Day 2 - 14 November 2019
09:30AM - Day 2
Operational 5G: Chair’s Welcome & Opening Remarks
5G, the benefits and the challenges
- Latency, network slicing
- Acceleration of existing technologies
- Barriers, gaps in connectivity
Panel: Unlocking the potential of 5G
- What will be the main enterprise value & business outcomes of 5G?
- How 5G will affect the holy quintet; capacity, reliability, latency, bandwidth and efficiency?
- What can we do now to prepare for the full rollout?
- 5G in five years time, where will we be?
Director of RAN Engineering
11:30AM - Day 2
Massive IoT and the 5G Revolution
This talk will look at how the combination of Massive IoT and new 5G technology will improve both the connectivity speed and coverage to drive IoT to achieve its full potential.
Big Data Analytics in 5G
With the dawn of 5G promising enabled intelligent network and application services with connectivity to remote sensors, big data analytics will be at the forefront of the evolution of 5G standards. This talk will look at the role of analytics in the context of 5G.
02:00PM - Day 2
5G, do you need it?
to follow soon . . .
5G, IoT & Blockchain: collaboration is key
Collaboration will be crucial in minimising the disturbance that will be caused by the increase in digitalisation that will be bought forth with 5G. This talk will discuss how with the advent of the 5G revolution, blockchain would be capable of amassing more and more data via 5G-powered, IoT-enabled devices.
Panel: Edge computing architecture as an enabler for 5G
The widespread adoption of 5G by individuals and companies is not expected until 2020. This panel discussion will look at the importance of integration edge computing architecture now, in order to be prepared for when the 5G revolution truly begins.
5G and the Future of Cybersecurity Strategy
Offering speeds anywhere from 20 to 100 times faster than 4G long-term evolution (LTE), the next generation of wireless networks will also support higher capacities of wireless devices. As more and more devices are powered on and synced up, each one becomes a potential security vulnerability for the wider network. This talk will look at the considerations that this will bring with regards cybersecurity strategy and how this can be pre-empted.