More

The other day, I found out something real fun: Not all bike lanes in Germany need to be used! Since bike lanes are quite dreadful and not at all safe, I wanted to write a handy tool to show me when to use a bicycle lane and when not. The German traffic code (StVO §2 Abs. 4 Satz 2) dictates:

Read More

Python 3.4 introduced the statistics module. It contains helpful methods for determining basic statistical properties, such as mean, median and standard deviation of samples and populations.

Read More

I had this curious thought the other day: what is the byte value distribution in binary files, such as an executable? Take for example /bin/echo on OS X 10.11.1.

Read More

The new Python 3.5 unpacking syntax makes a programmer’s life much easier.

Read More

I found a really neat data source online on unwanted robocalls that the FCC (Federal Communications Commission, a United States government agency) has created and published openly. The data source provides times and dates of unwanted robocalls that consumers have reported to the FCC. We can use this data source to find out all kinds of things, but today we will be content with just finding out the time of the day households are most likely to receive robocalls.

Read More

This is a simple s-expression parser written in Python 3. It understands symbols and numbers and uses tuples to represent the data internally.

Read More

Creating tuples from generator expression is surprisingly fast.

Read More

25 Oct 2015

Filtering Trees

Today we are going to look at how to filter items in tree data structures using Python 3. We are going to compare a stateful approach and a functional and recursive approach. In the end we will discuss the advantages of a functional implementation.

Read More

As you might know, CPython, the most commonly used implementation of Python, uses a stack based virtual machine to run Python scripts. This means that Python script ASTs are never directly executed. Instead, CPython compiles .py script files into byte code files first (.pyc files). This allows for some optimizations during the byte code compilation step and shipping of byte code files to end customers instead of raw scripts. This is useful to make reverse engineering hard. Ableton Live includes a CPython interpreter for its MIDI hardware integration. It does not let users look at the actual hardware integration scripts though. Instead, all hardware integration scripts can only be found in their compiled .pyc form.

Read More

This is a short evaluation on whether one can perform a series of basic tasks using the APIs that cloud photo services provide.

Read More

With the new async syntax in Python 3.5, defining asynchronous functions has become a lot simpler. In this article, I will demonstrate a simple example for this new feature. It will involve pulling a set of homepages of popular websites and displaying the first 10 characters of every HTTP response. The example will utilize the awesome aiohttp library. Make sure that your machine has aiohttp and Python 3.5 installed.

Read More

Given a list items, that contains ints and None, produce a list that only contains the int values with their order of appearance preserved.

Read More

The other day I received this ominous message on Skype from an infected machine:

Read More