diff --git a/README.rst b/README.rst
index 531cf8682..6620cc756 100644
--- a/README.rst
+++ b/README.rst
@@ -1,7 +1,37 @@
-===============
+==============
VulnerableCode
+==============
+
+VulnerableCode is a database of software package vulnerabilities with Web UI and API.
+
+Why Use VulnerableCode?
+=======================
+
+VulnerableCode provides a Web UI and API to access a database of known software package
+vulnerabilities with comprehensive information from upstream and downstream public
+sources including packages affected by a vulnerability and packages that fix a
+vulnerability.
+
+There is a `public VulnerableCode database `_
+and the project also provides the tools to build your own instance of the database.
+
+Getting Started
===============
+Instructions to get you up and running on your local machine are at `Getting Started `_
+
+The VulnerableCode documentation also provides:
+
+- prerequisites for installing the software.
+- an introduction to the user interface.
+- how to use the API.
+- tutorials for adding new pipelines to import and improve advisories.
+- extensive reference information about VulnerableCode data.
+- guidelines for contributing to code development.
+
+Build and tests status
+======================
+
|Build Status| |Code License| |Data License| |Python 3.8+| |stability-wip| |Gitter chat|
@@ -18,11 +48,12 @@ VulnerableCode
:target: https://gitter.im/aboutcode-org/vulnerablecode
+Benefits of VulnerableCode
+==========================
+
VulnerableCode is a free and open database of open source software package
vulnerabilities **because open source software vulnerability data and tools
-should be free and open source themselves**:
-
-We are trying to change this and evolve the status quo in a few other areas!
+should be free and open source themselves**.
- Vulnerability databases have been **traditionally proprietary** even though they
are mostly about free and open source software.
@@ -37,110 +68,29 @@ We are trying to change this and evolve the status quo in a few other areas!
easier to find a package and whether it is vulnerable.
PURLs were designed initially for ScanCode and VulnerableCode. PURL is
-now a de-facto standard for vulnerability management and package references.
-See https://github.com/package-url/purl-spec
-
-The VulnerableCode project is a FOSS community resource to help improve the
-security of the open source software ecosystem and its users at large.
-
-VulnerableCode consists of a database and the tools to collect, refine and keep
-the database current.
-
-
-.. pull-quote::
- **Warning**
- VulnerableCode is under active development and may not be ready for production
-use depending on your use cases.
-
-Read more about VulnerableCode at https://vulnerablecode.readthedocs.org/
+now a `standard `_ for vulnerability management
+and package references.
The VulnerableCode tech stack is Python, Django, PostgreSQL, nginx and Docker and
several libraries.
-Getting started
-===============
-
-Run with Docker
----------------
-
-First install docker, then run
-
-.. code:: bash
-
- git clone https://github.com/nexB/vulnerablecode.git && cd vulnerablecode
- make envfile
- docker compose build
- docker compose up -d
- docker compose run vulnerablecode ./manage.py import --list
-
-Then run an importer for nginx advisories (which is small)
+Support
+=======
-.. code:: bash
+If you have a specific problem, suggestion or bug, please submit a
+`GitHub issue `_.
- docker compose exec vulnerablecode ./manage.py import nginx_importer
- docker compose exec vulnerablecode ./manage.py improve --all
-
-At this point, the VulnerableCode app and API should be up and running with
-some data at http://localhost
-
-
-Populate VulnerableCode database
---------------------------------
-
-VulnerableCode data collection works in two steps: importing data from multiple
-sources and then refining and improving how package and software vulnerabilities
-are related.
-
-To run all importers and improvers use this
-
-.. code:: bash
-
- ./manage.py import --all
-
-.. code:: bash
-
- ./manage.py improve --all
-
-
-Local development installation
-------------------------------
-
-On a Debian system, use this
-
-.. code:: bash
-
- sudo apt-get install python3-venv python3-dev postgresql libpq-dev build-essential
- git clone https://github.com/nexB/vulnerablecode.git && cd vulnerablecode
- make dev envfile postgres
- make test
- source venv/bin/activate
- ./manage.py import nginx_importer
- ./manage.py improve --all
- make run
-
-At this point, the VulnerableCode app and API is up at http://127.0.0.1:8001/
+For quick questions or socializing, join the AboutCode community discussions on `Slack `_.
+Interested in commercial suppport? Contact the `AboutCode team `_.
License
-========
-
-Copyright (c) nexB Inc. and others. All rights reserved.
-
-VulnerableCode is a trademark of nexB Inc.
-
-SPDX-License-Identifier: Apache-2.0 AND CC-BY-SA-4.0
-
-VulnerableCode software is licensed under the Apache License version 2.0.
-
-VulnerableCode data is licensed collectively under CC-BY-SA-4.0.
-
-See https://www.apache.org/licenses/LICENSE-2.0 for the license text.
-
-See https://creativecommons.org/licenses/by-sa/4.0/legalcode for the license text.
-
-See https://github.com/nexB/vulnerablecode for support or download.
+=======
-See https://aboutcode.org for more information about nexB OSS projects.
+* `Apache-2.0 `_ is the overall license.
+* `CC-BY-SA-4.0 `_ applies to reference datasets.
+* There are multiple secondary permissive or copyleft licenses (LGPL, MIT,
+ BSD, GPL 2/3, etc.) for third-party components and test suite code and data.
Acknowledgements, Funding, Support and Sponsoring