41 results:
Sorting:
Relevance
Date
31.
Java programming
… years of experience in various industries and IT projects. We design "software made in Germany". We develop secure and reliable Java applications, both in the Java SE and Java EE environments. We use specifications and tools such as EJB,…
32.
Blockchain Applications
…Inreased automation, secure transactions,
more trust
Blockchain technology is the strategic IT tool for new business models and improved supplier relationships.
Find out if Blockchain technology is an alternative for your business challenge Map your business…
33.
Use cases
… necessitate the sharing of data across organisational boundaries. Data spaces are one of the keys to achieving simple, secure and self-determined data sharing.
What can we do for you?
34.
ConnectedCar Services
… accounting standards Integration and comprehensive extension of a third-party subscription management standard solution Secure connection of international payment service providers
Implementation and commissioning of over 50 international launches in…
35.
Public Charging Solutions
… the major car manufacturers offer public charging services as an additional mobility service for electric cars. This service secures access to the charging infrastructure, and provides the customer with a collective invoice for all suppliers used during the…
36.
Decision support for intelligent remote maintenance
… operators and employees are aware of the risks with regard to possible threats and are sensitized to them.
Your path to secure and intelligent remote maintenance,
to optimize cross-location collaboration
You should describe your requirements for…
37.
Guide to successful data visualization
… you need to know using a tried-and-tested process model. Analyze data more easily, comprehensively and quickly to secure a competitive advantage.
Sprungmarke Anfang
Download now:
38.
Catena-X
… ecosystem for the value chain in which all partners can meet on equal ground – trustworthy, collaborative, open and secure. For a digital, global data exchange based on European values.
On an equal footing: All partners have equal rights and data…
39.
Intelligent fault detection and maintenance planning
… sanctions lists, blacklists such as PEP lists (politically exposed persons), for example.
Rely on us to secure your digital identities and help you build sustainable customer relationships.
Quality of identity data: The decisive factor
…
40.
Cofinity-X
… operation and provision of corresponding services that enable all participants in the automotive value chain to exchange data securely and confidently.
The Catena-X consortium has developed various services for the operation of the data room up to a…