Tag Archives: need coffee

How many coffee capsules is it safe to drink per day?

Short answer: 4-5 capsules per day.

For more details, and an answer taking into account the specific type of capsule, read on.

To answer this -very important 😊- question, I’ll concentrate on Dolce Gusto capsules for the simple reason that that’s what I have at home (well, that, plus a Krups filter coffee machine, plus an Izzy traditional espresso machine, plus my one-time favorite Bialetti brikka). The results for Nespresso et. al. should be similar.

dolce gusto box

Do note that I’m only considering caffeine content; but that’s not always the only factor. E.g. if you drink anything near 400 cups Lungo decaffeinato in a single day, you will have non-caffeine related problems (WC attendance comes readily to mind ! 😊).

So, straight from Nestle’s faq:

How much caffeine is in each of the drinks?

Specialty Coffee :
– Cappuccino : 107 Mg Caffeine
– Cappuccino Skinny : 90 Mg Caffeine
– Latte Macchiato : 85 Mg Caffeine
– Vanilla Latte Macchiato : 83 Mg Caffeine
– Caramel Latte Macchiato : 83 Mg Caffeine
– Latte Macchito Skinny : 83 Mg Caffeine
– Mocha : 45 Mg Caffeine
– Cappuccino Ice : 35 Mg Caffeine

Coffee Drinks :
– Caffe Grande Intenso : 130 Mg Caffeine
– Espresso Intenso : 115 Mg Caffeine
– Grande Mild : 106 Mg Caffeine
– Light Roast : 106 Mg Caffeine
– Medium Roast : 103 Mg Caffeine
– Café au Lait : 92 Mg Caffeine
– Lungo : 89 Mg Caffeine
– Espresso : 80 Mg Caffeine
– Lungo decaffeinato : 1 Mg Caffeine

Non-Coffee Drinks
– Chai Tea Latte : 34 Mg Caffeine
– Nestea Peach Iced Tea : 9 Mg Caffeine

The usual number that’s given as “safe” caffeine per day for adults is 400 Mg (eg. see “Caffeine: How much is too much?” from Mayo Clinic here). So this amounts to:

Mg caffeine per capsuleMax capsules per day
Max. caffeine per day:400
Specialty Coffee :
Cappuccino Skinny904
Latte Macchiato855
Vanilla Latte Macchiato835
Caramel Latte Macchiato835
Latte Macchito Skinny835
Cappuccino Ice3511
Coffee Drinks :
Caffe Grande Intenso1303
Espresso Intenso1153
Grande Mild1064
Light Roast1064
Medium Roast1034
Café au Lait924
Lungo decaffeinato1400
Non-Coffee Drinks
Chai Tea Latte3412
Nestea Peach Iced Tea944

Spreadsheet is here if you want to play with the numbers (you can also comment on it). I’ve rounded to closest integer because nobody makes 3 cups of coffee and then decides to have another 0.8 😊

Enjoy !


Serious but hilarious NSA anecdotes

(This one’s for IT guys, perticularly crypto geeks, source is Schneier’s blog)

NSA recently declassified a lectures book from 1973. It contains some real gems, such as these from pages 55/56:

KAG-1/SEC used to be the bible of US cryptographers, was held in every crypto-center and covered everything from message preparation to compromise reporting in considerable detail. While we viewed it as a model of clarity, this perception was not always shared in the real world. A frustrated Navy Chief stormed out of bis crypto-ccntcr on board a carrier at sea, banded KAG-1 to a sailor and jokingly said “Throw this dam’ thing overboard.” He did. Several ships thereafter steamed back and forth for several days, but never found it. Winds, tides, and currents were studied to predict where it might come ashore with results so ambitious as to offer little hope and, in fact, it was never recovered – at least by us.

This incident triggered an R 1 study on what happens to our documents in salt water. A tank was made, and a copy of KAG-1 immersed. It stayed there for a year or so with no sign of deterioration. Agitators were added to stimulate wave action for another few months, with still no appreciable effect. We never did find out how long such a document would last. Subsequent work, however, has shown that good paper is nearly impervious to salt water, apparently indefinitely. A visit to S2’s exhibit of materials recovered from the sea bottom will bear that out. There you can see perfectly legible codes that had been under water since World War II, together with extraordinarily well-preserved items of hardware and magnetic tape that had been on the bottom for many years. These facts add to the previously expressed skepticism about jettison as a way to get rid of our stuff unless at very great depths and in completely secret location. (Shortly after WWII, small Army training crypto-devices called the SIGFOY were disposed of beyond the 100 fathom curve off Norfolk. Some years later, they became prize souvenirs for beach combers as they began washing ashore.)

UNSOLVED PUZZLE – We used to store a lot of cryptomaterial in a warehouse at Ft. Holabird. It was fenced and protected by a 24-hour armed civilian guard. One evening, such a guard saw an individual inside the fence, evidently attempting to penetrate the warehouse. He drew his weapon, cried “Halt!” and led the individual to the guard shack and started to call in for help. About that time, the intruder started running, climbed the fence, and disappeared.

We asked the guard why he didn’t shoot – he said he was afraid he might hurt somebody.

CONFETTI – When we manufacture one-time tape, a by-product of the punching process is millions upon millions of tiny, perfectly circular pieces of paper called “chad” that come out of holes in the tape. This chad was collected in burn bags and disposed of. Someone thought it would make good public relations to give this stuff to high school kids for use as confetti at football games. Inevitably, one of the burn bags was not quite empty when the chad went in. At the bottom, were a couple of TOP SECRET key card book covers and a few assorted keys. They carried the impressive caveats of those days like “CRYPTO – CRYPTO-CLEARANCE REQUIRED” and were, to use a term earlier referred to, “fascinating” to the kids when they discovered them.

One of the girls, whose father happened to be an Army officer, tacked soine of this material on her souvenir board. When Daddy saw it, he spiralled upward. He decided that it must be destroyed immediately; but first made a photograph of it for the record. He tore it up, flushed it away, and reported in. With some difficulty, various cheerleaders and other students who had glommed on to some of this material were tracked down, and persuaded to part with it.

We no lonser issue confetti.

A History of U.S. Communications Security (Volumes I and II);

the David G. Boak Lectures, National Security Agency (NSA), 1973


Oh the joy of coding with German Office

So I’m maintaining an Access database, with lots of VBA code, which serves as an internal management tool.

Changing a report should be, and usually is, pretty straight forward. But there I am today, after all changes are done, stuck trying to understand WHY THE FREAKING F*** a format string doesn’t work.

The offender is a text box with a date, and I’m trying to get it to be displayed like Nov-2015. So, according to Microsoft’s documentation, the format string is mmm-yyyy. Needless to say, didn’t work.

After an hour or so of banging my head on the wall, enlightenment comes: Year in German is Jahr !!! So mmm-jjjj, and, pronto, it worked like a charm.

By the way, Microsoft’s german doc is wrong (seems like a copy-paste error): it mentions jj and yyyy, instead of jj and jjjj which work (giving 15 and 2015 respectively).


Signs that you need a coffee, #1

You go to the office coffee maker.

You press the button to start the machine.

While the coffee is dripping, you open a sugar bag.

…and then you throw the sugar to the trash can, and the bag into the coffee 🙂

If you do that more than once in a sigle morning, just take the day off. You’re not gonna get any work done anyway !


Do-It-Yourself: Cappuccino Freddo — Rev. 2

Almost 6 years ago, I posted a guide on how to eas­ily make “cap­puc­cino freddo” cof­fee at home and accord­ing to my web stats, it’s still a very pop­u­lar post. Since then how­ever, I have sim­pli­fied and improved my tech­nique and I think it’s time to refresh the guide.

Reblog from George Adamopoulos : a great guide on how to make the famous greek-style cold coffee, Capuccino Freddo. It’s a must 🙂


Welcome !

Hi everybody !

I’m Jim Andrakakis. I’m a senior software engineer from Greece; with roots from Crete, raised mostly in Athens and since 2012 living in Switzerland, near Zürich. I’ve been coding since I was ten, and will probably continue until I’ve malloc()’d a block in the Great Heap In The Sky. I’m an incurable coffee addict, a firearm enthusiast, a cryptography hobbyist(*) and I’m perpetually tormented by 3 beautiful women 😊

As my friends know, my official first name is not Jim, it’s Dimitrios (usually used as “Dimitris” in Greece). Jim is the equivalent in English. There’s a small backstory to why I introduce myself this way, but it’s not important.

So that’s my new blog, which I started after Jux announced that they would be shutting down. Real pity; it was a great platform, I loved it.

So from now on I’ll be posting here my random thoughts, recipes, code and what-have-you.

But if you stop reading now and go to a beach, nobody will blame you

Enjoy !

(*) please don’t confuse cryptography with “crypto”, i.e. anything to do with bitcoin and crypto-“currencies”. For what it’s worth (which is not much) I believe that the blockchain (the mathematical concept that underpins most cryptocurrencies) has the potential to facilitate some useful applications. But caught in the mania of bitcoin, which is an almost ridiculous concept, it has been blown completely out of proportion. Thus any effort to apply blockchain in a useful way is invariably doomed, due to it being so unbelievably overhyped.