Category: Tips & Tricks
August 06, 2013by Sam Stafford, Developer at Perforce Software
If you do a lot of refactoring, and you notice that your life gets a little bit easier after upgrading to 2013.2 but you can't quite put your finger on why, it just might be one of these changes:Posted In:
August 01, 2013by Stephanie Turner (@p4vsteph)
The topic of code line management and policy makes for some lively discussions. If you ask 10 engineers their opinion, you'll get at least 12 answers.
July 30, 2013by Sven Erik Knop @p4sven
Many Perforce power users and administrators know about counters and attributes already. These are two mechanisms for storing extra metadata in Perforce. The 2013.1 release adds some new power for storing extra metadata, so it's worth reviewing why and how you would use these storage mechanisms.
July 24, 2013by Stewart Lord, Software Architect
Image: Official U.S. Navy Imagery W/Flickr
If you're a true believer in Continuous Integration (CI), you’ve probably tried to run pre-flight builds. A pre-flight build lets you run a pending change through the official CI machinery before you even commit a change, giving you better confidence in your work and helping to prevent broken builds.
There are several ways you could attempt a pre-flight build with Perforce. I’ll cover a few of those here, along with an idea for a purely local build in cases where the build takes a very long time.
July 22, 2013
by Russ Tremain, Senior Build Software Engineer
July 17, 2013by Bryan Pendleton, Software Engineer
From time to time, people ask me how replica servers affect the security of their Perforce installation.
The good news is that, properly deployed and configured, a replica server is just as secure as your main Perforce server.
It's usually the case that your Perforce server is the most important and valuable server in your entire organization: after all, this is where you are storing everything that you have developed, and everything that your team values! So I'm pleased that you are thinking about security and wondering how replica servers fit into your security process.