P4 Blog

  • June 10, 2015

    I've just returned from my first visit to InfoSecurity 2015 in London. With the launch earlier this year of Perforce Helix Threat Detection this was a great opportunity to review the state of the cyber-security world, hear about the key challenges facing governments, businesses and individuals and review some of the solutions being offered. This couldn't be more timely as, right when I'm writing this, it has been announced that the U.S. government suffered a serious attack earlier this year which compromised the personal details of thousands of federal employees.

  • June 09, 2015

    One of the common complaints I hear about centralized version control systems is that they are scary. With every commit being immediately visible there is a feeling that you may screw up everything for your co-workers. What’s worse is that you generally don’t have the power to clean up after yourself. How many of us have had to sheepishly go ask the admin to obliterate something?

    Posted In:
  • June 08, 2015

    Swarm is two years old this month!

    It’s rewarding to think that just two years ago, our collaboration engine was only just getting into the hands of our customers. Fast-forward to today, where Swarm plays a big part in the daily workflows of so many innovative companies. With much of the functionality now matured, we wanted to expand Swarm beyond just our English-speaking customers.

  • June 04, 2015

    In recent years Python has changed its package manager strategy, and the result is pip. Pip is a powerful package manager that simplifies the creation and consumption of Python packages, turning the Python Package Index into a hub of an ever-growing number of useful packages.

  • June 02, 2015

    LIVE WEBINARS on Tuesday, June 16th - Get Best Practices for Secure DevOps from Forrester Analysts

    Posted In:
  • June 01, 2015

    In this age of industrial espionage, insider theft and advanced cyber threats, it is becoming increasingly difficult to secure intellectual property (IP). The stakes are high. In fact, the IP Commission Report estimates annual losses of $300B attributed to IP theft in the United States alone. A Kroll Advisory Systems white paper describes how industrial espionage and insider attacks were responsible for the loss of trade secrets valued at $300M at Dow Chemical; $225M in illicit proceeds of a DuPont competitor that obtained DuPont’s Kevlar trade secrets; theft of Space Shuttle, jet and rocket design trade secrets from Rockwell and Boeing and technical IP theft from Motorola.

    Posted In:

Pages