Operations | Monitoring | ITSM | DevOps | Cloud

From court to code: Build an agentic RAG assistant with Elasticsearch

Want to see what it really takes to build a smart AI assistant? How about one that can help you make the right fantasy basketball picks? In this live session, we’ll demonstrate how to instantly activate and ground a high-performance AI agent using the Elastic Agent Builder, and we’ll show how it powers real-world use cases like smarter player picks. Join JD Armada, developer advocate, for a 20-minute live coding session to learn about.

Network Intelligence in the AI Era #network #networktraffic

Transform your network strategy from guesswork to data-driven. In this session, you'll learn how to: Build a peering & transit strategy that cuts costs. Model real connectivity costs per customer. Use dashboards to improve margins and renewals. Ask natural-language questions with Kentik AI. Join experts from Kentik, NetMavens, and Seaborn Networks, hosted by Capacity Media, to align your network reality with your commercial goals.

Get Kafka-Nated Ep 8: Realistic Synthetic Streaming Data w/ Michael Drogalis

Get Kafka-Nated Ep. 8 Wednesday, October 15th 2025 Guest Focus: Founder of ShadowTraffic, former Confluent stream-processing lead (Kafka Streams, ksqlDB), creator of the Onyx Platform Michael Drogalis joins host Hugh Evans to unpack one of the toughest challenges in stream processing: creating realistic synthetic test data for Kafka. Michael founded ShadowTraffic after leading Kafka Streams and ksqlDB at Confluent and building open-source stream systems like Onyx.

AI in the UK: A Panel Discussion on the Future of Artificial Intelligence

Join our AI panel discussion with Josh Mesout, James Faure, Abdul Hummaida, Jonas Vermeulen, and Daniel Miodovnik, as they come together to explore the rapidly evolving landscape of artificial intelligence. The conversation delves into the real-world applications of AI, its future trajectory, and the critical considerations surrounding security, privacy, and responsible AI practices.

Breaking Down the Exposure Management Maturity Model

Register for the next webinar. The Exposure Management Maturity Model is crucial for effective vulnerability management. Organizations face challenges like limited attack surface understanding and the need for better collaboration between security and IT teams. Defining a risk appetite helps prioritize vulnerabilities, while asset visibility and classification identify critical assets. The session emphasizes business-driven vulnerability prioritization and operational remediation strategies, concluding with self-assessment opportunities and the development of risk-based KPIs.

How Asset Management Works: A Beginner's Guide for IT Asset Management

The Secret Behind How Asset Management Works: A Beginner’s Guide for IT Asset Management — In this video, we’ll simplify everything you need to know about IT asset management! Whether you’re a beginner or just curious about how asset management works, this guide will break down the concepts, tools, and strategies used by top organizations to track, manage, and optimize their IT assets. Our expert-led explanation uses real-world examples to help you understand key principles of asset management, so you can start building a smarter IT environment today. Watch till the end for actionable insights and tips you can apply right away!