{"id":13567,"date":"2016-08-01T11:34:28","date_gmt":"2016-08-01T09:34:28","guid":{"rendered":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/?p=13567"},"modified":"2023-01-19T15:12:19","modified_gmt":"2023-01-19T14:12:19","slug":"sicheres-hosting-in-der-cloud-2","status":"publish","type":"post","link":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/","title":{"rendered":"Sicheres Hosting in der Cloud"},"content":{"rendered":"<p>NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt.<br \/>\nBesonders Cloud-Nutzer f\u00fchlen sich aufgrund neuester Ereignisse immer st\u00e4rker verunsichert: Werden ihre Daten von Cloud-Dienstleistern, Geheimdiensten oder Hackern mitgelesen? K\u00f6nnen Bilder, Texte und andere Dokumente eingesehen werden, ohne dass die Nutzer dies bemerken?<\/p>\n<p>Viele der verbreiteten \u00c4ngste sind meist unbegr\u00fcndet.<br \/>\nWelche Gefahren aber tats\u00e4chlich bei der Nutzung einer Computing Cloud drohen und wie Sie diese Gefahren durch eine Cloud \u201eMade in Germany\u201c gr\u00f6\u00dftenteils umschiffen k\u00f6nnen, erkl\u00e4rt Ihnen Patrick Zaubi von der filoo GmbH (Dauer: ca. 60 Minuten).<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Aufzeichnung:<\/span><\/strong><br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/yoP3MnH_txY\" \"=\"\" width=\"560\" height=\"315\" frameborder=\"0\"><\/iframe><br \/>\n<strong>Gerne stellen wir Ihnen zudem die <a href=\"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/webinar-Sicherheit-in-der-Cloud-Patrick-Zaubi.pptx\" target=\"_blank\" rel=\"noopener noreferrer\">Pr\u00e4sentation<\/a> zur Verf\u00fcgung.<\/strong><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Agenda:<\/span><\/strong><\/p>\n<ul>\n<li>Vorstellung<\/li>\n<li>Einleitung<\/li>\n<li>Bestandteile einer sicheren Cloud<\/li>\n<li>\u00dcber die filoo ClouD<\/li>\n<li>Live-Demo<\/li>\n<li>filoo private ClouD<\/li>\n<li>Ihre Fragen<\/li>\n<\/ul>\n<p><strong><span style=\"text-decoration: underline;\">Zielgruppe:<\/span><\/strong><br \/>\nDas Webinar richtet sich an alle Systemadministratoren, Cloud-Nutzer und IT-Interessierten, die etwas zum Thema Sicherheit erfahren m\u00f6chten.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Sprecher:<\/span><\/strong><br \/>\nPatrick Zaubi, Key Account Manager, filoo GmbH<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt. Besonders Cloud-Nutzer f\u00fchlen[&#8230;]<\/p>\n","protected":false},"author":111,"featured_media":13614,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"footnotes":""},"categories":[93,728,176],"tags":[113,300],"class_list":["post-13567","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-backup-storage","category-it-security","category-webinare","tag-vortraege","tag-hosting","post_format-post-format-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicheres Hosting in der Cloud - TKmag<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicheres Hosting in der Cloud - TKmag\" \/>\n<meta property=\"og:description\" content=\"NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt. Besonders Cloud-Nutzer f\u00fchlen[...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/\" \/>\n<meta property=\"og:site_name\" content=\"TKmag\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thomaskrenn.ag\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-01T09:34:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-19T14:12:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1640\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Redaktion\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ThomasKrennAG\" \/>\n<meta name=\"twitter:site\" content=\"@ThomasKrennAG\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redaktion\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/\"},\"author\":{\"name\":\"Redaktion\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/person\\\/ea523d7d40499c43c3129c69226fe17b\"},\"headline\":\"Sicheres Hosting in der Cloud\",\"datePublished\":\"2016-08-01T09:34:28+00:00\",\"dateModified\":\"2023-01-19T14:12:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/\"},\"wordCount\":117,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg\",\"keywords\":[\"Content: Webinare\",\"Hosting\"],\"articleSection\":[\"Backup &amp; Storage\",\"IT-Security\",\"Webinare\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/\",\"name\":\"Sicheres Hosting in der Cloud - TKmag\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg\",\"datePublished\":\"2016-08-01T09:34:28+00:00\",\"dateModified\":\"2023-01-19T14:12:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg\",\"width\":1640,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/webinare\\\/sicheres-hosting-in-der-cloud-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"TKMag\",\"item\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicheres Hosting in der Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#website\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/\",\"name\":\"TKmag\",\"description\":\"Das Expertenmagazin rund um Server, Storage, Virtualisierung und mehr.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#organization\",\"name\":\"Thomas-Krenn.AG\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tk_logo_340px.png\",\"contentUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tk_logo_340px.png\",\"width\":340,\"height\":160,\"caption\":\"Thomas-Krenn.AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/thomaskrenn.ag\\\/\",\"https:\\\/\\\/x.com\\\/ThomasKrennAG\",\"https:\\\/\\\/www.instagram.com\\\/thomaskrenn.ag\\\/\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/thomas-krenn-ag\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRdFd4BVXPbocFk1EYJwL0A\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/#\\\/schema\\\/person\\\/ea523d7d40499c43c3129c69226fe17b\",\"name\":\"Redaktion\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/Redaktion1-96x96.jpg\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/Redaktion1-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/Redaktion1-96x96.jpg\",\"caption\":\"Redaktion\"},\"description\":\"In unserem TKmag legen wir gro\u00dfen Wert darauf, alle Artikel von unseren Experten schreiben zu lassen. Aus diesem Grund gibt es den Redaktions-Account: Unter diesem Namen stellen wir alle Artikel ein, die von unseren Mitarbeitern ohne eigenen Account verfasst wurden.\",\"url\":\"https:\\\/\\\/www.thomas-krenn.com\\\/de\\\/tkmag\\\/author\\\/redaktion\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicheres Hosting in der Cloud - TKmag","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"de_DE","og_type":"article","og_title":"Sicheres Hosting in der Cloud - TKmag","og_description":"NSA, Foto-Leak, Hackerangriffe \u2013 in letzter Zeit werden immer mehr F\u00e4lle bekannt, in denen Daten systematisch ausspioniert und gestohlen werden. Nichts scheint mehr sicher in der IT-Welt. Besonders Cloud-Nutzer f\u00fchlen[...]","og_url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/","og_site_name":"TKmag","article_publisher":"https:\/\/www.facebook.com\/thomaskrenn.ag\/","article_published_time":"2016-08-01T09:34:28+00:00","article_modified_time":"2023-01-19T14:12:19+00:00","og_image":[{"width":1640,"height":600,"url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg","type":"image\/jpeg"}],"author":"Redaktion","twitter_card":"summary_large_image","twitter_creator":"@ThomasKrennAG","twitter_site":"@ThomasKrennAG","twitter_misc":{"Verfasst von":"Redaktion","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#article","isPartOf":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/"},"author":{"name":"Redaktion","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/person\/ea523d7d40499c43c3129c69226fe17b"},"headline":"Sicheres Hosting in der Cloud","datePublished":"2016-08-01T09:34:28+00:00","dateModified":"2023-01-19T14:12:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/"},"wordCount":117,"commentCount":0,"publisher":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#organization"},"image":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg","keywords":["Content: Webinare","Hosting"],"articleSection":["Backup &amp; Storage","IT-Security","Webinare"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/","name":"Sicheres Hosting in der Cloud - TKmag","isPartOf":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#primaryimage"},"image":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg","datePublished":"2016-08-01T09:34:28+00:00","dateModified":"2023-01-19T14:12:19+00:00","breadcrumb":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#primaryimage","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg","contentUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2016\/08\/Webinar_Sicheres_Hosting_in_der_Cloud_Aufzeichnung.jpg","width":1640,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/webinare\/sicheres-hosting-in-der-cloud-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"TKMag","item":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/"},{"@type":"ListItem","position":2,"name":"Sicheres Hosting in der Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#website","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/","name":"TKmag","description":"Das Expertenmagazin rund um Server, Storage, Virtualisierung und mehr.","publisher":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#organization","name":"Thomas-Krenn.AG","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/logo\/image\/","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2019\/07\/tk_logo_340px.png","contentUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2019\/07\/tk_logo_340px.png","width":340,"height":160,"caption":"Thomas-Krenn.AG"},"image":{"@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/thomaskrenn.ag\/","https:\/\/x.com\/ThomasKrennAG","https:\/\/www.instagram.com\/thomaskrenn.ag\/","https:\/\/de.linkedin.com\/company\/thomas-krenn-ag","https:\/\/www.youtube.com\/channel\/UCRdFd4BVXPbocFk1EYJwL0A"]},{"@type":"Person","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/#\/schema\/person\/ea523d7d40499c43c3129c69226fe17b","name":"Redaktion","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2014\/03\/Redaktion1-96x96.jpg","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2014\/03\/Redaktion1-96x96.jpg","contentUrl":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-content\/uploads\/2014\/03\/Redaktion1-96x96.jpg","caption":"Redaktion"},"description":"In unserem TKmag legen wir gro\u00dfen Wert darauf, alle Artikel von unseren Experten schreiben zu lassen. Aus diesem Grund gibt es den Redaktions-Account: Unter diesem Namen stellen wir alle Artikel ein, die von unseren Mitarbeitern ohne eigenen Account verfasst wurden.","url":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/author\/redaktion\/"}]}},"_links":{"self":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts\/13567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/comments?post=13567"}],"version-history":[{"count":10,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts\/13567\/revisions"}],"predecessor-version":[{"id":22924,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/posts\/13567\/revisions\/22924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/media\/13614"}],"wp:attachment":[{"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/media?parent=13567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/categories?post=13567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thomas-krenn.com\/de\/tkmag\/wp-json\/wp\/v2\/tags?post=13567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}