La Gestion De Configuration

Total Page:16

File Type:pdf, Size:1020Kb

La Gestion De Configuration Gestion de configuration Gestion de versions L'outil Subversion > La gestion de configuration | Suivre l'´evolutionde son produit tout en travaillant en ´equipe Jean-Yves Didier Universit´ed'Evry-Val d'Essonne Jean-Yves Didier La gestion de configuration 1/42 Gestion de configuration Gestion de versions L'outil Subversion > 1 Gestion de configuration 2 Gestion de versions G´en´eralit´es Concepts 3 Subversion : un outil de gestion de version Fonctionnement g´en´eral D´eploiementde subversion Jean-Yves Didier La gestion de configuration 2/42 Gestion de configuration Gestion de versions L'outil Subversion > Probl´ematique Questions classiques • O`use trouve la derni`ereversion en cours de d´eveloppement ? • Quelle version a ´et´evalid´eeet a ´et´efabriqu´ee? • Comment d´efinirun r´ef´erentielcommun entre tous les acteurs d'un projet ? R´esolutiondes probl`emessuivants • La duplication des donn´eesnum´eriques; • La gestion des it´erationset des versions ; • La gestion des configurations ; • La cr´eationd'un r´ef´erentiel; • Le contr^olede l'acc`esaux donn´ees. Jean-Yves Didier La gestion de configuration 3/42 Gestion de configuration Gestion de versions L'outil Subversion > Gestion de configuration (1/3) D´efinition: Gestion de configuration • Instantan´edes caract´eristiquesfonctionnelles et physiques d'un syst`emecon¸cupour r´epondre `aun ensemble d'exigences • Ensemble des activit´es,manuelles ou automatis´ees, permettant d’identifier et de d´efinirles articles de configuration d'un syst`eme et toutes leurs relations ; D´efinition: Article de configuration • Ensembles et sous-ensembles du syst`emequi remplissent une fonction int´eressantles utilisateurs ; • Tout article (document papier, logiciel ou mat´eriel),contenant des informations n´ecessaires`ala r´ealisationd'un projet ou au suivi de cette derni`ere. Jean-Yves Didier La gestion de configuration 4/42 Gestion de configuration Gestion de versions L'outil Subversion > Gestion de configuration (2/3) Caract´erisation • G`erela description technique d'un syst`emeet de ses divers composants (configuration) ; • G`erel'ensemble des modifications apport´eesau cours de l'´evolutiondu syst`eme; • Adapt´eaux syst`emescomplexes. Contraintes sur les articles de configuration • Identifiables de mani`ereunivoque, localisable, archiv´es; • Description des relations de d´ependance entre articles de configuration dans leurs diff´erentesversions. Jean-Yves Didier La gestion de configuration 5/42 Gestion de configuration Gestion de versions L'outil Subversion > Gestion de configuration (3/3) Secteurs int´eress´es • Informatique ; • A´eronautique; • Automobile ; • Armement ; • ... Jean-Yves Didier La gestion de configuration 6/42 Gestion de configuration Gestion de versions L'outil Subversion > Processus affili´es`ala gestion de configuration 4 processus principaux 1 Identification : I Inventaire, identification du p´erim`etreet des composants du syst`eme. 2 Ma^ıtrisede la configuration : I Coh´erencede l'ensemble des donn´ees de la configuration pendant la dur´eede vie du produit. 3 Enregistrement des ´etatsde la configuration : I Ma^ıtrisede l'´evolutionde la configuration et de ses constituants, conservation de l'historique. 4 Audit et revue : I Ad´equationentre la configuration et les exigences formul´ees. Jean-Yves Didier La gestion de configuration 7/42 Gestion de configuration Gestion de versions L'outil Subversion > Enjeu ´economiquede la gestion de configuration Le programme Airbus A380 2005 : Airbus annonce un d´elaidans la production des A380. Probl`eme : industrialisation des c^ablages`ainstaller dans l'appareil (530 km de c^ables); Cause : probl`emesd'interop´erabilit´esentre deux versions du m^emelogiciel : Catia v4 (Espagne, Allemagne), Catia v5 (France, Angleterre) ; Cons´equences: • 18 mois de retard sur le programme ; • Surco^utdu programme : 4,8 milliards d'euros ; • P´enalit´esde retard, annulations de commandes. Jean-Yves Didier La gestion de configuration 8/42 Gestion de configuration Gestion de versions L'outil Subversion > Gestion de configuration et normalisation Normes, r´ef´erentiels,recommandations IEEE 729-1983 IEEE Standard Glossary of Software Engineering Terminology (IEEE : Institute of Electrical and Electronics Engineers); ITILv3 (2011) Information Technology Infrastructure Library (R´ef´erentielde bonnes pratiques) ; ISO/IEC 20000:2011 IT Service Management System Standard ; IEEE 828-2012 IEEE Standard for Configuration Management in Systems and Software Engineering ; RG 000101-105 Recommandations g´en´eralesa´eronautiquesdu BNAE (Bureau de Normalisation de l'A´eronautique et de l'Espace) { 2010. Jean-Yves Didier La gestion de configuration 9/42 Gestion de configuration Gestion de versions L'outil Subversion > Liens entre gestion de configuration et informatique 3 utilisations majeures • Tracer les diff´erentesversions ou r´evisionsde toute information destin´ee`a^etreutilis´ee par un syst`eme; • D´eployer les configurations `atravers un parc informatique sous forme de fichiers et donn´ees; • G´ererle code source de d´eveloppements informatiques. Jean-Yves Didier La gestion de configuration 10/42 Gestion de configuration Gestion de versions L'outil Subversion > 1 Gestion de configuration 2 Gestion de versions G´en´eralit´es Concepts 3 Subversion : un outil de gestion de version Fonctionnement g´en´eral D´eploiementde subversion Jean-Yves Didier La gestion de configuration 11/42 Gestion de configuration Gestion de versions L'outil Subversion > Gestion de versions D´efinition La gestion de versions consiste `amaintenir l'ensemble des versions d'un ensemble ou d'une arborescence de fichiers (Processus 3 de la gestion de configuration). Applications • Suivi de l'´evolutionde la documentation technique ; • Gestion d'art´efactsinformatiques (fichiers CAO, etc.) ; • Gestion du code source d'une application ; Un concept non limit´e`al'informatique Solidworks Entreprise PDM { Dassault Syst`emes. Probl´ematiquedes PLM. Jean-Yves Didier La gestion de configuration 12/42 I Logiciel de contr^olede version git. • Processus assist´epar la machine : Rendre possible une telle cadence de production • Gestion manuelle impossible ; Gestion de configuration Gestion de versions L'outil Subversion > L'exemple du noyau Linux Version 3.2 (avril 2012) De la v 3.1 `ala v 3.2 (source : h-online.com) 1 400 000 lignes modifi´ees, 14 998 651 lignes de code, 200 000 lignes ajout´ees, 37 617 fichiers, 12 608 fichiers modifi´es, 7 800 d´eveloppeurs, 73 jours, 800 entreprises. 6 correctifs/heure. Jean-Yves Didier La gestion de configuration 13/42 I Logiciel de contr^olede version git. Gestion de configuration Gestion de versions L'outil Subversion > L'exemple du noyau Linux (Sujets sensibles au vertige s'abstenir) Version 3.2 (avril 2012) De la v 3.1 `ala v 3.2 (source : h-online.com) 1 400 000 lignes modifi´ees, 14 998 651 lignes de code, 200 000 lignes ajout´ees, 37 617 fichiers, 12 608 fichiers modifi´es, 7 800 d´eveloppeurs, 73 jours, 800 entreprises. 6 correctifs/heure. Rendre possible une telle cadence de production • Gestion manuelle impossible ; • Processus assist´epar la machine : Jean-Yves Didier La gestion de configuration 13/42 Gestion de configuration Gestion de versions L'outil Subversion > L'exemple du noyau Linux (Sujets sensibles au vertige s'abstenir) Version 3.2 (avril 2012) De la v 3.1 `ala v 3.2 (source : h-online.com) 1 400 000 lignes modifi´ees, 14 998 651 lignes de code, 200 000 lignes ajout´ees, 37 617 fichiers, 12 608 fichiers modifi´es, 7 800 d´eveloppeurs, 73 jours, 800 entreprises. 6 correctifs/heure. Rendre possible une telle cadence de production • Gestion manuelle impossible ; • Processus assist´epar la machine : I Logiciel de contr^olede version git. Jean-Yves Didier La gestion de configuration 13/42 A. Bob et Alice effectuent ensemble les modifications `aapporter sur la partie `aAlice ; B. Bob effectue les modifications, les envoie `aAlice qui joue au jeu des 10 diff´erencessur les fichiers ; C. Bob et Alice utilisent un logiciel de contr^olede version, donc Bob effectue les modifications et Alice en b´en´eficieen moins de 10 secondes sans que cela d´emolisseson travail ; Gestion de configuration Gestion de versions L'outil Subversion > Sc´enario D´eveloppement en ´equipe Alice et Bob d´eveloppent de nouvelles fonctionnalit´espour un logiciel. Apr`ess'^etrepartag´esle travail, Bob s'aper¸coitque, pour que sa partie fonctionne, la partie d'Alice doit ^etremodifi´eemais Alice a d´ej`acommenc´e`atravailler. Comment vont-ils s'y prendre ? Jean-Yves Didier La gestion de configuration 14/42 B. Bob effectue les modifications, les envoie `aAlice qui joue au jeu des 10 diff´erencessur les fichiers ; C. Bob et Alice utilisent un logiciel de contr^olede version, donc Bob effectue les modifications et Alice en b´en´eficieen moins de 10 secondes sans que cela d´emolisseson travail ; Gestion de configuration Gestion de versions L'outil Subversion > Sc´enario D´eveloppement en ´equipe Alice et Bob d´eveloppent de nouvelles fonctionnalit´espour un logiciel. Apr`ess'^etrepartag´esle travail, Bob s'aper¸coitque, pour que sa partie fonctionne, la partie d'Alice doit ^etremodifi´eemais Alice a d´ej`acommenc´e`atravailler. Comment vont-ils s'y prendre ? A. Bob et Alice effectuent ensemble les modifications `aapporter sur la partie `aAlice ; Jean-Yves Didier La gestion de configuration 14/42 C. Bob et Alice utilisent un logiciel de contr^olede version, donc Bob effectue les modifications et Alice en b´en´eficieen moins de 10 secondes sans que cela d´emolisseson travail ; Gestion de configuration Gestion de versions L'outil Subversion > Sc´enario D´eveloppement en ´equipe Alice et Bob d´eveloppent de nouvelles fonctionnalit´espour un logiciel. Apr`ess'^etrepartag´esle travail, Bob s'aper¸coitque, pour que sa partie fonctionne, la partie d'Alice doit ^etremodifi´eemais Alice a d´ej`acommenc´e`atravailler. Comment vont-ils s'y prendre ? A. Bob et Alice effectuent ensemble les modifications `aapporter sur la partie `aAlice ; B. Bob effectue les modifications, les envoie `aAlice qui joue au jeu des 10 diff´erencessur les fichiers ; Jean-Yves Didier La gestion de configuration 14/42 Gestion de configuration Gestion de versions L'outil Subversion > Sc´enario D´eveloppement en ´equipe Alice et Bob d´eveloppent de nouvelles fonctionnalit´espour un logiciel.
Recommended publications
  • Command Line Interface
    Command Line Interface Squore 21.0.2 Last updated 2021-08-19 Table of Contents Preface. 1 Foreword. 1 Licence. 1 Warranty . 1 Responsabilities . 2 Contacting Vector Informatik GmbH Product Support. 2 Getting the Latest Version of this Manual . 2 1. Introduction . 3 2. Installing Squore Agent . 4 Prerequisites . 4 Download . 4 Upgrade . 4 Uninstall . 5 3. Using Squore Agent . 6 Command Line Structure . 6 Command Line Reference . 6 Squore Agent Options. 6 Project Build Parameters . 7 Exit Codes. 13 4. Managing Credentials . 14 Saving Credentials . 14 Encrypting Credentials . 15 Migrating Old Credentials Format . 16 5. Advanced Configuration . 17 Defining Server Dependencies . 17 Adding config.xml File . 17 Using Java System Properties. 18 Setting up HTTPS . 18 Appendix A: Repository Connectors . 19 ClearCase . 19 CVS . 19 Folder Path . 20 Folder (use GNATHub). 21 Git. 21 Perforce . 23 PTC Integrity . 25 SVN . 26 Synergy. 28 TFS . 30 Zip Upload . 32 Using Multiple Nodes . 32 Appendix B: Data Providers . 34 AntiC . 34 Automotive Coverage Import . 34 Automotive Tag Import. 35 Axivion. 35 BullseyeCoverage Code Coverage Analyzer. 36 CANoe. 36 Cantata . 38 CheckStyle. ..
    [Show full text]
  • Analysis of Devops Tools to Predict an Optimized Pipeline by Adding Weightage for Parameters
    International Journal of Computer Applications (0975 – 8887) Volume 181 – No. 33, December 2018 Analysis of DevOps Tools to Predict an Optimized Pipeline by Adding Weightage for Parameters R. Vaasanthi V. Prasanna Kumari, PhD S. Philip Kingston Research Scholar, HOD, MCA Project Manager SCSVMV University Rajalakshmi Engineering Infosys, Mahindra City, Kanchipuram College, Chennai Chennai ABSTRACT cloud. Now-a-days more than ever, DevOps [Development + Operations] has gained a tremendous amount of attention in 2. SCM software industry. Selecting the tools for building the DevOps Source code management (SCM) is a software tool used for pipeline is not a trivial exercise as there are plethora’s of tools development, versioning and enables team working in available in market. It requires thought, planning, and multiple locations to work together more effectively. This preferably enough time to investigate and consult other plays a vital role in increasing team’s productivity. Some of people. Unfortunately, there isn’t enough time in the day to the SCM tools, considered for this study are GIT, SVN, CVS, dig for top-rated DevOps tools and its compatibility with ClearCase, Mercurial, TFS, Monotone, Bitkeeper, Code co- other tools. Each tool has its own pros/cons and compatibility op, Darcs, Endevor, Fossil, Perforce, Rational Synergy, of integrating with other tools. The objective of this paper is Source Safe, and GNU Bazaar. Table1 consists of SCM tools to propose an approach by adding weightage to each with weightage. parameter for the curated list of the DevOps tools. 3. BUILD Keywords Build is a process that enables source code to be automatically DevOps, SCM, dependencies, compatibility and pipeline compiled into binaries including code level unit testing to ensure individual pieces of code behave as expected [4].
    [Show full text]
  • Ansys SCADE Lifecycle®
    EMBEDDED SOFTWARE Ansys SCADE LifeCycle® SCADE LifeCycle is part of the Ansys Embedded Software family of products and solutions that includes modules providing unique support for application lifecycle management. This product line features requirements traceability via Application Lifecycle Management (ALM) tools, traceability from models, configuration and change management, and automatic documentation generation. SCADE LifeCycle enhances the functionalities of Ansys SCADE® tools with add-on modules that bridge SCADE solutions and Requirement Management tools or PLM/ALM (Product Lifecycle Management/ Application Lifecycle Management) tools. With SCADE LifeCycle, all systems and software teams involved in critical applications development can manage and control their design and verification activities across the full life cycle of their SCADE applications. / Requirements Traceability SCADE LifeCycle Application Lifecycle Management (ALM) Gateway provides an integrated traceability analysis solution for safety-critical design processes with SCADE Architect, SCADE Suite, SCADE Display, SCADE Solutions for ARINC 661 and SCADE Test: • Connection to ALM tools: linkage to DOORS NG, DOORS (9.6 and up) Jama Connect, Siemens Polarion, Dassault Systèmes Reqtify 2016. • Graphical creation of traceability links between requirements or other structured documents and SCADE models. • Traceability of test cases from SCADE Test Environment projects. • Bidirectional navigation across requirements and tests. • Customizable Export of SCADE artifacts to DOORS or Jama Connect. • Compliant with DO-178B, DO-178C, EN 50128, IEC 61508, ISO 26262, and IEC 60880 standards. EMBEDDED SOFTWARE / SCADE LifeCycle® // 1 / Project Documentation Generation SCADE LifeCycle Reporter automates the time-consuming creation of detailed and complete reports from SCADE Suite, SCADE Display, SCADE Architect and SCADE UA Page Creator for ARINC 661 designs through: • Generation of reports in RTF or HTML formats.
    [Show full text]
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • Les Outils Qui Nous Veulent Du Bien Plus De Temps Pour Développer En Labview
    Les outils qui nous veulent du bien Plus de temps pour développer en LabVIEW Rhône-Alpes LUG : Rencontre développeurs 04/07/2013 Luc DESRUELLE – Certifié LabVIEW Architect - MESULOG www.mesulog.fr La société MESULOG en bref Activité : Développement logiciel test et mesure Compétences : LabVIEW (Windows, RT, DSC, PDA, FPGA), TestStand Localisation : Grenoble (Moirans, 38) Partenaire National Instruments (2001) Développeurs certifiés LabVIEW et TestStand www.mesulog.fr (exemples de réalisation) Juillet 2013 Les logiciels qui vous veulent du bien 2 La société MESULOG en bref Ils nous ont fait confiance : AREVA T&D ALSTOM Grid ATMEL BEAMIND CEA (Commissariat à l'Énergie Atomique) CETIAT (Centre Technique des Industries Aérauliques et Thermiques) CNES (Centre National d'Études Spatiales) CNRS (Centre National de la Recherche Scientifique) EDF HONEYWELL Security LNE (Laboratoire National d'Essais) NIST (National Institute of Standards and Technology) NMIJ (National Metrology Institute of Japan) PECHINEY RADIALL STMicroelectronics THALES VALEO ... Juillet 2013 Les logiciels qui vous veulent du bien 3 Le présentateur CLA FORUMS Chef Projet Luc DESRUELLE Juillet 2013 Les logiciels qui vous veulent du bien 4 Le constat Le constat Juillet 2013 Les logiciels qui vous veulent du bien 5 Le constat Départ gestion projet Gestion projet : VITE Faire vite Juste avec ou bien? Coder BIEN BIEN vite ou bien un bloc notes Gestion Projet : Spécifications VITE Réalisation Tâches et Gestion code source Livrer Tests du code code Livrables
    [Show full text]
  • Rational DOORS Installation Guide Release 9.2
    IBM Rational DOORS Rational DOORS Installation Guide Release 9.2 Rational DOORS Rational DOORS Integration Products Before using this information, be sure to read the general information under the "Notices" chapter on page 107. This edition applies to IBM Rational DOORS, VERSION 9.2, and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1993, 2009 US Government Users Restricted Rights—Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Table of contents Chapter 1: About this manual 1 Chapter 2: Introduction 3 What is Rational DOORS? . 3 What types of Rational DOORS installation can I have? . 5 What are the licensing options?. 6 What next? . 6 Chapter 3: New installation of Rational DOORS on Windows 9 Installing the Rational DOORS database server . 9 Installing the Rational DOORS client. 12 Installing Rational DOORS for Rational Quality Manager Interface . 14 The Rational DOORS for Rational Quality Manager Interface client . 15 The Rational DOORS for Rational Quality Manager Interface server . 16 Silent installation . 18 Starting Rational DOORS . 19 For installations that point to an empty data folder . 19 For installations that point to existing Rational DOORS data . 20 RDS, the Rational DOORS database and UUIDs . 20 tds_valid_id.txt . 21 tds_registered.txt . 21 Installing the Rational DOORS Example Data . 21 Uninstalling Rational DOORS . 22 Chapter 4: Upgrading from version 9.0 and later 23 Information for users upgrading to Rational DOORS 9.2 from 9.0 and 9.1 . 23 Data migration. 23 Licensing . 23 Compatibility between version 9.0 and Rational DOORS 9.2 .
    [Show full text]
  • Introduction to Rational Synergy Release 7.1 Before Using This Information, Be Sure to Read the General Information Under Appendix A, “Notices” on Page 55
    Introduction to Rational Synergy Release 7.1 Before using this information, be sure to read the general information under Appendix A, “Notices” on page 55. This edition applies to VERSION 7.1, Rational Synergy (product number MN-SCM-IV-ICM70-08-01) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1992, 2009 US Government Users Restricted Rights—Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. ii Introduction to Rational Synergy Table of Contents Chapter 1: Introduction 1 Transitioning from other tools. 1 Conventions . 2 Rational Synergy graphical user interfaces . 2 Rational Synergy command line interface. 2 Typefaces and symbols . 2 Contacting IBM Rational Software Support . 3 Prerequisites . 3 Submitting problems. 3 Chapter 2: Benefits of using Rational Synergy 7 Goals of a configuration management tool . 7 Rational Synergy benefits . 8 Easy to use, right out of the box . 8 Fast start-up . 8 Rapid productivity for new users . 9 Flexible, automated workflow . 9 Secure team engineering environment . 10 World-wide control and transfer of information . 10 Seamless integrations for Windows development . 12 Chapter 3: Rational Synergy terminology 13 The Rational Synergy database. 13 Tasks and objects . 13 More about objects . 16 The check out and check in operations . 16 History. 18 Properties. 18 Current task. 18 Users, lifecycles, and states. 19 Introduction to Rational Synergy iii Projects and project groupings . 20 Directories and candidates . 22 The work area . 22 The synchronize operation . 23 Using, creating, adding, deleting, or removing objects . 23 Update, baseline, tasks, and process rules .
    [Show full text]
  • IBM Rational Synergy V7.2 and IBM Rational Change V5.3 Offer Architectural and Functional Improvements to Address Changing Needs
    IBM United States Software Announcement 211-038, dated May 3, 2011 IBM Rational Synergy V7.2 and IBM Rational Change V5.3 offer architectural and functional improvements to address changing needs of enterprise Change and Configuration Management Table of contents 1 Overview 7 Technical information 2 Key prerequisites 10 Ordering information 2 Planned availability date 18 Terms and conditions 2 Description 19 Prices 7 Program number 20 Order now 7 Publications At a glance In today's global economy, innovation holds the key to survival and growth. Organizations are profiting from skills and capital arbitrage through distributed resources. To support these dispersed, collaborative teams, organizations need a unifying platform for maximized value creation. IBM® Rational® Synergy and IBM Rational Change together: • Provide centralized Change and Configuration Management platform • Bring together globally distributed teams • Enable alignment of your technology investments with complex business demands to improve quality, accountability, and traceability From bottom to top support for achieving agility through task-based configuration management, advanced Software Change Management (SCM) and component- based development capabilities to a top-down approach using a Central CM platform, you can ensure that all processes for the development and delivery of software, systems, and IT, can be defined, implemented, automated, visualized, and thus, managed. Out-of-the-box Enterprise Change processes, reports, and lifecycles assist your organization with Six Sigma metrics and provide a fully integrated solution that brings together software development, IT, and other sources of change and software development for effective decision making. For ordering, contact your IBM representative, an IBM Business Partner, or IBM Americas Call Centers at 800-IBM-CALL (Reference: AE0001 ).
    [Show full text]
  • IBM Rational Synergy DCM-GUI
    IBM Rational Synergy DCM-GUI Release 7.2.1.1 IBM® Rational® Synergy - 1 - This edition applies to IBM Rational Synergy version 7.2.1.1, and to all subsequent releases and modifications until otherwise indicated in new editions. Before using this information, be sure to read the general information under Appendix: Notices on last section. © Copyright IBM Corporation 2014 US Government Users Restricted Rights – Use, duplication, or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM® Rational® Synergy - 2 - Contents Introduction........................................................................................................................4 Intended audience............................................................................................................4 Sources of DCM information..........................................................................................4 How this manual is organized..........................................................................................4 References used in this manual........................................................................................5 Overview of DCM..............................................................................................................6 About DCM.....................................................................................................................6 Features............................................................................................................................6 Terms and concepts.........................................................................................................7
    [Show full text]
  • Parasoft C/C++Test
    Parasoft C/C++test UNIFIED C AND C++ DEVELOPMENT TESTING GET A FREE TRIAL https://www.parasoft.com/ctest Deliver C and C++ FUNCTIONAL SAFETY AND COMPLIANCE ANALYZE HOST-BASED software that’s robust, Parasoft C/C++test provides everything you AND TARGET-BASED need to comply with industry standards: predictable, and secure. C AND C++ CODE CERTIFIED SOFTWARE Manage risk and costs by building better Parasoft C/C++test is certified by TÜV SÜD Increase the Quality of Complex software. Static analysis and unit testing for functional safety according to IEC 61508, Embedded C/C++ Software are critical for application quality, securi- IEC 62304, and ISO 26262 standards, Reduce the risk of complex embedded ty, and safety, and the cornerstone of any helping development teams achieve the software, leveraging comprehensive connected-application development initi- desired safety integrity level (SIL/ASIL). C and C++ coding best practices (e.g. ative today. MISRA C/C++, AUTOSAR C++, JSF) and Parasoft C/C++test is a unified testing QUALIFICATION KITS a powerful unit testing framework for solution that helps you identify defects To streamline the process of tool verification, both your host and target platforms. earlier and reduce the overall burden C/C++test Qualification Kits are available of achieving compliance with standards for DO-178B/C, DO-330, ED-12B/C, ISO- Mitigate the Security Risk from such as AUTOSAR, MISRA, ISO 26262, 26262, IEC-61508, and EN-50128, and other Connected IoT Devices DO-178B/C, IEC 61508, and IEC 62304. safety standards. These kits are customized Ensure the consistent application of for your specific environment and usage C/C++test helps organizations reduce security best practices (CERT, CWE, requirements, ensuring you have all the risk, cut costs, increase productivity, and OWASP) and integrate with API-level documentation required for verification.
    [Show full text]
  • Technical Data Sheet ®  SCADE Lifecycle R16
    Technical Data Sheet ® SCADE LifeCycle R16 SCADE LifeCycle is a product line of the ANSYS® Embedded software family of products and solutions that includes Requirements Management and modules combining a unique support for application lifecycle management. Traceability This product line features requirements traceability management, configuration and change management, SCADE LifeCycle Requirements Management Gateway automatic documentation generation, and project provides a complete traceability solution1 for safety-critical monitoring. design process with SCADE System, SCADE Suite, SCADE SCADE LifeCycle enhances the Display, and SCADE Test: functionalities of SCADE System®, SCADE Suite®, SCADE Display®, and SCADE Test with add-on modules that embed architecture and design activities within your whole Product/Application Lifecycle Management framework. With SCADE LifeCycle, all systems and software teams involved in critical applications Current Selection (Level N) development can manage and control their design and Central Column contains all documents verification activities across the full life cycle of their Upstream Information (N-1) = Downstream Information (N+1) What is covered by selection in = What is covering the selection SCADE® applications. the central column in the central column Read more about SCADE LifeCycle: • “Requirements Management and Traceability” • Capture of requirements and functional tests in a wide • “Project Metrics Dashboard” array of tools and formats: • ® ® ® ® • “Project Documentation Generation” Microsoft
    [Show full text]
  • NNJ09HD46C Section J-10B155 - MCCS ATTACHMENT J-10
    NNJ09HD46C Section J-10b155 - MCCS ATTACHMENT J-10 Product Version Qty Vendor Under Maintenance/ Maintenance Vendor Maintenance Type (Manufacturer) Support? (Yes or No) Freeflyer Engineer Network License 6 a.i. solutions Yes a.i. solutions 24x7 subscription/support Freeflyer Mission Network License 48 a.i. solutions Yes a.i. solutions 24x7 subscription/support InstallShield 2010 Exp Win 10 Acresso Software No True Image ECHO Enterprise Server 1 Acronis Software No Komodo IDE 5 license 2 ActiveState No Komodo IDE Single License 2 ActiveState No ActiveXperts Network Monitor- 1 ActiveXperts SW Yes SHI 24x7 Actual Multiple Monitor Software 562 Actual Tools Yes SHI 24x7 subscription License GNAT Pro Ada native environment to 1 AdaCore Software Yes AdaCore Software 24x7 subscription/support develop Ada software (including Ada Acrobat Pro Windows 9 8 Adobe No Creative Suite Web Premium 5.5 15 Adobe No Dreamweaver CS5 11 1 Adobe No Flash Builder Premium for 4.5 1 Adobe No Mac/Windows FrameMaker 34 Adobe Yes SHI subscription FrameMaker 10 10 Adobe No Photoshop CS5 12 6 Adobe No pRTI 1516, 5 Fed 1 AEgis Technologies Yes AEgis Technologies 12x5 subscription/support XMLSpy Mission Kit 2013 R2 1 Altova Yes SHI 24x7 subscription/websupport XMLSpy Professional Ed. 2013 R2 1 Altova Yes SHI 24x7 subscription/websupport Amergent Software 1 Amergent Yes Amergent 24x7 subscription/support 4DX 13 Analytical Graphics Yes Analytical Graphics 24x7 Inc Inc subscription/websupport 4DX 2 Analytical Graphics Yes Analytical Graphics 24x7 Inc Inc subscription/websupport
    [Show full text]