Python
Deploying Python Using Docker: The Easy Way
Posted on November 28th, 2023.CI/CD is one of the best development processes around; so you shouldn't be surprised it works well with Python! Read our post to learn a great way to get started.
CI/CD is one of the best development processes around; so you shouldn't be surprised it works well with Python! Read our post to learn a great way to get started.
Picture this: a fantastic Python app with a growing number of tests, employing either unittest or pytest. Running pytest test_*.py helps you perform unit tests and protects your code from breaking, ensuring your app remains stable even when you update dependencies using pip install --upgrade package_name. Best part? You can kill any bugs...
Can you spot the difference between colorama and colourama? Sure, one is American English, and the other is aimed at British-English users. One of these is a malicious Python package designed to trick users and the other is legitimate. Chances are that you’ve heard about vulnerable packages before —and may even be using a...
Open-source packages like those found on PyPI.org have helped every python user get their projects off the ground. Read to learn more about best management practices.
Having uncontrolled package dependencies can lead to some unintended consequences, like version conflict and even malicious and vulnerable packages. Let’s see what happens when you let those dependency trees go unchecked.
You know about CI/CD and you’re already using Python—so what’s stopping you from using them together?
Regularly scanning for vulnerabilities is the best way to protect against vulnerabilities that pop up and the risks that they bring. Learn How to Automate Vulnerability Scanning for PyPI Packages.
Auto-generated GUI's for your Python let your non-expert users run scripts and allow you to sleep soundly by restricting only specific servers for a job.
There are few things more frustrating than investigating why code works on one machine, but not another. This article will explain how unwanted packages sneak into your code, describe how to use requirements.txt files to ensure repeatable builds, and show how Package Consumers can quickly identify which applications are using a specific...
Every package from PyPI.org can become vulnerable: it's just a matter of time until it's detected. To protect yourself, use tools to routinely scan for vulnerabilities.