Category: Features & Releases
September 10, 2013
by Bryan Pendleton, Software Engineer
Image: Alexei von Wahl w/Flickr
Perforce replicas support a variety of different configurations. The most basic replica type is the read-only replica, but there are several other types of replicas that you can deploy.
The Forwarding Replica is one of my favorites.
August 29, 2013by Bryan Pendleton, Software Engineer
Image: nicknazrin w/Flickr
August 12, 2013by Sam Stafford, Developer at Perforce Software
Since the 2013.2 release adds a new piece of file metadata that may need to be resolved when merging (charset, associated with the undoc server.filecharset setting), this seems like a good time for a quick review of all of the different things that "p4 resolve" might ask you about.
The function of resolve, at its heart, is to take changes from a depot file and make sure you've accounted for them in your workspace file. Different commands will schedule resolves for different reasons:
August 07, 2013
by Dan Auker, Product Manager
Many Perforce customers are already using Commons, our new document collaboration system. To make it easier to try Commons, we’ve launched Commons Cloud, a free service that lets you get up and running immediately.
July 19, 2013by Matt Attaway, Open Source Community Manager (@p4mataway)
June and July is graduation season, so it's only appropriate that P4IdeaX have a graduating class as well. Let's see what has made its way to production recently:
July 17, 2013by Bryan Pendleton, Software Engineer
From time to time, people ask me how replica servers affect the security of their Perforce installation.
The good news is that, properly deployed and configured, a replica server is just as secure as your main Perforce server.
It's usually the case that your Perforce server is the most important and valuable server in your entire organization: after all, this is where you are storing everything that you have developed, and everything that your team values! So I'm pleased that you are thinking about security and wondering how replica servers fit into your security process.