Last week, our Open Digital Standards July 2021 event brought together vendors and end-user organizations from across the globe to discuss how the cross-industry development of open standards is helping businesses become digital-first. It was fantastic to have over 1,040 attendees from more than 90 countries gather virtually to discuss this critical roadmap to digital transformation.
Digitalization is forcing the convergence of networks and platforms that have traditionally remained separate. Mobile networks have previously been the domain of telecommunications providers, but as new mobile generations emerge the reach of the network is also becoming an enterprise domain.
We spoke with Thomas Magedanz, Professor of Electrical Engineering and Computer Sciences at the Technische Universität Berlin and Director of the software-based networks competence center at Fraunhofer Institute FOKUS, about the expectations for 5G networks, why 5G technologies are being tested with Smart Cities applications and how standards can drive the global network interoperability that 5G will require. Thomas was a keynote speaker at The Open Group Berlin 2017 in April.
Making Standards Work® for Smart Cities was the theme of The Open Group Berlin 2017 event. The focus was on how an architecture framework such as TOGAF®, an Open Group standard, can help administrations govern the introduction of smart systems to enable their citizens and businesses to thrive and prosper.
Its focus will be on how an architecture framework such as TOGAF®, an Open Group standard, can help administrations govern the introduction of smart systems to enable their citizens and businesses to thrive and prosper.
By The Open Group
The Open Group kicked off its first event of 2017 on a sunny Monday morning, January 30, in the City by the Bay, with over 200 attendees from 20 countries including Australia, Finland, Germany and Singapore.
By The Open Group
The increase of cybersecurity threats, along with the global nature of Information and Communication Technology (ICT), results in a threat landscape ripe for the introduction of tainted (e.g., malware-enabled or malware-capable) and counterfeit components into ICT products. This poses significant risk to customers in the operation of their business enterprises and our critical infrastructures.