Blog
All Blog Posts
How to manage native Python dependencies in your CI/CD pipeline
Application dependencies are like a city’s drainage system: when properly built and well managed, they become invisible in the apps we build, and we forget ...
Read More
How to Use AI to Write Code For You
Learn how to use Python to auto-generate code for you by simply talking to your computer!
Read More
Top 5 Cybersecurity Youtube Channels To Follow
Your software supply chain is only as secure as its weakest link. Get our survey report to see how other software professionals are coping and ...
Read More
Cohort Analysis with Python’s matplotlib, pandas, numpy and datetime
Learn how to use Python to perform cohort data analysis in order to better calculate retention rates and perform forecasting.
Read More
Software Supply Chain Security Checklist for Enterprises
Hackers are increasingly targeting your dev and CI/CD environments. This blog discusses the controls you need to put in place to thwart them.
Read More
Python’s Top 10 Machine Learning Algorithms
There are dozens of algorithms available in Python. Learn which one is the most appropriate for your project.
Read More
Spotify & Music Videos – A Python Microservice Tutorial
Learn how to use Python to create a microservice that generates a YouTube music video playlist from a Spotify song list.
Read More
Top 10 Trends in Python WebDev for 2021 and the resources to get started
Learn about the key trends in Python Web App Development that will change how you develop in 2021.
Read More
Reproducibility: How to Ensure Your Code Works on Every Machine
Learn how to gain reproducible runtime environment builds that deliver open source artifact integrity and eliminate configuration drift.
Read More
Can an AI Classification Model detect AI-generated content?
As AI-generated text improves, can we programatically distinguish it from human created text? Read this blog to find out.
Read More
How to Use Python for Cyber Forensics
Learn how to use Python for cyber forensics with this practice use case to find out the source of an Amazon Web Services (AWS) data ...
Read More
How to remediate your open source vulnerabilities quicker
Learn how you can use the ActiveState Platform to remediate open source vulnerabilities in hours instead of days.
Read More