Author: drweb

I needed a fun weekend project that actually taught me something useful about Python. Rock Paper Scissors seemed simple enough, but I quickly realized there are two versions of this game out there – the classic three-move version and the extended Rock-Paper-Scissors-Lizard-Spock from The Big Bang Theory. I decided to build both. This article walks through building both versions in Python from scratch. By the end, you will have a working terminal game that handles player input, generates random computer moves, determines winners, and keeps running until the player quits. The same logic applies to any simple game you want…

Read More

You deleted a log file mid-session, a running process is still writing to it, and ls shows nothing, but the data is still there, and you can get it back before the process closes. Linux deletes files the way most people assume is permanent, but what the rm command actually does is remove the directory entry and decrement the file’s link count, and if any process still has that file open, the kernel keeps the underlying inode alive until the last file descriptor pointing to it is closed. That window between rm and process exit is your recovery window, and…

Read More

Incredibuild this week developed a sandbox, dubbed Islo, that makes it possible to safely run artificial intelligence (AI) coding agents. Company CEO Shimon Hason said Islo provides an isolated execution environment that enables DevOps teams to limit access to sensitive data, codebases, resources and services. Each AI coding agent is then provided with its own dedicated, isolated environment that operates independently and can be centrally managed by a DevOps team. DevOps teams can deploy Islo independently of the Incredibuild platform or, alternatively, use the Incredibuild software development lifecycle (SDLC) management platform to apply policy controls, manage agent identities, enforce guardrails,…

Read More

My database was choking under the weight of repeated queries for user sessions. Every time a user logged in, the app hit PostgreSQL with the same fetch request, slowing things down for everyone. I needed an in-memory layer between my app and the disk, something fast that could store session data without the overhead of a full database round-trip. That is when I found Redis. This article covers what Redis is and how to use it from Python. By the end, you will understand data structures in Redis, how to run CRUD operations, use transactions and pipelines, and implement caching…

Read More

IREN Ltd, a provider of cloud infrastructure services, today revealed its intent to acquire Mirantis, a provider of open source OpenStack and Kubernetes software that is deployed in both cloud computing and on-premises IT environments. Under terms of the agreement valued at $625 million, Mirantis will operate as an independent subsidiary of IREN, a former provider of bitcoin mining services that now specializes in hosting artificial intelligence (AI) workloads. Dominic Wilde, senior vice president of marketing for Mirantis, said that while Mirantis will continue to engage with the more than 1,500 IT organizations it supports directly, the combined entity will…

Read More

I ran into this problem during a data migration when a colleague handed me a CSV full of product codes like “SKU-4829-A” and “ORD-1034-B” — and I needed to pull out just the numbers for validation. Manual extraction was not happening, so I wrote a small Python script to do it automatically. That script is what this article is about. This article covers two ways to extract digits from a Python string — using isdigit() and using regex. By the end, you’ll have a clear picture of when each approach makes sense, with working examples you can copy-paste into your…

Read More

I ran into this problem when I had a list of user records with some missing fields, and I needed to extract only the valid ones before processing. Writing a loop felt verbose for something this simple. That’s when I reached for Python’s filter() function. The article covers how filter() works, its two required arguments, how to use it with lambda and named functions, what happens when you pass None as the predicate, and how it compares to list comprehensions. By the end, you’ll know exactly when to reach for filter() and how to avoid the most common mistakes. TLDR…

Read More

Scanner Integrations May 5, 2026 Precision Container Security with Docker and Black Duck The complexity of modern containerized applications often leaves developers drowning in a sea of “noise”—vulnerabilities that exist in the file system but pose zero actual risk to the application. The integration between Black Duck and Docker Hardened Images (DHI) provides a definitive answer to this challenge. By combining Docker’s secure-by-default foundations, using VEX (Vulnerability Exploitability eXchange)… Jessy McDermott and Dan Stelzer Read now

Read More