The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Looking for a consolidated solution to find, secure, and monitor all of your web applications?
Join this 20 minute webinar to see how Veracode can help you easily track and inventory all of your external web applications with the ability to scan and scale on thousands of sites in parallel to find critical vulnerabilities and prioritize your biggest risks.
Learn how to leverage technologies such as Veracode Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). As one of the multiple scanning technologies Veracode offers on a single platform, your organization can systematically reduce risk while continuously monitoring your security posture.
Do your employees struggle to access and analyze information that sits across multiple systems? Do they delay completing tasks that require they login to yet another system? Employees are now pushing back against legacy systems – both on-premises and SaaS – and demanding more modern applications to complete their work. Unfortunately, you have spent millions of dollars on software and replacing them is not an option. The question: how do you meet employee expectations for more user-friendly tools without costly upgrades or throwing out your existing systems? Answer: a modern portal.
Sapho’s modern portal surfaces personalized and relevant tasks and data to employees using micro apps. Sapho micro apps are built by IT on top of your existing systems using a simple micro app builder and pre-built templates. These micro apps – available on any device, intranet, or messenger app – provide employees with proactive notifications about interesting system data, actions that need to be completed, and changes in business data that require attention. With Sapho, employees can complete work faster and make better decisions, improving their overall productivity and effectiveness.
In this webinar, we will show you how easy it is to build a modern portal that:
- Connects to your existing systems with pre-built connectors for systems such as SAP, Oracle, Concur, Salesforce, or ServiceNow
- Surfaces event-driven micro apps, that you can build in just 15 minutes to deliver simplified workflows and data access
- Is accessible by employees from any device, intranet, or messenger allowing them to complete actions and review information from anywhere
The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.
Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:
•Cloud Single Sign-On for easy access to cloud apps
•Regulatory compliance with standards such as PCI DSS
•Reduced identity lifecycle overheads
•Centralized management of cloud access policies
•Increased security with step-up authentication
Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.
In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:
- Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
- We have the data, now what? AI & the Future of Customer Experience
- How to use Predictive Analytics to find the right customer on the right channel
- 3 ways to drive ROI for your business by applying AI to improve the Customer Experience
Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
Securing a global enterprise requires security, development, vulnerability management, compliance and risk professionals to understand the engagement and inflection points in the software development lifecycle—and their roles to accelerate it.
Join Veracode for a two part session featuring "Securing the Enterprise in a DevOps World" with David Wayland, and an interactive panel discussion to continue the conversation on securing the enterprise in a DevOps World. This open round table discussion will be led by Veracode Co-Founder and CTO, Chris Wysopal. We will have time for Q&A so bring your questions!
The discussion will touch upon:
· Are you crawling, walking or running with your DevOps initiative?
· Pitfalls? Success?
· How are you connecting the dots for the business and the board on how your application security initiative is mitigating risk?
Panelists: David Wayland, Head of Enterprise Application Security—Fortune 500 Financial Firm, Pete Chestna, Director of Developer Engagement—Veracode, Joseph Feiman Chief Innovation Officer—Veracode.
If you are moving between methodologies, you are probably looking for a roadmap or at least lessons from someone that’s been through it already. Over its 10+ years, Veracode has moved from monolith to microservice and from waterfall to DevOps. We have learned a lot along the way and I’m eager to share the story. In this session learn:
· A basic Understanding of Waterfall, Agile and DevOps from a people, process and technology point of view
· Considerations when transitioning between these methodologies
· An approach to leading the change in your own company
· How Security can best be integrated into DevOps
According to Akamai, attacks at the application layer are growing by more than 25% annually. But many organizations still struggle to understand how to get started with application security, or what good looks like.
To shed light on the application security process, this session will outline the steps most of Veracode's customers take to develop a mature application security program. Attend and hear about Colin’s experience developing and managing an application security program from the ground up and learn:
• The different AppSec phases most organizations are currently in
• The next steps to take when moving toward a more comprehensive AppSec program
• Lessons learned, best practices and pitfalls to avoid -- from someone who’s been there
• What a comprehensive, mature AppSec program entails
Software makes the world go round these days, and it’s also causing a lot of problems. The U.S. Department of Homeland Security recently found that 90 percent of security incidents result from exploits against defects in software. It sometimes seems like we’re just rolling out the red carpet for cyberattackers with our applications. Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software?
We’ll discuss the four primary ways that vulnerabilities end up in your software. Attendees at this session will understand the main sources of vulnerabilities and how to prevent them -- a good first step in making apps less like a red carpet for cyberattackers, and more like a moat. We’ll get attendees up to speed on the following:
• Insecure coding
• A threat landscape that never quits
• Indiscriminate use of components
• Programming language choice
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point. Attend this session and learn about new approaches such as:
• Work with the way developers work.
• Cover not only the apps an organization develops internally, but also those it purchases or assembles from components.
• Move beyond the software development lifecycle to the full software lifecycle, covering apps from inception through production.
If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.
Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP and Tobias Bloch, VP Sales, North America at Accenture discuss the benefits of SAP’s ISV Partner Program, including the strength and seamlessness of go-to-market opportunities. Accenture is partnering with SAP to bring the power of SAP Cloud Platform to their customers.
PwC helps organizations and individuals create the value they're looking for. PwC leverages GRC technology to help clients manage risk with analytics. Elizabeth McNichol, Partner Risk and Compliance, PwC and Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP discuss the benefits of SAP’s ISV Partner Program and SAP’s portfolio to manage large data sets.
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.
To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.
Join us for this to learn:
- 6 reasons development should own security
- Best practices to employing Shift-Left security
- How to deploy secure apps at DevOps speed
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.
Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.
An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).
Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:
•How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
•How to leverage open standards to achieve GDPR compliance for strong authentication
•How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks
5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.
The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.
5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
•How will 5G impact industry?
•What are the market challenges and opportunities?
•What are the key drivers for growth?
•How big will the market be for 5G by 2022?
Test automation has become a must, especially in agile and DevOps projects with their goals of continuous integration and fast deployment. QA teams face many challenges today with testing including emerging technologies, digital maturity, and fast-paced delivery expectations.
In this session, attendees will learn about:
1.Key challenges in today’s testing landscape that impact automation testing
2.Ways to set expectations for automation that accelerate buy-in and support
3.Considerations for prioritizing types of testing and technologies for automation
4.Understanding who should be included in planning for automation
There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?
- Should your software emulate a data scientist?
- Learn about the power of data visualizations.
- Learn about creating value from disperse data sets.
This event is presented as part of the Modernizing Application Architecture with Microservices and APIs Virtual Summit Series. Join the event and live chat here: https://ca.6connex.com/event/APIM/login?lang=en-us
Your API strategy is the backbone of how your application architecture comes to life. But with pressure to move fast often teams move on to coding and build a first working version to prove out the concept - incidentally investing too much time to be really willing to rethink the approach.
There is another way... There's a whole world of API prototyping possibilities out there that allows for quick design and more importantly - enables teams to fail fast and get to the best solution that supports the strategy before investing in expensive coding time.
Join this presentation to learn:
- What makes a great API strategy
- What's important for your API design and architecture
- About API prototyping tools and approaches to help you get started
Many organizations are good at making management plans and then executing against those plans. The problem is organizations are now spending more time trying to understand the future, while at the same time the future is becoming less knowable.Organizations must adapt to growing uncertainty with innovation, not retreat, using the right combination of cloud technologies and agile operations.
In this webinar, experts from Google and Red Hat discuss how to:
- Implement hybrid cloud solutions more effectively
- Launch new initiatives with less risk
- Collectively use open source to create a more agile environment.
Please join us, on August 24th, at 10:30 AM PT, for a Webinar on how to confidently secure Docker on AWS.
Docker adoption has surged, up 40% over the past year, taking the lead for DevOps tools on AWS. With this transformation, enterprises are looking for ways to confidently introduce Docker into their Cloud environment. Join us as Cavirin experts guide you through:
> Securing EC2 Container Services, as well as Docker images, brought in from different registries
> Integrating CloudTrail and CloudFormation
> Today's best Docker security practices on AWS
> The latest on Kubernetes
Attend the AWS Docker Webinar and a chance to win Snapchat Spectacles.
It is challenging enough for organizations to stay ahead of the DevOps movement. As part of this trend, application security testing is becoming an integral part of a developer’s job. No longer can Static analysis alone ensure the overall security of an organization’s application portfolio.
In this webinar, learn how CA Veracode is taking the lead on securing DevOps with specific emphasis on:
•Validation of the impact of DevOps in the market through Veracode data and API usage analysis
•Vercode’s product portfolio strategy including Greenlight and IDE integrations enabling customers to stay ahead of DevOps
•Use case scenarios for customers to consider – each from the Security, Development and Operations perspectives
Combat cyber fraud with security orchestration without slowing down your customers
With everything in the enterprise going all digital, bypassing traditional security mechanisms in favor of instantaneous, user-convenient transactions increases the risk to the business exponentially. Accessing confidential employee files electronically, e-signing contracts, or allowing your customers to transfer money via a mobile app without cumbersome verification steps makes you and your customer prone to cyber fraud.
So, what is a digital business to do? You can’t very well remove security completely from your strategy. And, as passwords become obsolete, users increasingly want solutions that are invisible as well as convenient.
Security Orchestration may be the answer to the growing security concerns of your digital enterprise. Join this webcast lead by VASCO Data Security and learn how to keep your digital enterprise secure without slowing down customers or their transactions.
Topics of discussion will include:
•The role of Digital Trust and Orchestration in using frictionless security mechanisms such as:
oStep-up authentication for risky behavior
oBiometric authentication including fingerprint scan or face recognition
oContainer security for mobile apps
•Using security orchestration to improve user experience
Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.
You should attend this webinar if you want to:
- Minimize the total cost of ownership (TCO) for your next WiFi project
- Learn how wireless technology is advancing
- Be prepared for the next generation of wireless will be here in just a few years
Learn how to 10x your development velocity with an easy-to-setup Kubernetes pipeline. Having a true continuous deployment pipeline is closer than you think. By leveraging powerful technologies like Kubernetes, Google Container Engine (GKE), Google Container Registry (GCR), and Codefresh, we’ll show you how to go from commit to deploy faster than ever.
In this webinar, join William Dennis, Product Manager at Google Cloud, and Dan Garfield, Full-Stack Developer at Codefresh to see just how easy and powerful continuous deployment can be when using Kubernetes with Google Cloud and Codefresh.
Topics will include:
Setting up your first Kubernetes cluster
A full guide to deploying your first application
Automating deployment to Google Container Engine (GKE)
Tactics for testing microservices
Image tagging strategies for high quality control in Docker Registries
Not to mention free credits to help you get started!
Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.
Attendees will learn:
- What are the obstacles getting in the way of achieving digital transformation?
- Strategies to end the misalignment of business and IT on digital initiatives
- A roadmap to closing the IT delivery gap
IT organizations that rely on legacy platforms and traditional development processes struggle to innovate and keep up with competitive pressures and the high rate of change demanded by customers. Application and infrastructure modernization is needed and while many organizations are interested in making this change, they often find themselves asking, “Where and how do we begin?”
In this webinar we’ll share best practices from successful IT modernization and migration projects to help you get started on your digital transformation journey. Topics include:
- Analyzing large-scale application portfolios for modernization opportunities.
- Modernizing existing Java™ applications with containers, CI/CD, and DevOps principles.
- Creating a business case.
- Structuring transformation project teams.
- A proven methodology for migrations.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
User interfaces often utilize components such as grids and tables to help users browse and understand data. Today’s large data sets require sophisticated capabilities to ensure users can effectively comprehend data while remaining flexible and responsive. Building this functionality is time consuming, has integration and maintenance risks, and worst of all, distracts developers from the task at hand -- actually building the app.
Attend this webinar to learn how the web’s most powerful data grid and GraphQL can help you deliver advanced functionality with minimal effort. You’ll learn how to:
- Leverage React and GraphQL to easily group, sort, filter, page, and edit tabular data in a highly performant grid.
- Use ExtReact’s built-in GraphQL proxy to fetch data from any GraphQL server quickly and easily.
- Integrate other popular GraphQL libraries such as Apollo and Relay.
Tectonic 1.7 brings you the latest and greatest on enterprise-ready pure, upstream Kubernetes. The features in this release include:
-Stable support for Microsoft Azure to further extend the portability of applications across hybrid cloud environments
-Pre-configured monitoring and alerts via Prometheus’ AlertManager,
-Security compliance and governance.
Rob Szumski, Tectonic product manager at CoreOS, leads this webinar through the changes in the Tectonic 1.7 release. He'll go over the features included from this release and how Tectonic continues the push to breaking open the cloud market.
Dans un monde de plus en plus connecté, il est primordial pour les entreprises performantes de capter les opportunités en provenance de l’ensemble des canaux numériques : web et mobile. Dans ce contexte, les entreprises doivent adapter leur processus et leur système d’information (SI). Au travers de ce webinar, CA Technologies et ELCA vous présentent le rôle des architectures micro-services et des solutions d’API Management dans ce processus de transformation.
Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
Join our webinar to learn:
•What are containers?
•How to use containers?
•What are the security challenges they introduce?
The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPED and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.
In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development.
Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.
Join this webinar with 451 research and Quali to learn:
•Current trends in hybrid and multi-cloud deployments and enterprise requirements
•How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
•Sample case study of an enterprise undergoing cloud migration with best practice recommendations
NoSQL Databases are among the most important core components of Big Data infrastructure. This webinar covers 3 such NoSQL databases such as Cassandra, MongoDB and Toshiba's GridDB. Get more insights on the below attributes of these NoSQL databases
VR has sprouted a lot of startups, but not a whole lot of revenue yet. Yet the theory is that where there’s investment, there’s got to be fire. In this new wave of VR technology, refined console headsets are being set loose in the world, and mobile VR and mobile 360 are growing more popular with consumers. So it’s time to start thinking about a monetization strategy.
In mobile, for instance, freemium with a combination of ads and in-app purchases is the powerhouse that generates over 95 percent of revenues. For consoles, downloadable and extended content plus microtransactions are the big money makers. But virtual reality is an entirely new way of interacting with content. Will consumers be willing to stand through advertisements? Will they trust a virtual reality payment method, or is the technology too new to engender consumer confidence?
In this VB LIve event, you’ll learn about:
The future of VR payments, commerce, and innovation
How payments technology is revolutionizing VR/AR experiences
The challenges that emerge from the consumer and merchant side
The global perspective of VR/AR and where it is headed
* Stewart Rogers, Director of Marketing Technology, VB
* Cleveland Brown, CEO, Payscout
* Charlie Fink, VR columnist, Forbes
* Rachael Brownell, Moderator, VentureBeat
Many Kubernetes users are interested in hosting various workloads on Kubernetes. Aleks and Saurabh walks through multitenancy and security primitatives in Kubernetes to successfully run mixed workloads.