Transfer files from Google Drive in just 5 lines of Python code.

Photo by Nate Grant on Unsplash

Intro

Google Drive is the most used cloud storage platform. A need for some minimal yet effective tool to transfer contents to and from Drive is important!

There is a number of such libraries already present with Pydrive being the most amazing. Pydrive has a lot of functionalities but there are certain major functionalities that it lacks. Especially, when it comes to the most used feature i.e. Bulk uploading/downloading.

Thus with a goal to address the bulk uploading/downloading functionality in a way that is easy-to-use and yet covers all…


Photo by Fotis Fotopoulos on Unsplash

INTRO

API Development has become an essential skill for Backend Developers. Many companies also hire Developers for API Development only. Developing a REST API with Python is fairly simple as compared to other languages.

WHAT IS A REST API?

REST (REpresentational State Transfer) is an architectural style and an approach to communications that are often used in the development of Web services. The use of REST is often preferred over the more heavyweight SOAP (Simple Object Access Protocol) style because REST does not leverage as much bandwidth, which makes it a better fit for use over the Internet. …


Photo by Chris Ried on Unsplash

Intro

The concept of List Destructuring (aka Packing and Unpacking) is pretty nifty. You must have come across codes containing functions with these *args and **kwargs as arguments. It always used to boggle my mind, what kind of arguments are these. After some research, I got to know how wonderful they are.

Let’s understand them one by one. Open your favorite code editor and just follow along.

Unpacking

Consider a function that takes 3 arguments and we have a list of size 3 with us that has all arguments for the function. If we simply pass a list to the function, the…


Photo by Arget on Unsplash

Intro

The rate of cyber-attacks has increased by multi-fold in the past decade. Some common types of Cyber attacks are SQL Injection, Buffer Overflow Attacks, Denial-of-Service attacks, Session Hijacking.

A Man-in-the-Middle(MITM) attack is a kind of session hijacking in which a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. …


Photo by Héctor J. Rivas on Unsplash

Every time you want to search for an image similar to another one, you’re more or less left with one option: “Search Google for image”. Have you ever wondered what algorithms are making this happen? This is what we’ll explore in this blog post.

An Overview

There are numerous algorithms present today for this task, and depending on the use cases, the algorithms used can vary. Below are the major categories of image search engines:

  • Meta-data Based: These engines hardly consider the substance of the picture. Rather, they depend on literary signs; for example, manual comments and labeling performed by people, alongside…

Abhinav Anand

Hello World! I’m a Software Engineer. Loves toying the underlying structures of technologies in the world of zero’s and one’s.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store