Managing resource information in GLPI
Administration and Setup
The Administration and Setup sections of the main menu help you configure and manage your GLPI system. The Administration menu lets you configure users and groups for GLPI. Also, you can implement logging and create snapshots of the database. The Setup menu lets you configure global settings for notifications, authentication, mail gateways, document types, external links, and and other features.
This short tour has only touched the surface of the many features you'll find within the GLPI open source asset management and helpdesk system. In addition to a wide range of GLPI built-in features, additional options are available through external plugins. GLPI provides online documentation in many languages, and you can always ask for help in an active community forum.
GLPI is easy to implement and has a short learning curve for the end user. On the other hand, system administrators will find more than enough options for customizing the system.
- GLPI Project: http://www.glpi-project.org/spip.php?lang=en
- Apache Foundation: http://www.apache.org/
- MySQL: http://www.mysql.org/
- PHP: http://www.php.net/
- openSuse Linux: http://www.opensuse.org/
- University of Cyprus Library: http://library.ucy.ac.cy/ENGLISH/index_en.htm
- Mozilla Calendar Project: http://www.mozilla.org/projects/calendar/
- OCSNG: http://www.ocsinventory-ng.org/
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm