Skip to content
  • Contact us
  • Cookie Policy (EU)
  • Privacy Policy
Hacking With Python
Hacking With Python
  • Contact us
  • Cookie Policy (EU)
  • Privacy Policy
Convenience methodsDesign PatternsObject PoolPythonRAII

How to Create an Easy Thread-Safe Object Pool in Python with ContextManager

Introduction Sometimes, to save time and resources, it’s handy to have a collection of ready-to-use items, which we...
Iede SnoekNov 3, 2023Nov 3, 2023
Convenience methodsDelegationDesign PatternsPythonType annotations

Mastering the Easy Art of Delegation in Python: A Step-by-Step Guide

Introduction Delegation is like passing a job to someone else. In Python, you can do this by using...
Iede SnoekNov 1, 2023Nov 1, 2023
Convenience methodsDesign PatternsPythonRAIIType annotations

Making Resource Acquisition Easy: Python’s Simple Guide to RAII

Introduction Resource Acquisition and Initialization means the following: There are several ways to implement this pattern in Python:...
Iede SnoekOct 31, 2023Oct 31, 2023
Design PatternsObject PoolPythonType annotations

Simple Resource Management: Implementing the Object Pool Pattern in Python

Introduction Sometimes, for the sake of efficiency, it can be really helpful to keep a group of ready-to-use...
Iede SnoekOct 30, 2023Oct 30, 2023
Design PatternsLazy initializationMultitonPythonType annotationsUncategorized

Easy Implementation of Python’s Lazy Initialization Pattern for Improved Efficiency

Introduction Sometimes, making something can be costly. It might take a lot of resources or time to create...
Iede SnoekOct 30, 2023Oct 30, 2023
Design Patternsfactory methodPythonType annotations

Unlocking the Magic: Mastering the Factory Method in Python

Introduction In this article, we’ll explore a concept called the Factory Method in Python. The Factory Method is...
Iede SnoekOct 30, 2023Oct 30, 2023
Chain of ResponsilityDesign Patterns

Easy patterns in Python: Chain of Responsibility

Introduction The Chain of Responsibility pattern describes a chain of command/request receivers. The client has no idea which...
Iede SnoekOct 25, 2023Oct 25, 2023
CompositeDesign PatternsPythonType annotations

Easy patterns in Python: The Composite Pattern

Introduction The composite pattern allows you treat a group of objects like a single object. The objects are...
Iede SnoekOct 23, 2023Oct 23, 2023
BridgeDesign PatternsPythonType annotations

Easy Patterns in Python: The Bridge

Introduction The Bridge pattern is a design pattern that is meant to “decouple an abstraction from its implementation...
Iede SnoekOct 23, 2023Oct 23, 2023
Convenience methodsDesign PatternsGenericsObserverPythonType annotations

Easy Python Patterns: The Observer pattern

Introduction The observer pattern is a software design pattern that allows an object, usually called the subject, to...
Iede SnoekOct 22, 2023Oct 22, 2023
12345
  • Contact us
  • Cookie Policy (EU)
  • Privacy Policy
Copyright © 2025 - Yuki Theme By WP Moose
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}