How does Problem Management relate to Configuration Management?
Its related only when a configurable item having problem.
View Articleyou have done some changes to a program, how can you compare the exi
you can do a diff (p4 diff in perforce) on the program in depot vs the local working copy.
View ArticleWhat are some troubleshooting hints for Web Start applications?
Hi, Log files should help you.
View ArticleWhat is CVS(Control Version System?
CVS is a repository. It is also called Configuration management Tool. The use of CMT is to manage the code. The history of changes made to the code. This is the brief idea about the CMT. For...
View ArticleYou are working on some changes. At the same time if someone else is
Through the option of GetLatestVersion
View ArticleWhat Configuration Management tools are available?
there are many version control systems available in the market.their commercial names are as follows 1)Acurev 2)VSS(virtual source safe-not quite sure of the expansion) 3)clearcase 4)+1CM 5)CM synergy...
View ArticleDescribe how a program can be staged to the changeman package ?
goto the particular changeman package, then open it using S2 and give ST or S infront of the program, then the program will be staged
View ArticleWhat is configuration management?
files and directories under configuration management.First u setup view and used that view. This is configuration managment
View ArticleWhich version control (VC) or software configuration management (SCM
You can use Tortoise SVN,which has Merge Utility embedded in it.
View ArticleHow to create a package in changeman?
from changeman primary option menu,select 1(Build).1 (create),then it will ask for pkg details.fill those and a new pkg will be created. Important thing is specifying the release date of that package.
View ArticleWhat is subversion?
Suppose if we have released a version. Later if some more features are added to the previous version we have to create a subversion for the original version. Ex: version 1.0.0 subversion 1.1.0
View ArticleWhat is impersonation?
At times users access a resource as though they were someone else. This is known as impersonation. For example, if a web page has no access controls, then any user can access that web page. HTML pages,...
View Article
More Pages to Explore .....