CeBIT Open Source Project Lounge -- i-doit
i-doit -- ITIL Conformant Project DocumentationBy
i-doit is among the 15 projects that will present their work at CeBIT, offering a tool for project documentation conformant to ITIL.
In a nutshell: How would you describe your project in one or two sentences?
The i-doit project is a web-based Open Source solution for Information Technology Infrastructure (ITIL) conformant documentation (Configuration Management Database, CMDB) for IT environments.
When did the project begin?
The project started the beginning of 2004. It has been in steady development ever since.
How many active members does the project have?
The forum now has about 800 active members. Two people are continually involved in the product's development and another four are assigned to special tasks. Two additional system specialists are assigned to care about its functional manifestations.
Why was the project created?
A service project from Synetics GmbH needed an emergency recovery plan for one of its customers. Documentation for it first needed to be secured, which led to i-doit's development.
Why should a CeBIT visitor come to your booth?
So that we can demonstrate to those interested that complex, solution-oriented applications and Open Source are not a contradiction in terms.
Who do you make your software for?
All enterprises with more than about 100 IT workstations.
Where do you see your biggest current challenges?
Time constraints, resources and time-to-market.
If you could hire a full-time project developer now, what problem should he or she be ready to solve?
Most urgently a rework of the GUI (Ajax, Rich Web Application) and an extension of the rules system.
Under which licensing is the software released?
Artistic License. For free software compatible with the Free Software Foundation (FSF) and OpenSource.org with GPLv2.
Project website: www.i-doit.org.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems