Your search

Your search

A new anonymization method by Motionlogic makes it possible to use highly anonymized cell phone data from Deutsche Telekom customers for analyses of traffic flows. Privacy-compliant analysis of cell phone data

MOBILE ANALYTICS

At this year's CeBIT, Telekom and Motionlogic show how anonymized data from cell phone customers can be used for traffic planning.
To article
Distributed devices can be controlled and steered remotely through the M2M portal by T-Systems. This reduces maintenance costs and optimizes production capacity utilization. M2M solution: remote control and maintenance of machines

PREDICTIVE MAINTENCE

Control and maintain machines and devices at globally distributed production sites through the cloud.
To article
The partnership between T-Systems and Salesforce is generating first results: The  automotive platform Customer Experience Management (CEM), car dealers can offer information at the point of sale. Individual service for automotive customers thanks to T-Systems and Salesforce

CEM AUTOMOTIVE

The first T-Systems and Salesforce partner solution: A business app to build automotive customer loyalty.
To article

T-Systems at Facebook

Three ways a CSO can stop being the bad guy

Some security executives are redefining their roles to become people who say "yes," and restructuring their departments around becoming enablers of...

How Far Away Is Driverless Technology Really?

Is driverless technology really right around the corner? And what are we likely to encounter as we head round to meet it?

Will the Internet of Things mean the death of queuing?

If the future does arrive as promised, technology could herald the end of waiting to pay for goods and services. But what does that mean for...

The internet of things: convenience at a price

In the first of our series on the IoT we take a look at connected devices that are available today, the privacy and security issues of using them –...

Hacking Back: Two Wrongs Don't Make A Right

Here's the critical issue: Do you want to risk engaging your company in an ego-fueled war of revenge, or do you want to cut the bad guys off at the...

Big data collection makes it hard for you to remain anonymous

One of the challenges of Big Data collection is maintaining personal privacy. One way to do that is with 'de-identification' - eliminating personally...

The brilliant disruptive potential of IoT

The internet of things (IoT) as a ‘collective & strategic’ term has caught the interest of the enterprise and the consumer alike.

The programs with the most security vulnerabilities in 2014 were not the ones...

Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to...

Think big data is too big for SMEs? Barcelona's out to prove you wrong | ZDNet

Cross-checking payment details with particular Twitter hashtags to work out the economic impact of an FC Barcelona match in a given area. Analyzing...

How cloud is changing the role of IT

The modern leaders of IT departments are thought leaders. Cloud technology has given CIOs, CTOs and IT managers a tool set that once seemed...

T-Systems at Twitter

tsystemscom: There are 3 ways a CSO can stop being the bad guy. Read more at @CIOonline: http://t.co/PuUN36FQPJ #security

tsystemscom: How far away is driverless technology really? @forbes: http://t.co/A0NgsDFPMM #mobile #security

tsystemscom: Will the Internet of Things mean the death of queuing? @guardian: http://t.co/92jyBtBtof #IoT

tsystemscom: The internet of things, convenience at what price @guardian: http://t.co/iCX0LCjgDn #IoT

tsystemscom: Hacking back: Two wrongs don’t make a right @DarkReading: http://t.co/rBLD79E9Cg #security

tsystemscom: Big data collection makes it hard for you to remain anonymous @ITworld: http://t.co/IdfpLU0oA9 #bigdata

tsystemscom: The brilliant disruptive potential of the Internet of Things @itproportal: http://t.co/cr9httcRCJ #IoT

tsystemscom: The programs with the most security vulnerabilities in 2014 were not the ones you think @ZDNet: http://t.co/VWhPN6dEWx #security

tsystemscom: Think big data is too big for you? Barcelona's out to prove you wrong @ZDNet: http://t.co/xofiwBUKLa #bigdata

tsystemscom: The New Face of IT: How the #cloud is changing the role of IT @itproportal: http://t.co/FsrDaHf6nH

Cloud Brokerage

Whitepaper Cloud Brokerage
Multi-cloud strategies made easy
Go to document

September 13, 2013 Solutions

"Cloud Partner of the Year" – T-Systems honored by Cisco

"Cloud Partner of the Year"

T-Systems is Cisco's first choice for cloud partner.

My InfoBox

The number of documents in the InfoBox is limited to: 20
You can collect comfortably in the InfoBox information such as graphics, white papers and even entire pages from the T-Systems website at a central point for downloading and mailing at a later date. To do so, simply click on the InfoBox icon you will find on many of our pages:There are no documents in the InfoBox. Your InfoBox is empty at present.
Overall size 0 MB
Close Your e-mail was sent successfully. I want to send these documents. * Mandatory information



(separate recipients with comma)