Search
You can find the results of your search below.
Fulltext results:
- Communications @pub:company
- ===== Meetings ===== * **Join the meetings on time**. At Unicis, we start meetings promptly and don’... ml#managing-your-calendars|block out any personal time/events]], so that the team members do not inadvertently schedule a time when you are not available. <WRAP info> **Hint**... ponses. Each email address has a minimum response time (“Min RT”) and a direct responsible individual (D
- Leadership @pub:company
- d especially during a screen share session, I sometimes speak longer than I normally would. If you feel ... n 6 weeks. * Stay with the company for a longer time, but don't work more than 10 hours per week. Con... NOT fill any existing open position. They track time using the [[communications#time_tracking|time-tracking]] and sign a consulting agreement with Unicis.
- Products @pub:company
- ===== Outages ===== Outages are unexpected downtimes or problems with the service. Our team quickly f... to help users who can't upgrade right away. Clear timelines and deprecation notices are given for phasin... about features includes status updates, expected timelines, and any changes in scope. This keeps users ... rioritize fixes, and track progress. This ensures timely resolution and maintains system stability. ===
- Unicis.Tech @pub:company
- am members spread across two continents and three time zones. The wider team of contributors around the ... s more information, and lets us work at different time zones. <WRAP notice> **Note:** The [[:communic... arn about the history of Unicis by looking at the timeline on our [[https://www.unicis.tech/about-us#timeline|website]]. ===== Org chart ===== Everyone at U
- Processes and Procedures @pub:trust_center
- cations|Tech Stack Applications]]. * **Response Time:** Aim to respond to messages and emails within 2... e. Stick to the agenda to ensure efficient use of time. * **Minutes:** Assign a note-taker for each me... _applications#openproject|OpenProject]]) for real-time editing and brainstorming sessions. ===== 6. Com... mit tickets or request assistance. * **Response Time:** Aim to respond to technical issues within 2 ho
- Privacy Policy @pub:trust_center:policies
- ed alternative to Google Analytics. - [[https://uptime.kuma.pet/|Uptime Kuma]] A self-hosting monitoring tool. **Third party service providers:** - HotJar fo... Privacy policy]] - Gitlab source code repository, time tracking, code review - [[https://about.gitlab.co... vacy statement]] - GitHub source code repository, time tracking, code review only for community edition
- Introduction to Development @pub
- s have several key advantages, including a faster time to market and a reduced risk of developing produc... oblems early, and keeps the software good all the time. ++++ ++++ Code Review | Peer reviews to mainta... xperiment with new ideas. This includes dedicated time for research and development, cross-functional co
- Tech Stack Applications @pub:operations
- .tech"; } </code> {{tag>forward email}} ====== Uptime Kuma ====== **License:** MIT license **URL:** https://uptime.kuma.pet/ Status and monitoring tool. {{tag>sta... and applications, in high-resolution and in real-time. {{tag>monitoring resource network}} ====== Wazu
- Unicis Open Positions @pub:recruitment
- ==== Location: Remote ==== ==== Job Type: Part-Time ==== ==== About Us ==== Unicis is building a cu... * Automate threat feed import into Wazuh for real-time detection. ==== 6.2 Wazuh to Zabbix ==== * Co
- Vendor Questionnaires @pub:trust_center
- //If yes, please describe the process.// === 3.4 Time to Fix Vulnerabilities === Do you patch identified vulnerabilities within a reasonable time frame, and inform customers where appropriate? /
- Welcome to Unicis Handbook
- as a team. Whether you're a new joiner or a long-time team member, this guide will provide you with a d
- Environments @pub:development
- lly been tested in Dev and Demo environments to minimize the risk of downtime or issues affecting users.
- Source Code @pub:development
- g Tips ==== * **Logs**: Review logs for any runtime errors or warnings. * **Documentation**: Refer
- IT Security Policy @pub:trust_center:policies
- criticality of the vulnerability, with a response time from 1-3 days for critical vulnerabilities to 8-1