Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Recorded: Feb 21 2017 43 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Logistics Analytics: Predicting Supply-Chain Disruptions Logistics Analytics: Predicting Supply-Chain Disruptions Dmitri Adler, Chief Data Scientist, Data Society Recorded: Feb 16 2017 47 mins
    If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?

    In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
  • KYC in the online age KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 47 mins
    Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

    To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

    Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

    During this webinar, our panel of experts will provide answers to the following questions:

    •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

    •Are customers prepared to go down the digital route?

    •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

    •How are financial institutions coping with the challenges posed by the latest regulatory updates?

    Join us for this panel discussion with our expert speakers:

    Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
    Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
    Sarah Clarke, General Manager - Identity, Mitek
    David Rennie, Identity Assurance Programme, UK Cabinet Office
  • Bridging the Data Silos Bridging the Data Silos Merav Yuravlivker, Chief Executive Officer, Data Society Recorded: Feb 15 2017 48 mins
    If a database is filled automatically, but it's not analyzed, can it make an impact? And how do you combine disparate data sources to give you a real-time look at your environment?

    Chief Executive Officer Merav Yuravlivker discusses how companies are missing out on some of their biggest profits (and how some companies are making billions) by aggregating disparate data sources. You'll learn about data sources available to you, how you can start automating this data collection, and the many insights that are at your fingertips.
  • DDoS Threats of Past, Present and Future DDoS Threats of Past, Present and Future John Ellis, Chief Strategist, Cyber Security (APJ), Akamai & Michael Smith, Chief Technology Officer, Security (APJ), Akamai Recorded: Feb 15 2017 62 mins
    The Fourth Industrial Revolution is in all full swing with the Internet at its core. While the Internet is connecting everyone and everything it also connects us to a variety of nefarious threat actors, who have found ways to exploit and monetize many aspects of our digital world. In recent times, one area has been DDoS, which has become one of the top cyber threats du jour.

    In this webinar, you will learn:

    - Historical developments in the DDoS threat landscape
    - How criminal operators are building out their botnets – discover, infect, operate and maintain
    - Technical examination of new botnet trends such as the Mirai IoT botnet
    - Architectural concepts and design for DDoS mitigation solutions - covering cloud and data centre environments
    - Response strategies to defending and responding to DDoS attacks
    - Predictions for future and next steps.

    Join Akamai and (ISC)² on Feb 15 (Wed) at 13:00 (Singapore time) and learn about the DDoS threats of past, present and future.

    Presenters:
    - John Ellis, Chief Strategist, Cyber Security (Asia-Pacific & Japan), Akamai
    - Michael Smith, Chief Technology Officer, Security (Asia-Pacific & Japan), Akamai

    Moderator:
    - Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • Strategies for Successful Data Preparation Strategies for Successful Data Preparation Raymond Rashid, Senior Consultant Business Intelligence, Unilytics Corporation Recorded: Feb 14 2017 33 mins
    Data scientists know, the visualization of data doesn't materialize out of thin air, unfortunately. One of the most vital preparation tactics and dangerous moments happens in the ETL process.

    Join Ray to learn the best strategies that lead to successful ETL and data visualization. He'll cover the following and what it means for visualization:

    1. Data at Different Levels of Detail
    2. Dirty Data
    3. Restartability
    4. Processing Considerations
    5. Incremental Loading

    Ray Rashid is a Senior Business Intelligence Consultant at Unilytics, specializing in ETL, data warehousing, data optimization, and data visualization. He has expertise in the financial, manufacturing and pharmaceutical industries.
  • Improve Your Cybersecurity Visibility by Thinking Beyond the Network Improve Your Cybersecurity Visibility by Thinking Beyond the Network SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint Recorded: Feb 8 2017 53 mins
    Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

    In this webinar you will learn:

    • How cyber attackers gain visibility into organizations.
    • How you can see across all major threat entry points and stop attacks.
    • How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats.
    • How to eliminate social media risk so you can focus on social success.
    • How to protect against malicious apps that mishandle data or install malware.
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking The Foundations and Future of PKI: Yes, it’s Alive and Kicking Asaf Lerner, PKI product development at Gemalto Recorded: Feb 6 2017 59 mins
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology
  • Master any Cloud with Hybrid Cloud Management from HPE Master any Cloud with Hybrid Cloud Management from HPE Danny Cavion, Keri Sprinkle, Marc Bernis, HPE Recorded: Feb 2 2017 66 mins
    In our first web event in this series, we presented the next generation of hybrid cloud management platform from HPE. Join our second web event for a more in-depth look into the primary design use case: hybrid and multi-cloud management. Learn about the advantages that Hybrid Cloud Management can provide to you and your organization:
    Freedom to choose any cloud
    Cloud agnostic service designs
    Native container support
    Provide master-level control over other clouds and orchestrator
  • Cloud Next: The Next Generation of Cloud Management Software from HPE Cloud Next: The Next Generation of Cloud Management Software from HPE Danny Cavion, Keri Sprinkle, HPE Recorded: Feb 2 2017 67 mins
    HPE continues to refine and strengthen the capabilities of their cloud management platform with their newest software generation, Hybrid Cloud Management (HCM). HCM brings together hybrid and multi-cloud management, world class orchestration, application release automation, cloud compliance and an intelligent cloud service portal. Join us for this web event to find out how the HPE Hybrid Cloud Management platform can help you accelerate operations responsiveness and achieve cloud freedom.
  • Supporting the Idea Economy in Finance: IntelliQA with HPE Mobile Center Supporting the Idea Economy in Finance: IntelliQA with HPE Mobile Center Paul Kaye, IntelliQA Recorded: Feb 2 2017 52 mins
    Mobility has revolutionized the financial services industry and in many cases has changed the ways organizations work. It is changing the language of business and technology – and has become a competitive necessity.

    Join this webinar to learn how a Financial Times Stock Exchange (FTSE) 100 organization is leveraging HPE Application Delivery Management solutions and HPE Mobile Solutions to deliver high-quality experiences to customers, accelerate time to market and ensure innovation is alive and kicking in the world of finance.
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Mike Vien, former CounterTack Sales Engineer and current Malware And Forensic Expert Recorded: Feb 1 2017 63 mins
    Incident response is changing. IR professionals and security teams consistently need tools that provide a deeper level of intelligence around threats impacting their environments. The capability to drill down into information on incidents upon alerts from other tools is critical when investigating root cause and ultimately impact. 

    CounterTack is dedicated to helping incident response and forensics teams leverage behavioral intelligence to track attacks and determine exactly how to work that knowledge into the response workflow. Leveraging behavioral traits and predictive analytics through its products, CounterTack understands the demands IR teams face for improving response time and accuracy.

    This webinar will feature an interactive demonstration of exactly how an IR professional would leverage CounterTack’s industry-leading Responder PRO tool to reverse engineer key risk indicators. This demo will detail real-world uses of not just features in the solution, but show you how to investigate common and uncommon types of threats through a forensic lens.

    Attendees of this session will receive a limited-time only incentive to buy Responder PRO.

    Register Today.
  • 6 Essentials for Secure BYOD in Healthcare 6 Essentials for Secure BYOD in Healthcare Salim Hafid, Product Marketing Manager Recorded: Feb 1 2017 31 mins
    For healthcare organizations struggling to secure BYOD, Mobile Device Management (MDM) was widely heralded as a solution, one that could completely control unmanaged assets. However, physicians with multiple hospital affiliations coupled with privacy concerns has resulted in stagnant adoption.

    In this webinar, we explore alternatives to MDM that protect mobile data and devices without impeding on employee privacy. We'll also explore 6 critical capabilities for securing BYOD to help your firm achieve compliance.
  • Don’t Underestimate the Power of Good Apps Don’t Underestimate the Power of Good Apps Toby Marsden HPE Recorded: Jan 31 2017 61 mins
    Bad apps happen to good people. But they don’t have to. Join us for this session, where industry leaders and customers will show you how to successfully deliver high-quality apps at speed and scale. Learn tips and tricks to help you maneuver past obstacles and avoid bad apps. See some of the high-powered solutions Hewlett Packard Enterprise will bring to market that enable you to address the needs of the digital economy.
  • The Future belongs to the Fast, Transform your Business with IT Management The Future belongs to the Fast, Transform your Business with IT Management Genefa Murphy, Roy Ritthaler, HPE Recorded: Jan 31 2017 30 mins
    Join Roy Ritthaler, VP of Product Marketing IT Operations Management and Genefa Murphy, VP of Partner and Product Marketing, Application Delivery Management at Hewlett Packard Enterprise Software, as they discuss the challenges and opportunities of digital transformation in organizations today. They will also discuss how IT management can accelerate your transition to the digital enterprise. Transformation is driven by business needs, and innovations in application delivery and testing, hybrid cloud, machine learning, collaboration and mobility. By leveraging these innovations you can manage risk while also realizing rapid time to value and to market.
  • The True State of Security in DevOps and Expert Advice on How to Bridge the Gap The True State of Security in DevOps and Expert Advice on How to Bridge the Gap Stan Wisseman, Security Strategist, Security & Information Governance, HPE and Jeff Payne, CEO and Founder, Coveros Recorded: Jan 26 2017 56 mins
    Rapid application delivery is dramatically transforming how software is created and delivered, pushing the limits on the speed and innovation required of development teams. If you are wondering how this change in culture, process and operations affects Application Security, you are not alone.

    HPE research reveals that while fully mature DevOps programs are rare, well over half of organizations surveyed are implementing key DevOps methodologies such as Automated Testing and Frequent Delivery. And while most agree that this presents an opportunity to integrate Application Security methodologies – that is not the reality. In fact, only 20% of organizations cite Static Testing during the coding process.

    Join HPE and Coveros to discuss practical advice that DevOps and Application Security Teams, of any maturity level, can take away from these findings and begin to build a roadmap for building security into every step of the SDLC, from coding through production.
  • Value at the Speed of Business: Insights from the 2016-17 World Quality Report Value at the Speed of Business: Insights from the 2016-17 World Quality Report John Jeremiah, Product Marketing Manager, Hewlett Packard Enterprise Recorded: Jan 26 2017 49 mins
    Today we are in an age of digital consumers who are hyper-connected, expecting information and service wherever and when ever they want. Companies must be able to respond to the increasing demands of their customers with superior products and services without sacrificing quality or security.

    In this webinar you will learn about key findings from the eighth edition of the World Quality Report, which illustrates the impact of trends like Agile, DevOps, IoT and others. These trends are forcing organizations to disrupt with digital at an ever faster pace. Specifically you will learn more about these 4 key trends in QA and Testing:

    • Digital Transformation driving and shaping IT strategy
    • Agile and DevOps continue to expand and grow in adoption
    • Internet of Things a disrupting force with real implications on quality
    • Infrastructure costs (test environments); a rising concern
  • Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Bernard Sanders, CTO and Cofounder, CloudBolt; Chris Sells, Product Management Lead, Google Cloud Developer Tools Recorded: Jan 26 2017 24 mins
    Enterprise IT organizations looking to get a foothold into public cloud need solutions that deliver the efficiency and innovation promised by cloud platforms—without throwing away the investments they've made in on-prem technology, policies, and skills.

    Creating self-service Development & Test (or Dev/Test) environments is one of the first and most popular cloud workloads enterprise IT organizations explore in their journey to cloud. Google Cloud and CloudBolt have partnered to create a hybrid cloud solution for this important workload that's easy to set up, and can be fully tailored to your environment. CloudBolt is a cloud management platform that integrates your on-prem virtualization and private cloud resources with the public cloud, serving as a bridge between your existing infrastructure and Google Cloud Platform.

    With these hybrid solutions, users can rapidly provision the resources they need through an intuitive self-service portal. IT organizations maintain full control over system configuration, usage quotas, and cost transparency. By delivering a self-service, fully auditable alternative to shadow IT, CloudBolt and Google Cloud let you tap the latest cloud innovations from Google directly from the technology you're already familiar with on-prem.

    For more details, check out: https://www.cloudbolt.io/self-service-devtest-envs/
  • Security in the Age of Social Media Security in the Age of Social Media Jeff Lenton, Solutions Architect, RiskIQ Recorded: Jan 26 2017 33 mins
    Social Media has come of age. Collectively, social platforms have attracted two-thirds of the world’s internet users with more joining every day. This ubiquity has led many organisations to make social an integral part of their digital channels strategy, along with their web presence and mobile apps.

    For organisations engaging in social media, the importance of having an advanced social media strategy is more critical than ever.


    During the session you will learn:
    * The attack methods hackers use to exploit social media platforms and profiles.
    * Which weaknesses cyber criminals look for so you can protect your company’s social media reputation.
    * How to strengthen your security approach to combat social media threats.
    * The defense techniques an organization must employ to prevent social phishing attacks, brand impersonation, recruiting scams, customer service impersonations, malware attempts, RDC, and more.
  • VR AR analytics platform to understand how users interact with virtual world VR AR analytics platform to understand how users interact with virtual world Robert Merki Recorded: Jan 25 2017 32 mins
    cognitiveVR is an analytics platform built for virtual and augmented reality. In this webinar, cognitiveVR’s Director of Product, Robert Merki, will showcase how you can leverage analytics and data to understand how users interact with your virtual worlds.
  • 4 Key Focus Areas for Effective Performance Engineering 4 Key Focus Areas for Effective Performance Engineering Todd DeCapua CSC Recorded: Jan 25 2017 67 mins
    Learn how technology and business teams adopt Effective Performance Engineering to transform their organizations with the end user in mind. During this webinar, we will focus on four key areas of effective performance engineering. Join us to participate and learn how to build, develop, optimize and focus. The discussion will include references from the O'Reilly Media book titled, Effective Performance Engineering, co-authored by the speaker of this session.
  • Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Deepti Dhinakaran, Naila Govan-Vassen and Oluchi Enuha, General Manager, iROKOX Recorded: Jan 25 2017 35 mins
    The pay TV, VOD, and IPTV market is still evolving in terms of content and pricing models, but the demographics of Africa and its large population are highly attractive to existing and new market participants. Internet penetration, supplemented by a significant uptake in smartphone adoption, has altered the manner in which Africa consumes video content. This growth will be further augmented by the availability of cheaper DTT services, data-saving video consumption options, and attractively packaged triple-play services. It is critical for market participants to gauge market trends, price sensitivity and growth opportunities while offering their services. Along with pricing and richness of content, strategic partnerships will play a key role in defining the market leader in the next five years.
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Jan 24 2017 54 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • Improving Developer Engagement – A Q&A Session with CA API Product Management Improving Developer Engagement – A Q&A Session with CA API Product Management Dana Crane - Program Manager, Guillermo Tellez - Product Manager, Bill Oakes - Product Marketing Feb 28 2017 5:00 pm UTC 60 mins
    This Q&A session will examine the role of a developer portal in API Management, as well as the importance of its function as a hub to bring API Owners, Developers, Business Managers and Operations together to execute a successful API program. Dana and Guillermo will answer questions relating to developer engagement, API Publishing, the importance of the UX, and how a modern cross-platform portal can improve integrations with existing infrastructure.

    Join to learn about the latest in enabling your developers and get your questions answered live!
  • The Nuix Black Report: Find Out What Hackers are Really Thinking The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Mar 1 2017 5:00 am UTC 60 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • Pattern your DevOps success & avoid the anti-pattern landmines: best practices Pattern your DevOps success & avoid the anti-pattern landmines: best practices Ashish Kuthiala and Kelly Emo, HPE Mar 1 2017 6:00 pm UTC 45 mins
    Everyone’s talking DevOps and today, many are also doing. While first movers have advantage, they also leave a legacy of success patterns and fast failures. In this webinar, HPE DevOps technologists will share the aggregated knowledge of working with HPE’s own IT and R&D teams and global customers and partners who have been embarking on unique DevOps journeys for several years now and continuously implementing, learning and improving. This collective experience begins to shape DevOps patterns and anti-patterns that teams can learn from and apply as needed for their own unique DevOps scenarios.

    Explore proven patterns for connecting development and test teams in Continuous testing pipelines, integrating quality analytics into pipeline processes to accelerate progress, and assessing and engineering in the optimal level of automation to a continuous delivery toolchain to balance speed and risk. Avoid common anti-patterns such as “develop, deploy and forget” or “runaway build branches”.

    Join HPE’s Ashish Kuthiala and Kelly Emo as we share and explore these real-world DevOps anti-patterns, patterns and success stories.

    This is part one in a three-part DevOps webinar series. Join us also for:
    A look at the future of software testing: HPE vision for Continuous Testing, March 29
    Taking on Enterprise Agile with HPE, April 26
  • From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] Gonen Stein, CloudEndure and Andy Tzou, Google Mar 2 2017 4:00 pm UTC 30 mins
    Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud without the technical, performance, or financial challenges that normally strain IT resources. They'll dive into the technology behind the new automated migration service, which utilizes CloudEndure’s continuous, block-level replication, automated machine conversion, and application stack orchestration.

    This video will provide an overview of how Google and CloudEndure have partnered to create a self-service VM migration service. This service enables you to move your existing server infrastructure to Google Cloud Platform at no cost.

    Have you been waiting for just the right moment to migrate to the cloud? Have your questions answered about how companies are using the new automated migration service to simply and easily move to the cloud.
  • ASO or GTFO: App store optimization FTW ASO or GTFO: App store optimization FTW Stewart Rogers, Director of Marketing Technology, VentureBeat Mar 29 2017 5:00 pm UTC 60 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • A look at the future of software testing: HPE vision for Continuous Testing A look at the future of software testing: HPE vision for Continuous Testing Clint Sprauve, HPE Mar 29 2017 5:00 pm UTC 45 mins
    Many organizations struggle with the implementation of the engineering practices of DevOps, specifically with continuous testing. What if software development teams had a solution that was 100% cloud based (for distributed teams), provided real-time data analytics (for quick feedback), and supported the activities of build, edit and execution of test scripts in the cloud (nothing on the desktop). Couple that with the ability to test mobile apps on multiple devices (for scale and efficiency), the option to use containers plus existing tools (including open source), and support visual UX testing (for user experience and accessibility) while linking directly to existing continuous delivery infrastructure, and the goal of continuous testing becomes in reach.

    Join Clint Sprauve, Product Marketing Manager for Continuous Testing & Automation, to see the future of continuous testing in action and get a sneak preview of the latest software solutions for test automation. See what HPE is doing to push the envelope and take a key leadership role for the future of DevOps, quality and automation.

    This is part two in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    Taking on Enterprise Agile with HPE, April 26
  • Taking on Enterprise Agile with HPE Taking on Enterprise Agile with HPE Tye Davis, HPE Apr 26 2017 5:00 pm UTC 45 mins
    One of the largest challenges that we see organizations faced with when adopting agile methodologies and practices, is to deliver fast with quality at scale. Agile and scaling Agile in the enterprise is a core part of HPE’s strategy as we continuously learn from our own R&D and HPE IT efforts, as well as our customers and partners to implement scaled Agile. This learning is applied to our software solutions that help enable Agile development, testing and scaled Agile including the Scaled Agile Framework. ALM Octane acts as the communication hub and decision support system to organize, plan, and deliver Agile projects on teams and scaled up in the enterprise. The tools empower programs and teams to manage their backlog with visibility into development and testing data, and with analytics/insights for release forecasting, tasks completion and resource allocation.

    Join Tye Davis, Product Marketing Manager for Enterprise Agile, to see enterprise agile in action and get a preview of the latest software solution for application lifecycle management. See what HPE is doing to help organizations implement scaled agile.

    This is part three in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    A look at the future of software testing: HPE vision for Continuous Testing, March 29
  • Mobile commerce + AI: Not just a nice-to-have Mobile commerce + AI: Not just a nice-to-have Stewart Rogers, Director of Marketing Technology, VentureBeat May 11 2017 5:00 pm UTC 60 mins
    AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.

    Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.

    In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.

    Don't miss out!

    In this webinar you'll:
    * Dive into the current AI landscape, from free tools to enterprise-class options
    * Learn how conversational UI and AI will transform your mobile commerce
    * Understand which new platforms are right for your own commerce strategy
    * Get the key points to convince your CEO and CFO to put these master class tools in your hands

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • Mobile advertising: Stop fraud and step up clicks Mobile advertising: Stop fraud and step up clicks VentureBeat May 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers to be announced?

    Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.