I am Clueless about source controls

  • Thread starter Thread starter inotyce
  • Start date Start date
  • Tags Tags
    Controls Source
AI Thread Summary
The discussion centers around the challenges of using Microsoft Team Foundation Server (TFS) for source control, particularly in a virtual machine (VM) environment, which is perceived as slow and cumbersome. The user expresses a desire to switch to Subversion (SVN) for its command line and Tortoise GUI tools, citing difficulties with TFS. Concerns are raised about the client's reluctance to expose their software code publicly. The conversation shifts to whether the issues with TFS are primarily related to speed or personal preference. Suggestions include improving personal proficiency with TFS and gathering quantifiable data to support a case for switching to SVN. Engaging with colleagues and supervisors to gauge their opinions is also recommended.
inotyce
Messages
43
Reaction score
1
My company uses MS TFS for source controlling and I find this really difficult because we have to code on VMs (log on VMs and handle the code in TFS). I would like to make a suggestion to change this into SVN using command line or Tortoise GUI tools. But the client seems not to let publicly seen its software code. As you might know, coding through VMs is odd because it is really slow (GUI graphics drawn and redrawn). Thank you for any ideas.
 
Technology news on Phys.org
Is the issue of TFS vs SVN one of speed or do you just personally find it harder to use? If that's the case (and there are no others on the team who agree) then you might want to simply dedicate some time to getting better with it. If it's an issue where you can gather some quantifiable data to show quicker usage or something like that, then gather it on your own and present it in a coherent and persuasive manner.

Talk to colleagues and supervisors and see if they feel the same as well.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top