Mercoledì, 2 ottobre a Bologna presso la sede di Cineca, Consorzio interuniversitario, si svolgerà il NetEye User Group dedicato all’offerta di IT System Management di Würth Phoenix.
Verranno presentate la strategia e le maggiori innovazioni di NetEye, della nostra offerta di OTRS e dell’approccio di monitoraggio della Real User Experience attraverso l’integrazione di Al’exa e nBox. Clienti NetEye e OTRS forniranno un esempio pratico di come le soluzioni siano state adottate all’interno delle loro infrastrutture definendone le criticità, esigenze e potenzialità.
Lo User Group rappresenta un’opportunità di confronto tra gli utenti, che potranno condividere le proprie esperienze e proporre nuove aree di miglioramento per gli sviluppi futuri della soluzione.
RIVOLTO A: Tutti gli utenti di NetEye e dell’offerta di Würth Phoenix per OTRS
As technology continually evolves, keeping our software stack up to date is essential for performance, security, and access to new functionalities. In this post, I want to share how we upgraded MariaDB from version 10.3 to 10.11 as part of Read More
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, SMS management systems, or creating new notification rules. Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More