EVENTS

IBM IoT Exchange 2019
IBM IOT EXCHANGE 2019
July 23-24, 2019
After successful events in the US and Europe, IBM IoT Exchange heads to Sydney to round out our world tour. But it’s not too soon to plan for next year.We’ll hit the road again in 2020 with the latest AI, security and blockchain innovations. Experience the event that brings IBM and our p...

IoT Readiness Workshop
IOT READINESS WORKSHOP
July 24-24, 2019
Getting the right start when you’re implementing IoT in your business is critical. Our IoT readiness workshop is designed by industry experts who will help you identify, plan, implement and assess the outcome of your IoT project–whether you’re starting your first or you’ve al...

.

THOUGHT LEADERS

home.aspx
   
Q&A with Olivia (Ross) Taylor, Director of CRO at Directive Consulting
Q&A WITH OLIVIA (ROSS) TAYLOR, DIRECTOR OF CRO AT DIRECTIVE CONSULTING
Olivia Taylor, Director of CRO at Directive Consulting has 10 years of working experience in graphic designing and has expert knowledge in CRO/UX in landing pages and websites designing.

Olivia was recently nominated for the Orange County Business Journal's Top 25 Wom...

Q&A with Tyler Lessard, VP Marketing, Vidyard
Q&A WITH TYLER LESSARD, VP MARKETING, VIDYARD
Tyler Lessard, VP Marketing of Vidyard has been recently named as an Epic Marketer by Marketo. In this interesting Q&A, Tyler takes us through his marketing journey and shares with us the value of technology in an era where videos are not just visually replenishing, but are also empowering the custo...

Q&A with Henson Gawliu Jr., VP Marketing, SAP
Q&A WITH HENSON GAWLIU JR., VP MARKETING, SAP
In this Q&A, Henson Gawliu Jr. gives us a glimpse about how his career started into marketing and why he fell in love with technology. Here are his thoughts on marketing and driving customer experience.

MEDIA 7: Can you tell me about your background? I understand you went to S...

SPOTLIGHT

As the number of devices within the IoT grows with each passing day, so too does the number of accessible data nodes. More methods of connection results in more opportunities for unauthorized interception and access. Ensuring that data is protected and secure is vital in the face of a growing threat