Managing resource information in GLPI
Administration and Setup
The Administration and Setup sections of the main menu help you configure and manage your GLPI system. The Administration menu lets you configure users and groups for GLPI. Also, you can implement logging and create snapshots of the database. The Setup menu lets you configure global settings for notifications, authentication, mail gateways, document types, external links, and and other features.
This short tour has only touched the surface of the many features you'll find within the GLPI open source asset management and helpdesk system. In addition to a wide range of GLPI built-in features, additional options are available through external plugins. GLPI provides online documentation in many languages, and you can always ask for help in an active community forum.
GLPI is easy to implement and has a short learning curve for the end user. On the other hand, system administrators will find more than enough options for customizing the system.
- GLPI Project: http://www.glpi-project.org/spip.php?lang=en
- Apache Foundation: http://www.apache.org/
- MySQL: http://www.mysql.org/
- PHP: http://www.php.net/
- openSuse Linux: http://www.opensuse.org/
- University of Cyprus Library: http://library.ucy.ac.cy/ENGLISH/index_en.htm
- Mozilla Calendar Project: http://www.mozilla.org/projects/calendar/
- OCSNG: http://www.ocsinventory-ng.org/
Buy this article as PDF
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.