by CPI Staff | Sep 22, 2025 | Blog, Streamlit
In this blog post A Practical Guide to Securing Streamlit Environment Vars with TOML we will show you how to keep API keys, database URLs, and service credentials safe while building fast Streamlit apps. Secrets are the backbone of most apps. If you hardcode them, you...
by CPI Staff | Sep 22, 2025 | AI, Blog, Deep Learning, Machine Learning
In this blog post Deep Learning vs Machine Learning Choosing the Right Approach we will unpack what each approach really means, where they shine, and how to make a confident choice for your next project. Whether you build models or fund them, the goal here is clarity...
by CPI Staff | Sep 21, 2025 | .NET, Blog, PyTorch
In this blog post Practical ways to run PyTorch in .NET with TorchSharp and more we will walk through reliable ways to use PyTorch from .NET, when to choose each approach, and how the pieces work under the hood. At a high level, you have three good options: write and...
by CPI Staff | Sep 21, 2025 | AI, Blog, Streamlit
In this blog post Build a Chat Bot with Streamlit An End to End Guide for Teams we will walk through how to design, build, and deploy a production-ready chat bot using Streamlit and modern large language models (LLMs). Build a Chat Bot with Streamlit An End to End...
by CPI Staff | Sep 20, 2025 | Blog, Python
In this blog post How to Secure API Keys with Python for Apps and Infrastructure we will walk through practical ways to keep secrets safe from laptop to production. API keys are bearer secrets. Anyone who has the string can act as your application. That makes key...