Systems | Development | Analytics | API | Testing

%term

Perforce's Approach to Open-Source Communities

Perforce has been contributing and working in open source for decades now. We understand that open source is the linchpin for technology that supports businesses today. Our approach to open source is not unique to the industry at large or a company of our size (we have around 1,700 employees and 800 are on my team), but questions of our approach to open source became much more visible when we acquired Puppet – which has a really dedicated open-source community and a long history with open source.

What is SSO? How to use and setup Longview SSO Service?

In this video, we provide an in-depth guide to configuring and using Longview's Single Sign-On (SSO) service. You'll learn about the different authentication workflows such as SAML, OpenID, and OAuth, and how to set up Longview SSO to streamline access across multiple applications. Whether you're configuring SSO for the first time or enhancing security within your organization, this video walks you through each step of the process.

iNSta - Intelligent Scriptless Test Automation Platform | Cigniti, A Coforge Company

“A strength of iNSta is that the Intelligent Recorder and the NLP translation are interoperable. We think tools like iNSta will help testers focus on more gratifying tasks such as analysis and remediation. This is good news for the industry,” says Dominique Raviart, Practice Director at NelsonHall. Cigniti, a Coforge Company, built iNSta – an AI-powered, low-code/scriptless test automation platform – to empower global enterprises to improve their Cost of Quality without any vendor lock-in.

Revolutionizing Build Analytics: How to enhance build processes with ThoughtSpot

In the fast-paced world of software development, the efficiency of build processes plays a crucial role in maintaining productivity and code quality. At ThoughtSpot, while Gradle has been effective, the growing complexity of our projects demanded a more sophisticated approach to understanding and optimizing our builds. This requirement prompted us to explore Build Analytics—harnessing data from our build processes to gain actionable insights.

Testing Center of Excellence (TCOE): A Brief History, and How It Can Be Modernized

The end goal of the Testing Center of Excellence (TCOE) is to drive the shift from fragmented, project-based QA efforts to a unified governance structure. It was a pre-Agile innovation to bring testing from the “background” to the center of the SDLC. The arrival of Agile renders the traditional TCoEs obsolete.

AI in UX design - Vital AI Impacts & Enhanced Features

Did you know that the AI market size is likely to reach USD 826.73 billion dollars by 2030? Yes, you read it right! The use of artificial intelligence can be seen in every field. AI in UX design is bringing about a revolution in the way users interact with technology. Traditionally, UX design relied on designer intuition, manual processes, and labor-intensive user testing. No doubt, the conventional approach had a positive impact on the user experience.

How to Manage Your API Policies with OPA (Open Policy Agent)

APIs are essential to modern applications, but managing access and security policies can be complex. Traditional access control mechanisms can fall short when flexible, scalable, and fine-grained control over who can access specific resources is needed. This is where OPA (Open Policy Agent) steps in. OPA provides a unified framework for consistently defining and enforcing policies across microservices, APIs, Kubernetes clusters, and beyond. Consistent policy management is essential for enterprises.

Govern an Open Lakehouse with Snowflake Open Catalog, a Managed Service for Apache Polaris

To enhance security and ease operational burden, many organizations with data lakes or lakehouses want flexibility to securely integrate their tools of choice on a single copy of data. An open standard for storage format and catalog API has helped, but there’s still a need for open standards for the catalog, including a consistent way to apply security access controls to data.