SlideShare a Scribd company logo
1 of 13
CONFIGURATION
MANAGEMENT


RIZKA MARSA PRAMADANI
PRELIMINARY
•   Software configuration item (SCI) or configuration item (CI)
An approved unit of software code, a document or piece of hardware that is
designed for configuration management and treated as a distinct entity in
the software configuration management process.
•   SCI version
The approved state of an SCI at any given point of time during the
development or maintenance process.
•   Software configuration version
An approved selected set of documented SCI versions that constitute a
software system or document at a given point of time, where the activities
to be performed are controlled by software configuration management
procedures. The software configuration versions are released according to
the cited procedures
(CONT’D)..
The SCIs are generally placed into four classes, as follows:
• Design documents
• Software code
• Data files, including files of test cases and test scripts
• Software development tools.
COMMON TYPES OF SOFTWARE
CONFIGURATION ITEMS

Design documents                           •   Software change requests (SCRs) and
                                               software change orders (SCOs)
•   Software development plan (SDP)
                                           •   Version description document (VDD)
•   System requirements document
                                           Software code
•   Software requirements document (SRD)
                                           •   Source code
•   Interface design specifications
                                           •   Object code
•   Preliminary design document (PDD)
                                           •   Prototype software
•   Critical design document (CDD)
                                           Data files
•   Database description
                                           •   Test cases and test scripts
•   Software test plan (STP)
                                           •   Parameters, codes, etc.
•   Software test procedure (STPR)
•   Software test report (STR)             Software development tools (the versions
                                           applied in the development and maintenance
•   Software user manuals                  stages)
•   Software maintenance manuals           •   Compilers and debuggers
•   Software installation plan (SIP)       •   Application generators
•   Software maintenance requests          •   CASE tools
    (including problem reports)
SOFTWARE CONFIGURATION
MANAGEMENT
An SQA component responsible for applying (computerized
and non-computerized) technical tools and administrative
procedures that enable completion of the tasks required to
maintain SCIs and software configuration versions
TASKS
AND ORGANIZATION
The tasks of software configuration management may be
classified into four groups:
• Control software change
• Release of SCI and software configuration versions
• Provision of SCM information services
• Verification of compliance to SCM procedures
SOFTWARE CHANGE
CONTROL
Software change management controls the process of
introducing changes mainly by doing the following:
• Examining change requests and approving
  implementation of appropriate requests.
• Assuring the quality of each new version of software
  configuration before it becomes operational.
APPROVAL TO CARRY OUT
PROPOSED CHANGES
The factors affecting the decision whether to implement a
proposed change include:
• Expected contribution of the proposed change
• Urgency of the change
• Effect of the proposed change on project timetables, level
  of service, etc.
• Efforts required in making the change operational
• Required software quality assurance efforts
• Estimated required professional resources and cost of
  performing the change.
RELEASE OF SOFTWARE
CONFIGURATION VERSIONS
The need to release a new software configuration version usually
stems from one or more of the following conditions:
• Defective SCIs
• Special features demanded by new customers
• The team’s initiatives to introduce SCI improvements.
TYPES OF SOFTWARE
CONFIGURATION RELEASES

  Baseline versions

  • Baseline software configuration versions are planned
    early, during a system’s development or operating
    stage. As part of the process, they are reviewed, tested
    and approved, as are their SCIs

  Intermediate versions

  • When problems arise that require immediate attention
    – such as the need to correct defects identified in an
    important SCI, or perform immediate adaptation as
    defined in a contract with a new customer – an
    intermediate version of the software is often prepared.
TYPES OF SOFTWARE
CONFIGURATION RELEASES
(CONT’D)



   Revisions

   • Revisions introduce minor changes and corrections
     to a given software configuration version.

   Numeration conventions for identification
   of SCI and software versions
   • Numeration conventions have been formulated to
     identify SCIs; the most commonly used is decimal
     numeration, which indicates the successive version
     and revision numbers and is registered accordingly
SOFTWARE CONFIGURATION
MANAGEMENT PLANS
(SCMPS)
The main objective of a software configuration management plan (SCMP) is
to plan ahead the schedule of baseline version releases and the required
resources to carry out all the activities required for the software configuration
releases. Accordingly, an SCMP usually includes:
•   An overview of the software development project or existing software
    system.
•   A list of scheduled baseline version releases.
•   A list of SCIs (documents, code, etc.) to be included in each version.
•   A table identifying the relationship of software development project plans
    and maintenance plans to scheduled releases of new SCIs or SCI
    versions.
•   A list of assumptions about the resources required to perform the various
    activities required by the SCMP.
•   Estimates of the human resources and budget needed to perform the
    SCMP.
SOFTWARE CONFIGURATION
EVOLUTION MODELS

 The linear evolution model
 • This model is the natural choice for software systems developed
   to serve a single organization.The model is also applied to
   popular software packages, which tend to be uniform in structure,
   where the need to meet a wide range of maintenance demands
   for a single version is a great advantage.

  The tree evolution model

 • According to this model, several parallel versions of the software
   are developed to serve the needs of different customers
   simultaneously throughout the system’s life cycle. Tree models
   are typically applied in firmware configuration versions, where
   each branch serves a different product or product line.

More Related Content

What's hot

Configuration management
Configuration managementConfiguration management
Configuration management
Kobi Vider
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
Julia Carolina
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
elliando dias
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
elliando dias
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
sslovepk
 
Process Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownProcess Document - Configuration Management Drilldown
Process Document - Configuration Management Drilldown
Laurie Sheehan, PMP
 

What's hot (20)

Configuration management
Configuration managementConfiguration management
Configuration management
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Software configuration items
Software configuration itemsSoftware configuration items
Software configuration items
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
 
Configuration Management Best Practices
Configuration Management Best PracticesConfiguration Management Best Practices
Configuration Management Best Practices
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineering
 
Change Management
Change ManagementChange Management
Change Management
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
Software Configuration Management And CVS
Software Configuration Management And CVSSoftware Configuration Management And CVS
Software Configuration Management And CVS
 
Lecture 06 Software Configuration Management
Lecture 06 Software Configuration ManagementLecture 06 Software Configuration Management
Lecture 06 Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Process Document - Configuration Management Drilldown
Process Document - Configuration Management DrilldownProcess Document - Configuration Management Drilldown
Process Document - Configuration Management Drilldown
 

Similar to Configuration management

Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
gururguru01
 
Introduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptxIntroduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptx
AbcXyz302255
 
software configuration management
software configuration managementsoftware configuration management
software configuration management
Fáber D. Giraldo
 

Similar to Configuration management (20)

Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
Introduction to DO-178B - Software Considerations in Airborne Systems and Equ...
 
SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)
 
SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)
 
Voyager scm
Voyager scmVoyager scm
Voyager scm
 
Voyager scm
Voyager scmVoyager scm
Voyager scm
 
Project 1 & 2.pptx
Project 1 & 2.pptxProject 1 & 2.pptx
Project 1 & 2.pptx
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
Ch 8 configuration management
Ch 8 configuration managementCh 8 configuration management
Ch 8 configuration management
 
Greate Introduction to Software Engineering @ Track IT Academy
Greate Introduction to Software Engineering @ Track IT AcademyGreate Introduction to Software Engineering @ Track IT Academy
Greate Introduction to Software Engineering @ Track IT Academy
 
Lecture 2 (Software Processes)
Lecture 2 (Software Processes)Lecture 2 (Software Processes)
Lecture 2 (Software Processes)
 
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
Softwareengineeringfundamentalssvetlinnakov 1233295163644547-1
 
Sdlc model
Sdlc modelSdlc model
Sdlc model
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Introduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptxIntroduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptx
 
Software engineer
Software engineerSoftware engineer
Software engineer
 
Introduction to Requirement engineering
Introduction to Requirement engineeringIntroduction to Requirement engineering
Introduction to Requirement engineering
 
software configuration management
software configuration managementsoftware configuration management
software configuration management
 
Agile methods and safety critical software - Peter Gardner
Agile methods and safety critical software - Peter GardnerAgile methods and safety critical software - Peter Gardner
Agile methods and safety critical software - Peter Gardner
 
Scm PPT
Scm PPTScm PPT
Scm PPT
 

More from ashamarsha (13)

Progress control
Progress controlProgress control
Progress control
 
Staff training and certification
Staff training and certificationStaff training and certification
Staff training and certification
 
Software testing
Software testingSoftware testing
Software testing
 
SQA architecture
SQA architectureSQA architecture
SQA architecture
 
Software quality factor2(2)
Software quality factor2(2)Software quality factor2(2)
Software quality factor2(2)
 
Software quality factor
Software quality factor Software quality factor
Software quality factor
 
Software quality factor2_part2
Software quality factor2_part2Software quality factor2_part2
Software quality factor2_part2
 
Software quality factor2
Software quality factor2Software quality factor2
Software quality factor2
 
Software quality factors
Software quality factorsSoftware quality factors
Software quality factors
 
Penyebab error
Penyebab errorPenyebab error
Penyebab error
 
Resume quality
Resume quality Resume quality
Resume quality
 
Software Quality Factors
Software Quality FactorsSoftware Quality Factors
Software Quality Factors
 
Pertanyaan
PertanyaanPertanyaan
Pertanyaan
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Configuration management

  • 2. PRELIMINARY • Software configuration item (SCI) or configuration item (CI) An approved unit of software code, a document or piece of hardware that is designed for configuration management and treated as a distinct entity in the software configuration management process. • SCI version The approved state of an SCI at any given point of time during the development or maintenance process. • Software configuration version An approved selected set of documented SCI versions that constitute a software system or document at a given point of time, where the activities to be performed are controlled by software configuration management procedures. The software configuration versions are released according to the cited procedures
  • 3. (CONT’D).. The SCIs are generally placed into four classes, as follows: • Design documents • Software code • Data files, including files of test cases and test scripts • Software development tools.
  • 4. COMMON TYPES OF SOFTWARE CONFIGURATION ITEMS Design documents • Software change requests (SCRs) and software change orders (SCOs) • Software development plan (SDP) • Version description document (VDD) • System requirements document Software code • Software requirements document (SRD) • Source code • Interface design specifications • Object code • Preliminary design document (PDD) • Prototype software • Critical design document (CDD) Data files • Database description • Test cases and test scripts • Software test plan (STP) • Parameters, codes, etc. • Software test procedure (STPR) • Software test report (STR) Software development tools (the versions applied in the development and maintenance • Software user manuals stages) • Software maintenance manuals • Compilers and debuggers • Software installation plan (SIP) • Application generators • Software maintenance requests • CASE tools (including problem reports)
  • 5. SOFTWARE CONFIGURATION MANAGEMENT An SQA component responsible for applying (computerized and non-computerized) technical tools and administrative procedures that enable completion of the tasks required to maintain SCIs and software configuration versions
  • 6. TASKS AND ORGANIZATION The tasks of software configuration management may be classified into four groups: • Control software change • Release of SCI and software configuration versions • Provision of SCM information services • Verification of compliance to SCM procedures
  • 7. SOFTWARE CHANGE CONTROL Software change management controls the process of introducing changes mainly by doing the following: • Examining change requests and approving implementation of appropriate requests. • Assuring the quality of each new version of software configuration before it becomes operational.
  • 8. APPROVAL TO CARRY OUT PROPOSED CHANGES The factors affecting the decision whether to implement a proposed change include: • Expected contribution of the proposed change • Urgency of the change • Effect of the proposed change on project timetables, level of service, etc. • Efforts required in making the change operational • Required software quality assurance efforts • Estimated required professional resources and cost of performing the change.
  • 9. RELEASE OF SOFTWARE CONFIGURATION VERSIONS The need to release a new software configuration version usually stems from one or more of the following conditions: • Defective SCIs • Special features demanded by new customers • The team’s initiatives to introduce SCI improvements.
  • 10. TYPES OF SOFTWARE CONFIGURATION RELEASES Baseline versions • Baseline software configuration versions are planned early, during a system’s development or operating stage. As part of the process, they are reviewed, tested and approved, as are their SCIs Intermediate versions • When problems arise that require immediate attention – such as the need to correct defects identified in an important SCI, or perform immediate adaptation as defined in a contract with a new customer – an intermediate version of the software is often prepared.
  • 11. TYPES OF SOFTWARE CONFIGURATION RELEASES (CONT’D) Revisions • Revisions introduce minor changes and corrections to a given software configuration version. Numeration conventions for identification of SCI and software versions • Numeration conventions have been formulated to identify SCIs; the most commonly used is decimal numeration, which indicates the successive version and revision numbers and is registered accordingly
  • 12. SOFTWARE CONFIGURATION MANAGEMENT PLANS (SCMPS) The main objective of a software configuration management plan (SCMP) is to plan ahead the schedule of baseline version releases and the required resources to carry out all the activities required for the software configuration releases. Accordingly, an SCMP usually includes: • An overview of the software development project or existing software system. • A list of scheduled baseline version releases. • A list of SCIs (documents, code, etc.) to be included in each version. • A table identifying the relationship of software development project plans and maintenance plans to scheduled releases of new SCIs or SCI versions. • A list of assumptions about the resources required to perform the various activities required by the SCMP. • Estimates of the human resources and budget needed to perform the SCMP.
  • 13. SOFTWARE CONFIGURATION EVOLUTION MODELS The linear evolution model • This model is the natural choice for software systems developed to serve a single organization.The model is also applied to popular software packages, which tend to be uniform in structure, where the need to meet a wide range of maintenance demands for a single version is a great advantage. The tree evolution model • According to this model, several parallel versions of the software are developed to serve the needs of different customers simultaneously throughout the system’s life cycle. Tree models are typically applied in firmware configuration versions, where each branch serves a different product or product line.