After a welcoming introduction, you’ll get to know all the news and strategic info about NetEye and Cyber Security. Our partner Atlassian will talk about Enterprise Service Management, while our Technical Consultant, Nicola Degara will introduce you to data-driven IT Service Management. Würth Phoenix’ Cyber Security expert, Massimo Giaimo, will dive into our platform CTI (Cyber Threat Intelligence); followed by a partner speech from Elastic.
After a nice lunch break at the Plaza Restaurant, the afternoon holds interesting success stories for you as well as time for proper feedback from your side! ✌🏼😉 … and you surely don’t want to miss out on the delicious pastries from Iginio Massari – Alta Pasticceria 🧁and the prize drawing at the end of this amazing day’s event.
You can find the registration and further details here.
Processing Tree Rendering Issue We shipped a fix for a rendering bug in the Tornado UI Processing Tree. Under specific conditions, navigating back to the dashboard after expanding tree nodes caused the tree to render incorrectly nodes would appear collapsed, Read More
Role Search Now Works in Access Control We've fixed the search functionality in the Roles view under Configuration - Access Control, so you can now find roles instantly without any errors. List of updated packages To solve the issues mentioned Read More
Running Ollama locally or on dedicated hardware is straightforward until you need to know whether a model is actually loaded in RAM, how fast it generates tokens under load, or when memory consumption reaches a threshold that affects other workloads. Read More
A practical look at SAFe, LeSS, Scrum@Scale, Disciplined Agile, Nexus, and custom hybrid models for enterprise IT organizations using Jira, Jira Service Management, and Confluence Cloud. Scaling Agile in the Enterprise: The Question Nobody Really Wants to Answer For many Read More
Today, there are many solutions available for IT asset inventory management, such as GLPI. However, these tools often lead to fragmented data spread across different databases that don't communicate with each other, except through custom-built interfaces. The Challenge The goal Read More