Also this year Würth Phoenix invites you to the Open Source Conference in Rome, which will be held March 31st at the convention center of the Barcelo Aran Mantegna Hotel.
At this year’s conference our keynote will be:
Log Management & related: more and more we are inundated with requests from the privacy guarantor, new laws and requirements related to data security that are requiring the management and storage of millions of logs. How is it possible to make sense of this information?
Always active in the community and strong supporters of Open Source we will present our offer for the implementation of a monitoring strategy by introducing the new Log Management module of NetEye that allows not only to store the logs but to analyze them by creating useful and effective statistics for the optimization of the IT services.
Date: Tuesday, March 31, 2015
Location: Barceló Aran Mantegna, via Andrea Mantegna 130, Roma
For more details you can view the agenda that can be consulted on the official website of the conference at the following link.
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More
With the upgrade to NetEye 4.44, we've added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one of the most relevant is the introduction of Elastic Stack 9. This Elasticsearch major release (https://www.elastic.co/guide/en/elastic-stack/9.0/elastic-stack-release-notes.html) includes some new Read More
The NetEye Conference 2025 in Verona offered a full day of deep-dive sessions, live use cases, and peer-to-peer learning – all centered around one guiding theme: Intelligent Operations in Action. Our community explored how observability, cybersecurity, and service management converge Read More
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More