Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
In today's rapidly changing landscape of Virtual Reality, it can be difficult to stay on top of the plethora of technologies and use-cases for this emerging market. Joseph Radak, Course Developer at Udacity and Co-Founder of Eerie Bear Games, will share his insights on how to stay relevant in the world of VR and keep up with consumer demand - not just in gaming, but in other industries like mobile, technology, media, healthcare and more. Joseph will share trends on VR consumption, up-skilling your existing workforce for VR, and finding the right talent that will help your company excel in the rapidly changing landscape of VR.
Network security is no longer about firewalls and related perimeter protection. It extends all the way to endpoints and the information assets they process and store. At any given time, do you really know what’s on your network, how they got there, and if they might be creating quantifiable business risks? With the complexity of today’s wired and wireless networks, this is becoming an increasingly-difficult question to answer.
Join information security veteran and writer of 12 books including the highly-popular Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel for a discussion on the technical and operational security concerns impacting modern networks. You’ll hear real-world stories and obtain practical insight into what it takes to have a resilient environment that can withstand today’s threats and risks.
As the digital experience proliferates in everyday life and we begin to migrate into the new virtual reality medium, how do we create the most human and organic digital experience?
Moving forward, digital devices not only grow smaller and closer to the body, but daily use time explodes. The challenge is using design strategies around user experience to mitigate consumer pain points to allow for seamless immersion in your experience or VR product.
We will talk about how about how design must be incorporated as a process and strategy in VR builds for success.
Join the hosts of the EMEA Software Customer Forums 2017 for a sneak peek of the exciting customer presentations and product news from our strategy and best practice-sharing event.
The EMEA Software Customer Forums are a great opportunity for IT Operations Management and Application Delivery Management practitioners to learn how their peers are utilizing HPE solutions to successfully reach technology and business objectives. Delegates will also get a preview of some new product developments from HPE Product Management and executives.
Don’t miss out – join us on this webinar for a preview of the great content we’ll be sharing in-depth at the EMEA Customer Forum in Dublin from 15-19 May, more info and registration at www.hpe-customerforums2017.com.
Join us April 27th for a panel discussion on how to put the human first while creating for Virtual Reality. Part of the VR/AR BrightTALK Summit, our panelists will exchange on how to take user and audience in consideration during the Virtual Reality creation process.
As Virtual Reality is getting more and more exposure, it is time to highlight the right practices of designing a Virtual Reality project and see what we can do to put the human first.
- Do Virtual Reality creators consider the audience they address before/while developing their projects? Why is this crucial? How and when to do so?
- Are we more careful today to offer more accessible VR experiences than a year ago?
- How is this evolving? Do studios and creators tend to integrate more the human in the creation process?
The panel will be led by Amandine Flachs, Events and Communication manager at the Realities Centre. She will be joined by a variety of Virtual Reality leaders, including creators, game developers, agency and B/B professionals.
- Amandine Flachs, Events & Comms Manager, Realities Centre
- Tom Evans - CEO and co-founder at Trojan VR
- Komal Sable - COO at Tengio
- Doug North Cook - Creative director and co-founder at Decoder.
You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.
Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:
• The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.
•Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.
• How to respond to and mitigate security risks faster and more reliably at a reduced cost.
-Summarize the Studies on Non-immersive Virtual Reality Therapy
-Summarize the Studies on Immersive Virtual Reality Therapy
-Discuss Current uses of Technology
-Discuss the Future of the Field
-Q & A
Brandon Birckhead is a physician who founded Immergence Technologies, LLC, a company to help dentists use virtual reality in their practice and collaborate with developers to create tailored content. He is also the coordinator of the VRARA Digital Health Committee. Current research focus has been on exploring the immersive effect of different VR applications. He graduated from Mayo Clinic Medical School in 2016.
One of the largest challenges that we see organizations faced with when adopting agile methodologies and practices, is to deliver fast with quality at scale. Agile and scaling Agile in the enterprise is a core part of HPE’s strategy as we continuously learn from our own R&D and HPE IT efforts, as well as our customers and partners to implement scaled Agile. This learning is applied to our software solutions that help enable Agile development, testing and scaled Agile including the Scaled Agile Framework. ALM Octane acts as the communication hub and decision support system to organize, plan, and deliver Agile projects on teams and scaled up in the enterprise. The tools empower programs and teams to manage their backlog with visibility into development and testing data, and with analytics/insights for release forecasting, tasks completion and resource allocation.
Join Tye Davis, Product Marketing Manager for Enterprise Agile, to see enterprise agile in action and get a preview of the latest software solution for application lifecycle management. See what HPE is doing to help organizations implement scaled agile.
This is part three in a three-part DevOps webinar series. Join us also for:
Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
A look at the future of software testing: HPE vision for Continuous Testing, March 29
Augmented, mixed, and virtual reality compose a spectrum for next-gen computing that is disrupting or accelerating the business objectives of companies across almost every industry. With an ever growing number of pilots and available solutions, it is imperative that businesses develop a strategy of where to play and how to win, while avoiding technology for technology’s sake, in order to create new value.
Jiten Dajee is a subject matter expert on digital reality technology spanning the entire value chain of augmented, mixed, and virtual reality. Jiten has been involved with Digital Reality technology since his first joint-venture in healthcare wearables in 2011. He joined Deloitte Consulting Innovation to lead the rapid commercialization of digital reality across industrial and commercial sectors. He brings an end-to-end understanding of how optics, networks, semiconductors, platforms, products, and will interact in the next-gen computing medium. Jiten specializes in market intelligence, technology adoption, solution integration, and strategic growth planning of digital reality in enterprise.
While many companies and institutions understand the need to investigate AR and VR, the path to success is a long one. Often, there are several teams at a single company looking at ways to leverage this technology, for internal processes as well as customer- and consumer-facing solutions.
This panel will explore ways to effectively bring this vision to fruition:
• Identifying the right use cases
• Getting internal buy-in and budget
• Finding development resources
• Rolling out new AR/VR processes and products
Enterprise is the best starting or entry point for AR and VR because the pain points are high, the dollars are there to make a strong ROI case for use, and the wearable form factor is much less of an issue. AR and VR technologies will be instrumental in closing the skill gap that is responsible for the shortage of skilled manufacturing workers. We are optimistic that industrial productivity will grow and that this will ultimately translate into higher wages because AR and VR will allow more workers to do high-skill jobs, and improve their performance.
Augmented Reality in Business: Assessing the Potential
This live panel will set the scene for augmented reality (AR) in business; what are the use cases? Who's beginning to adopt the technology? Where are we seeing success? The panel of experts will then discuss areas of growth and the challenges that lie ahead.
The panelists will try to break through the surrounding hype and discuss in detail the true potential and challenges for AR when business look towards adoption.
Featuring an industry-leading selection of Augmented reality experts:
- Josh Downs, Community Manager, BrightTALK (Moderator)
- Alice Bonasio, Technology Author and Journalist
- Max Dawes, Partnerships & Marketing Director, Zappar
- Mickael Jordan, Co-Founder & COO, Augment
For more information on Alice Bonasio please visit:
This presentation will look at the new opportunities being opened up for the visualisation of data within both personal and collaborative 3D spaces, delivered to mobile, browser, desktop, virtual reality and social virtual world/social virtual reality environments. The pros and cons of both 3D and VR environments for the creation and sharing of data visualisations will be considered, tools which let you do dataviz in 3D and VR today presented, and future development pathways discussed.
Consumers want more mobile-friendly financial services, and they want them now -- without any security or privacy compromises. These expectations create tension in the delivery of mobile financial services and apps. What’s the best way to strike a balance between a frictionless mobile experience and the security diligence customers demand?
Learn how to answer this question for your enterprise during a webinar with Ted Eull, NowSecure VP of Risk and Privacy. Ted will apply insights from mobile security engagements with NowSecure customers in the financial services industry, explain best practices, and provide guidance on topics such as:
-- Where do you draw the line between frictionless mobile UX and authentication?
-- What constitutes good two-factor authentication for financial services apps that doesn’t hinder adoption or inconvenience users?
-- How can FFIEC guidance help enterprises develop secure financial services apps?
Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.
In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:
•Digital technology accelerators
•Security and compliance brakes
•Secure data exchange services solutions
We'll take a look at some real world success stories including:
•Turning a costly background check workflow into a profit center
•Simplified statewide financial reporting workflows
•Secure data collection for sensitive population health reporting
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the enterprise
•What cloud access management is
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.
Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.
In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.
Don't miss out!
In this webinar you'll:
* Dive into the current AI landscape, from free tools to enterprise-class options
* Learn how conversational UI and AI will transform your mobile commerce
* Understand which new platforms are right for your own commerce strategy
* Get the key points to convince your CEO and CFO to put these master class tools in your hands
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Jonathan Jarvis, CEO, Token
* Wendy Schuchart, Moderator, VentureBeat
As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.
Now in its second published release, it is being deployed in a number of projects.
Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:
• 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
• In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
• Overview of oneM2M certification(including background of the need for oneM2M certification program).
• Introduction of Certified Product (Target service and use cases are included per each company).
• An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.
-- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
-- Sookhun Jeon, Telecommunications Technology Association (TTC)
-- JaeSeung Song, Assistant Professor, Software Engineering and Security group (SESlab), Computer and Information Security Department, Sejong University
-- Dr. David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST
To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at firstname.lastname@example.org.
To learn more about oneM2M, visit: http://www.onem2m.org/
To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
As cloud, mobility, Big Data, and social business have transformed the role of technology in the enterprise, workers require access to corporate applications, customers, and data through mobile devices.
This shift requires a fundamental change in the way that networks are designed and managed – and while the technical benefits of a digital workplace may be immediately apparent, enterprises want to understand the business value associated with this network transition.
Join us as IDC and Aruba discuss how to transition to a Mobile-First Enterprise, and hear from six customers who have realized the benefits of the digital workplace, including:
•360% five-year ROI
•9 months breakeven point
•2,844 hours additional productive time per 100 users
•77% less unplanned downtime
Financial Services enterprises and quickly moving into the 21st century and adopting the BYOD, enterprise mobility and mobile workforce mentality. But with this they are unknowingly increasing the risks their companies face, creating thousands of new end-points with the potential for breaches, hacks and compromises.
Mobility teams can manage devices through EMM (Enterprise Mobility Management) software, but these platforms only go so far. Fully securing an environment from the hidden risks embedded deep in applications, and real time threats from compromised network connections and devices are threats that require a new Mobile Threat Defense strategy (as outlined by Gartner) including state of the art automation and machine learning. But how could, and should you implement this - and where do you start?
Join Domingo Guerra, President & Co-Founder of Appthority as he discusses how Fortune 1000 financial services companies are implementing measures to solve their mobile device challenges. In this session Domingo will cover:
- How to gain visibility of your mobile risks
- How leading financial services companies secure mobile use, while maintaining productivity and privacy
- How to get additional value from an existing EMM deployment while adding security coverage.
In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system.
Join Mandiant’s live webinar and hear real world experts as they discuss recent interbanking messaging system breaches, what lessons should be learnt, and how to avoid such pitfalls in the future.
A hole in the way the global email infrastructure works exposes every business to cyber-criminals. DMARC is a new security protocol that secures your email, protects your clients and improves the deliverability of every email you send.
This webinar will provide you with an overview about the DMARC protocol and the types of attack that it protects against, its email configuration and deliverability benefits and how to protect your business.
As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.
• Examine the realities of IoT data processing and analytics
• Describe the architectures needed to support the capability
• Analyze drivers and technique to secure IoT data elements
Healthcare security requirements become even more complicated with the move to the cloud. Competing internal priorities, along with numerous cloud apps to control, increase strain on already under-resourced teams. Visibility and control over data can seem almost impossible when it is being stored in locations you do not own or manage.
In this CISO-led webinar, learn about how avoid console overload by consolidating controls with a cloud access security broker platform.
Key topics include:
- Overcoming security dashboard overload when trying to manage authentication, access controls, devices, threats, compliance, malware, DLP, etc
- Healthcare security options to control data in the cloud
- CASB platform and solution overview
The old threat of ransomware—locking files and demanding money to release the files—is back, bigger and more dangerous than ever. In the first three months of 2016, cyber criminals used ransomware to collect $209 million from victims. And the ransomware attacks have continued to grow. In fact, security experts estimate that criminals will collect around $1 billion this year.
How can you protect your people, data and brand from those attacks? With information. Join us for this webinar and learn about:
- How ransomware works
- What to look for
- What critical safety measures can be employed to prevent a successful attack.
Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.
Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:
-- Address DevOps stakeholders' worries and concerns about integrating security testing
-- Determine the right depth of analysis for continuous mobile app security testing
-- Track mobile DevSecOps metrics over time to measure success
You better get good at conversational video marketing, fast—or you're going to be obsolete.
Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.
Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.
Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.
By watching this webinar, you'll:
* Optimize your audience takeaways for video content
* Get tips from the savviest sales and marketing people on their video content strategy
* Focus your energy on the right distribution channels for your adverts
* Personalize video content to lock in the close
* Stewart Rogers, Director of Marketing Technology, VentureBeat
More speakers to be announced soon!
With the growing demands of enterprise outdoor Wi-Fi users, customers’ expectations of outdoor Wi-Fi has gone beyond the basic network connection. Outdoor Wi-Fi deployments for small and large areas are often different and how to improve the user experience while minimizing costs has always been a concern for enterprises.
This webinar will address various outdoor use cases and their most appropriate solution; DreamWorks Animations will share their real-life outdoor deployment experience with the audience, including their unique outdoor Wi-Fi requirements, deployment challenges and their future move to enable an always-on indoor/outdoor Wi-Fi connectivity in the entire work place.
Join us to learn more about the current challenges and benefits of outdoor Wi-Fi and ways to meet the new demands and performance standards.
You can also qualify for a free Aruba access point*
*Terms and Conditions apply
It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.
Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.
In this webinar you'll:
* Learn what works and what doesn't in 2017's mobile advertising arena
* Mitigate the mobile advertising fraud risk in your own applications
* Create the most engaging mobile advertisements for savvy app patrons
* Use video and 360 advertising to stay abreast of the latest trends in mobile advertising
* Stewart Rogers, Director of Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
More speakers to be announced?
Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.
At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.
Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.
* Discover the one trick to never-fail push notifications everywhere, not just apps
* Drive 2770% higher conversion rates through a specific kind of push notifications
* Learn how to apply behavioral triggered push notifications in your own marketing strategy
* Build better timing into your push notifications to increase conversions
* Stewart Rogers, Director of Marketing Technology for VentureBeat
• Wendy Schuchart, Moderator, VentureBeat
For LTV, engagement, and lifecycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.
ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.
For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!
In this webinar you'll:
* Learn why ASO is fundamental to the success of any app
* Familiarize yourself with the pillars of solid ASO strategy
* Leverage technology to increase your lifetime user value
* Think beyond keywords for your search strategies
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Peggy Anne Salz, Chief Analyst, MobileGroove
* Wendy Schuchart, Moderator, VentureBeat
Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.
This talk will cover, via live demo and code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.
David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:
- Natural language processing: finding keywords in relevant context within unstructured text
- Statistical NLP: sentiment analysis via supervised machine learning
- Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
- Graph analysis: finding actions outside the usual or expected network of people
- Heuristic rules: finding suspect actions based on past schemes or external datasets
- Topic modeling: highlighting use of keywords outside an expected context
- Anomaly detection: Fully unsupervised ranking of unusual behavior
Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.
Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.
Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.