Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
pub:home [16.06.2025 06:45] Predrag Tasevskipub:home [16.06.2025 07:50] (current) Predrag Tasevski
Line 14: Line 14:
 This is a place where we talk about what every team member needs to know to work well at Unicis. This is a place where we talk about what every team member needs to know to work well at Unicis.
  
-<button primary url="pub:company:communications">Communications</button>+<button primary url="pub/company/communications">Communications</button>
  
 ===== Leadership ===== ===== Leadership =====
Line 20: Line 20:
 This is where we talk about what managers and leaders at Unicis need to know to run a great company. This is where we talk about what managers and leaders at Unicis need to know to run a great company.
  
-<button primary url="pub:company:leadership">Leadership</button>+<button primary url="pub/company/leadership">Leadership</button>
  
 ===== Products ===== ===== Products =====
Line 26: Line 26:
 This page covers what all contributors to the open-source community and Unicians should know in order to contribute to the core product. This page covers what all contributors to the open-source community and Unicians should know in order to contribute to the core product.
  
-<button primary url="pub:company:products">Products</button>+<button primary url="pub/company/products">Products</button>
  
 ===== Why open-source ===== ===== Why open-source =====
Line 38: Line 38:
 We introduce you to the Software Development Life Cycle (SDLC) and how we build the products at Unicis. We introduce you to the Software Development Life Cycle (SDLC) and how we build the products at Unicis.
  
-<button primary url="Development">Development</button>+<button primary url="pub/development">Development</button>
  
 ===== Security and Compliance ===== ===== Security and Compliance =====
Line 44: Line 44:
 In this section, we explain how Unicis handles data privacy, cybersecurity, and compliance. In this section, we explain how Unicis handles data privacy, cybersecurity, and compliance.
  
-<button primary url="Trust Center">Trust Center</button>+<button primary url="pub:trust_center">Trust Center</button>
  
 ===== Operations ===== ===== Operations =====
Line 50: Line 50:
 In the operations section, we elaborate on tools and applications used internally at Unicis and how to use them. In the operations section, we elaborate on tools and applications used internally at Unicis and how to use them.
  
-<button primary url="Operations">Operations</button>+<button primary url="pub/operations">Operations</button>
  
 ===== Recruiting ===== ===== Recruiting =====