Browse communities
Browse communities
Presenting a webinar?

Mobile Computing

Community information
Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
  • Early on expectations from B2B buyers in their journey set the stage for marketing and sales to work together. As leads flow in, an agreed-upon plan and process should be in place for lead identification, distribution and follow-up. This optimized plan and process can make a huge difference between smooth sailing or rough seas in the next steps of the journey for the marketing and sales teams and most importantly, the buyer.

    So, what does this process look like, and how can an optimized lead process affect not only the quality of the buyer's journey, but opportunity generation? Join Isaac Payne, Marketing Operations Specialist, and Ali Gooch, Sr. Sales Manager-both of Pardot, as they explore and give us tips on how we can get the most out of an optimized lead process.
  • Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

    SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.

    Key Takeaways:
    • Security considerations in each of the architecture layers
    • Data isolation risks and mitigation plans
    • Overview of CWE/SANS and OWASP Security threats
    • Data retention and termination policies
    • Infrastructure and cloud related security risks and solutions
  • Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.

    Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
  • There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • Mobile applications, cloud computing and BYOD (Bring Your Own Device) are reshaping nearly every aspect of your business, from revenue opportunities to how and where your employees work. They’re also forcing you to reinvent your security policies. Otherwise every device, from laptop to smartphone, is a data breach waiting to happen.

    In Pulse Secure’s webinar on March 19, Senior Principal Analyst Jon Oltsik of Enterprise Strategy Group will explore the new world of mobile security:

    User role, device type, network location & factors define your new security needs.

    Creating - Enforcing - Effective network access policies for secure mobile processes.

    How top organizations are tackling mobile security.
  • Mobile apps present a unique challenge for e-commerce merchants. Not only do they need to positively engage your customers, they must also generate revenue for your company. 

    So what keeps customers happy and coming back for more? Apps that support the on-the-go lifestyle and are engaging enough to keep users interested for the long term.

    In this webinar, 5 Tips to make sure customers transact with your app, we'll provide a clear roadmap for success that focuses on specific dos and don'ts, including:

    - DO NOT be insensitive to data privacy concerns
    - Do pay close attention balancing functionality with download speed
  • Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.

    Why You Should Attend:
    • Understand the “risk premium” ascribed to the cloud versus the private data center.
    • Learn why the cloud requires new processes for governance and compliance.
    • Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
    • Understand how to build a holistic approach to cloud security.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We’ll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET’s powerful endpoint solutions respond to APTs.

    Category: Research overview and ESET product presentation.
  • The rise of enterprise trends such as bring your own device (BYOD), increased use of cloud and network based services and the need to ensure optimum performance, makes added user authentication measures vital.

    Two-factor authentication provides an extra layer of safekeeping that is imperative when adopting a holistic security infrastructure while keeping the cost of implementation down.

    Join us for an interactive webinar to gain insights on:

    • Why and how is Two-factor authentication one of the easiest ways of accomplishing a higher level of security for your enterprise systems?
    • How does Two-factor authentication ensure identity protection?
    • How to deploy a Cloud-based Two-factor authentication platform?
  • Quality of Service (QoS) is essential to growth of every organization. Building a high quality, reliable and flexible network infrastructure is particularly challenging with continuously growing network demands imposed by today’s mobile workforce. For that reason, many IT professionals are looking into the clouds for answers.

    Join Curtis Peterson, SVP Operations at RingCentral, as he outlines the advantages of the over the top service model in achieving business agility and high QoS.
  • The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Join us on March 17th to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
  • Recent research reveals that care providers are using mobile technologies to enhance care coordination and improve patient satisfaction.

    Are you and your IT team equipped to support mHealth easily and affordably?

    Join Eric Wicklund, editor of mHealth News and Niel Levonius of RingCentral for this informative 20 minute presentation on trends in cutting edge healthcare communication technology from secure BYOD communications to advanced care coordination platforms. You will learn how:

    IT can support healthcare providers to improve outcomes with real-time, secured mobile communications
    Mobile, cloud platforms can facilitate care provider and patient engagement
    IT can leverage communications solutions that minimize maintenance time and costs
  • Instructional video that illustrates steps to configure a common mobile use case, employee leave requests, in 60 Seconds using Sitrion ONE. More info on www/sitrion.com/one
  • In the past, most traditional test automation focused on the UI and not the back-end. This was a leftover mindset from the days of "just throw it over the wall”. With the current shift in how teams are organized, the skillset for testing is evolving. Dev/Ops, continuous delivery, mobile, cloud and the Internet of Things is forcing a rapid pace of development. Now, QA professionals and business analysts are more ingrained in the overall development process from start to finish. Now that software development for different platforms are using a “shift-left” approach (which involves moving testing to earlier in the software development lifecycle), it is requiring test automation engineers to enhance their technical skills.

    Join Clint Sprauve, Senior Product Marketing Manager for HP Functional Testing, and learn about:

    • API and web services testing early in the development lifecycle
    • How to shift-left with non-technical testers
    • Best practices for proper test automation in Agile and continuous testing processes
  • This video explores a solution to common enterprise mobility headaches such as legacy infrastructure, security, budgets, skill shortages, and time to market. It presents a strategy that uses a rapid, cloud-based, end-to-end solution with pre-built use cases and connectors to SAP, SharePoint and Salesforce in order to solve 80% of common use cases in the enterprise
  • This video explores a solution to common enterprise mobility headaches such as legacy infrastructure, security, budgets, skill shortages, and time to market. It presents a strategy that uses a rapid, cloud-based, end-to-end solution with pre-built use cases and connectors to SAP, SharePoint and Salesforce in order to solve 80% of common use cases in the enterprise
  • Listen in as Jonathan Lindo, Vice President of Enterprise Mobility, talks about how enterprises cope with deploying large scale mobile apps.

    Learn about Mobile DevOps
    . integration with test automation
    . direct from app to service desk and zoom into "user of one" experience
    . obtaining a combined view of developer analytics, business analytics, operations analytics

    Speaker: Jonathan Lindo was the recipient of the 2014 Annual Worldwide Invention & Innovation Award, awarded for 'Smart Containerization of Mobile Device Resources'.
  • The latest release of the premier standard for delivering management information via system firmware, System Management BIOS (SMBIOS) Reference Specification, Version 3, extends support for 64-bit architecture systems. We will review each of the changes with the focus on the new 64-bit support for accessing SMBIOS data. Since its release in 1995, the widely implemented SMBIOS standard has simplified the management of more than two billion client and server systems.
  • What advantages does cloud provide to a growing business?

    Regardless of the organization’s size, industry or geographic location, decision makers and IT staff always look to ensure reliability, flexibility and adaptability of their network infrastructure.

    As businesses expand to multiple locations, instant and reliable communication between remote workers becomes a necessity. Find out what advantages a cloud-based communication system provides over an on-premise legacy solution.
  • More than 90,000 attendees from 200 countries attended the renowned global telecommunications event of the year, Mobile World Congress (MWC) in Barcelona, which took place March 2-5, 2015 in the Fira Gran Via venue. Over 2,000 companies participated in the conference and demonstrated their latest products and innovations in various product lines.


    MWC 2015 Key Themes:

    •SDN (Software Defined Networking) and NFV (Network Function Virtualization) gaining traction
    •Small cells playing a larger role
    •5G hype cycle begins, ahead of standardization in 2016-17 and commercialization by 2020; Europe making a push to recapture technological mindshare with 5G, after being eclipsed by the US, Japan and Korea for 4G
    •LTE unlicensed (LTE-u), with operators showing interest in using unlicensed spectrum and vendors poised to get incremental small cell deals
    •“Virtual everything” – AT&T targeting 5% of its telco network functions virtualized by CY15; vendors showcased solutions including even Radio Access Network (RAN) virtualization
    •Emerging technologies: signaling orchestration (much more than just diameter routing, the interworking with legacy and other emerging protocols will play a huge role) and Self Organizing Networks (SONs)
    •Endpoint launches galore: MWC would not be complete without the introduction of various products ranging from smartphones to the emerging wearables segment