Skip to main content
Back to Blog

Reflections on
Python.

Browsing 6 articles tagged with Python.

Streaming LLM API Responses in Python: A Complete Production Guide - Handle token-by-token output, implement back-pressure, manage rate limits, and build fault-tolerant wrappers around OpenAI-compatible APIs
· 8 min read · Python

Streaming LLM API Responses in Python: A Complete Production Guide

Handle token-by-token output, implement back-pressure, manage rate limits, and build fault-tolerant wrappers around OpenAI-compatible APIs

Streaming is the difference between an AI product that feels fast and one that feels slow. Instead of waiting 10–30 seconds for a completed response, a streaming API delivers each token as it is generated. This post covers the full picture: HTTP server-sent events, Python async generators, rate limit handling, and building a robust wrapper you can drop into a production application.

Read more
Building a Geospatial REST API with FastAPI and PostGIS - A complete walkthrough of a production-ready spatial data API: routing, geometry serialisation, spatial queries, and GeoJSON responses
· 6 min read · Python

Building a Geospatial REST API with FastAPI and PostGIS

A complete walkthrough of a production-ready spatial data API: routing, geometry serialisation, spatial queries, and GeoJSON responses

FastAPI's async-first design and automatic OpenAPI documentation make it an excellent choice for geospatial APIs. Combined with PostGIS for spatial queries and GeoAlchemy2 for the ORM layer, you can build a fully-featured location API in a few hundred lines of Python.

Read more
Cloud-Native Geospatial: GeoParquet, COGs, and STAC - The modern formats and cataloguing standards that are reshaping how spatial data is stored, accessed, and shared
· 7 min read · Cloud-Native Geospatial

Cloud-Native Geospatial: GeoParquet, COGs, and STAC

The modern formats and cataloguing standards that are reshaping how spatial data is stored, accessed, and shared

The geospatial industry is in the middle of a format revolution. GeoJSON files copied to S3 buckets, shapefiles emailed between teams, and WMS services that time out under load are giving way to a new stack built around cloud-native principles: data that can be accessed in parts, indexed without downloading, and queried directly from object storage.

Read more
Spatial ETL Pipelines with GeoPandas and Shapely - Building robust, reproducible geospatial data transformation workflows entirely in Python
· 5 min read · Python

Spatial ETL Pipelines with GeoPandas and Shapely

Building robust, reproducible geospatial data transformation workflows entirely in Python

Most geospatial data arrives dirty: mismatched projections, broken geometries, inconsistent attribute schemas. GeoPandas and Shapely give you a powerful, Pythonic toolkit for cleaning, transforming, and enriching spatial data before it reaches your database or analysis pipeline.

Read more
Chora: The First Python Library for Place-Based Computing - Model place as experience, not just location
· 6 min read · Chora

Chora: The First Python Library for Place-Based Computing

Model place as experience, not just location

Unlike standard GIS which asks 'What is at coordinates X,Y?', Chora asks 'Why does this park feel like Home to Alice, but Danger to Bob?' Place isn't a polygon—it's an emergent phenomenon arising from memory, habit, emotion, and social interaction.

Read more
OS³: Open Source Security Studio - Launching A Hands-On Cybersecurity Teaching Platform - Deliberately vulnerable, modular, and instructor-friendly labs for cyber security education and engagement
· 8 min read · Cybersecurity

OS³: Open Source Security Studio - Launching A Hands-On Cybersecurity Teaching Platform

Deliberately vulnerable, modular, and instructor-friendly labs for cyber security education and engagement

OS³ (Open Source Security Studio) is a free, open-source platform for teaching cyber security through safe, practical labs. Built in Python/Flask for CMU540 at Birmingham Newman University and STEM outreach, it offers paired insecure vs. secure demos of common vulnerabilities and network security simulations.

Read more