Search
You can find the results of your search below.
Fulltext results:
- Communications @pub:company
- ons ====== This page explains what every team member (//Unicians//) needs to know in order to effecti... g called the “All hands” every month. All team members, both internal and external, are required to at... s” meeting. All meetings are recorded and team members who can’t attend should watch the recording wit... ation version. ==== Blog ==== Blog articles can be published using [[https://decapcms.org/|Decap CMS
- Formatting Syntax @wiki
- up language, which tries to make the datafiles to be as readable as possible. This page contains all p... ction is possible, too. Just add the section name behind a hash character as known from HTML. This lin... o automatically create links by default, but this behavior can be enabled in the [[doku>config]] file. Hint: If DokuWiki is a link, then it's enabled. *
- Vendor Questionnaires @pub:trust_center
- products and/or services? //If yes, please describe the process.// === 1.2 Customer Testing === Do ... products and/or services? //If yes, please describe the process.// === 1.3 Self-Assessment === Do y... of continued improvement? //If yes, please describe the process.// === 1.4 External Testing === Do ... products and/or services? //If yes, please describe the process.// === 1.5 Training === Do you prov
- Right to Erasure Request Form @pub
- ata Protection Regulation (GDPR). We will do our best to respond promptly and in any event within one... to comply with your request, whichever happens to be later. The information you supply in this form will only be used for the purposes of identifying the personal... Address (required)" Textbox "Contact Telephone Number" "=Your Contact Telephone Number (required)" ema
- Products @pub:company
- ====== This page covers the things every team member needs to know in order to effectively contribute... The Unicis product roadmap is transparent and can be found via the [[https://feedback.unicis.tech|Unic... ocumented, evaluated for its impact, and approved before implementation. When there is a pull request (PR), each code change or logic should be reviewed by the lead or someone else. The reviewe
- Leadership @pub:company
- fully accountable for enhancing the items listed below, and listing them is not an excuse. These mis... "Predrag, wait a minute."// * I often criticize before I appreciate, especially when something seems... make decisions quickly when something is close to being ready to ship. It's okay to say //"I want earl... ection and health. * **Public Representation:** Being the company's spokesperson at events, in the n
- Releasing @pub:development
- he version family (for 2022.12.2 the branch would be ''%%version-2022.12%%'') * Merge all the commits that should be released on the version branch * If backporting... d replace ''%%xxxx.x%%'' with the version that is being released * Fill in the section of ''%%Breaki... te/%%'' prefix. * Sort the list of commits alphabetically and remove all commits that have little im
- IT Security Policy @pub:trust_center:policies
- ortant to Unicis and everyone here is doing their best to keep your presentations and data secure. This document describes our internal security policies, and minimum secu... nt categories on which all Unicis’s data needs to be categorized. The categories define who can access... urity ==== At Unicis we inspect closely any code before it is release. Our developers inspect the log
- Introduction to Development @pub
- ion outlines our methodology, team structure, and best practices to ensure our products meet the highe... lease that is minimally buggy, so that issues can be fixed quickly. Agile methodologies have several k... within a development team. This idea was written before video conferencing was common, but it still suggests team co-location for better communication and team identity. During the C
- Unicis.Tech @pub:company
- ameworks|international standards, frameworks, and benchmarks]]. Unicis is committed to a comprehensive strategy against, whatever it may be. * Automating security, data privacy, and compl... e to manage privacy and data protection, IT and cyber security, compliance, and legal requirements. ... ny that works fully remotely and has five team members spread across two continents and three time zon
- Processes and Procedures @pub:trust_center
- l for the efficient operation of Unicis are described in this document. It is designed to keep employe... edule introductory meetings with relevant team members and [[..:company:leadership|leaders]]. ===== 3... s are necessary to maintain productivity and well-being. Take a 5- to 10-minute break every hour. ===... hnical support. Ensure employees and community members know how to submit tickets or request assistanc
- Source Code @pub:development
- public. It covers the structure, guidelines, and best practices for contributing to the Unicis Platfo... All changes must go through a code review process before being merged. ==== Unicis Apps (Atlassian Forge Framework) ==== This repository contains the so... * **Modular Structure**: Each application should be developed as a separate module within the reposit
- Software Development Lifecycle @pub:development
- hat our software is thoroughly tested and refined before reaching a wide audience. <mermaid> %%{init:... utral'}}%% flowchart LR id1((Alpha)) ==> id2((Beta)) ==> id3((Early Access)) ==> id4((General Avai... ionalities. ==== Audience ==== Internal team members and a limited group of external testers. ==== ... pdate the team on progress and challenges. ===== Beta Stage ===== ==== Purpose ==== The Beta stage
- Unicis Open Positions @pub:recruitment
- s ====== All open hiring positions at Unicis can be found here. {{tag>job hiring job position}} +++... Job Description ==== As a SOC Engineer, you will be responsible for designing, deploying, and maintai... and deploying SOCs in cloud infrastructure. ==== Benefits ==== * Competitive salary and benefits package. * Opportunities for professional developme
- Predrag Tasevski (predrag) - Public Page @user
- der and CEO// <WRAP group> <WRAP half column> **Cyber Security & Privacy by Design Advocate | Certifie... , DPO, CSPS, and more** Predrag has worked in cyber and IT security for more than a decade. He knows... nd default. He also knows how to assess risks and be aware of them. Furthermore, he also works on bloc... (DPO), Certified Payment Security Practitioner, CyberSec First Responder, Project Management Professio