Popular recipes by Alan Holt http://code.activestate.com/recipes/users/4170480/2009-06-02T02:37:28-07:00ActiveState Code RecipesNMEA sentence checksum (Python)
2009-06-02T02:37:28-07:00Alan Holthttp://code.activestate.com/recipes/users/4170480/http://code.activestate.com/recipes/576789-nmea-sentence-checksum/
<p style="color: grey">
Python
recipe 576789
by <a href="/recipes/users/4170480/">Alan Holt</a>
(<a href="/recipes/tags/checksum/">checksum</a>, <a href="/recipes/tags/gps/">gps</a>, <a href="/recipes/tags/nmea/">nmea</a>).
</p>
<p>Calculates the checksum of an NMEA sentence (GPS data).</p>
Floyd-Steinberg dithering algorithm (Python)
2009-06-02T01:28:46-07:00Alan Holthttp://code.activestate.com/recipes/users/4170480/http://code.activestate.com/recipes/576788-floyd-steinberg-dithering-algorithm/
<p style="color: grey">
Python
recipe 576788
by <a href="/recipes/users/4170480/">Alan Holt</a>
(<a href="/recipes/tags/algorithm/">algorithm</a>, <a href="/recipes/tags/dithering/">dithering</a>, <a href="/recipes/tags/floyd_steinberg/">floyd_steinberg</a>, <a href="/recipes/tags/image/">image</a>, <a href="/recipes/tags/manipulation/">manipulation</a>).
</p>
<p>Floyd-Steinberg dithering is an image dithering algorithm (see <a href="http://en.wikipedia.org/wiki/Floyd-Steinberg" rel="nofollow">http://en.wikipedia.org/wiki/Floyd-Steinberg</a> for more details). While the algorithm is mainly for image manipulation, I use it to create random locations for sensor networt devices.</p>
Automated management of CLI devices (Python)
2009-05-27T01:24:12-07:00Alan Holthttp://code.activestate.com/recipes/users/4170480/http://code.activestate.com/recipes/576778-automated-management-of-cli-devices/
<p style="color: grey">
Python
recipe 576778
by <a href="/recipes/users/4170480/">Alan Holt</a>
(<a href="/recipes/tags/cli/">cli</a>, <a href="/recipes/tags/management/">management</a>, <a href="/recipes/tags/ssh/">ssh</a>, <a href="/recipes/tags/telnet/">telnet</a>, <a href="/recipes/tags/tunnel/">tunnel</a>).
</p>
<p>This recipe provides a mechanism for remote, automated control of a network device via its command-line interface (CLI). It assumes that the CLI is accessed using Telnet. Furthermore, the device cannot be accessed directly, instead the user has to SSH to an intermediate jump host before Telneting to the device. </p>