SlideShare a Scribd company logo
CONFIGURATION
MANAGEMENT


RIZKA MARSA PRAMADANI
PRELIMINARY
•   Software configuration item (SCI) or configuration item (CI)
An approved unit of software code, a document or piece of hardware that is
designed for configuration management and treated as a distinct entity in
the software configuration management process.
•   SCI version
The approved state of an SCI at any given point of time during the
development or maintenance process.
•   Software configuration version
An approved selected set of documented SCI versions that constitute a
software system or document at a given point of time, where the activities
to be performed are controlled by software configuration management
procedures. The software configuration versions are released according to
the cited procedures
(CONT’D)..
The SCIs are generally placed into four classes, as follows:
• Design documents
• Software code
• Data files, including files of test cases and test scripts
• Software development tools.
COMMON TYPES OF SOFTWARE
CONFIGURATION ITEMS

Design documents                           •   Software change requests (SCRs) and
                                               software change orders (SCOs)
•   Software development plan (SDP)
                                           •   Version description document (VDD)
•   System requirements document
                                           Software code
•   Software requirements document (SRD)
                                           •   Source code
•   Interface design specifications
                                           •   Object code
•   Preliminary design document (PDD)
                                           •   Prototype software
•   Critical design document (CDD)
                                           Data files
•   Database description
                                           •   Test cases and test scripts
•   Software test plan (STP)
                                           •   Parameters, codes, etc.
•   Software test procedure (STPR)
•   Software test report (STR)             Software development tools (the versions
                                           applied in the development and maintenance
•   Software user manuals                  stages)
•   Software maintenance manuals           •   Compilers and debuggers
•   Software installation plan (SIP)       •   Application generators
•   Software maintenance requests          •   CASE tools
    (including problem reports)
SOFTWARE CONFIGURATION
MANAGEMENT
An SQA component responsible for applying (computerized
and non-computerized) technical tools and administrative
procedures that enable completion of the tasks required to
maintain SCIs and software configuration versions
TASKS
AND ORGANIZATION
The tasks of software configuration management may be
classified into four groups:
• Control software change
• Release of SCI and software configuration versions
• Provision of SCM information services
• Verification of compliance to SCM procedures
SOFTWARE CHANGE
CONTROL
Software change management controls the process of
introducing changes mainly by doing the following:
• Examining change requests and approving
  implementation of appropriate requests.
• Assuring the quality of each new version of software
  configuration before it becomes operational.
APPROVAL TO CARRY OUT
PROPOSED CHANGES
The factors affecting the decision whether to implement a
proposed change include:
• Expected contribution of the proposed change
• Urgency of the change
• Effect of the proposed change on project timetables, level
  of service, etc.
• Efforts required in making the change operational
• Required software quality assurance efforts
• Estimated required professional resources and cost of
  performing the change.
RELEASE OF SOFTWARE
CONFIGURATION VERSIONS
The need to release a new software configuration version usually
stems from one or more of the following conditions:
• Defective SCIs
• Special features demanded by new customers
• The team’s initiatives to introduce SCI improvements.
TYPES OF SOFTWARE
CONFIGURATION RELEASES

  Baseline versions

  • Baseline software configuration versions are planned
    early, during a system’s development or operating
    stage. As part of the process, they are reviewed, tested
    and approved, as are their SCIs

  Intermediate versions

  • When problems arise that require immediate attention
    – such as the need to correct defects identified in an
    important SCI, or perform immediate adaptation as
    defined in a contract with a new customer – an
    intermediate version of the software is often prepared.
TYPES OF SOFTWARE
CONFIGURATION RELEASES
(CONT’D)



   Revisions

   • Revisions introduce minor changes and corrections
     to a given software configuration version.

   Numeration conventions for identification
   of SCI and software versions
   • Numeration conventions have been formulated to
     identify SCIs; the most commonly used is decimal
     numeration, which indicates the successive version
     and revision numbers and is registered accordingly
SOFTWARE CONFIGURATION
MANAGEMENT PLANS
(SCMPS)
The main objective of a software configuration management plan (SCMP) is
to plan ahead the schedule of baseline version releases and the required
resources to carry out all the activities required for the software configuration
releases. Accordingly, an SCMP usually includes:
•   An overview of the software development project or existing software
    system.
•   A list of scheduled baseline version releases.
•   A list of SCIs (documents, code, etc.) to be included in each version.
•   A table identifying the relationship of software development project plans
    and maintenance plans to scheduled releases of new SCIs or SCI
    versions.
•   A list of assumptions about the resources required to perform the various
    activities required by the SCMP.
•   Estimates of the human resources and budget needed to perform the
    SCMP.
SOFTWARE CONFIGURATION
EVOLUTION MODELS

 The linear evolution model
 • This model is the natural choice for software systems developed
   to serve a single organization.The model is also applied to
   popular software packages, which tend to be uniform in structure,
   where the need to meet a wide range of maintenance demands
   for a single version is a great advantage.

  The tree evolution model

 • According to this model, several parallel versions of the software
   are developed to serve the needs of different customers
   simultaneously throughout the system’s life cycle. Tree models
   are typically applied in firmware configuration versions, where
   each branch serves a different product or product line.

More Related Content

What's hot

Configuration management
Configuration managementConfiguration management
Configuration managementKobi Vider
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementJulia Carolina
 
Software configuration items
Software configuration itemsSoftware configuration items
Software configuration items
ashok kumar
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
Amr E. Mohamed
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
TechWell
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
robertodepalma
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration Management
Md Mamunur Rashid
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
guy_davis
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Managementelliando dias
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
JeyanthiR
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Managementelliando dias
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
Arunnima B S
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineering
Rupesh Vaishnav
 
Change Management
Change ManagementChange Management
Configuration Management
Configuration ManagementConfiguration Management
Configuration Managementsslovepk
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
Er. Shiva K. Shrestha
 
Software Configuration Management And CVS
Software Configuration Management And CVSSoftware Configuration Management And CVS
Software Configuration Management And CVS
Rajesh Kumar
 
Lecture 06 Software Configuration Management
Lecture 06 Software Configuration ManagementLecture 06 Software Configuration Management
Lecture 06 Software Configuration Management
Achmad Solichin
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
Virendra Thakur
 
Process Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownProcess Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownLaurie Sheehan, PMP
 

What's hot (20)

Configuration management
Configuration managementConfiguration management
Configuration management
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Software configuration items
Software configuration itemsSoftware configuration items
Software configuration items
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineering
 
Change Management
Change ManagementChange Management
Change Management
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
Software Configuration Management And CVS
Software Configuration Management And CVSSoftware Configuration Management And CVS
Software Configuration Management And CVS
 
Lecture 06 Software Configuration Management
Lecture 06 Software Configuration ManagementLecture 06 Software Configuration Management
Lecture 06 Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Process Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownProcess Document - Configuration Management Drilldown
Process Document - Configuration Management Drilldown
 

Similar to Configuration management

Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Swamy Shettru
 
SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)
uma sree
 
SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)
Amr E. Mohamed
 
Project 1 & 2.pptx
Project 1 & 2.pptxProject 1 & 2.pptx
Project 1 & 2.pptx
OkianWarner
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
 
Greate Introduction to Software Engineering @ Track IT Academy
Greate Introduction to Software Engineering @ Track IT AcademyGreate Introduction to Software Engineering @ Track IT Academy
Greate Introduction to Software Engineering @ Track IT Academy
Mohamed Shahpoup
 
Lecture 2 (Software Processes)
Lecture 2 (Software Processes)Lecture 2 (Software Processes)
Lecture 2 (Software Processes)
Education Front
 
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1gururguru01
 
Sdlc model
Sdlc modelSdlc model
Sdlc model
Dhilsath Fathima
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
vishal choudhary
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
Syed Zaid Irshad
 
Introduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptxIntroduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptx
AbcXyz302255
 
Software engineer
Software engineerSoftware engineer
Software engineer
Social Development Club
 
Introduction to Requirement engineering
Introduction to Requirement engineeringIntroduction to Requirement engineering
Introduction to Requirement engineering
Nameirakpam Sundari
 
software configuration management
software configuration managementsoftware configuration management
software configuration managementFáber D. Giraldo
 
Agile methods and safety critical software - Peter Gardner
Agile methods and safety critical software - Peter GardnerAgile methods and safety critical software - Peter Gardner
Agile methods and safety critical software - Peter Gardner
AdaCore
 
Scm PPT
Scm PPTScm PPT

Similar to Configuration management (20)

Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
 
SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)
 
SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)
 
Voyager scm
Voyager scmVoyager scm
Voyager scm
 
Voyager scm
Voyager scmVoyager scm
Voyager scm
 
Project 1 & 2.pptx
Project 1 & 2.pptxProject 1 & 2.pptx
Project 1 & 2.pptx
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
Ch 8 configuration management
Ch 8 configuration managementCh 8 configuration management
Ch 8 configuration management
 
Greate Introduction to Software Engineering @ Track IT Academy
Greate Introduction to Software Engineering @ Track IT AcademyGreate Introduction to Software Engineering @ Track IT Academy
Greate Introduction to Software Engineering @ Track IT Academy
 
Lecture 2 (Software Processes)
Lecture 2 (Software Processes)Lecture 2 (Software Processes)
Lecture 2 (Software Processes)
 
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
 
Sdlc model
Sdlc modelSdlc model
Sdlc model
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Introduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptxIntroduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptx
 
Software engineer
Software engineerSoftware engineer
Software engineer
 
Introduction to Requirement engineering
Introduction to Requirement engineeringIntroduction to Requirement engineering
Introduction to Requirement engineering
 
software configuration management
software configuration managementsoftware configuration management
software configuration management
 
Agile methods and safety critical software - Peter Gardner
Agile methods and safety critical software - Peter GardnerAgile methods and safety critical software - Peter Gardner
Agile methods and safety critical software - Peter Gardner
 
Scm PPT
Scm PPTScm PPT
Scm PPT
 

More from ashamarsha

Progress control
Progress controlProgress control
Progress controlashamarsha
 
Staff training and certification
Staff training and certificationStaff training and certification
Staff training and certificationashamarsha
 
Software testing
Software testingSoftware testing
Software testingashamarsha
 
SQA architecture
SQA architectureSQA architecture
SQA architectureashamarsha
 
Software quality factor2(2)
Software quality factor2(2)Software quality factor2(2)
Software quality factor2(2)ashamarsha
 
Software quality factor
Software quality factor Software quality factor
Software quality factor ashamarsha
 
Software quality factor2_part2
Software quality factor2_part2Software quality factor2_part2
Software quality factor2_part2
ashamarsha
 
Software quality factor2
Software quality factor2Software quality factor2
Software quality factor2ashamarsha
 
Software quality factors
Software quality factorsSoftware quality factors
Software quality factors
ashamarsha
 
Penyebab error
Penyebab errorPenyebab error
Penyebab error
ashamarsha
 
Resume quality
Resume quality Resume quality
Resume quality ashamarsha
 
Software Quality Factors
Software Quality FactorsSoftware Quality Factors
Software Quality Factors
ashamarsha
 

More from ashamarsha (13)

Progress control
Progress controlProgress control
Progress control
 
Staff training and certification
Staff training and certificationStaff training and certification
Staff training and certification
 
Software testing
Software testingSoftware testing
Software testing
 
SQA architecture
SQA architectureSQA architecture
SQA architecture
 
Software quality factor2(2)
Software quality factor2(2)Software quality factor2(2)
Software quality factor2(2)
 
Software quality factor
Software quality factor Software quality factor
Software quality factor
 
Software quality factor2_part2
Software quality factor2_part2Software quality factor2_part2
Software quality factor2_part2
 
Software quality factor2
Software quality factor2Software quality factor2
Software quality factor2
 
Software quality factors
Software quality factorsSoftware quality factors
Software quality factors
 
Penyebab error
Penyebab errorPenyebab error
Penyebab error
 
Resume quality
Resume quality Resume quality
Resume quality
 
Software Quality Factors
Software Quality FactorsSoftware Quality Factors
Software Quality Factors
 
Pertanyaan
PertanyaanPertanyaan
Pertanyaan
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Configuration management

  • 2. PRELIMINARY • Software configuration item (SCI) or configuration item (CI) An approved unit of software code, a document or piece of hardware that is designed for configuration management and treated as a distinct entity in the software configuration management process. • SCI version The approved state of an SCI at any given point of time during the development or maintenance process. • Software configuration version An approved selected set of documented SCI versions that constitute a software system or document at a given point of time, where the activities to be performed are controlled by software configuration management procedures. The software configuration versions are released according to the cited procedures
  • 3. (CONT’D).. The SCIs are generally placed into four classes, as follows: • Design documents • Software code • Data files, including files of test cases and test scripts • Software development tools.
  • 4. COMMON TYPES OF SOFTWARE CONFIGURATION ITEMS Design documents • Software change requests (SCRs) and software change orders (SCOs) • Software development plan (SDP) • Version description document (VDD) • System requirements document Software code • Software requirements document (SRD) • Source code • Interface design specifications • Object code • Preliminary design document (PDD) • Prototype software • Critical design document (CDD) Data files • Database description • Test cases and test scripts • Software test plan (STP) • Parameters, codes, etc. • Software test procedure (STPR) • Software test report (STR) Software development tools (the versions applied in the development and maintenance • Software user manuals stages) • Software maintenance manuals • Compilers and debuggers • Software installation plan (SIP) • Application generators • Software maintenance requests • CASE tools (including problem reports)
  • 5. SOFTWARE CONFIGURATION MANAGEMENT An SQA component responsible for applying (computerized and non-computerized) technical tools and administrative procedures that enable completion of the tasks required to maintain SCIs and software configuration versions
  • 6. TASKS AND ORGANIZATION The tasks of software configuration management may be classified into four groups: • Control software change • Release of SCI and software configuration versions • Provision of SCM information services • Verification of compliance to SCM procedures
  • 7. SOFTWARE CHANGE CONTROL Software change management controls the process of introducing changes mainly by doing the following: • Examining change requests and approving implementation of appropriate requests. • Assuring the quality of each new version of software configuration before it becomes operational.
  • 8. APPROVAL TO CARRY OUT PROPOSED CHANGES The factors affecting the decision whether to implement a proposed change include: • Expected contribution of the proposed change • Urgency of the change • Effect of the proposed change on project timetables, level of service, etc. • Efforts required in making the change operational • Required software quality assurance efforts • Estimated required professional resources and cost of performing the change.
  • 9. RELEASE OF SOFTWARE CONFIGURATION VERSIONS The need to release a new software configuration version usually stems from one or more of the following conditions: • Defective SCIs • Special features demanded by new customers • The team’s initiatives to introduce SCI improvements.
  • 10. TYPES OF SOFTWARE CONFIGURATION RELEASES Baseline versions • Baseline software configuration versions are planned early, during a system’s development or operating stage. As part of the process, they are reviewed, tested and approved, as are their SCIs Intermediate versions • When problems arise that require immediate attention – such as the need to correct defects identified in an important SCI, or perform immediate adaptation as defined in a contract with a new customer – an intermediate version of the software is often prepared.
  • 11. TYPES OF SOFTWARE CONFIGURATION RELEASES (CONT’D) Revisions • Revisions introduce minor changes and corrections to a given software configuration version. Numeration conventions for identification of SCI and software versions • Numeration conventions have been formulated to identify SCIs; the most commonly used is decimal numeration, which indicates the successive version and revision numbers and is registered accordingly
  • 12. SOFTWARE CONFIGURATION MANAGEMENT PLANS (SCMPS) The main objective of a software configuration management plan (SCMP) is to plan ahead the schedule of baseline version releases and the required resources to carry out all the activities required for the software configuration releases. Accordingly, an SCMP usually includes: • An overview of the software development project or existing software system. • A list of scheduled baseline version releases. • A list of SCIs (documents, code, etc.) to be included in each version. • A table identifying the relationship of software development project plans and maintenance plans to scheduled releases of new SCIs or SCI versions. • A list of assumptions about the resources required to perform the various activities required by the SCMP. • Estimates of the human resources and budget needed to perform the SCMP.
  • 13. SOFTWARE CONFIGURATION EVOLUTION MODELS The linear evolution model • This model is the natural choice for software systems developed to serve a single organization.The model is also applied to popular software packages, which tend to be uniform in structure, where the need to meet a wide range of maintenance demands for a single version is a great advantage. The tree evolution model • According to this model, several parallel versions of the software are developed to serve the needs of different customers simultaneously throughout the system’s life cycle. Tree models are typically applied in firmware configuration versions, where each branch serves a different product or product line.