Software Delivery Management System
The Resource Management function enables the user to define resources and allocate them to teams. The system them tracks the resource utilization based on the work assignments thereby enabling managers to track and optimally utilize their resources.
Task status and timesheet entries are generated automatically eliminating the need for manual entry of work done and time taken and enabling the reporting of metrics such as efficiency, on-time completion, defects and defect cycles by resource.
The Requirements Manager enables users to define requirements against releases, assign work, maintain defects and changes, organise requirements into hierarchies by releases and across releases.
Requirements are automatically linked to assignments, resources and work products (documents and code). Users can therefore track progress and trace all documentation (including changes and defects) against individual requirements.
Change and Defect Management
Change and Defect Management enables the user to enter changes and defects (internal and client reported), track changes and defects against multiple releases, monitor status and report progress.
Changes and defects can be linked to a requirement thereby providing complete traceability and history by requirement.
Release Management enables the user to configure releases, freeze check-ins prior to delivery, manage multiple deliveries against a release, review release status and monitor resource costs
Configuration Management enables the user to load project configuration from database definitions and program files and documents from existing components or define new ones during development.
It controls project configuration, manages check-ins and check-outs and automatically updates timesheets and statuses based on work done by the developers.
Additionally the Configuration Manager creates and maintains an archive of changes made, thereby enabling the suer to compare versions (within and across releases) , review changes and trace source of defects.
Application access is granted through either a windows login or through database login. The system manages security at two levels.
Functional access is restricted by user role and is configurable for an organisation. Roles can be defined by authorised users and functional access specified for them
Data access is restricted by teams, each team can be assigned one or more projects and members allocated to the teams will be able to access these projects only.