Our Blog Posts

Featured Blog

Disinformation Is An Open Source Problem

The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
All Blog Posts
Search
Trusted Artifacts for Artifactory with ActiveState
Introducing Trusted Open Source Artifact Subscription for JFrog Artifactory
Automatically populate JFrog Artifactory with up-to-date open source Python packages, or other open source language artifacts you can trust.
Read More →
graphql python tutorial
How to work with GraphQL in Python
GraphQL is the de facto standard for providing an external API. Learn how to use the GQL 3 GraphQL Client for Python.
Read More →
python coding mistakes
Top 10 Coding Mistakes in Python & How to Avoid Them
This article provides an introduction to the top ten errors beginners often make and gives you tips on how to avoid them.
Read More →
python text summarization
How to do text summarization with deep learning and Python
Python tutorial - use Abstractive Text Summarization and packages like newspeper2k, PyPDF2, and SPaCy to summarize text with deep learning.
Read More →
python 2 in supply chain
The Python 2 Threat in Your Supply Chain Is Real
Python 2 in development and test environments pose an undue risk in the face of escalating supply chain attacks.
Read More →
Java Log4j Vulnerability
ActiveState’s Official Statement on the Java Log4j Vulnerability
After careful auditing, it has been established that ActiveState is not impacted by the critical Apache Log4j vulnerability, CVE-2021-44228.
Read More →
pypi security supply chain
PyPI security pitfalls and steps towards a secure Python ecosystem
PyPI is improving Python supply chain security, but gaps still exist. Learn the tools and techniques to avoid Python's security pitfalls.
Read More →
IoT Security
Managing IoT Security Threats and Vulnerabilities Better
Securing IoT devices means securing their network, supply chain, and automating vulnerability remediation. Here's how.
Read More →
Working with vulnerable python packages blog cover
How to work with vulnerable Python packages, and stay secure
Vulnerabilities are a fact of Python developer life. Read this post to learn how to automate vulnerability remediation quickly and easily.
Read More →
CircleCI Optimization
How to make your CircleCI runs faster, and more secure
Learn how to make your CircleCI runs faster and more secure by using a prebuilt runtime environment.
Read More →
synthetic data python
Top 10 Python Packages for Creating Synthetic Data
Data is expensive, but synthetic data can be just as good for a fraction of the cost. Learn how to generate synthetic data.
Read More →
Which Python Dependency Manager Should You Choose?
Which Python Dependency Manager Should I Choose?
Dependency management is hard. Environment management is harder. Learn how to do both, easier.
Read More →

Stay up-to-date with our mailing list

Scroll to Top