How to eliminate “Works on My Machine” Issues20220410203429

How to eliminate “Works on My Machine” Issues

Dana CraneLast Updated: May 10, 2022Configuration Drift, environment collaboration, programmatic reproducibility, troubleshooting, works on my machine
Works on my machine issues? Learn how centrally controlled and shared environments can help eliminate them....
How to Solve Reproducible Environments the Easy Way20220402193414

How to Solve Reproducible Environments the Easy Way

Dana CraneLast Updated: May 10, 2022artifact registry, branching, pinned dependencies, reproducible environment
Problems creating reproducible environments? Learn the strategies, tactics and automated tooling that can help....
How to set up your Python environment with a single command20220325155836

How to set up your Python environment with a single command

Dana CraneLast Updated: May 10, 2022environment reproducibility, github project, python, python environment, reproducible environment
Tired of troubleshooting your Python environments every time you start a new project? Learn how to automate environment setup....
How to Automatically Eliminate Dependency Hell20220317145058

How to Automatically Eliminate Dependency Hell

Dana CraneLast Updated: May 10, 2022circular dependencies, dependency conflicts, dependency hell, dependency management, dependency resolution, diamond dependencies, environment corruption
Wrestling with Dependency Hell? See how the ActiveState Platform can help you automatically resolve dependency conflicts....
Secure PyPI? The Problem with Trusting Open Source Repositories20220310163425

Secure PyPI? The Problem with Trusting Open Source Repositories

Dana CraneLast Updated: March 10, 2022dependency confusion, hosted artifact repository, identity hijacking, pypi, python packages, pytosquatting, secure build service, secure software supply chain, typosquatting
Still trusting open source language repositories that offer no security guarantees? Learn how to secure the Python packages you import. ...
Populating JFrog Artifactory with Secure Open Source Artifacts20220303164736

Populating JFrog Artifactory with Secure Open Source Artifacts

Dana CraneLast Updated: March 3, 2022artifact repository, binary repository, JFrog Artifactory, python packages, secure software supply chain, trusted artifacts
Start coding securely by ensuring the opens source packages in JFrog Artifactory have been built securely in the first place....
Trust, Security and the Reproducibility Crisis in Software20220224213512

Trust, Security and the Reproducibility Crisis in Software

Dana CraneLast Updated: February 24, 2022reproducibility crisis, scientific computing, software reproducibility, supply chain security
Reproducibility is a crisis in many scientific fields. Learn how cost-effective software reproducibility can help solve the crisis....
How to Immunize Your Software Supply Chain From End To End20220216153344

How to Immunize Your Software Supply Chain From End To End

Dana CraneLast Updated: February 17, 2022open source security, SBOM, shift left, SLSA, software supply chain attacks, software supply chain security, vendor management
It’s no longer a question of whether you’ll be affected by a supply chain attack, but when and how badly. Manage the risk by shifting left the right w...
How to go from untrusted open source components to trusted artifacts20220210143645

How to go from untrusted open source components to trusted artifacts

Dana CraneLast Updated: February 25, 2022artifactory, binary repository, JFrog Artifactory, python packages, trusted artifacts
Starting with secure, trusted open source artifacts before your developers write their first line of code is the best way to control costs and reduce ...
The Software Industry’s Supply Chain Security – Poor, Average or Excellent?20220203170138

The Software Industry’s Supply Chain Security – Poor, Average or Excellent?

Dana CraneLast Updated: February 3, 2022dependency confusion, software supply chain security, Supply chain attacks, supply chain best practices, typosquatting
Understand how your security implementation stacks up against your peers, and how you can decrease software supply chain security risk....