Software Configuration Management Model
The PMBOK says the fact that the Venture Manager is liable for the next vary administration responsibilities:
Recognizing when a change has occurred.
Well, she definitely knew her stuff - but I came away considering that CM was a bit 'academic'.
How Drastically wrong Can I Be? Configuration Management is BUSINESS CRITICAL!
Therefore configuration settings on your community need to be backed up, verified for compliance with any corporate governance policy or security standard, and consistency of configs maintained across the estate.
Let's speak about alter manage inside Prince2
Changes almost always come in three categories:
Request For Evolve (RFC). This really is ordinarily a request from the customer or customers requesting a alter from what was originally requested.
Change and Configuration Administration (CCM) is the method for minimizing configuration drift by ensuring all environment settings are accepted and according to established standards. CCM is composed of three distinct practices: configuration management that is the creation, documentation and updating of ordinary settings for all supported IT components; alter management that is the method for figuring out and approving brand new configuration settings and updates; and alter detection which is an ongoing process of monitoring for inappropriate changes. Achieving compliance objectives for making certain IT infrastructure reliability necessitates automated options that address all 3 CCM disciplines.
How does it work?
To date, the growth of network system hardware has taken place at a a lot quicker rate than the equal development of network administration or community configuration management software. In a few respects it is understandable - Community Gadgets did not need managing or configuring initially as they have been black containers that either handed information or not. It was simply with the creation of shared community infrastructures like Ethernet that this configuration of addresses and protocols became essential and some consideration made of the network topology to cater for traffic flows and volumes.
Find out the secrets of configuration management here.
Donna Stahoski is our Configuration Management expert who also reveals secrets download limewire,student discount software,printable memory game on their own site.
Hiç yorum yok:
Yorum Gönder