ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Configuration management : theory, practice, and application

دانلود کتاب مدیریت پیکربندی: تئوری، عمل و کاربرد

Configuration management : theory, practice, and application

مشخصات کتاب

Configuration management : theory, practice, and application

ویرایش: 2 
نویسندگان: ,   
سری:  
ISBN (شابک) : 9780367137250, 0367137259 
ناشر:  
سال نشر: 2019 
تعداد صفحات: 454 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 19 مگابایت 

قیمت کتاب (تومان) : 36,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 6


در صورت تبدیل فایل کتاب Configuration management : theory, practice, and application به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مدیریت پیکربندی: تئوری، عمل و کاربرد نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مدیریت پیکربندی: تئوری، عمل و کاربرد

این کتاب یک رویکرد جامع برای مدیریت پیکربندی از دیدگاه های مختلف توسعه محصول، از جمله جاسازی شده و فناوری اطلاعات، ارائه می دهد. با توجه به گزینه های پیکربندی، توصیه های معتبری در مورد نحوه گسترش محصولات برای بازارهای مختلف ارائه می دهد. این کتاب همچنین اهمیت مدیریت پیکربندی را برای سایر بخش‌های سازمان توضیح می‌دهد. این یک نمای کلی از مدیریت پیکربندی و عناصر فرآیند آن ارائه می‌کند تا درک متنی از تئوری، عمل و کاربرد CM را در اختیار خوانندگان قرار دهد. این کتاب تعامل پیکربندی و مدیریت داده با تمام منابع سازمانی را در هر مرحله از چرخه عمر محصول نشان می‌دهد.


توضیحاتی درمورد کتاب به خارجی

The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. The book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle.



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Dedication
Contents
List of Equations
List of Figures
List of Tables
Foreword to the Second Edition
Preface
Acknowledgments
Authors
Chapter 1: Overview of the Product Life Cycle
	1.1. Questions Answered in this Chapter
	1.2. Introduction
	1.3. Phases
		1.3.1. Development
		1.3.2. Introduction
		1.3.3. Growth
		1.3.4. Maturity
		1.3.5. Decline
		1.3.6. After the Decline
	1.4. CM and the Dynamics of Change
		1.4.1. Survivability Conditions
		1.4.2. Evolution of the Horseless Carriage
			1.4.2.1. A Look at the Converging Technologies
		1.4.3. Product Market Adaptation
		1.4.4. Product Performance Adaptation
	1.5. CM and Market Adaptations
		1.5.1. Mass Customization
		1.5.2. Performance Adaptations
			1.5.2.1. Adaptive Radiation
			1.5.2.2. New Drawing versus New Dash Number
			1.5.2.3. Design Reuse versus Common Design
	1.6. Share Design Decision
Chapter 2: Overview of the Supporting Enterprise Infrastructure
	2.1. Questions Answered in this Chapter
	2.2. Introduction
	2.3. Information Technology
		2.3.1. A Brief History of Information and Information Security
			2.3.1.1. Examples of Capability Demand
			2.3.1.2. Examples of Capacity Demand
		2.3.2. Stability of Internal Infrastructure
			2.3.2.1. GTS Backbone
			2.3.2.2. Application Deployment
			2.3.2.3. Software Methodologies
			2.3.2.4. Software Adaptation
			2.3.2.5. GTS System Security
			2.3.2.6. Platform Transitions
			2.3.2.7. GTS Case Studies
	2.4. Overhead, General and Administrative, and Other Cost Elements
	2.5. Intellectual Property
		2.5.1. What Is IP?
		2.5.2. What Drives IP?
			2.5.2.1. Internal
			2.5.2.2. External
		2.5.3. How It Applies to CM
		2.5.4. Why Is It Necessary?
		2.5.5. IP and Legal Documentation (Incarnations or Permutations of the Design)
	2.6. International Traffic in Arms Regulations
		2.6.1. Counterfeit Products Circa 800
		2.6.2. Counterfeit Items Circa 2010s
Chapter 3: Configuration Management and Product Management
	3.1. Questions Answered in this Chapter
	3.2. Introduction
	3.3. Marketing
		3.3.1. Product
		3.3.2. Price
		3.3.3. Promotion
		3.3.4. Place
		3.3.5. Marketing and Market Research
		3.3.6. Customer Interface
		3.3.7. Market Segmentation
	3.4. Increasing the Complexity of the Product
		3.4.1. Embedded Software
			3.4.1.1. Embedded Firmware
			3.4.1.2. Physical Attributes of Software Not Visible
			3.4.1.3. Capabilities of Software Not Externally Obvious
		3.4.2. Embedded Hardware
			3.4.2.1. Embedded Hardware Attributes Not Readily Visible
			3.4.2.2. Capabilities of Hardware Not Obvious Though Implied
		3.4.3. System Complexity
	3.5. Distributed Product Development
		3.5.1. Outsourced Coordinated Development
	3.6. Hardware Heritage
Chapter 4: A Configuration Item and What It Implies
	4.1. Questions Answered in this Chapter
	4.2. Introduction
	4.3. Serialization
	4.4. Traceability
	4.5. Higher Level of Management Controls
		4.5.1. CM Planning
		4.5.2. Configuration Identification
			4.5.2.1. Configuration Identification Activity
		4.5.3. Change Control
			4.5.3.1. Change Effectivity
			4.5.3.2. Re-identification
		4.5.4. Configuration Status Accounting
		4.5.5. Configuration Audit
		4.5.6. Metrics
			4.5.6.1. The Number of Engineering Drawings on a Program—Poor Metric
			4.5.6.2. The Number of Engineering Orders on a Program—Poor Metric
			4.5.6.3. The Number of CM and Software CM Requirements in the Contract—Good Metric
			4.5.6.4. How Long Engineering Orders Take to Be Approved and Released—Good Metric
Chapter 5: Data Definition, Data Types, and Control Requirements
	5.1. Questions Answered in this Chapter
	5.2. Introduction
	5.3. Data Definition
		5.3.1. Knowledge Workers Spend 30% of Each Day Looking for Data with a 50% Success Rate
		5.3.2. Data, if Found, Contains between 10% and 25% Data Inaccuracies
		5.3.3. Lack of Data Context
		5.3.4. Inadequate Data Definition Resulting in the Data Being Misinterpreted
		5.3.5. Inadequate Data Safeguards
		5.3.6. Multiple Sources of Truth for the Same Data
		5.3.7. Too Much Data and Not Enough Intelligence
	5.4. A Strict Data Diet
		5.4.1. 3D Printing
		5.4.2. Quantum Computing
		5.4.3. Database Transfers
		5.4.4. Social Media, Real-Time Video/Images, and Text Messaging
			5.4.4.1. Social Media
			5.4.4.2. Real-Time Video and Other Images
			5.4.4.3. Text Messaging
	5.5. CM and Levels of Quality Business Systems Management
		5.5.1. Level I, Policy Management
		5.5.2. Level II, Plans Management
		5.5.3. Level III, Process Management
		5.5.4. Level IV, Procedures Management
		5.5.5. Level V, Metadata Management
			5.5.5.1. Configuration-Dependent Metadata Field Management
			5.5.5.2. Non-Configuration-Dependent Metadata Field Management
		5.5.6. Level VI, Guidelines Management
		5.5.7. Level I, II, III, and IV Requirements Management and CM Planning
		5.5.8. The Use of Shall, Will, and Should Is Changing
Chapter 6: Configuration Management
	6.1. Questions Answered in this Chapter
	6.2. Introduction
	6.3. Overview of CM
		6.3.1. History of CM
		6.3.2. Das V-Modell
		6.3.3. What Does CM Apply To?
			6.3.3.1. Software Items
			6.3.3.2. Firmware Items
			6.3.3.3. Hardware Items
			6.3.3.4. Drawings
			6.3.3.5. Specifications
			6.3.3.6. Material Lists
			6.3.3.7. Document Material List (Document BOM)
			6.3.3.8. Produced Item Material List (Item BOM)
			6.3.3.9. Manufacturing Lines
		6.3.4. CM Process Elements
			6.3.4.1. Inputs
			6.3.4.2. Constraints
			6.3.4.3. Mechanisms/Facilitators
			6.3.4.4. Outputs
		6.3.5. Requirements and CM
			6.3.5.1. Scope Trace Through Requirements
			6.3.5.2. Requirements and CM Overview
			6.3.5.3. Success Criteria
			6.3.5.4. Good versus Poor Requirements
			6.3.5.5. Elicitation
			6.3.5.6. Prioritizing and Tracking
			6.3.5.7. Relationship Between Requirements and CM
			6.3.5.8. Logistics
Chapter 7: Configuration Management Support of Functional Resources
	7.1. Questions Answered in this Chapter
	7.2. Introduction
	7.3. CM and Project Management
		7.3.1. Acceptance
		7.3.2. DD Form-250 Use
		7.3.3. CM and Project Integration Management
		7.3.4. CM and Scope Management
		7.3.5. CM and Time Management
		7.3.6. CM and Project Communications Management
		7.3.7. CM and Project Cost Management (Earned Value Management)
			7.3.7.1. Assumptions
			7.3.7.2. Calculation of Cost Avoidance
			7.3.7.3. Total Program Cost
			7.3.7.4. Value to the External Customer
			7.3.7.5. Value to the Company
		7.3.8. CM and Project Quality Management
			7.3.8.1. Protection from Audit
		7.3.9. CM and Project Risk Management
		7.3.10. CM and Action Item Lists
	7.4. CM and Systems Engineering
	7.5. CM and Production
	7.6. CM and Finance
	7.7. CM and Legal
	7.8. CM and the Contracts Department
	7.9. CM and Supply Chain Management
	7.10. CM and Facilities
		7.10.1. CM and Property Management
	7.11. Time-Phased CM Activities
		7.11.1. At Award
			7.11.1.1. The Contract
			7.11.1.2. Contract Provisions and Reference Documents
			7.11.1.3. Hidden Data Submittal Requirements
			7.11.1.4. Disconnects Between Contract Parts or Documents
			7.11.1.5. The Watch List
			7.11.1.6. Contract Status Worksheet
			7.11.1.7. Setting Up a Conformed Contract and Contractual Data Repository
		7.11.2. Critical Activities Not Related to Product Performance
			7.11.2.1. What Has to Be Done
			7.11.2.2. Why It Has to Be Done
			7.11.2.3. Resource Assessment and Management
			7.11.2.4. IP Plan
			7.11.2.5. DD Form-254 and “For Official Use Only” Marking
			7.11.2.6. CM Plan
			7.11.2.7. DRL Tracking System
			7.11.2.8. DRL Cover Letters
			7.11.2.9. Standardized Data Distributions Internal and External
			7.11.2.10. The CCB
		7.11.3. Hardware Quality Instruction and Software Quality Instruction
			7.11.3.1. What Has to Be Done
			7.11.3.2. Why It Has to Be Done
		7.11.4. Program Data Repository Basics
			7.11.4.1. Program Intranet Site
			7.11.4.2. Program Servers
			7.11.4.3. PD/LM Systems
			7.11.4.4. PD/LM Product Structure
	7.12. The First 90 Days and Beyond
		7.12.1. The 90/90 Rule
			7.12.1.1. Setting Expectations
		7.12.2. Proposals and CM Budget
		7.12.3. CM Interfaces
			7.12.3.1. Internal CM Interfaces
			7.12.3.2. Know Your Internal Customer
		7.12.4. Program Dos and Don’ts
			7.12.4.1. CM as a Service Organization
		7.12.5. The Many Aspects of CM
			7.12.5.1. Speaking with One Voice to the Customer
			7.12.5.2. Domestic ITAR Marking Inconsistencies
		7.12.6. The Property Management Interface
			7.12.6.1. DD Form-250, Material Inspection and Receiving Report
		7.12.7. DD-1149, Requisition and Invoice/Shipping Document
		7.12.8. Shippers and DIL Deliveries
		7.12.9. Certificates of Conformance
	7.13. Summary
Chapter 8: Functional Interfaces
	8.1. Questions Answered in this Chapter
	8.2. Introduction
	8.3. Project Management Basics
		8.3.1. Project Integration Management
		8.3.2. Scope Management
		8.3.3. Time Management
		8.3.4. Project Communications Management
			8.3.4.1. Information Distribution
			8.3.4.2. Information Description
			8.3.4.3. Information Schedule
			8.3.4.4. Progress Reporting
			8.3.4.5. Communications Plan Revision
			8.3.4.6. Escalation Process
			8.3.4.7. Administrative Closure
		8.3.5. Project Cost Management (Earned Value Management)
			8.3.5.1. Schedule Performance Index
			8.3.5.2. Cost Performance
			8.3.5.3. Other Elements Associated with EVM
		8.3.6. Project Quality Management
		8.3.7. Project Risk Management
		8.3.8. Action Item List
	8.4. Engineering Basics
		8.4.1. Design and Requirements
		8.4.2. Simulation and Verification
		8.4.3. Bills of Materials and Bills of Documentation
	8.5. Production Basics
		8.5.1. Production Setup
		8.5.2. Production Test and Verification
	8.6. Finance Basics
	8.7. Legal Basics
	8.8. Contracts Department
	8.9. Supply Chain Management Basics
	8.10. Facilities Basics
Chapter 9: Configuration Management Baselines
	9.1. Questions Answered in this Chapter
	9.2. Introduction
	9.3. There Are Many Baselines
		9.3.1. Functional
		9.3.2. Allocated
		9.3.3. Product
		9.3.4. Developmental
			9.3.4.1. Design Implications
			9.3.4.2. Change Implications
	9.4. Triggers for Moving From One Baseline to the Next
		9.4.1. CM Implications of a Product Baseline
	9.5. Baselines and Configuration Identification
		9.5.1. Phase-Based Item Re-Identification
	9.6. Validation and Verification in Non-Governmental Sales
	9.7. Product Acceptance
Chapter 10: Configuration Control
	10.1. Questions Answered in this Chapter
	10.2. Management of a Configuration
	10.3. CM Is Critical to Quality and Safety
	10.4. The CM Tower of Babel
		10.4.1. Use Drives the CM Planning and Management Systems Design
			10.4.1.1. Multiple Build End Items
		10.4.2. Six Sigma
		10.4.3. Multiple Build End Item and a Product Baseline
	10.5. One-Off End Items
	10.6. Management of Change
		10.6.1. Engineering Change Request
		10.6.2. Engineering Change Orders
			10.6.2.1. Review Changes
			10.6.2.2. Approval/Disapproval
		10.6.3. Variances, Part Substitution, and Defects
			10.6.3.1. Variances
			10.6.3.2. Part Substitutions
			10.6.3.3. Defects
	10.7. Configuration Verification
		10.7.1. Functional Aspect
			10.7.1.1. Analysis
			10.7.1.2. Inspection
			10.7.1.3. Test
			10.7.1.4. Demonstration
		10.7.2. Aids to Functional Aspect Verification
			10.7.2.1. CM and Test Execution Trials
			10.7.2.2. Subsystems (Product Sub-Element) Verification
	10.8. Systems (Product) Verification
		10.8.1. Live-Fire Exercise
		10.8.2. Analysis, Inspection, Test, and Demonstration Master Plan
		10.8.3. Requirements and Closure
	10.9. Configuration Audit
		10.9.1. In-Process Audits
		10.9.2. Formal Audits
			10.9.2.1. Functional Audits
			10.9.2.2. Physical Audits
	10.10. Material Receipt and Inspection
		10.10.1. Goods
		10.10.2. Production Material
		10.10.3. Process Material
		10.10.4. Customer-Furnished Material
Chapter 11: When Things Go Wrong
	11.1. Areas of Configuration Management Risk
	11.2. Hardware and Software Integration
		11.2.1. Commercial Titan—Intelsat 603
		11.2.2. Космос-3M—QuickBird 1
	11.3. Ineffective ICWGs
		11.3.1. Missile X Interfaces
		11.3.2. Mars Climate Orbiter
		11.3.3. Apollo and Lunar Module CO2 Filters
	11.4. Milestone Slips Because Metrics Were Not Used to Determine Where a Project Was
		11.4.1. Throwing Decisions Over the Fence
		11.4.2. Company-Level Procedural Approval Holds Up Multiple Programs
	11.5. Inordinate Change Processing Duration and Number of Changes
		11.5.1. Low Temperature Microgravity Physics Facility
	11.6. Lack of Change Implementation After Approval
		11.6.1. Apollo 13 Oxygen Tanks
	11.7. Lack of Control of Item Identification
		11.7.1. General Motors Corporation Switch Recall
	11.8. Undocumented Changes or Part Substitution in Final Product
		11.8.1. Solar Maximum Mission
		11.8.2. Drop-In Replacement Sometimes Not So
	11.9. Lack of Proper Configuration Control Board Stakeholder Review
		11.9.1. Harness Support Bracket Redesign Without Harness Team Input
		11.9.2. Small ICBM Internal Shelf Design
		11.9.3. Informal Change Management
		11.9.4. Open Loop and Stove Pipe Changes
	11.10. High Rate of Scrap and Repair
		11.10.1. Untested Item Substitution
		11.10.2. Drug Manufacturing Issues
	11.11. Maintaining Software and Its Associated Design Documentation
		11.11.1. Source Code and Compile
		11.11.2. Merge Failure
	11.12. Lack of Requirements Control
		11.12.1. Subassembly of Switch
		11.12.2. Lack of Allocated Baseline Management
		11.12.3. Design Drawing Updated From Wrong Revision
	11.13. Operational and Maintenance Activities
		11.13.1. Google Traffic Routed Through China
		11.13.2. Airbus A380 Engine Failure
		11.13.3. Equifax Data Breach
		11.13.4. A400M Software Vulnerability
	11.14. Poor Risk Management Decisions
		11.14.1. Ford Pinto
	11.15. Inadequate Subsystem to Subsystem Interface Control
		11.15.1. Chevy Monza
	11.16. Lack of Data Management
		11.16.1. In 2001, U.S. Congress Created November 31 by Mistake
	11.17. Lack of Change Communication
		11.17.1. Lion Air Flight 610
	11.18. Failure to Understand All Requirements
		11.18.1. The U.S. Air Force Expeditionary Combat Support System (ECSS)
		11.18.2. Inadequate Training of Those Performing CM Functions
		11.18.3. What Is the Point of Processing an Engineering Order?
		11.18.4. Where Is That Written Down?
		11.18.5. No Records to Combat Environmental Violation Allegations
Chapter 12: Test, Inspection, and Evaluation Master Plan Organized
	12.1. Philosophy of the Master Plan
	12.2. Benefits of the Master Plan
		12.2.1. System Definition
		12.2.2. Test (Verification)
			12.2.2.1. Reliability Testing
	12.3. So, When Do We Start Testing?
		12.3.1. Types of Tests During Development
	12.4. Reviews
	12.5. Inspections (Verification)
	12.6. Demonstration (Verification)
	12.7. Analysis (Verification)
	12.8. DFMEA and PFMEA
	12.9. Product Development Phases
	12.10. Summation
Chapter 13: Assessing and Mitigating Risk
Appendix 1: Related Configuration Management Standards
Appendix 2: Acronyms
Appendix 3: Bibliography
Appendix 4: Key Performance Indicators
Appendix 5: Publications contributed to by Value Transformation, LLC.
Index




نظرات کاربران