Systems | Development | Analytics | API | Testing

%term

File Types and How to Use the Perforce Helix Core Typemap

In this video, learn about file types and how to use the Perforce Helix Core typemap (p4 typemap) to control how your server stores files and make sure they have the attributes set necessary to interact within your specific pipeline as expected. Check out the other videos in the Perforce Helix Core Admin’s Guide playlist for tutorials on other basic admin operations you will use when administering your Helix core server.

How to Ignore Files and Directories in Perforce Helix Core

In this video, learn how the p4 ignore file works and how to set up your Perforce Helix Core server to automatically ignore directories within your workspace that you don't want to have pushed up into version control. Check out the other videos in the Perforce Helix Core Admin’s Guide playlist for tutorials on other basic admin operations you will use when administering your Helix core server.

5 Generative AI Use Cases You Need to Apply to Your Processes

Ready to implement generative AI in your business processes? Starting with the right generative AI use cases is key to your success. You’ll want to find areas where you can achieve quick wins as you grow toward your larger AI vision. In this article, we’ll highlight five use cases where you can incorporate generative AI for increased process efficiency.

Flamegraph Feature Preview Christmas Present, Thank you for 2023!

As a Christmas present, we have started rolling out a new feature for the Profiler: flamegraph rendering in addition to the existing Timeline and Callgraph. This is a feature preview and will see more changes in Q1 of 2024. For now, only customers with the most recent plans (Tideways 6) can access them, or you can view them in traces of the „demo“ organization. Let us know what you think of it!

Layered Security Strategy for Managing APIs

This post is part of a series on becoming a secure API-first company. For a deeper dive, check out the eBook Leading Digital Transformation: Best Practices for Becoming a Secure API-First Company. As APIs have become mission-critical, securing them against threats is crucial. APIs are an attractive target for attackers, and a single vulnerability can expose an organization's most sensitive information assets. To properly secure APIs, we have to move beyond basic perimeter defenses.

What Is Automated Regression Testing, and How Do You Get Started?

Adding new features or enhancements to an app is a good thing – unless the changes trigger an unexpected problem. To protect against this risk, QA teams and developers can leverage automated regression testing, which offers a fast and efficient means of confirming that software upgrades or changes don't introduce bugs into applications.

10 Testing Recommendations for Software as Medical Device

Medical devices have been used for centuries but are only being regulated recently to ensure patient safety. Every medical device must meet the requirements of the regulations in a country or region before entering the market. Very recently, going digital has changed not only our lifestyles but also the operations of medical devices.

Fivetran Demo: How to accelerate and automate SAP ERP data into Google Cloud and BigQuery

Learn how Fivetran accelerates and automates data movement for SAP ERP data to Google Cloud and BigQuery. Using Fivetran’s fully automated and fully managed data movement service you can achieve self service data integration for BigQuery data workloads quickly and securely and always 100% automated.

Cybersecurity Considerations for In-Vehicle Infotainment Systems

The focus of today’s new-car buyer centers more on the “Digital Cockpit ecosystem experience” and less on the traditional features, such as horsepower and fuel economy. The automotive industry has made it a priority to deliver that experience with fully connected in-vehicle infotainment (IVI) systems of touchscreen displays, voice commands, and integrated information and entertainment functions.