Blog

All Blog Posts
Search
Exploring K Means Clustering in Big Data Using Python
As data volumes continue to expand exponentially in various scientific and industrial sectors, clustering has become an essential big data analysis technique. It helps generate ...
Read More
Software Supply Chain Buyer’s Guide: Securing the Import Process
Organizations are increasingly concerned with the security of their software supply chain, but have trouble navigating the ever-expanding labyrinth of open source and proprietary software ...
Read More
Software Composition Analysis (SCA) Tools Compared
A Software Composition Analysis (SCA) tool provides organizations with three key ways to understand the open source software used within their application: Because open source ...
Read More
Software Bill Of Materials (SBOMs) Compared
Software Bill Of Materials (SBOMs) are becoming increasingly important, and even a critical requirement if you’re aUS government vendor  or a  medical device manufacturer. This ...
Read More
Disinformation Is An Open Source Problem
The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More
Open Source Security Stack
Traditional open source security stacks focus on traditional security challenges, and may be lacking when it comes to addressing emerging threats such as those posed ...
Read More
Software Supply Chain Security Buyers Guide
Software Supply Chain Security Buyers Guide
The software supply chain is both wide and deep, as is the tidal wave of solutions offered by the market. Learn how to best approach ...
Read More
Python for DevOps
Top 10 Python Packages for DevOps
Learn how to use key Python libraries to automate common DevOps uses cases. Provides a prebuilt Python environment and sample code.
Read More
Build an AI Text Detector
How to Build an AI Text Detector Using Python
AI-generated text is proliferating. This Python tutorial lets you create a simple script to help detect AI-generated text.
Read More
Chain of Custody in the Software Supply Chain
How to Implement a Chain of Custody for Your Software Supply Chain
Implementing chain of custody at scale for your software supply chain is a non-trivial task. Learn how ActiveState can help.
Read More
The Growing Threat of AI Externalities
AI-generated data is poisoning AI application training data, while AI-generated code is making every app less secure. Learn what you can do.
Read More
Open Source Observability Reduces Vulnerability Risk
Learn how to eliminate silos and identify vulnerabilities across the extended enterprise and down to the lowest transitive dependency.
Read More
Scroll to Top