ActiveState Blog

How to work with GraphQL in Python20220107135308

How to work with GraphQL in Python

Nicolas BohorquezLast Updated: March 7, 2022api, API creation, GraphQl, python programming
GraphQL is the de facto standard for providing an external API. Learn how to use the GQL 3 GraphQL Client for Python....
Top 10 Coding Mistakes in Python & How to Avoid Them20211230100237

Top 10 Coding Mistakes in Python & How to Avoid Them

Nicolas BohorquezLast Updated: December 30, 2021python code, python developer, python programming
This article provides an introduction to the top ten errors beginners often make and gives you tips on how to avoid them....
How to do text summarization with deep learning and Python20211223194711

How to do text summarization with deep learning and Python

Dante SblendorioLast Updated: January 7, 2022deep learning, Natural Language Processing, NLP, python tutorial, text summarization
Python tutorial - use Abstractive Text Summarization and packages like newspeper2k, PyPDF2, and SPaCy to summarize text with deep learning....
The Python 2 Threat in Your Supply Chain Is Real20211215173123

The Python 2 Threat in Your Supply Chain Is Real

Dana CraneLast Updated: December 16, 2021python 2, python 2 eol, python 2 support, Python 2 vulnerabilities, Python supply chain
Python 2 in development and test environments pose an undue risk in the face of escalating supply chain attacks....
ActiveState’s Official Statement on the Java Log4j Vulnerability20211213180550

ActiveState’s Official Statement on the Java Log4j Vulnerability

Suhani SLast Updated: December 15, 2021
After careful auditing, it has been established that ActiveState is not impacted by the critical Apache Log4j vulnerability, CVE-2021-44228....
PyPI security pitfalls and steps towards a secure Python ecosystem20211209190256

PyPI security pitfalls and steps towards a secure Python ecosystem

Dana CraneLast Updated: December 20, 2021
PyPI is improving Python supply chain security, but gaps still exist. Learn the tools and techniques to avoid Python's security pitfalls....
Managing IoT Security Threats and Vulnerabilities Better20211202132009

Managing IoT Security Threats and Vulnerabilities Better

Dana CraneLast Updated: December 2, 2021Internet of things, IoT, IoT Threats, IoT vulnerabilities, Python APIs, SBOM, Software bill of materials, software supply chain security
Securing IoT devices means securing their network, supply chain, and automating vulnerability remediation. Here's how....
How to work with vulnerable Python packages, and stay secure20211125113952

How to work with vulnerable Python packages, and stay secure

Dana CraneLast Updated: December 15, 2021Automated remediation, Common Vulnerabilities and Exposures, CVE, CVSS, NVD, Python vulnerabilities, vulnerability remediation
Vulnerabilities are a fact of Python developer life. Read this post to learn how to automate vulnerability remediation quickly and easily....
How to make your CircleCI runs faster, and more secure20211117143721

How to make your CircleCI runs faster, and more secure

Vince PowerLast Updated: November 18, 2021CI/CD, CircleCI, Continuous Integration/Continuous Delivery, runtime environment
Learn how to make your CircleCI runs faster and more secure by using a prebuilt runtime environment....
Top 10 Python Packages for Creating Synthetic Data20211112125358

Top 10 Python Packages for Creating Synthetic Data

Nicolas BohorquezLast Updated: November 12, 2021DataSynthesizer, Gretel Synthetics, mesa, mimesis, plaitpy, pydbgen, scikit-learn, synthetic data, Synthetic Data Vault, TimeSeriesGenerator, zpy
Data is expensive, but synthetic data can be just as good for a fraction of the cost. Learn how to generate synthetic data....