Home » ActiveState Blog
How to work with GraphQL in Python20220107135308
How to work with GraphQL in Python
Nicolas BohorquezLast Updated: March 7, 2022api, API creation, GraphQl, python programming
GraphQL is the de facto standard for providing an external API. Learn how to use the GQL 3 GraphQL Client for Python....
Top 10 Coding Mistakes in Python & How to Avoid Them20211230100237
Top 10 Coding Mistakes in Python & How to Avoid Them
Nicolas BohorquezLast Updated: December 30, 2021python code, python developer, python programming
This article provides an introduction to the top ten errors beginners often make and gives you tips on how to avoid them....
How to do text summarization with deep learning and Python20211223194711
How to do text summarization with deep learning and Python
Dante SblendorioLast Updated: January 7, 2022deep learning, Natural Language Processing, NLP, python tutorial, text summarization
Python tutorial - use Abstractive Text Summarization and packages like newspeper2k, PyPDF2, and SPaCy to summarize text with deep learning....
The Python 2 Threat in Your Supply Chain Is Real20211215173123
The Python 2 Threat in Your Supply Chain Is Real
Dana CraneLast Updated: December 16, 2021python 2, python 2 eol, python 2 support, Python 2 vulnerabilities, Python supply chain
Python 2 in development and test environments pose an undue risk in the face of escalating supply chain attacks....
ActiveState’s Official Statement on the Java Log4j Vulnerability20211213180550
ActiveState’s Official Statement on the Java Log4j Vulnerability
Suhani SLast Updated: December 15, 2021
After careful auditing, it has been established that ActiveState is not impacted by the critical Apache Log4j vulnerability, CVE-2021-44228....
PyPI security pitfalls and steps towards a secure Python ecosystem20211209190256
PyPI security pitfalls and steps towards a secure Python ecosystem
Dana CraneLast Updated: December 20, 2021
PyPI is improving Python supply chain security, but gaps still exist. Learn the tools and techniques to avoid Python's security pitfalls....
Managing IoT Security Threats and Vulnerabilities Better20211202132009
Managing IoT Security Threats and Vulnerabilities Better
Dana CraneLast Updated: December 2, 2021Internet of things, IoT, IoT Threats, IoT vulnerabilities, Python APIs, SBOM, Software bill of materials, software supply chain security
Securing IoT devices means securing their network, supply chain, and automating vulnerability remediation. Here's how....
How to work with vulnerable Python packages, and stay secure20211125113952
How to work with vulnerable Python packages, and stay secure
Dana CraneLast Updated: December 15, 2021Automated remediation, Common Vulnerabilities and Exposures, CVE, CVSS, NVD, Python vulnerabilities, vulnerability remediation
Vulnerabilities are a fact of Python developer life. Read this post to learn how to automate vulnerability remediation quickly and easily....
How to make your CircleCI runs faster, and more secure20211117143721
How to make your CircleCI runs faster, and more secure
Vince PowerLast Updated: November 18, 2021CI/CD, CircleCI, Continuous Integration/Continuous Delivery, runtime environment
Learn how to make your CircleCI runs faster and more secure by using a prebuilt runtime environment....
Top 10 Python Packages for Creating Synthetic Data20211112125358
Top 10 Python Packages for Creating Synthetic Data
Nicolas BohorquezLast Updated: November 12, 2021DataSynthesizer, Gretel Synthetics, mesa, mimesis, plaitpy, pydbgen, scikit-learn, synthetic data, Synthetic Data Vault, TimeSeriesGenerator, zpy
Data is expensive, but synthetic data can be just as good for a fraction of the cost. Learn how to generate synthetic data....