A seemingly simple, but dire legacy issue most businesses face today: A temporary workaround gradually becomes the permanent operating model. Lukas provides real world experience and examples on how to move towards a modern, future-ready process.
A seemingly simple, but dire legacy issue most businesses face today: A temporary workaround gradually becomes the permanent operating model. Lukas provides real world experience and examples on how to move towards a modern, future-ready process.
Predict returns. Reduce volatility. Increase profit.
Our latest article shows how OEMs can cut planning deviations by up to 30% using machine-learning-based return forecasts. The result: smoother compound operations, less idle time, and smarter remarketing decisions. And the best part? A lightweight prototype can prove the value fast — before any major IT investment.
Since the Barrierefreiheitsstärkungsgesetz (BFSG) came into force in June 2025, many of us have become familiar with accessibility. At first glance, all the rules, guidelines, and implementation options can seem overwhelming. In this blog post, Britta Fichtl will show how developers can take their first steps toward
accessibility, with a focus on practical implementation for web applications.
The Digital Euro Rulebook Development Group (RDG) published their latest update v0.9 on the Digital Euro Scheme Rulebook in June 2025. Senacor took a deeper look at the current state of the scheme rulebook and covers some important topics and highlights in this blogpost. As banking and payments experts, we would like to contribute to the market discussion to foster a successful development and introduction of the Digital Euro and invite our clients and industry partners to comment to our views and contributions.
In today’s interconnected and rapidly evolving software landscape, vulnerabilities are an unavoidable part of development. As the complexity of applications grows, so does the attack surface. With dependencies on numerous external libraries, open-source packages, and container images, transitive CVEs become one of the most common vulnerability findings and worth focusing at. This blog post will introduce you the the world of CVE Management and give you an overview of some common tools you might use.
Quantum computing is a rapidly advancing research area which promises to solve various classically difficult problems, including various cryptographic schemes. Several experts predict that quantum computers will be capable of breaking currently used encryption schemes in a decade. To secure data in the post-quantum future the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has announced the first completed standards for post-quantum cryptography protocols.
This article provides an introduction to quantum computers as well as an overview of post-quantum cryptography.
Testing as a Fundamental Aspect of Software Craftsmanship Ensuring the reliability and maintainability of software systems requires rigorous testing, making it a cornerstone of every software project. Martin Fowler, a key advocate for software...
Driving Sales & Customer Experience through a Centralized Customer Data Pool Many automotive OEMs face persistent challenges in crafting truly personalized customer experiences, largely due to fragmented access to high-quality, actionable customer data. This data...
How Consumer-Driven Contract Testing prevents us from implementing breaking changes in APIs without proper versioning. Contract Testing According to the Pact documentation, contract testing changes the development workflow by changing the way testing is performed...
Transparent Tracking & Forecasting along Vehicle Distribution Routes for Automotive OEMs If you are involved in the sales process of a newly manufactured vehicle, you will likely be familiar with the lack of transparency during the finished vehicle’s...
Sie sehen gerade einen Platzhalterinhalt von Facebook. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie sehen gerade einen Platzhalterinhalt von Instagram. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie sehen gerade einen Platzhalterinhalt von X. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie müssen den Inhalt von reCAPTCHA laden, um das Formular abzuschicken. Bitte beachten Sie, dass dabei Daten mit Drittanbietern ausgetauscht werden.
Mehr Informationen