Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing and Integrating Product Data Management and Software Configuration Management

Buy
This text shows how the integration of PDM and SCM can help organizations quickly and efficiently develop new products and efficiently maintain and update existing products.

Because today’s products rely on tightly integrated hardware and software components, system and software engineers need to have an understanding of both product data management (PDM) and software configuration management (SCM). This groundbreaking book offers that essential knowledge by:

  • Showing how the integration of PDM and SCM can help organizations quickly and efficiently develop new products and efficiently maintain and update existing products
  • Providing comprehensive coverage of PDM/SCM principles, pointing out the similarities and differences of these two processes
  • Presenting the immense range of PDM/SCM tools available to professionals in the field
  • Including in-depth case studies that provide practical knowledge for successful PDM and SCM use and integration

About the Authors

Ivica Crnkovic is a professor of industrial software engineering at Mälardalen University, Sweden. A frequent contributor to the literature on component development, Professor Crnkovic is the coeditor of Building Reliable Component-Based Software Systems (Artech House, 2002). He received his M.Sc. in electrical engineering and in theoretical physics, and his Ph.D. in computer science from the University of Zagreb, Croatia.

Ulf Asklund is an associate professor of configuration management at Lund University, Sweden, where he earned a Ph.D. A regular presenter at international conferences on software configuration management, he has organized workshops and a conference for the IEEE.

Annita Persson Dahlqvist is a software configuration and product data manager for Ericsson, AB. She earned her B.Sc. in computer science from the University of Gothenburg, Sweden. She has been a program committee member of software configuration management symposia and workshops and is a regular presenter at international conferences on software and system configuration management.

(HTML tags aren't allowed.)

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Complications of Regional Anesthesia
Complications of Regional Anesthesia

This updated and expanded 2nd Edition offers practical advice on the prevention and management of complications associated with regional anesthesia and nerve blocks. Besides comprehensive coverage of potential pitfalls for the practicing anesthesiologist, the book adds new material exploring outcomes of regional and general anesthesia. The...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...

Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
The conjunction of several factors having occurred throughout the past
few years will make humans significantly change their behavior vis-à-vis machines.
In particular the use of speech technologies will become normal in
the professional domain, but also in everyday life. The performance of speech
recognition components
...
Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
Effects of Space Weather on Technology Infrastructure
Effects of Space Weather on Technology Infrastructure
The highly variable conditions in the Earth-related space environment, including the Sun, the interplanetary medium and the coupled magnetosphere-ionosphere-atmosphere system, are collectively known as space weather. In the recent past we have experienced that space weather influences the performance and reliability of space- and ground-based...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy