SlideShare a Scribd company logo
1
Software Configuration
Management
2
Definition of SCM
• Software configuration management is the discipline of
managing the evolution of complex software systems [IEEE
STD 1987].
• Software configuration management is the process of
identifying, organizing & controlling changes to the software
during development & maintenance. SCM Operates throughout
software development lifecycle (SDLC). From the software
developer's perspective, SCM facilitates the development &
change implementation activities.
The common features in a SCM tool are:
* Support for controlling all types of file
* Managing changes
* Supporting branching & merging
* Identifying & recreating releases
* Providing a project view
Importance of SCM in SDLC
SCM tools provide project managers with total control of the
entire process of software development. It can track changes
made to the code by developers and communicate status of
documents and code as well as changes that have been made to
them.
3
4
Basic concepts of Configuration Management:
Configuration Item:
A piece of software or work product which is subject to change is
a configuration item
Change Request:
It is a formal report that contains the request for modification in a
configuration item.
Versions and configurations: A version identifies the state of a
particular configuration item or a configuration at a well
defined point in time
Promotion: A promotion is a version of a configuration item/CM
aggregate that has been available to other developers in a
project.
Release: A release is a version that has been available to the user
or the client.
Repository: It stores the various releases of a CM
item/aggregate.
Workspace: It is a library of promotions.
5
Configuration Management Activities
• Configuration item/CM aggregate identification
• Promotion management
• Release management
• Branch management
• Variant Management
• Change Management
6
• Configuration item identification
– modeling of the system as a set of evolving components
• Promotion management
– is the creation of versions for other developers
• Release management
– is the creation of versions for the clients and users
• Change management
– is the handling, approval and tracking of change requests
• Branch management
– is the management of concurrent development
• Variant management
– is the management of versions intended to coexist
7
Configuration Management Roles
• Configuration Manager
– Responsible for identifying configuration items. The configuration
manager can also be responsible for defining the procedures for
creating promotions and releases
• Change control board member
– Responsible for approving or rejecting change requests
• Developer
– Creates promotions triggered by change requests or the normal
activities of development. The developer checks in changes and
resolves conflicts
• Auditor
– Responsible for the selection and evaluation of promotions for release
and for ensuring the consistency and completeness of this release
8
Goals of SCM
• Configuration identification - Identifying configurations,
configuration items and baselines.
• Configuration control - Implementing a controlled change
process. This is usually achieved by setting up a change
control board whose primary function is to approve or reject
all change requests that are sent against any baseline.
• Configuration status accounting - Recording and reporting all
the necessary information on the status of the development
process.
9
• Configuration auditing - Ensuring that configurations contain
all their intended parts and are sound with respect to their
specifying documents, including requirements, architectural
specifications and user manuals.
• Build management - Managing the process and tools used for
builds.
• Process management - Ensuring adherence to the
organization's development process.
• Environment management - Managing the software and
hardware that host the system.
• Teamwork - Facilitate team interactions related to the process.
• Defect tracking - Making sure every defect has traceability
back to the source. 10
SDLC Life cycle
11
Configuration Management Tools
• SVN
• Revision Control System (RCS )
• Concurrent Versions System (CVS)
• Perforce
• Clearcase
• TFS
12
Topics going to be covered
• Version Controlling tools:
• SVN (Subversion), CVS
• Project Compiling scripts and Automation:
• ANT, NANT, VB Script, Cruise Control
• Software Packaging:
• NSIS – Nullsoft Scriptable Install System
• Bug Tracking:
• Mantis, Jeera
13
SVN
• Apache Subversion (often abbreviated SVN, after the
command name svn) is a software versioning and revision
control system distributed under an open source license.
Developers use Subversion to maintain current and historical
versions of files such as source code, web pages, and
documentation. Its goal is to be a mostly compatible successor
to the widely used Concurrent Versions System (CVS).
14
Subversion's architecture
15
Nant & Ant
Nant
NAnt is a free and open source software tool for
automating software build processes. It is similar to Apache Ant,
but targeted at the .NET environment rather than Java. NAnt
requires one of the .NET frameworks (1.0, 1.1, 2.0, 3.5 or 4.0) or
the third party Mono platform.
Ant
Apache Ant is a software tool for automating software build
processes. It is similar to Make but is implemented using the Java
language, requires the Java platform, and is best suited to
building Java
16
• Nullsoft Scriptable Install System (NSIS) is a script-driven
installation system for Microsoft Windows with minimal
overhead backed by Nullsoft, the creators of Winamp. NSIS
has risen to popularity as a widely used alternative to
commercial and proprietary products like InstallShield.
• * Even Google Using NSIS for Installers (.exe)
17
• Mantis Bug Tracker is a free and open source, web-based
bug tracking system released under the terms of the GNU
General Public License version 2. The most common use of
MantisBT is to track software defects. However, MantisBT is
often configured by users to serve as a more generic issue
tracking system and project management tool.
18
THANK YOU
19

More Related Content

What's hot

Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
guy_davis
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
TechWell
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)Nishkarsh Gupta
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration Management
Md Mamunur Rashid
 
SCM PPT
SCM PPTSCM PPT
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementJulia Carolina
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Managementelliando dias
 
software configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiessoftware configuratiom management role n resposnbilities
software configuratiom management role n resposnbilities
Mahesh Panchal
 
Process Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownProcess Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownLaurie Sheehan, PMP
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
Amr E. Mohamed
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
Arunnima B S
 
Software configuration management in deep
Software configuration management in deepSoftware configuration management in deep
Software configuration management in deep
Fáber D. Giraldo
 
Configuration management
Configuration managementConfiguration management
Configuration managementKobi Vider
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
JeyanthiR
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
TechWell
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementChandan Chaurasia
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
Rajesh Kumar
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Managementelliando dias
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
fizamustanser
 

What's hot (20)

Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration Management
 
SCM PPT
SCM PPTSCM PPT
SCM PPT
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
software configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiessoftware configuratiom management role n resposnbilities
software configuratiom management role n resposnbilities
 
Process Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownProcess Document - Configuration Management Drilldown
Process Document - Configuration Management Drilldown
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
 
5. scm
5. scm5. scm
5. scm
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software configuration management in deep
Software configuration management in deepSoftware configuration management in deep
Software configuration management in deep
 
Configuration management
Configuration managementConfiguration management
Configuration management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 

Viewers also liked

Spiritmedia Presentation
Spiritmedia PresentationSpiritmedia Presentation
Spiritmedia Presentation
PPAScotland
 
παρουσίαση1
παρουσίαση1παρουσίαση1
παρουσίαση1dimitris79
 
The 20 millions phenomenon: how low- and middle-income Brazilians changed the...
The 20 millions phenomenon: how low- and middle-income Brazilians changed the...The 20 millions phenomenon: how low- and middle-income Brazilians changed the...
The 20 millions phenomenon: how low- and middle-income Brazilians changed the...
Natalò Niccoli
 
Bogota historical places
Bogota historical placesBogota historical places
Bogota historical placesAlex Ptte
 
παρουσίαση1
παρουσίαση1παρουσίαση1
παρουσίαση1dimitris79
 
Think presentation
Think presentationThink presentation
Think presentation
PPAScotland
 

Viewers also liked (6)

Spiritmedia Presentation
Spiritmedia PresentationSpiritmedia Presentation
Spiritmedia Presentation
 
παρουσίαση1
παρουσίαση1παρουσίαση1
παρουσίαση1
 
The 20 millions phenomenon: how low- and middle-income Brazilians changed the...
The 20 millions phenomenon: how low- and middle-income Brazilians changed the...The 20 millions phenomenon: how low- and middle-income Brazilians changed the...
The 20 millions phenomenon: how low- and middle-income Brazilians changed the...
 
Bogota historical places
Bogota historical placesBogota historical places
Bogota historical places
 
παρουσίαση1
παρουσίαση1παρουσίαση1
παρουσίαση1
 
Think presentation
Think presentationThink presentation
Think presentation
 

Similar to Scm PPT

SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)
Amr E. Mohamed
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.ppt
divyammo
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.ppt
divyammo
 
Software configuration management, Web engineering
Software configuration management, Web engineeringSoftware configuration management, Web engineering
Software configuration management, Web engineering
divyammo
 
software configuration management
software configuration managementsoftware configuration management
software configuration managementFáber D. Giraldo
 
Configuration management
Configuration managementConfiguration management
Configuration management
Mohammed Abdallah
 
Unit 6 Software Configuration Management
Unit 6 Software Configuration ManagementUnit 6 Software Configuration Management
Unit 6 Software Configuration Management
KanchanPatil34
 
DevOps Practices in a Nutshell
DevOps Practices in a NutshellDevOps Practices in a Nutshell
DevOps Practices in a Nutshell
Fibonalabs
 
System Programming
System ProgrammingSystem Programming
System Programming
JahnaviBhagat
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
vishal choudhary
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
lokareminakshi
 
Ch25 - Configuration Management
Ch25 - Configuration ManagementCh25 - Configuration Management
Ch25 - Configuration Management
Harsh Verdhan Raj
 
SQL Server DevOps Jumpstart
SQL Server DevOps JumpstartSQL Server DevOps Jumpstart
SQL Server DevOps Jumpstart
Ori Donner
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineering
Rupesh Vaishnav
 
Configuration Managment Powerpoint
Configuration Managment PowerpointConfiguration Managment Powerpoint
Configuration Managment PowerpointJeannine Jacobs, MS
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
software-engineering-book
 

Similar to Scm PPT (20)

SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.ppt
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.ppt
 
Software configuration management, Web engineering
Software configuration management, Web engineeringSoftware configuration management, Web engineering
Software configuration management, Web engineering
 
software configuration management
software configuration managementsoftware configuration management
software configuration management
 
Configuration management
Configuration managementConfiguration management
Configuration management
 
Unit 6 Software Configuration Management
Unit 6 Software Configuration ManagementUnit 6 Software Configuration Management
Unit 6 Software Configuration Management
 
DevOps Practices in a Nutshell
DevOps Practices in a NutshellDevOps Practices in a Nutshell
DevOps Practices in a Nutshell
 
Voyager scm
Voyager scmVoyager scm
Voyager scm
 
Voyager scm
Voyager scmVoyager scm
Voyager scm
 
Ch 8 configuration management
Ch 8 configuration managementCh 8 configuration management
Ch 8 configuration management
 
System Programming
System ProgrammingSystem Programming
System Programming
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Ch25 - Configuration Management
Ch25 - Configuration ManagementCh25 - Configuration Management
Ch25 - Configuration Management
 
SQL Server DevOps Jumpstart
SQL Server DevOps JumpstartSQL Server DevOps Jumpstart
SQL Server DevOps Jumpstart
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineering
 
Configuration Managment Powerpoint
Configuration Managment PowerpointConfiguration Managment Powerpoint
Configuration Managment Powerpoint
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
Sunil
SunilSunil
Sunil
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Scm PPT

  • 2. 2 Definition of SCM • Software configuration management is the discipline of managing the evolution of complex software systems [IEEE STD 1987]. • Software configuration management is the process of identifying, organizing & controlling changes to the software during development & maintenance. SCM Operates throughout software development lifecycle (SDLC). From the software developer's perspective, SCM facilitates the development & change implementation activities.
  • 3. The common features in a SCM tool are: * Support for controlling all types of file * Managing changes * Supporting branching & merging * Identifying & recreating releases * Providing a project view Importance of SCM in SDLC SCM tools provide project managers with total control of the entire process of software development. It can track changes made to the code by developers and communicate status of documents and code as well as changes that have been made to them. 3
  • 4. 4 Basic concepts of Configuration Management: Configuration Item: A piece of software or work product which is subject to change is a configuration item Change Request: It is a formal report that contains the request for modification in a configuration item.
  • 5. Versions and configurations: A version identifies the state of a particular configuration item or a configuration at a well defined point in time Promotion: A promotion is a version of a configuration item/CM aggregate that has been available to other developers in a project. Release: A release is a version that has been available to the user or the client. Repository: It stores the various releases of a CM item/aggregate. Workspace: It is a library of promotions. 5
  • 6. Configuration Management Activities • Configuration item/CM aggregate identification • Promotion management • Release management • Branch management • Variant Management • Change Management 6
  • 7. • Configuration item identification – modeling of the system as a set of evolving components • Promotion management – is the creation of versions for other developers • Release management – is the creation of versions for the clients and users • Change management – is the handling, approval and tracking of change requests • Branch management – is the management of concurrent development • Variant management – is the management of versions intended to coexist 7
  • 8. Configuration Management Roles • Configuration Manager – Responsible for identifying configuration items. The configuration manager can also be responsible for defining the procedures for creating promotions and releases • Change control board member – Responsible for approving or rejecting change requests • Developer – Creates promotions triggered by change requests or the normal activities of development. The developer checks in changes and resolves conflicts • Auditor – Responsible for the selection and evaluation of promotions for release and for ensuring the consistency and completeness of this release 8
  • 9. Goals of SCM • Configuration identification - Identifying configurations, configuration items and baselines. • Configuration control - Implementing a controlled change process. This is usually achieved by setting up a change control board whose primary function is to approve or reject all change requests that are sent against any baseline. • Configuration status accounting - Recording and reporting all the necessary information on the status of the development process. 9
  • 10. • Configuration auditing - Ensuring that configurations contain all their intended parts and are sound with respect to their specifying documents, including requirements, architectural specifications and user manuals. • Build management - Managing the process and tools used for builds. • Process management - Ensuring adherence to the organization's development process. • Environment management - Managing the software and hardware that host the system. • Teamwork - Facilitate team interactions related to the process. • Defect tracking - Making sure every defect has traceability back to the source. 10
  • 12. Configuration Management Tools • SVN • Revision Control System (RCS ) • Concurrent Versions System (CVS) • Perforce • Clearcase • TFS 12
  • 13. Topics going to be covered • Version Controlling tools: • SVN (Subversion), CVS • Project Compiling scripts and Automation: • ANT, NANT, VB Script, Cruise Control • Software Packaging: • NSIS – Nullsoft Scriptable Install System • Bug Tracking: • Mantis, Jeera 13
  • 14. SVN • Apache Subversion (often abbreviated SVN, after the command name svn) is a software versioning and revision control system distributed under an open source license. Developers use Subversion to maintain current and historical versions of files such as source code, web pages, and documentation. Its goal is to be a mostly compatible successor to the widely used Concurrent Versions System (CVS). 14
  • 16. Nant & Ant Nant NAnt is a free and open source software tool for automating software build processes. It is similar to Apache Ant, but targeted at the .NET environment rather than Java. NAnt requires one of the .NET frameworks (1.0, 1.1, 2.0, 3.5 or 4.0) or the third party Mono platform. Ant Apache Ant is a software tool for automating software build processes. It is similar to Make but is implemented using the Java language, requires the Java platform, and is best suited to building Java 16
  • 17. • Nullsoft Scriptable Install System (NSIS) is a script-driven installation system for Microsoft Windows with minimal overhead backed by Nullsoft, the creators of Winamp. NSIS has risen to popularity as a widely used alternative to commercial and proprietary products like InstallShield. • * Even Google Using NSIS for Installers (.exe) 17
  • 18. • Mantis Bug Tracker is a free and open source, web-based bug tracking system released under the terms of the GNU General Public License version 2. The most common use of MantisBT is to track software defects. However, MantisBT is often configured by users to serve as a more generic issue tracking system and project management tool. 18