Found 98 bookmarks
Newest
Senior Software Engineer - D.C. Thomson & Co. Ltd.
Senior Software Engineer - D.C. Thomson & Co. Ltd.

Hey! You! Yes, you! Looking for a senior hacker role? Want to work for the second biggest creator of comics called DC¹? Fancy working in a team and environment that, in my experience, is the nicest group of folk I’ve worked with in the 35 years I’ve been banging on keyboards for money? Think you could cope working with me? (Okay, fine, forget that last part).

Perhaps know someone who might like that?

1: I think. Honestly, I’ve not actually fact-checked that.

·dcthomson.co.uk·
Senior Software Engineer - D.C. Thomson & Co. Ltd.
wyuenho/emacs-pet: Tracks down the correct Python tooling executables from your virtualenvs so you can glue the binaries to Emacs and delete code in init.el
wyuenho/emacs-pet: Tracks down the correct Python tooling executables from your virtualenvs so you can glue the binaries to Emacs and delete code in init.el
What looks to be a module for Emacs that helps find the right venv for a project; I think. Saving this to look at at some point in the future.
·github.com·
wyuenho/emacs-pet: Tracks down the correct Python tooling executables from your virtualenvs so you can glue the binaries to Emacs and delete code in init.el
Boto3 1.34.129 documentation
Boto3 1.34.129 documentation
"You use the AWS SDK for Python (Boto3) to create, configure, and manage AWS services, such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Simple Storage Service (Amazon S3). The SDK provides an object-oriented API as well as low-level access to AWS services."
·boto3.amazonaws.com·
Boto3 1.34.129 documentation
A Retrospective on Requests
A Retrospective on Requests

As per the title: a retrospective of requests.

Possibly killer quote: "After receiving our first security disclosure, I was told that Requests wasn't a serious project but instead one person's art project and thus we shouldn't fix the vulnerability. This was despite the project being touted as being used by multiple international government agencies, political campaigns, and boasting about it's #1 download spot on PyPI. So when I say it might be artful, I'm trying to take a neutral stance on what is art and what isn't art and whether the internals of Requests are actually beautiful art."

·blog.ian.stapletoncordas.co·
A Retrospective on Requests
(How to Write a (Lisp) Interpreter (in Python))
(How to Write a (Lisp) Interpreter (in Python))
This page has two purposes: to describe how to implement computer language interpreters in general, and in particular to build an interpreter for most of the Scheme dialect of Lisp using Python 3 as the implementation language. I call my language and interpreter Lispy (lis.py). Years ago, I showed how to write a semi-practical Scheme interpreter Java and in in Common Lisp). This time around the goal is to demonstrate, as concisely and simply as possible, what Alan Kay called "Maxwell's Equations of Software."
·norvig.com·
(How to Write a (Lisp) Interpreter (in Python))
How to improve Python packaging, or why fourteen tools are at least twelve too many
How to improve Python packaging, or why fourteen tools are at least twelve too many
"Join me on a journey through packaging in Python and elsewhere. We’ll start by describing the classic packaging stack (involving setuptools and friends), the scientific stack (with conda), and some of the modern/alternate tools, such as Pipenv, Poetry, Hatch, or PDM. We’ll also look at some examples of packaging and dependency-related workflows seen elsewhere (Node.js and .NET). We’ll also take a glimpse at a possible future (with a venv-less workflow with PDM), and see if the PyPA agrees with the vision and insights of eight thousand users."
·chriswarrick.com·
How to improve Python packaging, or why fourteen tools are at least twelve too many
How We Executed A Critical Supply Chain Attack On Pytorch
How We Executed A Critical Supply Chain Attack On Pytorch

"Four months ago, Adnan Khan and I exploited a critical CI/CD vulnerability in PyTorch, one of the world’s leading ML platforms. Used by titans like Google, Meta, Boeing, and Lockheed Martin, PyTorch is a major target for hackers and nation-states alike.

Thankfully, we exploited this vulnerability before the bad guys.

Here is how we did it."

·johnstawinski.com·
How We Executed A Critical Supply Chain Attack On Pytorch