Solved

SVN or GitHub or Git

Posted on 2014-01-21
3
1,101 Views
Last Modified: 2014-01-25
Hi,

I'm wondering about whether I should use SVN, Github or Git. I'm familiar with SVN as I have the SVN server on my Windows 7 (only locally though). I don't know anything about Github or Git? Are they the same even?

I'm wondering if I use Github if I'll set passwords for the code and directories as it's mainly used for my clients.

I'm using Tortoise SVN but does Github have a nice graphical interface like Tortoise so I can see which files haven't been committed, which have been added and so forth like the screenshot.
Screenshot-2014-01-21-17.09.04.png
0
Comment
Question by:Victor Kimura
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 16

Accepted Solution

by:
hankknight earned 250 total points
ID: 39800021
GitHub is a web-based hosting service that use the Git revision control system.  To use GitHub you need to be using Git.  

There are several nice graphical user interfaces for Get:
http://git-scm.com/downloads/guis

The fundamental difference between SVN and Git is that SVN is Centralized while Git is Distributed.  

These links are worth following:
https://git.wiki.kernel.org/index.php/GitSvnComparison
http://blog.teamtreehouse.com/why-you-should-switch-from-subversion-to-git
0
 
LVL 62

Assisted Solution

by:gheist
gheist earned 250 total points
ID: 39808539
Let me add 1c in defence of SVN:

With SVN hotcopy it is some step closer to distributed
No GIT client beats windows TortoiseSVN
And SVN does very well with related huge binary files (e.g. mdb )
0
 

Author Closing Comment

by:Victor Kimura
ID: 39808602
Thank you very much! That's helpful. =)
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question