UK to let Huawei help build 5G data network

IGTV's Victoria Scholar discusses the news that the UK Government has approved the supply of equipment by Chinese telecoms firm Huawei for the UK's new 5G data network.

Spotlight

White Hawk Software

White Hawk Software is a Silicon Valley based software Security Company protecting mission critical software by tamper-proofing code and cryptographic keys against modifications AT RUNTIME and reverse engineering, no matter what malware is attacking.

OTHER VIDEOS

Ericsson’s energy-smart 5G site in Texas sets a new standard for sustainable network solutions

video | July 11, 2023

Ericsson’s new proof-of-concept 5G site has the potential to be fully powered by solar energy complemented by integrated Lithium-ion batteries for up to a 24-hour period....

Watch Now

Unlocking the power of 5G with Magnus Bjorkman

video | August 14, 2023

Magnus Bjorkman, CEO of Tension and a gamification app developer, invites you into his world. This behind-the-scenes story profiles his journey in life putting the customer experience first to create immersive sports fan experiences in his native Sweden and beyond....

Watch Now

IBM: Let's create the right AI for your business with watsonx

video | August 28, 2023

There’s AI, then there’s the right AI for your business. Introducing watsonx: a platform designed to multiply output by tailoring AI to your needs....

Watch Now

Boosting Branch Communications with Fortinet Secure SD-WAN | Customer Stories

video | August 17, 2023

One of New Zealand’s largest fully integrated logistics providers, #Fliway, has trucks on the road, across the country, around the clock. Its 450 staffers at 13 branch locations and 6 warehouses needed reliable, secure connectivity, but were increasingly challenged by a patchwork of legacy equipment and an expensive MPLS-based managed wide area network....

Watch Now

Spotlight

White Hawk Software

White Hawk Software is a Silicon Valley based software Security Company protecting mission critical software by tamper-proofing code and cryptographic keys against modifications AT RUNTIME and reverse engineering, no matter what malware is attacking.

Events