National Academies Press: OpenBook

Configuration Management and Performance Verification of Explosives-Detection Systems (1998)

Chapter: Appendix B: Configuration Management Tools

« Previous: Appendix A: Explosives-Detection Technologies
Suggested Citation:"Appendix B: Configuration Management Tools." National Research Council. 1998. Configuration Management and Performance Verification of Explosives-Detection Systems. Washington, DC: The National Academies Press. doi: 10.17226/6245.
×

Appendix B Configuration Management Tools

The configuration management tool industry is well established in that there are a number of configuration management tools that have gained acceptance in the marketplace (e.g., Pure Atria's ClearCase, Continuus' Continuus, True Software's ADC/Pro, and Intersolv's PVCS, Starbase's StarTeam, MKS's Source Integrity, and Perforce Software's Perforce). Most of these tools are available for Unix and Windows PC platforms. Table B1 shows examples of configuration management tools.

The classification categories for configuration management tools need to match the evolution of a company's development, production, and maintenance needs. For example, a Class 1 tool would typically suit a small company or a research and development group that has a small number of releases and possibly no variant releases. A Class 2 tool would typically suit a medium- or large-sized company that did not have a lot of formal processes defined and was not focused on standards certification. They may have many variant releases and so need strong support for parallel development and build management of products and, therefore, more reliability from the configuration management repository. A Class 3 tool would typically suit a large corporation that had formal processes that need to be automated and that focused on process improvement and had developer and management and change needs similar to companies that use Class 2 tools.

TABLE B1 Examples of Client-Server Configuration Management Tools

Version-Control Tools (Class 1)

Developer-Oriented Tools (Class 2)

Process-Oriented Tools (Class 3)

Intersolv's PVCS

Pure Atria's ClearCase

Continuus' Continuus

MKS's Source Integrity

True Software's ADC/Pro

Platinum's Harvest

Starbase's StarTeam

 

SQL Software's PCMS (Product Configuration Management Software)

Microsoft's SourceSafe

 

 

Revision Control System (RCS)

 

 

Source Code Control System (SCCS)

 

 

Perforce Software's Perforce

 

 

Tower Concept's Razor

 

 

Suggested Citation:"Appendix B: Configuration Management Tools." National Research Council. 1998. Configuration Management and Performance Verification of Explosives-Detection Systems. Washington, DC: The National Academies Press. doi: 10.17226/6245.
×
Page 59
Next: Appendix C: Threat-Decision Paradigm »
Configuration Management and Performance Verification of Explosives-Detection Systems Get This Book
×
Buy Paperback | $47.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

This report assesses the configuration-management and performance-verification options for the development and regulation of commercially available Explosive Detection Systems (EDS) and other systems designed for detection of explosives. In particular, the panel authoring this report (1) assessed the advantages and disadvantages of methods used for configuration management and performance verification relative to the FAA's needs for explosives-detection equipment regulation, (2) outlined a "quality management program" that the FAA can follow that includes configuration management and performance verification and that will encourage commercial development and improvement of explosives-detection equipment while ensuring that such systems are manufactured to meet FAA certification requirements, and (3) outlined a performance-verification strategy that the FAA can follow to ensure that EDSs continue to perform at certification specifications in the airport environment.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!