Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

Blog

Gartner® Peer Insights™ “Voice of the Customer” Report Identifies Delphix as Customers’ Choice for Data Masking

Based entirely on 18 months’ worth of customer reviews on Gartner Peer Insights, Delphix is peer-recognized as a Customers’ Choice based on our Overall Rating and User Interest and Adoption
Data Management, Security & Compliance
Blog

Medical Device Security Best Practices

Growing concerns surrounding medical device security are increasing across the globe. In the U.S., new legislation is being introduced due to the increasing number of connected devices and a cyberattack’s ability to disrupt patient care.
Security & Compliance, Software Quality
Blog

Safety and Security for Medical Devices with New U.S. House of Representatives Legislation

Learn more about the recent legislation approved by the U.S. House of Representatives to address cybersecurity for medical devices and how it relates to open source software security, secure code standards, and static analysis.
Security & Compliance, DevOps
Blog

Software Security: Secure Coding Practices Guide

Software security and secure coding practices should be considered from the start of a software project. The beginning of any new software development project can be daunting, as there are many decisions, including those that affect software security, that need to be made and considerations that must be thought through. Often this includes defining project requirements, selecting the right processes, choosing the right tools, and ensuring software security. For that reason, we have organized a step-by-step guide to walk you through the most time-consuming and difficult challenges of a new project to help ensure that yours is a success.
Security & Compliance, DevOps
Blog

Top 5 Reasons Why Developers Use Klocwork for Software Security

Here are the top five reasons why developers choose Klocwork for security.
DevOps, Security & Compliance
Blog

Top 5 Reasons Why Developers Use Helix QAC for Compliance

Here are the top five reasons why developers choose Helix QAC for compliance.
DevOps, Security & Compliance
Blog

Secure Collaboration for Chip Design in Cloud Environments

Moving chip design to the cloud comes with challenges. Learn what you need to consider for designers and developers to securely collaborate on AWS semiconductor or Azure semiconductor environments.
Security & Compliance, Embedded Systems & Chip Design
Blog

VR Content Creation: How It Works and Software You Need

VR content creation follows a lot of the same processes involved in creating 3D assets for video games and other media. Get an overview of the VR content creation process and a primer on what VR creation software you might need to get started.
Version Control, Digital Creation & Collaboration
Blog

Rethinking test data management with a DevOps approach

The task of managing test data with legacy, manual, approaches is often fraught with challenges, from IT teams lacking access to high-quality data to time-intensive data masking. In this blog we delve into how to build a comprehensive DevOps test data management (TDM) strategy to overcome these limitations and transform app delivery.
Data Management, DevOps
Blog

Don’t let legacy data management slow your digital transformation

Banks are feeling the pinch of data privacy and security more than ever. At the same time, siloed, legacy systems are getting in the way of responding to innovation needs with new technologies. Read our blog to understand how test data management can help you drive compliance and differentiation.
Data Management, DevOps
Blog

Game Assets: What You Need to Know for Asset Recycling

What is a game asset? Dive into game asset recycling challenges and learn how to conquer them.
Digital Creation & Collaboration
Blog

What Is Feature Flagging? Feature Flag Best Practices

What is feature flagging? Find out what feature flagging is, when to use it, and how it compares to feature branching.
Version Control