The book "Pandas. Working with data »

The book "Pandas. Working with data » Hello! We have finally prepared the release of our book " Pandas . Work with data! " Much of her material is devoted to classes Series and DataFrame , which is provided by pandas for storing and manipulating data, the configuration topic is also affected. pandas , work with time series, visualization of data, etc.
 
 
At the moment " Pandas . Working with data " is available only on our website, in the future, we hope that it will be available at large sites selling e-books.
 
Introduction to pandas and its ...
+ 0 -

Kivy. From creation to production, one step. Part 2

Kivy. From creation to production, one step. Part 2
 
Greetings!
 
Today, as always, let's talk about creating mobile applications with the framework Kivy and Python. In particular, it will be a question of creating a mobile client for one Internet resource and publishing it on Google Play. I'll tell you what problems a novice and experienced developer may encounter, who decided to try themselves in a cross-platform development with Kivy, what can and should not be done in programming with Python for Android. svyatye.com in a mobile application, so that people can read and use it offline », followed by the publication of the client in the Google ...
+ 0 -

Kaggle: Amazon from Space - tricks and khaki for learning neural networks

Kaggle: Amazon from Space - tricks and khaki for learning neural networks  
 
Last summer, was over. competition on the kaggle site, which was devoted to the classification of satellite imagery of the Amazon forests. Our team took 7th place out of 900+ participants. Despite the fact that the competition ended a long time ago, almost all the methods of our decision are applicable so far, not only for competitions, but also for training neural networks for selling. For details under cat.
 
albu [/i]
 
At the time of participation in the competition, he directed all ml of the direction in the company Geoscan. But since then ...
+ 0 -

Analysis of routing tables, or why the network engineer Python

Analysis of routing tables, or why the network engineer PythonHello Habr!
 
This is my first article on Habré, and she was born out of the question in one of the professional forums. The question looked, somewhat paraphrasing, as follows:
 
 
There is a set of text files containing output of routing tables from various network devices;
 
Each file contains information from one device;
 
Devices can have different output formats for the routing table;
 
It is necessary to output the path to an arbitrary subnet or IP address from each of the devices based on the available data on demand;
 
The output must include information on the record from the routing table ...
+ 0 -

Steganography in IP-packages

Once, before the protection of the regular laboratory work, I was asked: what fields of the IP package can I use for the stegano? I did not know and just shrugged. But soon I decided to study this question.
 
Under the hood you are waiting for the study of IP packet headers, your own ping utility in Python and several ways to transfer data without attracting attention.
 
Structure of the IP packet
 
Setting up the environment
 
Ping: Easy version of
 
Ping: Complicated version of
 
Improvements?
 
 
 
...
+ 0 -

Determination of the ballistic-temporal characteristics of the motion of the center of mass of the paratrooper, dropped from the plane

Introduction


 
To determine the ballistic-temporal characteristics of the motion of the center of mass of the paratrooper, we must choose a simplified mathematical model, which is quite accessible for analytical research and at the same time preserves the most characteristic features of the initial object.
 
For the construction of simplified mathematical models of the parachutist movement, analysis, determination, and systematization of the permanent and temporal parameters are carried out.
 
There are no regular and sufficiently substantiated methods for constructing nonlinear mathematical ...[/h]
+ 0 -

Python and steganography

Not so long ago in my educational institution passed the pilot Hakaton for students. The subjects of the tasks were related to information security, including data encryption.
 
 
Python and steganography here a good article about it.
 
 
So, we have an image. There are pixels in the image. Pixels are formed from primary colors - red, green and blue.
 
 
Each of the colors is coded with a number from 0 to 255.
 
 

 
 
And we also have ASCII characters that are encoded as well.
 
 
Let's try to encode some text into this picture.
 
 
[h4] P...[/h]
+ 0 -

As I wrote the login for the protocol SRP6a in Python, but received JavaScript and Python in one box

As I wrote the login for the protocol SRP6a in Python, but received JavaScript and Python in one boxA great and fascinating journey begins with a simple and banal step. When I needed to implement the login process for a set of automated tests, I did not even know where it would lead.
 
Later in the article, you will learn how to prove that you know the password without ever passing it in any form (zero-proof proof), and how I stumbled on the finished examples to get the working Python code at the end of the path .
 
DISCLAIMER OF AUTHORITY: I've been programming on Python not so long ago, because the things I'll tell you about, and the mistakes that I've made can seem trivial to you.
 
[h2] ...[/h]
+ 0 -

Preliminary program PyConRu-2018: three Python Core Developer'a, speakers from Google, Yelp, Red Hat, Yandex

Preliminary program PyConRu-2018: three Python Core Developer'a, speakers from Google, Yelp, Red Hat, YandexHello, Habr!
 
 
July 22-23 in 95 km. from Moscow there will pass the sixth Russian conference for python-programmers PYCON RUSSIA 2018 .
 
 
Already in the program: Yuri Selivanov (Python Core Developer, EgdeDB, Canada), Andrey Svetlov (Python Core Developer, Ukraine), Christian Heimes (Python Core Developer, Red Hat, Germany), Melanie Warrick (Google, USA), Stephan Jaensch Yelp, Germany), Kate Heddleston (Shift, USA), Alejandro Saucedo (Eigen Technologies, United Kingdom), Vadim Pushtaev (Mail.Ru), Marina Kamalova (Yandex). If you want to join as a speaker, there are a few more days to ...
+ 0 -

Probabilistic programming and Bayesian method for hackers

Hello colleagues. Today we wanted to ask how useful you seem to be a slightly outdated book " " Bayesian Methods for Hackers ", Published in the original in 201? but not yet translated into Russian.
 
 
Probabilistic programming and Bayesian method for hackers
 
The book is positioned as applied, maximally disposed of mathematics and timeless.
 
 
Under the cut - a slightly abbreviated translation of the review of this book, laid out by the author on Github.
 
Please participate in voting
 
Prologue ...
+ 0 -