Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

Blog

File Masking Made Simple With Perforce Delphix Masking APIs

Learn how the Perforce Delphix masking APIs allow you to create the necessary objects and easily perform masking jobs for a wide variety of file formats.
Data Management, Security & Compliance
Blog

What Your Server Upgrade Plan Needs

Server Upgrades in 30 Seconds
Version Control
Blog

Automotive Virtualization: How Automotive Hypervisor Enables Innovation and Compliance

Automotive virtualization and the automotive hypervisor brings plenty of opportunity to innovate. But it also brings compliance challenges…
Security & Compliance, DevOps
Blog

Introduction to Secure Lookup, a Data Masking Algorithm

Unlike traditional encryption, most masking algorithms are designed to be irreversible, meaning they purposely destroy information so the original data is not retrievable from the masked dataset. Secure lookup is designed to mask data consistently but irreversibly.
Data Management, Security & Compliance
Blog

Your Guide to Gaming as a Service (GaaS)

A focus on gaming as a service, including GaaS games, and games as a service model.
Digital Creation & Collaboration
Blog

How to Use Kanban for Software Development — With Examples

An explanation of Kanban development, and 5 tips how to do Kanban development in software
DevOps
Blog

What is Agile Scrum: Basics to Best Practices for Beginners

This Agile scrum for beginners guide is everything you need to know to understand the Agile development framework that is scrum.
DevOps
Blog

What is Shift Left Testing?

Learn about shift left testing and its benefits.
Data Management, Software Quality
Blog

Static Code Analysis Explained

First, write the code. Next, run a static code analyzer…
Software Quality
Blog

What Is Functional Testing?

Describing what is functional testing and different types of functional tests.
Data Management, Application Lifecycle Management
Blog

Git vs. SVN: What's the Difference, and Which is Better for Your Team?

Get an overview of Git vs. SVN.
Version Control
Blog

Healthcare Data De-Identification: What the Salesperson Can’t Tell You

Learn the one secret a salesperson can’t tell you when it comes to de-identifying your sensitive data. This blog by Perforce Delphix experts Ilker Taskaya and Jeannine Crownover explores effective strategies for healthcare data de-identification.
Data Management, Security & Compliance