I tracked everything I did for a year in fifteen minutes increment. Then, I visualised the data.
A few months ago, while discussing about cryptography (the art of writing or solving codes), my friend told me about the 75th Anniversary Commemorative Coin. This limited edition fifty cent coin was released on 1 September 2022 by Australian Mint to celebrate the 75th anniversary of the Australian Signals Directorate (ASD). The specialty of this coin is that there are several cryptography puzzles minted on this coin.
One cloudy afternoon, while walking down the street, you see an object tossed out of a speeding car. It is a bag. You are curious to check the contents. The contents look suspicious, so you quickly snap some photographs. Little did you know that you were about to embark on a crazy mysterious adventure.
Have you ever used an Allen Key to hit a nail on a wooden board? or a screwdriver to drill a hole in the wall? How about using a presentation software to automatically play a list of your favourite songs on a slideshow mode? or using MS Excel for retouching your photos. I am sure there are better tools to do these tasks. But, no one said you can’t use these software tools for the above-mentioned applications. This blog is an essay about how I find it fascinating how people have found an alternate use of tools within a software eco-system to achieve their end-results.
Through various circumstances since last year, I used Ubuntu as my primary operating system. This blog outlines my experience of using Linux for day-to-day tasks and how I have realised that the operating system doesn’t matter as long as you can get your work done.
Isaac Asimov developed the three laws of robotics. I have always been curious about implementing the three laws in real humanoid robots. Here’s a blog post where I outline the possible ways of implementing the three laws while asking several questions regarding the ethics of developing humanoid robots. Bonus story in the beginning.
One cloudy afternoon, while walking down the street, I saw an object tossed out of a speeding car. It was a bag. I was curious to check the contents. The contents looked suspicious, so I quickly snapped some photographs. Little did I know that I was about to embark on a crazy mysterious adventure for the next three days with little to no sleep at all.
Categorising blog posts is essential if you want your readers to read similar posts that they liked. While there are some limitations when implementing categorisation in Jekyll, but it is far from impossible. This blog highlights the steps I took to categorise blog posts.
The power of open-source is in contribution. This contribution not only requires coding but also requires requesting something out of the project. One such feature request from a fellow member of the open-source community led to a fantastic coding adventure for the past few months.
This blog post is going to be a short update about the blogs. Over the years, I used external blogging platforms such as Blogger, WordPress, and Medium. However, last year, I felt a need to own the contents of my blog, where I had complete control over its layout, format, and type of content. Thankfully, I found Jekyll, a static site generator that transforms the plain-text files into a website.
Last weekend I participated in a hackathon. For context, following the events of 2020 A.D., we have started using virtual hackathons and hackathons interchangeably. If you are reading far into the future, from a space station or the Moonbase and see the planet Earth without any floating mess, then know that some of us were working on tracking that debris. If you are a sentient life form living somewhere near Alpha Centauri, then viola, you have found a fragment of human knowledge.
A month ago, I started working on the final project for my web development course. The project parameters were simple: use Django and JavaScript and do not make anything similar to other course projects. Apart from this, the students had a choice to build “whatever” they wanted. I like the freedom of creating “whatever” with no pre-determined technical specifications. Previous projects in the course had a strict set of technical specifications, and the students must complete all the project requirements to get a passing grade. However, when “whatever” I wanted was on the table, I naively planned out an ‘inventory management system (Inv)’ project design on a yellow post-it note, stuck it on the wall behind my computer, and started the project from scratch. Little did I know that the last one week would follow the cycle of Eat-Code-Sleep(?).
Working in a university, I have to manage lots of documents. If the documents are not stored in a proper folder location then it irritates me to search the required document. Also, if you are like me who likes things standardised, then having an inconsistency in folder structure and names can be frustrating. If you are reading this way ahead in the future; I am not talking about physical papers with folders stacked on a shelf as you may have seen in the museums. I am talking about digital files on a computer.
If you have started coding in Python, after some point, you may require to install some external packages. If you’ve done things right (fingers crossed), nothing should break and everything should install perfectly fine. In a perfect world, it should. But often at times you may face some issues. Moreover, when you are collaborating on a project with others, you may have to deal with “But, it works fine on my computer”.
Last weekend, I participated in a hackathon. If you are reading this blog in 2020, I don’t have to explain why we have a virtual hackathon.
Imagine that you and your group of friends want to communicate the latest gossip in the school. You have a strict teacher named Snape who is constantly finding the slightest reason to send you to detention. You and your friends decide to pass on the messages on a piece of paper. If Prof Snape gets hold of this paper, you don’t want him to find out what you are discussing. So, you come up with a clever idea. You shift the alphabet by three positions when you write the message. This right-shifting your alphabet by three makes your A = D, B = E, C = F, . . ., X = A, Y = B, Z = C
.