Models for Monetising 5G & Edge Computing Investments

In this webinar, STL Partners discussed the range of business models that are available to telcos in the enterprise market, demonstrated these through case studies and real-life examples.  STL leveraged the learnings of its research programme and focused on vertical industries and the role of 5G in manufacturing, healthcare, energy, and transport & logistics.
Watch Now



Build a Robot Application with AWS RoboMaker


Level: 300 Robotics development requires roboticists to use a wide variety of tools to develop, test, and deploy their robot applications. The installation and configuration of a robotics development environment is tedious and time-consuming. AWS RoboMaker provides a suite of tools to simplify the robot development lifecycle. In this tech talk, we'll use AWS RoboMaker to demonstrate the lifecycle of robot development from inception to deployment. We'll review and update the application code using AWS Cloud9, and we'll use AWS RoboMaker to simulate the application with Gazebo. Finally, we'll build, package and deploy the application to a robot using AWS RoboMaker's fleet management features.
Watch Now

Security Hardening for Containerized Deployments across Multi-Clouds

In this webinar, we will examine how to add robust cryptography to the containerized applications that process sensitive data. Our expert speakers will describe how certified cryptographic capabilities -including key generation, digital signing, and data encryption - can be built-in within containerized applications, using hardware security modules (HSMs) to enhance security and facilitate auditing and regulatory compliance.
Watch Now

SIP Fraud Detection – Scenarios and Challenges

WeDo Technologies

We all know that SIP technology provides ample benefits and opportunities for the user to save money whilst increasing productivity. However, these types of systems also create more opportunities for fraud attacks. As SIP technology becomes more widely adopted, fraud threats have grown as well. The key to preventing this is to closely monitor a CSP network — the last thing you want is your system to be hacked when you want to keep the business profitable.
Watch Now

How to Secure IoT Devices with Root-of-Trust Authentication


Secure connectivity is becoming one of the most important challenges for IoT applications. This webinar will help you learn how innovative security measures—Intrinsic ID’s patented SRAM PUF technology coupled with Trusted Secure IP from Renesas—can help you quickly and easily create device and board-level authentication to safely secure a connected IoT system.
Watch Now