CeBIT Open Source Project Lounge -- AdempiereERP
AdempiereERP -- True Open Source Enterprise Ressource PlanningBy
AdempiereERP is among the 15 projects that will present their work at CeBIT, offering an enterprise ressource planning for the German market.
In a nutshell: How would you describe your project in one or two sentences?
ADempiere is a true Open Source enterprise resource planning (ERP) system without hidden costs or restrictions that satisfies important German enterprise requirements (such as translation and data export) and fulfills their productivity needs. The project is not developed by one vendor alone, but by many members of a developer community, therefore has longevity and is on a stable basis.
When did the project begin?
How many active members does the project have?
How did the project come into being?
As a fork of the Compiere project.
Why should a CeBIT visitor come to your booth?
To experience a market-ready, productivity oriented Open Source ERP system.
Who do you make your software for?
We develop ADempiere for small and middle sized enterprises.
Where do you see your biggest current challenge?
To develop a framework that can carry the strong growth of the project.
If you could hire a full-time project developer now, what problem should he or she be ready to solve?
A complete modularization of the system.
Under which licensing is the software released?
Project website: www.adempiereerp.de.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm