当前位置:网站首页>Discrimination of configuration, software configuration items and software configuration management items
Discrimination of configuration, software configuration items and software configuration management items
2022-06-25 08:36:00 【AbelZ_ 01】
During software configuration management , Configuration items need to be identified , Refer to the documents of other companies or just look at GJB The explanation of the terms in it is easy to be confused , This passage GB、GJB Differentiation and analysis , Final description of the configuration 、 Software configuration items 、 The concept of software configuration management items
A term is used to explain
GB/T 11457-2006 Software engineering terminology
To configure
a) Computer system 、 Components or networks according to the characteristics of their functional components 、 Number 、 The arrangement defined by the main features and interactive connections . Specifically speaking , The term configuration can refer to hardware configuration or software configuration ;
b) In configuration management , Hardware developed in the technical documentation and embodied in the product 、 Software functions and ( or ) physical characteristics .
Configuration item Hardware designed for configuration management 、 Software or a combination of both , It is treated as a single entity in the configuration management process .
Computer software configuration items A collection of software designed for configuration management , It is in the configuration management process , Treat as an entity .
Software configuration management items
Various related items of software configuration items under software configuration management . Including various management documents 、 Review records and documents 、 Software documentation 、 Source code and its executable code 、 System software, support software and various relevant data required for operation .
GJB 5235 Military software configuration management
software configuration Documents in various forms and versions produced at various stages of the software life cycle 、 Program 、 A collection of data and environments .
Software configuration items Software components viewed as a unit for configuration management purposes , It is usually an element in the software configuration .
GJB 2786A-2009 General requirements for the development of military soft waxes
Computer software configuration items
The software set that meets the final use requirements and is designated by the demander for independent configuration management . The selection of computer software configuration items is based on the trade-offs of the following factors : software function 、 scale 、 Host or target computer 、 Developer 、 Security plan 、 Reuse plan 、 Key 、 Interface considerations 、 Need to document and control separately 、 And other factors .
As can be seen from the above ,GB/T 11457 And GJB 2786A The concept of software configuration items is the same , and GJB 5235 Really different , How should we understand ?
A focus on GJB 5235 Mentioned : It is usually an element in the software configuration , This half sentence is obviously contrary to the other two standards , The author thinks that this standard wants to express “ Hierarchical management ” The concept of , For simple software projects , What it says “ Configuration item ” It's actually “ Configuration management items ”.
Let's look at the relationship between these standards ,GJB 2786、5235 All quote GB/T 11457, So we need to With GB/T 11457 Subject to .
Conclusion
With GB/T 11457-2006 Software engineering terminology As defined in
To configure
a) Computer system 、 Components or networks according to the characteristics of their functional components 、 Number 、 The arrangement defined by the main features and interactive connections . Specifically speaking , The term configuration can refer to hardware configuration or software configuration ;
b) In configuration management , Hardware developed in the technical documentation and embodied in the product 、 Software functions and ( or ) physical characteristics .
Configuration item Hardware designed for configuration management 、 Software or a combination of both , It is treated as a single entity in the configuration management process .
Computer software configuration items A collection of software designed for configuration management , It is in the configuration management process , Treat as an entity .
Software configuration management items
Various related items of software configuration items under software configuration management . Including various management documents 、 Review records and documents 、 Software documentation 、 Source code and its executable code 、 System software, support software and various relevant data required for operation .
Digression
《 Measures for the Standardization Administration of the national defense industry 》
Article 8. The standards of the military industry shall not conflict with the national standards and the national military standards . When the national standard 、 When the national military standards meet the requirements , No longer formulate military industry standards .
Article 18 And national standards 、 The national military standards are the military industry standards with overlapping, repeated and contradictory , It shall be abolished by the competent department of national defense industry ”
边栏推荐
- 软件确认测试有什么作用?确认测试报告的价格是多少?
- Stimulsoft Ultimate呈现报告和仪表板
- How to interpret the information weight index?
- Remove headers from some pages in a word document
- What does openid mean? What does "token" mean?
- How is the ISM model analyzed?
- Wechat applet introduction record
- 在网上股票开户安全吗?证券账户可以给别人用吗?
- Bluecmsv1.6- code audit
- Is there any risk in making new bonds
猜你喜欢

leetcode. 13 --- Roman numeral to integer

堆栈认知——栈溢出实例(ret2libc)

面试前准备好这些,Offer拿到手软,将军不打无准备的仗

检测点是否在多边形内

Various synchronous learning notes

UEFI:修复 EFI/GPT Bootloader

C language "Recursion Series": recursively realizing the n-th power of X

Super simple case: how to do hierarchical chi square test?

Daily question brushing record (III)

【515. 在每个树行中找最大值】
随机推荐
初识生成对抗网络(11)——利用Pytorch搭建WGAN生成手写数字
How to calculate the information entropy and utility value of entropy method?
4 reasons for adopting "safe left shift"
Wechat applet opening customer service message function development
[QT] qtcreator shortcut key and QML introduction
Stimulsoft Ultimate呈现报告和仪表板
Hyper-v:Hyper-v 第 1 代或第 2 代虚拟机
是否可以给数据库表授予删除列对象的权限?为什么?
EasyPlayer流媒体播放器播放HLS视频,起播速度慢的技术优化
35岁腾讯员工被裁员感叹:北京一套房,存款700多万,失业好焦虑
Almost taken away by this wave of handler interview cannons~
家庭服务器门户Easy-Gate
About i/o -- the relationship between memory and CPU and disk
How to calculate the correlation coefficient and correlation degree in grey correlation analysis?
股票网上开户安全吗?小白求指导
Various synchronous learning notes
Is it safe to open an account for stocks on the Internet? Can the securities account be used by others?
Super simple case: how to do hierarchical chi square test?
Word2vec, phrases, phraser, keyedvectors commonly used in gensim
在哪个平台买股票开户安全?求分享