{"id":10817,"date":"2015-02-16T14:02:41","date_gmt":"2015-02-16T13:02:41","guid":{"rendered":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/?p=10817"},"modified":"2023-02-22T09:52:43","modified_gmt":"2023-02-22T08:52:43","slug":"sicheres-hosting-der-cloud","status":"publish","type":"post","link":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/","title":{"rendered":"Sicheres Hosting in der Cloud"},"content":{"rendered":"<p>NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt.<\/p>\n<p>Besonders Cloud-Nutzer f\u00fchlen sich aufgrund neuester Ereignisse immer st\u00e4rker verunsichert: Werden ihre Daten von Cloud-Dienstleistern, Geheimdiensten oder Hackern mitgelesen? K\u00f6nnen Bilder, Texte und andere Dokumente eingesehen werden, ohne dass die Nutzer dies bemerken? Viele der verbreiteten \u00c4ngste sind aber meist unbegr\u00fcndet.<br \/>\nWelche Gefahren tats\u00e4chlich bei der Nutzung einer Computing Cloud drohen und wie Sie diese Gefahren durch eine Cloud \u201eMade in Germany\u201d gr\u00f6\u00dftenteils umschiffen k\u00f6nnen, erkl\u00e4rt Ihnen Jens Rehp\u00f6hler. Der Rechenzentrumsexperte und Gesch\u00e4ftsf\u00fchrer von filoo, der Hostingsparte der Thomas-Krenn.AG, wird in diesem Webinar versuchen, alle Unsicherheiten im Umgang mit der Cloud zu beseitigen.<\/p>\n<p><span style=\"text-decoration: underline;\">Zielgruppe:<\/span><br \/>\nDas Webinar richtet sich an alle Systemadministratoren, Cloud-Nutzer und IT-Interessierte, die etwas zum Thema Sicherheit erfahren m\u00f6chten.<span style=\"text-decoration: underline;\"><br \/>\n<\/span><\/p>\n<p><span style=\"text-decoration: underline;\">Sprecher:<\/span><br \/>\nJens Rehp\u00f6hler, Gesch\u00e4ftsf\u00fchrer der <a href=\"https:\/\/www.filoo.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">filoo GmbH<\/a><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Aufzeichnung:<\/span><\/strong><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/80ktZFWQ4aw\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Gerne stellen wir Ihnen zudem die Pr\u00e4sentation als <a href=\"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/150225_Sicheres-Hosting-in-der-Cloud.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> zur Verf\u00fcgung.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt. Besonders Cloud-Nutzer f\u00fchlen[&#8230;]<\/p>\n","protected":false},"author":308,"featured_media":10833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"footnotes":""},"categories":[93,728,55,176],"tags":[186,113,300],"class_list":["post-10817","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-backup-storage","category-it-security","category-virtualisierung","category-webinare","tag-cloud","tag-vortraege","tag-hosting","post_format-post-format-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicheres Hosting in der Cloud - TKmag<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicheres Hosting in der Cloud - TKmag\" \/>\n<meta property=\"og:description\" content=\"NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt. Besonders Cloud-Nutzer f\u00fchlen[...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"TKmag\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thomaskrenn.ag\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-16T13:02:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-22T08:52:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katharina Niemetz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ThomasKrennAG\" \/>\n<meta name=\"twitter:site\" content=\"@ThomasKrennAG\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katharina Niemetz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/\"},\"author\":{\"name\":\"Katharina Niemetz\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/person\\\/fc5a55f07c0b06e32cea83c50cab27f6\"},\"headline\":\"Sicheres Hosting in der Cloud\",\"datePublished\":\"2015-02-16T13:02:41+00:00\",\"dateModified\":\"2023-02-22T08:52:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/\"},\"wordCount\":181,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg\",\"keywords\":[\"Cloud\",\"Content: Webinare\",\"Hosting\"],\"articleSection\":[\"Backup &amp; Storage\",\"IT-Security\",\"Virtualisierung\",\"Webinare\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/\",\"name\":\"Sicheres Hosting in der Cloud - TKmag\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg\",\"datePublished\":\"2015-02-16T13:02:41+00:00\",\"dateModified\":\"2023-02-22T08:52:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/expertentipps\\\/virtualisierung\\\/sicheres-hosting-der-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"TKMag\",\"item\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicheres Hosting in der Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#website\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/\",\"name\":\"TKmag\",\"description\":\"Das Expertenmagazin rund um Server, Storage, Virtualisierung und mehr.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#organization\",\"name\":\"Thomas-Krenn.AG\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tk_logo_340px.png\",\"contentUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tk_logo_340px.png\",\"width\":340,\"height\":160,\"caption\":\"Thomas-Krenn.AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/thomaskrenn.ag\\\/\",\"https:\\\/\\\/x.com\\\/ThomasKrennAG\",\"https:\\\/\\\/www.instagram.com\\\/thomaskrenn.ag\\\/\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/thomas-krenn-ag\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRdFd4BVXPbocFk1EYJwL0A\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/person\\\/fc5a55f07c0b06e32cea83c50cab27f6\",\"name\":\"Katharina Niemetz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Katharina_Niemetz-96x96.jpg\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Katharina_Niemetz-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Katharina_Niemetz-96x96.jpg\",\"caption\":\"Katharina Niemetz\"},\"description\":\"Katharina Niemetz war nach ihrem Germanistikstudium an der Universit\u00e4t Wien von Januar 2015 bis Juli 2017 bei der Thomas-Krenn.AG besch\u00e4ftigt. Als Texterin\\\/Onlineredakteurin in der Communications-Abteilung k\u00fcmmerte sie sich haupts\u00e4chlich um die Bereiche Content-, Social-Media- und E-Mail-Marketing.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/katharina-niemetz-233941b9?trk=nav_responsive_tab_profile\"],\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/author\\\/kniemetz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicheres Hosting in der Cloud - TKmag","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"de_DE","og_type":"article","og_title":"Sicheres Hosting in der Cloud - TKmag","og_description":"NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt. Besonders Cloud-Nutzer f\u00fchlen[...]","og_url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/","og_site_name":"TKmag","article_publisher":"https:\/\/www.facebook.com\/thomaskrenn.ag\/","article_published_time":"2015-02-16T13:02:41+00:00","article_modified_time":"2023-02-22T08:52:43+00:00","og_image":[{"width":820,"height":300,"url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg","type":"image\/jpeg"}],"author":"Katharina Niemetz","twitter_card":"summary_large_image","twitter_creator":"@ThomasKrennAG","twitter_site":"@ThomasKrennAG","twitter_misc":{"Verfasst von":"Katharina Niemetz","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#article","isPartOf":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/"},"author":{"name":"Katharina Niemetz","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/person\/fc5a55f07c0b06e32cea83c50cab27f6"},"headline":"Sicheres Hosting in der Cloud","datePublished":"2015-02-16T13:02:41+00:00","dateModified":"2023-02-22T08:52:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/"},"wordCount":181,"commentCount":0,"publisher":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#organization"},"image":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg","keywords":["Cloud","Content: Webinare","Hosting"],"articleSection":["Backup &amp; Storage","IT-Security","Virtualisierung","Webinare"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/","name":"Sicheres Hosting in der Cloud - TKmag","isPartOf":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg","datePublished":"2015-02-16T13:02:41+00:00","dateModified":"2023-02-22T08:52:43+00:00","breadcrumb":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#primaryimage","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg","contentUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2015\/02\/Webinar_sicheres_Hosting_Cloud_Aufzeichnung.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/expertentipps\/virtualisierung\/sicheres-hosting-der-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"TKMag","item":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/"},{"@type":"ListItem","position":2,"name":"Sicheres Hosting in der Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#website","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/","name":"TKmag","description":"Das Expertenmagazin rund um Server, Storage, Virtualisierung und mehr.","publisher":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#organization","name":"Thomas-Krenn.AG","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/logo\/image\/","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2019\/07\/tk_logo_340px.png","contentUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2019\/07\/tk_logo_340px.png","width":340,"height":160,"caption":"Thomas-Krenn.AG"},"image":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/thomaskrenn.ag\/","https:\/\/x.com\/ThomasKrennAG","https:\/\/www.instagram.com\/thomaskrenn.ag\/","https:\/\/de.linkedin.com\/company\/thomas-krenn-ag","https:\/\/www.youtube.com\/channel\/UCRdFd4BVXPbocFk1EYJwL0A"]},{"@type":"Person","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/person\/fc5a55f07c0b06e32cea83c50cab27f6","name":"Katharina Niemetz","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/04\/Katharina_Niemetz-96x96.jpg","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/04\/Katharina_Niemetz-96x96.jpg","contentUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/04\/Katharina_Niemetz-96x96.jpg","caption":"Katharina Niemetz"},"description":"Katharina Niemetz war nach ihrem Germanistikstudium an der Universit\u00e4t Wien von Januar 2015 bis Juli 2017 bei der Thomas-Krenn.AG besch\u00e4ftigt. Als Texterin\/Onlineredakteurin in der Communications-Abteilung k\u00fcmmerte sie sich haupts\u00e4chlich um die Bereiche Content-, Social-Media- und E-Mail-Marketing.","sameAs":["https:\/\/www.linkedin.com\/in\/katharina-niemetz-233941b9?trk=nav_responsive_tab_profile"],"url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/author\/kniemetz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts\/10817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/users\/308"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/comments?post=10817"}],"version-history":[{"count":9,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts\/10817\/revisions"}],"predecessor-version":[{"id":22081,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts\/10817\/revisions\/22081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/media\/10833"}],"wp:attachment":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/media?parent=10817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/categories?post=10817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/tags?post=10817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}