-
Integrated Traceability: The Secret to Surviving Your Next Software Development Audit
Survive Your Next Software Development Audit
-
IT Governance and Version Control: What You Need to Know
IT governance, risk, and compliance (GRC) requires version control. It is a vital part of audits. Beyond legal requirements, it can be used to plan your compliance strategy to improve
-
Common Vulnerability Scoring System: What Is CVSS in Cybersecurity?
Explore what is the Common Vulnerability Scoring System (CVSS) score explained, and how CVSS is used to calculate risk.
-
What Is NIST Cybersecurity Framework?
Get an overview of the NIST cybersecurity framework.
-
Static Code Analysis Explained
First, write the code. Next, run a static code analyzer…
-
Five Classifications for Risk Control Measures in Medical Device Development
Risk control is a critical stage of risk management. Find out five key risk control measures.
-
How to Set Up Your Continuous Integration Branching Strategy
Learn how to set up your CI/CD branching strategy.
-
Performing Accurate Impact Analysis in Perforce ALM
Forward impact analysis determines the child requirements and other dependent items that may be affected by requirement changes.
-
AWS CloudFormation: How to Build AWS Infrastructure as Code
Get tips for building Infrastructure as Code with AWS CloudFormation.
-
Helix IPLM Add-On Features
Learn how to extend Helix IPLM – IP lifecycle management by Perforce – with add-on features to further boost productivity, minimize IP leakage, and ensure the highest level of IP quality.