Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

Blog

What Is Log4Shell? The Log4j Vulnerability Explained

A new vulnerability that impacts devices and applications that use Java has been identified in Log4j, the open-source Apache logging library. Known as Log4Shell, the flaw is the most significant security vulnerability currently on the internet, with a severity score of 10-out-of-10. Fortunately, Perforce static analysis and SAST tools — Helix QAC and Klocwork — can help.
Security & Compliance, DevOps
Blog

What Is a Planning BoM?

Get an overview of planning BoMs, how to create them, and why they are important in semiconductor design.
Embedded Systems & Chip Design
Blog

Design Verification With Traceability

Learn how Methodics IPLM links requirements management, design management, and verification management for a fully traceable design and verification process.
Embedded Systems & Chip Design, Security & Compliance
Blog

UE5 Update: How Top Studios Manage Unreal Upgrades with Perforce Streams

Learn how leading studios use Perforce Streams to manage Unreal Engine upgrades.
Digital Creation & Collaboration, Version Control
Blog

Compliance Audit Best Practices

In this blog, our expert discusses the compliance audit best practices teams should follow when working in regulated industries.
Application Lifecycle Management
Blog

High Quality, Secure Code Starts with Klocwork + Secure Code Warrior

Software security breaches pose a major safety and security threats. However, writing high quality, secure code can be a challenge without the right tools and knowledge. Here we explain how Klocwork and Secure Code Warrior helps to ensure that your code is secure.
Security & Compliance, DevOps
Blog

Adapting FMEA Steps for Modern Risk Management

Learn how to modify FMEA steps to meet the complexities of risk management in regulated industries. Our expert takes you through each step in detail.
Application Lifecycle Management
Blog

Beyond the FMEA Risk Assessment: Agile Risk Management

In this blog, our expert discusses FMEA risk assessments, and how risk management strategy has evolved beyond FMEA.
Application Lifecycle Management
Blog

What is Mixed Reality? How to Get Started with Mixed Reality Development

Mixed reality is the latest technology for blending the real world with digital experiences. Learn how mixed reality is being used across industries, how to get started with mixed reality development, and see examples of mixed reality.
Version Control
Blog

What Is Design Partitioning?

Get an overview of SoC design partitioning and how Methodics IPLM can help enable it so you can reap the benefits - accelerated delivery, reduced risks, and lower costs.
Embedded Systems & Chip Design
Blog

The Importance of Business Acceptance Testing in Product Development

In this blog, our expert discusses the benefits of business acceptance testing, and why it's a crucial component of successful product development.
Data Management
Blog

Navigating Electric Vehicle Development

As the electric vehicle market continues to grow, it is essential that you have a clear understanding of electric vehicle development and electric vehicle software.
Software Quality, DevOps