CeBIT Open Source Project Lounge -- i-doit
i-doit -- ITIL Conformant Project DocumentationBy
i-doit is among the 15 projects that will present their work at CeBIT, offering a tool for project documentation conformant to ITIL.
In a nutshell: How would you describe your project in one or two sentences?
The i-doit project is a web-based Open Source solution for Information Technology Infrastructure (ITIL) conformant documentation (Configuration Management Database, CMDB) for IT environments.
When did the project begin?
The project started the beginning of 2004. It has been in steady development ever since.
How many active members does the project have?
The forum now has about 800 active members. Two people are continually involved in the product's development and another four are assigned to special tasks. Two additional system specialists are assigned to care about its functional manifestations.
Why was the project created?
A service project from Synetics GmbH needed an emergency recovery plan for one of its customers. Documentation for it first needed to be secured, which led to i-doit's development.
Why should a CeBIT visitor come to your booth?
So that we can demonstrate to those interested that complex, solution-oriented applications and Open Source are not a contradiction in terms.
Who do you make your software for?
All enterprises with more than about 100 IT workstations.
Where do you see your biggest current challenges?
Time constraints, resources and time-to-market.
If you could hire a full-time project developer now, what problem should he or she be ready to solve?
Most urgently a rework of the GUI (Ajax, Rich Web Application) and an extension of the rules system.
Under which licensing is the software released?
Artistic License. For free software compatible with the Free Software Foundation (FSF) and OpenSource.org with GPLv2.
Project website: www.i-doit.org.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.