Mais conteúdo relacionado Semelhante a Identifying and managing change (20) Mais de IBM Rational software (20) Identifying and managing change1. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 1© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
© Copyright IBM Corporation 2013
Identifying and managing change
Contents
Module overview -2
Gathering requirements -5
Viewing a requirement artifact’s history -6
Gathering requirements -10
Manage change by using
suspect traceability -11
Suspicion profiles -12
Viewing suspicion indicators -13
Evaluating the change -14
Lab: Managing requirements using suspect
traceability -15
Review -16
Module summary -17
2. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 2© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2 © Copyright IBM Corporation 2013
Module overview
After you complete this module, you should be able to
manage change by doing these tasks :
Identify changed artifacts
Explore the history of an artifact
Identify suspect traceability
3. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 3© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3 © Copyright IBM Corporation 2013
Topics
> = Current topic
>Identifying changed
artifacts
Exploring artifact history
Identifying suspect
traceability
4. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 4© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4 © Copyright IBM Corporation 2013
The Project dashboard: Lifecycle projects
Use widgets to track project
progress and to flag
potential risk areas.
For example, how
risky is this change?
5. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 5© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5 © Copyright IBM Corporation 2013
Topics
> = Current topic
Identifying changed
requirements
>Exploring artifact history
Identifying suspect
traceability
6. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 6© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6 © Copyright IBM Corporation 2013
Viewing a requirement artifact’s history
What was recently changed in
this requirement artifact?
Click the Open History icon.
To view the history of an artifact, click the
Open History icon .
7. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 7© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
7 © Copyright IBM Corporation 2013
Artifact history: Revision history
A revision is created each time that you save
an artifact.
Each revision is represented by a revision icon
on the Revisions tab.
You can view changes that were made over
time.
You can view the history of most artifacts.
The rich hover shows the changes that were
made to the artifact, including changes to
primary text, comments, attributes, and links.
8. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 8© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8 © Copyright IBM Corporation 2013
Artifact history: Restoring a previous version
You can restore previous versions of the
artifact.
Select the version to restore, and then click the
Restore icon.
1
2
Versions are represented by colored boxes.
The darkest box represents the most recent
version. The lighter-shaded boxes represent
older versions.
If changes were made that you do not want to
retain, you can restore an artifact to a
previous version .
Note: When you delete an artifact, the
artifact and its audit history are gone. You
cannot recover the artifact and its history.
9. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 9© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9 © Copyright IBM Corporation 2013
Artifact history: Audit history
In the audit history, you can see a detailed
history of changes that were made to an
artifact.
The Audit History tab presents a summary
of all of the changes that were made to an
artifact. By clicking this tab, you can see a
more detailed history of changes that were
made to an artifact.
10. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 10© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10 © Copyright IBM Corporation 2013
Topics
> = Current topic
Identifying changed
requirements
Exploring artifact history
>Identifying suspect
traceability
11. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 11© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11 © Copyright IBM Corporation 2013
Manage change by using suspect traceability
• Suspect traceability indicates
the potential impact of changes
to linked artifacts.
• Linked artifacts are marked with
indicators to show that the
artifacts might be affected by
changes.
12. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 12© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12 © Copyright IBM Corporation 2013
Suspicion profiles
• Suspect traceability is based
on suspicion profiles that the
project administrator creates.
• A suspicion profile identifies a
set of link types, artifact types,
and attributes to watch for
changes.
• Suspicion profiles are set for
the project in these cases:
– When you choose a suspicion
profile or profiles to use
– When you open a saved view that
includes suspicion profiles
• The suspicion profile is stored
as a cookie in the browser.
Click the Suspicion Profiles
icon in the toolbar to choose a
profile.
A suspicion profile identifies a set of link
types, artifact types, and attributes to watch
for changes. When artifacts that match the
profile criteria are changed, the linked
artifacts are marked with a suspicion
indicator to alert team members of the
possible impact of the change.
Administrators can create suspicion profiles
that correspond to different roles or areas of
interest in a project.
Suspect profiles can be used for projects,
modules, and artifacts.
To select a suspicion profile, click the
Suspicion Profiles icon in the toolbar.
When you open a saved view that includes
suspicion profiles, your current suspicion
profile is set to the profile or profiles that are
in the saved view.
The suspicion profile selection is stored as a
cookie in your browser. The profile is active
in all sessions with that browser, unless you
clear the browser cookies.
13. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 13© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13 © Copyright IBM Corporation 2013
Suspicion indicators
You can add a Suspicion column at
the project, module, and collection
levels. You can view indicators in the
sidebar of the artifact editor.
You can also view indicators in
the Links section of the sidebar.
For more information about suspect
traceability, see “Viewing and
clearing suspect traceability” at
http://pic.dhe.ibm.com/infocente
r/clmhelp/v4r0/index.jsp
(http://pic.dhe.ibm.com/infocent
er/clmhelp/v4r0/topic/com.ibm.r
ational.rrm.help.doc/topics/t_vie
w_suspect_trace.html?resultof=
%22Viewing%2band%2bclearin
g%2bsuspect%22%20%22tracea
bility%22%20%22traceabl%22)
The Suspect icon shows the source of
the change that caused the suspect
state:
• If the icon shows a black arrow
that points out of the icon, the
change is in the current artifact.
• If the icon shows a blue arrow
that points into the icon, the
change is in the linked artifact.
• If the icon shows a red double
arrow, both the current artifact
and the linked artifact were
changed.
In the Links section, you can see both
incoming and outgoing suspect links.
On the Artifacts page, you can see
only incoming links.
14. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 14© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14 © Copyright IBM Corporation 2013
Evaluating changes
After you assess the change and take any
necessary actions, you can clear the suspect
state.
A rich hover contains a link to the changed
artifact. You can go to that artifact and review
its audit history to review the changes.
To clear a suspect indicator, do one of these
steps:
•To remove the suspicion for all of the
artifacts that are in the window, click Clear
all.
•To remove the suspicion for all of the
artifacts that are in a profile group in the
window, click Clear for profile. This
window can contain multiple profile groups.
•To remove the suspicion for an artifact that
is in the window, click Clear.
15. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 15© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15 © Copyright IBM Corporation 2013
Lab 1: Managing requirements by using suspect traceability
After you finish this lab, you should be
able to assess the impact of change by
using suspect traceability.
16. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 16© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
16 © Copyright IBM Corporation 2013
Review
How can you assess how an
artifact changed?
How can you identify a changed
artifact?
Why is suspicion in a module not
reflected on a base artifact?
17. Essentials of IBM® Rational® DOORS Next Generation V4.01
Identifying and managing change 17© Copyright IBM Corporation 2013
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17 © Copyright IBM Corporation 2013
Module summary
In this module, you learned how to manage change by
doing these tasks :
Identifying changed artifacts and understanding how they
changed by exploring their history
Using suspect profiles to assess change and its impact