CeBIT 2015: What’s hot, what’s trending in B2B

0 Shares 0 Flares ×

Showcasing the latest in digital trends and hard tech for enterprise, the annual CeBIT technology fair was held from March 16 to March 20 in Hanover, Germany. More than 3,300 exhibitors attended, representing 70 countries with the latest in innovation spread out across 5 million square feet.

While the latest with video games, mobile apps and other consumer products were on display, a number of IT trends and themes marketed towards B2B firms won the spotlight, many of which are worth keeping an eye on to see how they develop.

Samsung Electronics

Samsung Electronics made several announcements regarding its Internet of Things (IoT) solutions. One of its big reveals was the addition of a B2B segment of its company, called Samsung Business. With this announcement Samsung unveiled its plans to provide numerous solutions for B2B companies in several industries including retail, healthcare, transportation, hospitality, education and finance. Like many of the other presenters, security seems to be high on Samsung’s radar. The company also divulged its plans to beef up its WiFi security solutions.

Huwai and SAP and Iot

Also in the IoT space, Chinese telecom giant Huawei struck a deal with German software company SAP to develop new technologies for the Internet of Things. A “joint innovation efforts” will be set up in Shenzhen, where Huawei is based, and in Walldorf in Germany, home to SAP, for IoT research. Also, the companies said that as part of the extended deal they will focus on developing packaged offerings for customers including those in the maintenance and warning services industries in China and Europe,” as ZDNet reports.

Huawei also introduced four new ICT services, including Next Generation Anti-DDoS.

Blackberry SecuTablet

BlackBerry continues to try and stay relevant in a fast-paced and competitive environment. Last year BlackBerry purchased Secusmart to boost its security factor and is now teaming up with Samsung and IBM with its latest product, the SecuTablet. Based on the Galaxy Tab S 10.5, the SecuTablet is going to be marketed to both the private and public sectors that need high security.

“The SecuTABLET closes a supply gap and opens up for government and administrations an opportunity to derive greater benefit from digitization and the mobile Internet, with system integration as a fundamental success factor,” said Stefan Hefter, an IBM senior management consultant. “We have contributed our longstanding expertise as a system integrator for mobile solutions. The technology used to make mobile apps secure by means of so-called wrapping has already proven its worth in the United States.”

SecuTablet is rumored to be released this summer priced at $2,380.

The new BlackBerry SecuTablet. Image via BlackBerry
The new BlackBerry SecuTablet. Image via BlackBerry

Vivicom’s BlueVision

Dubbed as a “new B2B communications solution” for video telephony and project work, Vivicom’s BlueVision offers B2B firms a way to improve face-to-face communication and collaboration, regardless of geography. This tool is promoted as:

  • Providing the ability to hold meetings and conferences on multiple platforms
  • Compatible with laptops, desktops and mobile
  • Supporting up to 49 participants

Want to hold webinars or online courses? This tool covers you there, too. The BlueVision tool also offers server and cloud versions, and is described as having high protection against wiretapping.

Flexibility equates to better productivity

Historically, organizational behaviorists suggest employees who are allowed levels of autonomy and flexibility are more productive. Recent surveys and studies appear to back up this theory. As IoT continues to pave a path to the future, businesses are clearly looking at how it will assimilate with everyday tasks. During its presentation at CeBIT, Google highlighted the role technology can play in strengthening this aspect of business. According to the tech giant, its priority is “removing any hurdles” that hinder staff from letting creativity flow. Collaboration in the cloud plays a big role as it can allow employees to have the freedom to collaborate from any location.

“Give people freedom and they will dazzle you,” said Frank Kohl-Boas, Google’s Head of HR said during his speech at CeBIT.

Innovation from China

Notable was China’s strong presence, with more than 600 companies presenting at the annual event. China was also the partnering country for CeBIT 2015.

“German business values China, not just as our most important trade partner outside of Europe, but also as a partner in developing sophisticated technologies,” German Chancellor Angela Merkel said on the opening day of the show. Chinese vice premier Ma Kai was also present during the fair, further showing solidarity of a Germany-China partnership in technology.

Expect to see much coming from China on the tech front.

What else was the buzz of CeBIT?

Other topics discussed by industry experts included the trend towards biometrics, cybercrime and protecting data, and how mobile is both changing processes and creating opportunities for new business models. These discussions are going to continue to be prominent with probable tech solutions to follow.

While many technology fairs are aimed at consumers, CeBIT is changing the dynamic. EuroNews reported, “The term, digital economy not only applies to an increasingly connected business community but also the transition of CeBIT from a consumer to a business fair.”

If this year’s fair was any indicator, things indeed appear to be shifting from B2C to B2B.

Image credit: CeBIT video still

 

0 Shares Twitter 0 Facebook 0 Google+ 0 LinkedIn 0 Email -- 0 Flares ×
The following two tabs change content below.
Leigh Goessl

Leigh Goessl

Leigh Goessl has been writing on the web since 2007. She currently is a freelance writer and enjoys writing about business and tech topics. Leigh's previous work includes ghost writing for a a legal website, a major online college and an education website. Her education includes an MBA with a concentration in information security.
0 comments