How To Mitigate Malicious Emails

Although phishing is already a well-known cyberattack, it remains effective. Especially people who are not familiar with the virtual environment could be easily tricked into believing fake emails. Here is, what ACOPA suggests paying attention to when reading mails and...

Outlier correction with sap ibp demand

Author: Tai Nguyen Introduction „Tell us what the future holds, so we may know that you are god.” (Isaiah 41: 23) As early as 700 years BC, the ability to make accurate forecasts was identified as a utopian task [1]. 2700 years later, the difficulty of this task has...

WireGuard As VPN For our Infrastructure

Authors: Alexander Zierhut & Simon Lange von Zierhut IT What Do You Need A VPN In Your Company Network? There are many reasons for using a VPN in a company’s own network. Nowadays, the focus is primarily on topics such as intruder detection and mitigation,...

Business Value Of UX Design

UX DESIGN AS SUCCESS TUNING In highly competitive markets with a wide range of products and services, UX standards andcustomer expectations for user-friendliness continue to rise. Offering a good UX is evolving from anice-to-have to a must-have in order to keep up...

Digital Transformation

With the advent of Industry 4.0, digital business processes have now become the norm. We can help you to identify potential, create individual solutions that meet your specific business needs and support you through the change process in all areas of your business....