Visual Exploration
Glossary Page
The purpose of visual exploration is to provide an overview of the data and enable users to navigate through different segments of the data in an interactive manner. In this situation, users may not have any or only a basic understanding of the data, and their goal is to identify patterns or relationships. Visual exploration can be viewed as an unguided search for pertinent information in the data. To aid users in this search process, visual exploration techniques must have a high level of interactivity.
http://www.infovis-wiki.net/index.php/Visual_Exploration
Latest Webinars
Latest Articles
T-Systems and German Edge Cloud join forces
T‑Systems and German Edge Cloud are joining forces to deliver integrated, ready‑to‑use digital solutions for industrial data ecosystems such as Catena‑X. By combining T‑Systems’ expertise in integration and connectivity with German Edge Cloud’s ONCITE Industrial SaaS solution, the partnership enables scalable applications for traceability and Industrial AI, provided via the Telekom Cloud. This collaboration helps manufacturing companies implement use cases quickly, achieve seamless integrations, and generate measurable value across the entire supply chain. The goal is to build open, interoperable digital ecosystems that accelerate and sustain digital transformation in the manufacturing industry.
Read more
Sven Löffler
Feb 26, 2026
End-to-end solution for carbon footprint in the supply chain
T‑Systems and IPOINT have launched an end‑to‑end solution that enables automotive manufacturers and suppliers to track product carbon footprints across global supply chains. By combining IPOINT’s sustainability software with T‑Systems’ access to the Catena‑X data ecosystem, the solution supports transparent emissions reporting in line with EU CSRD requirements and provides actionable insights for reducing environmental impact.
Read more
Sven Löffler
Feb 25, 2026
Our Content Management System (CMS) became an attack target
When our CMS became the target of a large-scale DDoS attack, it triggered a real-world stress test of our cloud infrastructure. From saturated load balancers and 100% CPU utilization to emergency mitigation measures, this incident challenged our resilience. By rapidly implementing AWS CloudFront, AWS WAF, and a secure edge-based protection model, we successfully stabilized the system and prevented further disruption. A follow-up attack confirmed the effectiveness of the new architecture, demonstrating how proactive security design and strong collaboration ensure service continuity and long-term resilience.
Read more
Mohamed Radwan
Feb 17, 2026