Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

Blog

What Is Buffer Overflow? Preventing Buffer Overrun

One of the most common code vulnerabilities is a buffer overflow vulnerability. If a buffer overflow vulnerability is not addressed, an untrustworthy agent can take advantage and cause a buffer overrun. For that reason, it is important to understand what is buffer overflow, which will greatly help you with preventing buffer overflow.
Security & Compliance, DevOps
Blog

9 Tips for Working With Legacy Code

Coding Best Practices, Software Quality
Blog

Personal Data Protection Law (PDPL) in Saudi Arabia: How Delphix Helps

The Saudi Arabia Personal Data Protection Law (PDPL Saudi Arabia) is actively regulating personal data processing. Find out how Delphix helps with PDPL compliance here
Data Management, Security & Compliance
Blog

Perforce at Embedded World North America 2024

Perforce showcased static analysis solutions at the inaugural Embedded World North America conference! Learn more about the activities, sessions, and embedded software trending topics at this year's event.
Software Quality
Blog

Are Self-Driving Cars Safe?

Cars are increasingly dependent on technology and will progressively become more autonomous — and ultimately self-driving. For this reason, it's important to learn about the security concerns with self-driving cars so you can answer the questions "are self-driving cars safe" and "in what ways are driverless cars safer than human drivers?"
Security & Compliance, DevOps
Blog

Your Guide to SAP Testing Automation & How to Get Started

This blog will explore the fundamentals of SAP testing automation and provide an actionable roadmap to help you get started.
Software Quality, DevOps
Blog

Perforce’s Approach to Open-Source Communities

Perforce’s approach to open source and open source communities.
Blog

5 Ways Perforce Helps with DORA Regulation Compliance

The Digital Operational Resilience Act (DORA) regulation mandates cyber resilience requirements for financial institutions. Find out how Perforce helps with the DORA regulation.
Security & Compliance, DevOps
Blog

The Future of Gaming: Game Development Trends from Our 2024 Report

We surveyed game developers around the globe for insights on the future of gaming and game development trends in the industry. Get an overview of our 2024 report.
Digital Creation & Collaboration, Version Control
Blog

Protecting Sensitive Data in Non-Production Environments: No Trade-Offs Necessary!

Sensitive data is expanding throughout enterprises. So are non-production environments. Protecting sensitive data in these environments is tough. This blog post shows you how to do it
Data Management
Blog

Masked vs. Unmasked Data: Unmasking the Real Value of Masked Data

Well-masked production data preserves existing implicit data relationships across the enterprise. Dive deeper into the real value of masked data.
Data Management
Blog

5 Military Aerospace Software Trends That Can Benefit From DO-178C

Growing trends in the aerospace and defense industry are pushing the adoption of DO-178C, the essential functional safety standard for aircraft software systems. Here are five trends increasing DO-178C certification for military software applications.
Coding Best Practices, Security & Compliance