Your search

Your search

In the context of Big Data Data, the law for data protection and IT becomes a huge challenge, explains Dr. Jürgen Hartung, one of the leading IT-laywers, in the interview. When analyzing Big Data, the law for data protection and IT plays an important role

TECHNOLOGY AND LAW

IT lawyer Dr. Jürgen Hartung explains what organizations are legally allowed to do with data and why it’s sometimes wiser to err on the side of caution.
Go to article
Gartner helps companies in selecting IT service providers and regularly assesses the providers through the graphical assignment in a Magic Quadrant. T-Systems is among the leaders. T-Systems has been named a leader for IT outsourcing in Gartner's Magic Quadrants.

LEADERSHIP IN IT-OUTSOURCING

In two recent reports, the IT research and advisory company Gartner positioned the top IT outsourcing providers in its Magic Quadrants.
To article
Making IT security a top priority – security needs strategy | T-Systems Making IT security a top priority – security needs strategy | T-Systems

SPECIAL SECURITY

Making IT security a top priority – security needs strategy.
Go to special
A strong cloud is dynamic – end-to-end cloud computing | T-Systems A strong cloud is dynamic – end-to-end cloud computing | T-Systems

Special Cloud Computing

A strong cloud is dynamic – end-to-end cloud computing
Go to special

T-Systems at Facebook

What you need to know when building for the Internet of Things

Nest co-founder Matt Rogers presented his thoughts on what to know when designing products for the Internet of Things (IoT) space at the 2014 DEMO...

Big Business Fail: Makers and Startups Are The Ones Shaping the Internet of...

They are driving the acceptance, use and growth of the IoT through the creation of a multitude of niche applications. The ramifications Makers and...

Healthcare’s Big Data Opportunity

The hospitals where my grandchildren are born will be unrecognizable to what we know today – safer, cleaner and more efficient. And what is...

How Graph Analytics Can Connect You To What's Next In Big Data

Everything in our digital universe is connected. Every single day, you wake up and start a series of interactions with people, products and machines....

Attackers trading malware for privilege

Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to...

Videos about CIOmove | T-Systems

How far are companies concerning digitization and transformation? – Self-assessment of CIOs on video

Growing numbers of IT leaders put mission-critical apps in the cloud

The Infosys-sponsored research revealed that cost savings is no longer the main reason to put apps in the cloud. According to 77% of respondents,...

How Millennials Created the IoT Without Even Knowing | WIRED

The buzz surrounding the Internet of Things (IoT) has been constant, even if discordant. From appliance manufacturers to automotive companies, to...

Spam Nation: Cybercrime and spam are far bigger security threats than you think

In Spam Nation, cybersecurity expert Brian Krebs investigates Russian spammers and seeks to educate users about how valuable their assets are to...

5 steps to more mobile-security-savvy employees

It takes more than policies and penalties to make your workers smart about mobile security. Here’s how to identify and correct problem behaviors in...

T-Systems at Twitter

tsystemscom: What you need to know when building for the Internet of Things @TechRepublic: http://t.co/RTv0w6crbv #IoT

tsystemscom: Big business fail: Makers and startups are the ones shaping the Internet of Things @Gartner_inc: http://t.co/NGd7Mytui3

tsystemscom: Healthcare’s Big Data opportunity - medical progress may lie in the systematic analyses of existing data @TechCrunch: http://t.co/4khloizVm2

tsystemscom: How graph analytics can connect you to what's next in Big Data @forbes: http://t.co/r95QFjpl96

tsystemscom: Attackers trading malware for privilege - access is everything to most criminals @ITworld: http://t.co/Ca3NQfTpZO

tsystemscom: At Reitan Convenience customers turn quality controllers through IT utilization: http://t.co/eF6h0jMq0T #CIOmove

tsystemscom: Growing numbers of IT leaders put mission-critical apps in the #cloud @ComputerWeekly: http://t.co/AyBXGAFAaG

tsystemscom: How millennials created the Internet of Things without even knowing @WIRED: http://t.co/TDZo12RexH #IoT

tsystemscom: Spam Nation: Cybercrime and spam are far bigger #security threats than you think @TechRepublic: http://t.co/kiVcoEzj32

tsystemscom: It takes more than policies and penalties to make your workers smart about #mobile #security @Computerworld: http://t.co/amca9kCQJj

Cloud Brokerage

Whitepaper Cloud Brokerage
Multi-cloud strategies made easy
Go to document

September 13, 2013 Solutions

"Cloud Partner of the Year" – T-Systems honored by Cisco

"Cloud Partner of the Year"

T-Systems is Cisco's first choice for cloud partner.

My InfoBox

The number of documents in the InfoBox is limited to: 20
You can collect comfortably in the InfoBox information such as graphics, white papers and even entire pages from the T-Systems website at a central point for downloading and mailing at a later date. To do so, simply click on the InfoBox icon you will find on many of our pages:There are no documents in the InfoBox. Your InfoBox is empty at present.
Overall size 0 MB
Close Your e-mail was sent successfully. I want to send these documents. * Mandatory information



(separate recipients with comma)