Customized Remote Work Solutions From the World’s Largest Fully Remote CompanyCustomized Remote Work SolutionsLearn More

Python

Showing 1-9 of 62 results
EngineeringIcon ChevronData Science and Databases

The Many Applications of Gradient Descent in TensorFlow

by Alan Reiner

TensorFlow is one of the leading tools for training deep learning models. Outside that space, it may seem intimidating and unnecessary, but it has many creative uses—like producing highly effective adversarial input for black-box AI systems.

18 minute readContinue Reading
EngineeringIcon ChevronTechnology

Modern Web Scraping with Python and Selenium

by Neal Barnett

Web scraping has been around since the early days of the World Wide Web, but scraping modern sites that heavily rely on new technologies is anything but straightforward. In this article, Toptal Software Developer Neal Barnett demonstrates how you can use Python and Selenium to scrape sites that employ a lot of JavaScript, iframes, and certificates.

9 minute readContinue Reading
EngineeringIcon ChevronData Science and Databases

Sound Logic and Monotonic AI Models

by Emmanuel Tsukerman

For those working with AI, the future is certainly exciting. At the same time, there is a general sense that AI suffers from one pesky flaw: AI in its current state can be unpredictably unreliable.

12 minute readContinue Reading
EngineeringIcon ChevronData Science and Databases

MCMC Methods: Metropolis-Hastings and Bayesian Inference

by Divyanshu Kalra

Markov Chain Monte Carlo (MCMC) methods let us compute samples from a distribution even though we can’t do this relying on traditional methods. In this article, Toptal Data Scientist Divyanshu Kalra will introduce you to Bayesian methods and Metropolis-Hastings, demonstrating their potential in the field of probabilistic programming.

12 minute readContinue Reading
EngineeringIcon ChevronTechnology

Haxe Review: Haxe 4 Features and Strengths

by Kevin Bloch

The quietly growing number of serious Haxe projects have something new to contend with: the first major compiler release in over three years. What does Haxe 4 bring to the table?

10 minute readContinue Reading
EngineeringIcon ChevronBack-end

How to Create an SSO Button – A Flask Login Tutorial

by Son Nguyen Kim

Single sign-on is great for users, sparing them from memorizing yet another password; for businesses, removing frictio; and for developers, since less code means less things that can go wrong. In this Flask login tutorial, we’ll write a step-by-step guide to add a SSO login button into a Flask application with SimpleLogin and Facebook as an identity provider.

6 minute readContinue Reading
EngineeringIcon ChevronTechnology

Building Your First Telegram Bot: A Step by Step Guide

by Ali Abdel Aal

Chatbots are revolutionizing the way people interact with technology. In recent years, their simplicity and low cost have helped drive adoption across various fields and industries. In this article, Toptal Natural Language Processing Developer Ali Abdel Aal demonstrates how you can create and deploy a Telegram chatbot in a matter of hours.

11 minute readContinue Reading
EngineeringIcon ChevronTechnology

HorusLP-Gurobi: High-level Optimization Architecture for Gurobi

by Shanglun Wang

Commercial solvers such as Gurobi are playing an increasingly important role in optimization, and they tend to boast more features than open-source solutions. In this article, Toptal Python Developer Sean Wang explains how you can integrate the HorusLP package with Gurobi’s API to harness its most advanced features.

9 minute readContinue Reading
EngineeringIcon ChevronData Science and Databases

Adversarial Machine Learning: How to Attack and Defend ML Models

by Pau Labarta Bajo

The increasing accuracy of machine learning systems has resulted in a flood of applications using them. As machine learning models matured and improved, so did ways of attacking them. In this article, Toptal Python Developer Pau Labarta Bajo examines the world of adversarial machine learning, explains how ML models can be attacked, and what you can do to safeguard them against attack.

10 minute readContinue Reading

Join the Toptal® community.