“Social, Mobile, Local – Technology Trends, Tools, and Strategies for Small Business Success”
Wednesday, Oct. 26 – 9:00 am-4:00 pm – Madison Event Center in Covington
The NKU Small Business Development Center and NKU Chase Law & Informatics Institute are co-sponsoring a technology conference for small businesses. The conference: Social, Mobile, Local – Technology Trends, Tools and Strategies for Small Business Success, is Wednesday, Oct. 26, from 9 a.m. to 4 p.m. at the Madison Event Center in Covington. If you own a small business or work with one as a service provider, you will find the program relevant and practical. Learn more at http://somolonky.eventbrite.com.
The day-long conference is designed to provide valuable information to small businesses and those who support entrepreneurship in three categories: (1) entities interested in using / maximizing the value of their social media efforts in marketing, relationship building, and sales generation; (2) businesses who want to learn more about the newer, low cost ‘cloud computing’ tools, software, and functional capabilities to improve and expand the efficiency and productivity of their internal processes; and (3) organizations who want to be better informed about the role of intellectual property protection as it relates to their products, services, marketing materials, and business practices.
CincyIP 3rd Annual Symposium, Open Source & Security Cubed: Dispelling the Myths
Thursday, Oct. 27 – 7:45am-4:30pm – The METS Center, 3861 Olympic Blvd., Erlanger
Full information available online.
The program will feature topics on Open Source Compliance, 3D licensing strategy, supply chain issues, M & A topics, the intersection of IP and open source security and other topics.
The use of open source software continues to grow on a daily basis. Today, enterprise applications contain 40% to 70% open source code and this fact has legal, development, IT security, risk management and compliance organizations focusing their attention on its use, as never before. They increasingly understand that the open source content within an application must be detected. Once uncovered, decisions regarding compliance with intellectual property licensing obligations must be made and known security vulnerabilities must be remediated. It is no longer sufficient from a risk perspective to not address both open source issues.
I will be at both programs and hope to see you there.