Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

DevSecOps Pipeline Overview: DevSecOps Simplified Blog

DevSecOps Pipeline Overview: DevSecOps Simplified

An effective DevSecOps pipeline ensures that security is baked in throughout the software development life cycle. Here, we explain each DevSecOps phase of the DevSecOps pipeline and suggest beneficial DevSecOps tools that can help safeguard and secure your software.
DevOps, Software Quality
What Is Rate Limiting? Blog

What Is Rate Limiting?

Rate limiting applies to the number of calls a user can make to an API within a set time frame. This is used to help control the load that’s put on the system. Learn use cases for rate limiting and how to get ensure security for APIs.
API Management
Multicloud API Strategy: Overcoming Silos, Security, & Compliance Challenges With APIs   Blog

Multicloud API Strategy: Overcoming Silos, Security, & Compliance Challenges With APIs

Developing a multicloud strategy can ensure your enterprise thrives in a world dominated by cloud technology. Learn how Akana and multicloud APIs can fuel your multicloud strategy and help you overcome silos, security, and compliance challenges.
API Management
What is a Data Protection Authority (DPA)? And Why Does It Matter? Blog

What is a Data Protection Authority (DPA)? And Why Does It Matter?

A data protection authority (DPA) oversees the application of data protection laws. Find out what enterprises need to know about DPA and becoming DPA compliant.
Data Management, Security & Compliance
Using OpenMP Debugging Interface (OMPD) With TotalView Blog

Using OpenMP Debugging Interface (OMPD) With TotalView

A high level overview looks at debugging OpenMP technologies. It answers the questions what is OpenMP, talks about OMPD, and the capabilities within TotalView to debug OpenMP.
Coding Best Practices
What is Data Scrambling? Blog

What is Data Scrambling?

Learn how data scrambling protects data by irreversibly replacing sensitive original values with structurally similar fictitious ones.
Data Management, Security & Compliance
The Japan APPI (Act on the Protection of Personal Information) Explained Blog

The Japan APPI (Act on the Protection of Personal Information) Explained

How does the Japan APPI — Act on the Protection of Personal Information — affect your business? We explain what it is, who it applies to, and penalties.
Data Management, Security & Compliance
NY SHIELD Act: Everything You Need to Know Blog

NY SHIELD Act: Everything You Need to Know

The NY Shield Act is a data protection law focused on the reduction of data breaches. Discover how it works, requirements, and compliance factors.
Security & Compliance, Data Management
How to Make Your Cloud Computing Migration a Success Blog

How to Make Your Cloud Computing Migration a Success

Cloud migration moves digital operations to a cloud platform. Discover benefits, strategies, and deployment methods, including Delphix solutions.
DevOps, Data Management
PDPA: The Personal Data Protection Act of Singapore Explained Blog

PDPA: The Personal Data Protection Act of Singapore Explained

Singapore’s Personal Data Protection Act (PDPA) regulates data privacy. Get an overview of PDPA compliance and how to make it easier with Perforce Delphix.
Data Management, Security & Compliance
A Comprehensive Guide to the DevOps Model Blog

A Comprehensive Guide to the DevOps Model

Do you know what makes development operations effective? Use this expert Perforce Delphix guide to explore the DevOps model.
DevOps, Data Management
What is the California Privacy Rights Act (CPRA)? Blog

What is the California Privacy Rights Act (CPRA)?

Learn what protection is included in the California Privacy Rights Act (CPRA). Use this Delphix expert guide to help understand your data protection.
Data Management, Security & Compliance