November 2014

Nov 27

TV and the second screen: social media, innovation and regulation

Thursday, November 27, 2014 - Thursday, November 27, 2014 - 10:00pm

United Kingdom: Delegates at this conference will assess latest developments in the links between broadcasting and the second screen.They will consider challenges and opportunities as broadcasting and social media integrate in editorial and production processes - as well as the implications of the changing commercial relationships between content producers, distributors and ISPs, particularly for investment, innovation and competition.

December 2014

Dec 4

Roundtable Discussion: Privacy & Identity Management

Thursday, December 4, 2014 - Thursday, December 4, 2014

California: Join us for this meeting, we'll look at the topic of privacy from the perspective of one potential solution: Personal Identity Management. How can businesses, individuals, and families manage their identities, their personal data, their privacy preferences, and do so globally across the Internet. Can we reach this goal, or will we forever be the victims of unscrupulous companies, governments, and hackers?

Dec 7

ITU Telecom World

Sunday, December 7, 2014 - Wednesday, December 10, 2014

Qatar: ITU Telecom World is the global platform for high-level debate, networking, innovation-showcasing and knowledge-sharing across the ICT community. It brings together public and private sectors, emerging markets and industry investors to explore the current massive disruption of the ICT sector and its implications for the future. 

Dec 8

Digital Disruption

Monday, December 8, 2014 - Thursday, December 11, 2014

California:  Digital transformation doesn’t happen overnight. But you need to be ready for all that lies ahead for your organization. Digital Disruption 2014 covers the three hottest areas of the digital ecosystem: IoT, Big Data, Virtualization.

Dec 12

Autotech Council: Automotive Cybersecurity

Friday, December 12, 2014 - Friday, December 12, 2014

California: As automobiles become prolific gatherers of data, and as more private data is stored in the car and in the carmaker's cloud, we must escalate the importance of protecting the customers' data from black had operatives. Additionally, as ADAS and autonomous vehicles connect live actuators and car control to the data, the risks of malicious attacks on cars escalates to life-or-death level. As a result, automakers are far more aggressive about securing their products than would be your average smartphone app maker. There simply is much, much more hanging in the balance.

Submit an Event Request!

To prevent automated spam submissions leave this field empty.
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
9 + 8 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.