2014 Creative Lab Broadband Keynote Bernie Su

Bernie Su, Emmy Award Winning Web Series Creator “Lizzie Bennet Diaries”, “Emma Approved”, “Lookbook: The Series”, PBS Digital’s “Frankenstein MD”.

Spotlight

Soha Systems, Inc

Enterprises are providing access to their corporate applications in much the same way they did twenty years ago. But, in today’s cloud and mobile-centric world – in which IT organizations need to provide third parties access to behind the firewall applications – how can IT ensure secure access without the chronic pain and complexity that goes along with providing third party access?

OTHER VIDEOS

Ericsson’s energy-smart 5G site in Texas sets a new standard for sustainable network solutions

video | July 11, 2023

Ericsson’s new proof-of-concept 5G site has the potential to be fully powered by solar energy complemented by integrated Lithium-ion batteries for up to a 24-hour period....

Watch Now

Unlocking the power of 5G with Magnus Bjorkman

video | August 14, 2023

Magnus Bjorkman, CEO of Tension and a gamification app developer, invites you into his world. This behind-the-scenes story profiles his journey in life putting the customer experience first to create immersive sports fan experiences in his native Sweden and beyond....

Watch Now

IBM: Let's create the right AI for your business with watsonx

video | August 28, 2023

There’s AI, then there’s the right AI for your business. Introducing watsonx: a platform designed to multiply output by tailoring AI to your needs....

Watch Now

Boosting Branch Communications with Fortinet Secure SD-WAN | Customer Stories

video | August 17, 2023

One of New Zealand’s largest fully integrated logistics providers, #Fliway, has trucks on the road, across the country, around the clock. Its 450 staffers at 13 branch locations and 6 warehouses needed reliable, secure connectivity, but were increasingly challenged by a patchwork of legacy equipment and an expensive MPLS-based managed wide area network....

Watch Now

Spotlight

Soha Systems, Inc

Enterprises are providing access to their corporate applications in much the same way they did twenty years ago. But, in today’s cloud and mobile-centric world – in which IT organizations need to provide third parties access to behind the firewall applications – how can IT ensure secure access without the chronic pain and complexity that goes along with providing third party access?

Events