ActiveState Blog

Introducing Trusted Open Source Artifact Subscription for JFrog Artifactory20220112134624

Introducing Trusted Open Source Artifact Subscription for JFrog Artifactory

Loreli CadapanPublished: January 12, 2022Last Updated: January 13, 2022artifactory, python packages, trusted artifacts
Automatically populate JFrog Artifactory with up-to-date open source Python packages, or other open source language artifacts you can trust....
How to work with GraphQL in Python20220107135308

How to work with GraphQL in Python

Nicolas BohorquezPublished: January 7, 2022Last Updated: January 7, 2022api, API creation, GraphQl, python programming
This article provides an introduction to the top ten errors beginners often make and gives you tips on how to avoid them....
Top 10 Coding Mistakes in Python & How to Avoid Them20211230100237

Top 10 Coding Mistakes in Python & How to Avoid Them

Nicolas BohorquezPublished: December 30, 2021Last Updated: December 30, 2021python code, python developer, python programming
This article provides an introduction to the top ten errors beginners often make and gives you tips on how to avoid them....
How to do text summarization with deep learning and Python20211223194711

How to do text summarization with deep learning and Python

Dante SblendorioPublished: December 23, 2021Last Updated: January 7, 2022deep learning, Natural Language Processing, NLP, python tutorial, text summarization
Python tutorial - use Abstractive Text Summarization and packages like newspeper2k, PyPDF2, and SPaCy to summarize text with deep learning....
The Python 2 Threat in Your Supply Chain Is Real20211215173123

The Python 2 Threat in Your Supply Chain Is Real

Dana CranePublished: December 15, 2021Last Updated: December 16, 2021python 2, python 2 eol, python 2 support, Python 2 vulnerabilities, Python supply chain
Python 2 in development and test environments pose an undue risk in the face of escalating supply chain attacks....
ActiveState’s Official Statement on the Java Log4j Vulnerability20211213180550

ActiveState’s Official Statement on the Java Log4j Vulnerability

Suhani SPublished: December 13, 2021Last Updated: December 15, 2021
After careful auditing, it has been established that ActiveState is not impacted by the critical Apache Log4j vulnerability, CVE-2021-44228....
PyPI security pitfalls and steps towards a secure Python ecosystem20211209190256

PyPI security pitfalls and steps towards a secure Python ecosystem

Dana CranePublished: December 9, 2021Last Updated: December 20, 2021
PyPI is improving Python supply chain security, but gaps still exist. Learn the tools and techniques to avoid Python's security pitfalls....
Managing IoT Security Threats and Vulnerabilities Better20211202132009

Managing IoT Security Threats and Vulnerabilities Better

Dana CranePublished: December 2, 2021Last Updated: December 2, 2021Internet of things, IoT, IoT Threats, IoT vulnerabilities, Python APIs, SBOM, Software bill of materials, software supply chain security
Securing IoT devices means securing their network, supply chain, and automating vulnerability remediation. Here's how....
How to work with vulnerable Python packages, and stay secure20211125113952

How to work with vulnerable Python packages, and stay secure

Dana CranePublished: November 25, 2021Last Updated: December 15, 2021Automated remediation, Common Vulnerabilities and Exposures, CVE, CVSS, NVD, Python vulnerabilities, vulnerability remediation
Vulnerabilities are a fact of Python developer life. Read this post to learn how to automate vulnerability remediation quickly and easily....
How to make your CircleCI runs faster, and more secure20211117143721

How to make your CircleCI runs faster, and more secure

Vince PowerPublished: November 17, 2021Last Updated: November 18, 2021CI/CD, CircleCI, Continuous Integration/Continuous Delivery, runtime environment
Learn how to make your CircleCI runs faster and more secure by using a prebuilt runtime environment....
Previous
12381
Next