Story image

IN PICS: MEF16 Baltimore - Day 2

09 Nov 2016

MEF16 officially kicked off on Monday evening with the opening reception, and today saw a jam packed schedule of workshops, proof of concept demonstrations and keynotes. 

Held at the Inner Harbour Hilton Hotel in Baltimore, U.S. The event runs right through to Thursday with over 1200 guests in attendance. 

This event gives guests, speakers and companies an opportunity to engage with top Carrier Ethernet, LSO (Lifecycle Service Orchestration), SDN, NFV, and Cloud services experts who are shaping the future of the communications landscape.

Expanding on popular elements of last year's programme, the MEF Excellence Awards Dinner, Proof of Concept Service & Technology Showcase, LSO Hackathon all aim to empower industry stakeholders with high-quality information and analysis. 

Today finished with the MEF excellence awards with telecoms provider, PLDT, taking out the service innovation award for APAC. A total of 36 companies were competing for a number of awards who Stan Hubbard, MEF16 program director says have gone through a rigorous progress. 

"Thank you to everybody and congratulations to all of the finalists. They've all done a fantastic job."

Microsoft urges organisations to tackle data blindspots
Despite significant focus placed on CX transformation, over a third of Australian organisations claimed that more than one in five of their projects failed.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Renesas develops 28nm MCU with virtualisation-assisted functions
The MCU features four 600 megahertz CPUs with a lock-step mechanism and a large 16 MB flash memory capacity.
DOCOMO ranked world's top mobile operator in 5G SEP applications
NTT DOCOMO has been ranked the world's leading mobile operator in terms of applications for candidate standard-essential patents.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
Gartner’s top 10 data and analytics trends for 2019
Data is the fuel for the modern world, and analytics the engine. Gartner has compiled the top 10 trends to watch this year.
How CIOs can work with colleagues to drive new competitive advantages
"If recent history has taught us anything, it’s that the role of the CIO is always changing, and that it won’t stop changing anytime soon."