Systems | Development | Analytics | API | Testing

December 2021

Secure Code Warrior Integration

Software security breaches pose a major safety and security threats. However, writing high quality, secure code can be a challenge without the right tools and knowledge. Secure Code Warrior is an integrated platform that provides secure coding training and tools that helps shift developer focus from vulnerability reaction to prevention. By using a combination of training courses and tournaments, Secure Code Warrior enables developers to gain the knowledge and skills to fix security vulnerabilities — ensuring they are less likely to be repeated in the future.

What Is Log4Shell? The Log4j Vulnerability Explained

A new vulnerability that impacts devices and applications that use Java has been identified in Log4j, the open-source Apache logging library. Known as Log4Shell, the flaw is the most significant security vulnerability currently on the internet, with a severity score of 10-out-of-10. Fortunately, Perforce static analysis and SAST tools — Helix QAC and Klocwork — can help.

How to Write a Software Requirements Specification (SRS Document)

Clear, concise, and executable requirements help development teams create a proper product. How do we organize and present these requirements? That's where a Software Requirements Specification (SRS) comes in. But what is an SRS, and when should you use one? In this blog, we'll outline a typical software requirements specification, including how to define your product's purpose, describe what you're building, detail the requirements, and, finally, deliver it for approval.

Design Verification With Traceability

Adding traceability to design verification allows teams to definitively and easily document the exact state of the verification at any point in the design process. This provable documented status of verification is particularly important when trying to meet FuSa specifications like ISO 26262 and DO-254. In this blog, learn how the Methodics IPLM platform links requirements, design, and verification together to provide a fully traceable model between all three systems.

UE5 Update: How Top Studios Manage Unreal Upgrades With Perforce Streams

Unreal Engine 5 is coming. Well, it is already here! Leading studios are making the switch. This means upgrading their toolsets, retesting their codebase, and figuring out how to manage changes to the engine moving forward. For leading game studios, a UE5 update (and customizations) can be safely managed with Helix Core — the game development standard for version control. It’s the tool trusted by 95% of top AAA studios.

Compliance Audit Best Practices

If you’re working in a regulated industry, compliance audits are a part of your day-to-day. Without the right processes in place to follow applicable standards, compliance can be tricky, and audits can be daunting. In order to successfully comply with regulatory standards applicable in your industry, you will be required to adopt a set of tools and practices as part of your product lifecycle itself.

Featured Post

Five steps towards better software for A11Y accessibility

The A11Y movement is an important one, because it refers to how accessible software is to everyone, ensuring that apps can be used by the maximum number of people to ensure inclusivity. The A11Y is a numeronym, with 11 referring to the number of letters that the word 'accessibility' contains between 'a' and 'y'. Nor is this just about reaching the most potential customers: with increasing numbers of websites and apps being used for healthcare, government and more, A11Y has become a must. After all, in many countries, accessibility is a right protected by law.