Blog

News from the world of logistics.

A truck on the highway transports washing machines, showcasing efficient line optimization in logistics.

Line optimisation: fewer empty runs, stronger networks

Fluctuating volumes and unclear capacities lead to empty runs in general cargo transport. Route optimisation provides a remedy: with a sound database and intelligent software, capacity utilisation within the network can be increased and costs reduced.

Read more

Flowchart on yellow background which stands for transparency and automated processes through Business Process as a Service

Automate with Business Process as a Service

Outsourcing complete business processes as IT services and scaling them flexibly.

Hacker on computer which is supposed to stand for high value of IT security in companies

10 tips to increase IT security

When a vulnerability has been found in the IT system by cyber criminals, the economic damage is often great. With these 10 tips you can increase your IT security.

Employees participating in company sports as part of health management, which stands for sensitivity in terms of data protection

Well-intentioned, but treacherous: corporate health management can quickly become a data protection trap

Corporate health management has found its way into many companies. But beware! Personal data is collected everywhere.

Cookie with crumbs which stands for cookies in terms of privacy protection

What you need to know about the new German TTDSG

What is the "new" data protection law all about? What changes? And for whom?

Man standing in the sun looking at his shadow, which stands for data protection of sensitive data.

The personnel file casts its shadow ahead

The digital personnel file facilitates the management of employee information. This must be taken into account in terms of data protection law.

White arrows in the wall representing a network attack and the firewall.

Better safe than sorry: How firewalls should protect against network attacks

Firewalls and their importance for protection against common network attacks.