CeBIT Open Source Project Lounge - GOsa²
GOsa² -- Central Software and Ressource ManagementBy
GOsa² is among the 15 projects that will present their work at CeBIT, offering a central management of software. Although not known to many, they help out in large projects already, for example in the LiMux project in the City of Munich, Germany.
In a nutshell: How would you describe your project in one or two sentences?
GOsa² is a highly capable, flexible and free solution for central management of all connected resources and users of an LDAP-based authority or enterprise network. GOsa² provides newcomers and seasoned system administrators alike with an intuitive, role-based administrative interface for efficient management and deployment of complex IT environments.
When did the project begin?
The project has been around since the end of 2001.
How many active members does the project have?
The team consists of four core developers and 11 project members with write privileges to the development repository.
How did the project come into being?
GOsa² has its roots in GONICUS GmbH. It was developed to give customers an easy infrastructure management capability and was developed right from the start as Open Source.
Why should a CeBIT visitor come to your booth?
Meet GOsa² and its developers physically at CeBIT, and we'd be happy to answer all questions!
Who do you make your software for?
GOsa² solicits input from the community and customers, whose suggestions get continuing attention and become part of the software.
Where do you see your biggest current challenge?
We are still trying to develop a logo.
Under which license is the software currently offered?
GOsa² is under GPL licensing.
Project website: www.gosa-project.org
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems