After a welcoming introduction, you’ll get to know all the news and strategic info about NetEye and Cyber Security. Our partner Atlassian will talk about Enterprise Service Management, while our Technical Consultant, Nicola Degara will introduce you to data-driven IT Service Management. Würth Phoenix’ Cyber Security expert, Massimo Giaimo, will dive into our platform CTI (Cyber Threat Intelligence); followed by a partner speech from Elastic.
After a nice lunch break at the Plaza Restaurant, the afternoon holds interesting success stories for you as well as time for proper feedback from your side! ✌🏼😉 … and you surely don’t want to miss out on the delicious pastries from Iginio Massari – Alta Pasticceria 🧁and the prize drawing at the end of this amazing day’s event.
You can find the registration and further details here.
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
Jira Service Management now includes a new feature that lets you easily schedule your activities. What? You haven’t activated it yet? No worries, you’re in the right place! Here’s a quick guide to how to enable it and make the most Read More
This post offers a simple and pragmatic way to manage your company's knowledge base with an SaaS product like Confluence. Why are we always here talking about the documentation problem? The title of this post references the Panda, an endangered Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More