1 System Configuration Management EMGT 587 Wasson Ch 42 Steve Chenoweth Right – Wikipedia’s IDEF0 image of the configuration management process. From

Slides:



Advertisements
Similar presentations
1 Safety People - Safety Staff Requirements April 2006.
Advertisements

Title (Don’t forget to include images on this slide!) Type your name here.
Basic requirements At least 8 slides 1 introduction slide with your name, topic and an image 1 side by side slide for each piece of evidence (6 evidence.
1 Update on Learning By Observation Learning from Positive Examples Only Tolga Konik University of Michigan.
Configuration Management Managing Change. Points to Ponder Which is more important?  stability  progress Why is change potentially dangerous?
1 Steve Chenoweth Tuesday, 10/04/11 Week 5, Day 2 Right – Typical tool for reading out error codes logged by your car’s computer, to help analyze its problems.
Configuration management. Reasons for software configuration management  it facilitates the ability to communicate  status of documents, coding, changes.
Heuristic Evaluation IS 485, Professor Matt Thatcher.
1 Questions? CSSE Requirements Steve Chenoweth Department of Computer Science & Software Engineering RHIT Session 6 – Wed, July 18, 2007 Above –
Scientific Method Existing Knowledge Scientific Curiosity Hypothesis Logical Analysis “Proof” from Deiter: Engineering Design; A Materials and Processing.
Agenda Typical process flow for Action Items New fields and metrics now available “Status” field nuances Revised notification New reporting Interacting.
Chapter 2 - Overview of the Systems Engineering Design Process1 Aerospace Systems Engineering Chapter 2 - Overview of the Systems Engineering Design Process.
© Module 5—Safety and Health Training Safety Management Worksite Analysis Management Commitment and Employee Involvement Hazard Prevention and.
Cloud Control Senior Project Summer Overview Cloud Control is a platform to control data transmission to/from internet connected devices from the.
CEN th Lecture CEN 4021 Software Engineering II Instructor: Masoud Sadjadi Release Management.
UBSCO-PPMS Maintenance Training Manuals
1 Portfolio Management – Agile How to plan like a VP Highsmith, Ch 12 CSSE579 Session 6 Part 2 One company’s software product portfolio.
ISO Tor Stålhane IDI / NTNU. What is ISO ISO 9001 was developed for the production industry but has a rather general structure ISO describes.
Information Architecture Linden Daniels. Steps of a Successful Information Architecture Discovery Education Design Migration Monitor.
1 Configuration Management “The Cookbook Approach”
The Guide to the Software Engineering Body of Knowledge
Configuration Management (managing change). Starter Questions... Which is more important?  stability  progress Why is change potentially dangerous?
1 10/14/2015ã 2007, Spencer Rugaber The Waterfall Process Software plans and requirements Validation System feasibility Validation Product design Verification.
Usability Testing Chapter 6. Reliability Can you repeat the test?
WEEK 1, DAY 2 STEVE CHENOWETH CSSE DEPT CSSE 533 –INTRO TO MONGODB.
AN INTRODUCTION The Basics of Rhetoric. Learning Targets Target 1: I can define rhetoric. Target 2: I can use the three rhetorical analysis questions.
WSM Administrator Training. WSM Administrator Discussion of WSM Administrator responsibilities Discussion of WSM administrative interfaces Detailed discussion.
Software Engineering COSC 4460 Class 4 Cherry Owen.
Week 6 - Systems Engineering and Analysis
Week 7 - Systems Engineering and Analysis
› Newspaper › Subscribed news letters › Word of mouth › › TV.
Chapter 4 Review Chad Hagstrom CS 310 Spring 2008.
Different Types of HCI CLI Menu Driven GUI NLI
Maintaining and Sustaining System Integrity Configuration Management for Transportation Management Systems Configuration management (CM) describes a series.
Styles of User Interface. Learning Objectives: By the end of this topic you should be able to: describe the characteristics of different styles of user.
PICTURE EXCHANGE COMMUNICATION SYSTEM (PECS) Teresa Robinson EDS 685 Practicum Early Childhood Special Education.
LAB SAFETY LESSON. Mystery…in the Lab Crime Scene Walk-Through  Pictures included on following slides for absent students.
Qualification & Training of Work Planners Steven K. Little Work Control Department Manager.
Evaluation Question 4? HOW DID YOU USE MEDIA TECHNOLOGIES IN THE CONSTRUCTION AND RESEARCH, PLANNING AND EVALUATION STAGES?
This is your Title Slide Name & Class Period Title of Project At least 1 topic related picture.
Task Analysis. Question to Consider What skills and information are necessary to address the identified needs? What knowledge does the expert have that.
How to do a great Power Point Document. The Principles 1. The audience should focus on YOU, not the screen 2. Keep it simple! Both text and visual layout.
1 Steve Chenoweth EMGT 587 Or, It’s doomsday, did you have any plans?
User Support. The need for user support More support needed because: Computers become ever more powerful The software that runs on them becomes ever more.
Horizon Photo-mote. ability to access photographs and images stored online, with the aid of a wireless remote remote enables the user to identify and.
EMIS Chapter 5 Much of Chap 5 and 6 varies depending on the contract type. Two major types are important so we’ll digress to Contracting 101 for.
Core LIMS Training: Entering Experimental Data – Simple Data Entry.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Software Configuration Management
Software and Systems Integration
Name of Georgia State Symbol
Indiana U t Wendy Balmer
Sample Presentation. Slide 1 Info Slide 2 Info.
Team members: Project Manager: Facilitator: Customer Liason:
Training Personal Accountability "אני אחראי על הלמידה והפיתוח שלי..."
Business Information Systems
DO NOW: Please turn both of these images into a meme by adding text.
Meeting, training & teaching in the interactive iWorld
Presentation Title INSTRUCTIONS:
Operations Software Bryan Butler.
Baseline – IEEE definition
Insert picture of item #1 here.
CS 350 – Software Design Principles and Strategies – Chapter 14
Presenter Department Affiliation Date of Presentation
Workshop 1: Processing Facility Configuration Information
TOPIC: (insert here) INSERT STUDENT NAMES HERE.
Presentation Title INSTRUCTIONS:
YOUR TITLE GOES HERE.
Today’s Agenda Dealing with Vendors Consultants Contracts
How to get started & What you need to know
Presentation transcript:

1 System Configuration Management EMGT 587 Wasson Ch 42 Steve Chenoweth Right – Wikipedia’s IDEF0 image of the configuration management process. From /Configuration_management. /Configuration_management

2 A few slides about this topic It’s a system-wide accountability – Thus, a Systems Engineer thing to do – Fits in with system testing, acceptance testing, etc. – Also fits with white-box testing of interfaces, etc. An architectural activity – Did we pick the right one? – Do the interfaces work? The development config also is an issue! So is documentation…

3 Baselines First one – approved requirements Thereafter – configuration control = control of every piece of info or product that goes into the system. Also includes managing expectations. And the project setup – like communications. Endless list of “items”

4 Issues – p 492 Configuration identification knowledge for most SEs typically comes from informal exposure via verbal discussions in meetings, on-the-job- training (OJT), and observation over many years. Most engineers have little or no training in the principles of configuration management; most are selftaught through observation and knowledge of general CM standards. By these means they feel able to proclaim themselves to be configuration experts.

5 The world of configurations

6 Where’s the info come from?

7 In long-lived products, stuff moves around…

8 A typical config picture

9 How many reviews to get it right?