Trusted-Execution-Technique

Glossary Page

It cooperates with the respective operating system, verifying, for example, the system BIOS and firmware, and starts the operating system. If errors are detected, the operating system receives feedback. It then decides how the computer continues to function. Essentially, it strengthens platforms that are exposed to attacks on hypervisors, the BIOS, or other firmware, such as malicious rootkits or malware. This function can also be seen as an extension of Virtual Machine Extensions (VMX), Intel's technology for virtual environments.

http://www.datacenter-insider.de/hardware/komponenten/articles/488444/ external-link

Latest Webinars

Latest Articles

Blog Post Cover

End-to-end solution for carbon footprint in the supply chain

T‑Systems and IPOINT have launched an end‑to‑end solution that enables automotive manufacturers and suppliers to track product carbon footprints across global supply chains. By combining IPOINT’s sustainability software with T‑Systems’ access to the Catena‑X data ecosystem, the solution supports transparent emissions reporting in line with EU CSRD requirements and provides actionable insights for reducing environmental impact.

Read more

external-link
Author image

Sven Löffler

Feb 25, 2026

Blog Post Cover

Our Content Management System (CMS) became an attack target

When our CMS became the target of a large-scale DDoS attack, it triggered a real-world stress test of our cloud infrastructure. From saturated load balancers and 100% CPU utilization to emergency mitigation measures, this incident challenged our resilience. By rapidly implementing AWS CloudFront, AWS WAF, and a secure edge-based protection model, we successfully stabilized the system and prevented further disruption. A follow-up attack confirmed the effectiveness of the new architecture, demonstrating how proactive security design and strong collaboration ensure service continuity and long-term resilience.

Read more

external-link
Author image

Mohamed Radwan

Feb 17, 2026

Blog Post Cover

Carnival: New record in mobile data usage

During the 2026 Carnival season, the Telekom mobile network in the strongholds of Cologne, Düsseldorf, Bonn, Mainz, and Aachen recorded a new data peak of 2 million gigabytes — an increase of more than 30 percent. Cologne clearly topped the city ranking. The mobile data shows strong visitor flows into Cologne, high 5G usage, and noticeable demographic differences depending on the carnival hotspot. The AI-powered RAN Guardian Agent optimized the network during more than 130 major events. Instagram was the most popular app. Additionally, anonymized Motion Data analyses support planning and safety at large-scale events.

Read more

external-link
Author image
Author image

Tino Bliesener, Tobias Kleyböcker

Feb 17, 2026