#python-libraries

[ follow ]
Pycoders
3 weeks ago
Python

PyCoder's Weekly | Issue #626

Handling CTRL-C interrupts elegantly in Python can be complex when dealing with concurrent code. [ more ]
Realpython
1 month ago
Python

Python Deep Learning: PyTorch vs Tensorflow - Real Python

Both PyTorch and TensorFlow are open source Python libraries used for numerical computation on data.
There are differences in functionality, tools, and resources between PyTorch and TensorFlow, which should be considered based on specific use cases. [ more ]
Pycoders
2 months ago
Python

PyCoder's Weekly | Issue #619

Duck typing allows flexibility in Python classes based on object behaviors.
IPython Jupyter Magic commands modify cell behavior in notebooks. [ more ]
Realpython
3 months ago
Python

Episode #192: Practical Python Decorator Uses & Avoiding datetime Pitfalls - The Real Python Podcast

Python decorators can be used to extend the behavior of a function without modifying it explicitly
Python libraries use decorators for call interception, function registration, and enriching function behavior [ more ]
InfoWorld
5 months ago
Python

The best Python libraries for parallel processing

Python's default implementation, CPython, is single-threaded, limiting its speed.
Threading in Python only provides concurrency, not parallelism.
Python libraries like Ray, Dask, and Dispy enable parallel processing across multiple cores and machines. [ more ]
CodeProject
1 month ago
Data science

Java Code Change Impact Analysis - Introduction to JCCI

Analyzing the impact scope of Java code submissions can improve regression testing efficiency. [ more ]
Theregister
6 months ago
Privacy professionals

BlackCat plays dirty with malvertising mouse traps

Affiliates of the ALPHV/BlackCat ransomware-as-a-service operation are using malvertising campaigns to infect victims' systems.
Nitrogen malware is being used as an initial access payload to launch second-stage attacks, including the deployment of ransomware.
Using Python libraries allows attackers to hide in an organization's normal traffic patterns and delay detection of malicious activity. [ more ]
[ Load more ]