Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Recorded: Feb 23 2017 58 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • Real World IoT – Practical Advice from the Front Lines of IoT Implementation Real World IoT – Practical Advice from the Front Lines of IoT Implementation Christian Renaud Recorded: Feb 22 2017 32 mins
    Christian Renaud, Research Director, Internet of Things, discusses the vertical and horizontal approaches to the Internet of Things, the state of IoT deployments, 2016 IoT M&A, and a preview of what to expect at the upcoming Real World IoT event, 5-6 April at the Landmark London.
  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Recorded: Feb 21 2017 43 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Logistics Analytics: Predicting Supply-Chain Disruptions Logistics Analytics: Predicting Supply-Chain Disruptions Dmitri Adler, Chief Data Scientist, Data Society Recorded: Feb 16 2017 47 mins
    If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?

    In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
  • Synchronizing with HPE ALM for Traceability Across Toolsets Synchronizing with HPE ALM for Traceability Across Toolsets Mark Ford, TIAA Recorded: Feb 16 2017 50 mins
    If your Dev teams are storing their requirements as User Stories in one tool and your QA teams are storing their Test Cases in HPE ALM, then chances are you have no traceability between the two. And what about Test Defects created in HPE ALM? How can you trace those back to the original User Story requirement? I’ll show you how we solved this dilemma using Tasktop to synchronize User Stories to HPE ALM Requirements, pass the User Story id throughout the HPE ALM lifecycle from Requirement to traced Test Case to linked Defect, and how we will synchronize the Test Defects back to our Dev tool and link them back to the User Story for full round trip traceability.

    This session is suitable for all levels including VPs, Directors, Dev and QA managers, practitioners, and technical resources. I will cover the following:
    Why Requirement and Defect traceability is important to us
    The challenges faced that prompted our solution
    Detailed explanation of how we implemented the solution
    The benefits realized
  • KYC in the online age KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 47 mins
    Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

    To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

    Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

    During this webinar, our panel of experts will provide answers to the following questions:

    •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

    •Are customers prepared to go down the digital route?

    •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

    •How are financial institutions coping with the challenges posed by the latest regulatory updates?

    Join us for this panel discussion with our expert speakers:

    Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
    Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
    Sarah Clarke, General Manager - Identity, Mitek
    David Rennie, Identity Assurance Programme, UK Cabinet Office
  • Bridging the Data Silos Bridging the Data Silos Merav Yuravlivker, Chief Executive Officer, Data Society Recorded: Feb 15 2017 48 mins
    If a database is filled automatically, but it's not analyzed, can it make an impact? And how do you combine disparate data sources to give you a real-time look at your environment?

    Chief Executive Officer Merav Yuravlivker discusses how companies are missing out on some of their biggest profits (and how some companies are making billions) by aggregating disparate data sources. You'll learn about data sources available to you, how you can start automating this data collection, and the many insights that are at your fingertips.
  • Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Ronnie Sternberg, SafeDK, Kimm Yeo, HPE Recorded: Feb 15 2017 57 mins
    The use of Software Development Kits (SDKs) continues to be on the rise in mobile apps. In the last six months, we’ve seen a jump of more than 12% in the use of SDKs for creating mobile apps. These off-the-shelf services, from advertising, analytics, social, and more, are helpful in the mobile development process. They offer unique functionality and simplify the coding, while saving time and money. But SDKs are not really YOUR code. You work hard to ensure your users’ experience, safety and privacy in your own code, but can you guarantee the same for the code from these guest SDKs? What about the test implications and impact on user engagement and retention?

    Join us to hear about:
    Key trends and findings for Mobile SDKs
    2 major domains of risk introduced when using SDKs and associated real-life stories
    How you can achieve a 5 star rating using HPE Mobile Center and SafeDK
  • DDoS Threats of Past, Present and Future DDoS Threats of Past, Present and Future John Ellis, Chief Strategist, Cyber Security (APJ), Akamai & Michael Smith, Chief Technology Officer, Security (APJ), Akamai Recorded: Feb 15 2017 62 mins
    The Fourth Industrial Revolution is in all full swing with the Internet at its core. While the Internet is connecting everyone and everything it also connects us to a variety of nefarious threat actors, who have found ways to exploit and monetize many aspects of our digital world. In recent times, one area has been DDoS, which has become one of the top cyber threats du jour.

    In this webinar, you will learn:

    - Historical developments in the DDoS threat landscape
    - How criminal operators are building out their botnets – discover, infect, operate and maintain
    - Technical examination of new botnet trends such as the Mirai IoT botnet
    - Architectural concepts and design for DDoS mitigation solutions - covering cloud and data centre environments
    - Response strategies to defending and responding to DDoS attacks
    - Predictions for future and next steps.

    Join Akamai and (ISC)² on Feb 15 (Wed) at 13:00 (Singapore time) and learn about the DDoS threats of past, present and future.

    Presenters:
    - John Ellis, Chief Strategist, Cyber Security (Asia-Pacific & Japan), Akamai
    - Michael Smith, Chief Technology Officer, Security (Asia-Pacific & Japan), Akamai

    Moderator:
    - Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • Have Your Mobile Testing Shopping List Ready In 30 minutes Have Your Mobile Testing Shopping List Ready In 30 minutes Antoine Aymer, Mobile Technologist, Hewlett Packard Enterprise Recorded: Feb 14 2017 28 mins
    Very few mobile apps are home of a delightful blend of user experience. You might ask yourself: is there such thing as a secret testing recipe?

    Antoine invites you for a 30-minute coffee break to disclose the top 10 ingredients of a robust mobile testing framework – almost everything from the user experience to the confluence between functional testing and analytics.
  • Strategies for Successful Data Preparation Strategies for Successful Data Preparation Raymond Rashid, Senior Consultant Business Intelligence, Unilytics Corporation Recorded: Feb 14 2017 33 mins
    Data scientists know, the visualization of data doesn't materialize out of thin air, unfortunately. One of the most vital preparation tactics and dangerous moments happens in the ETL process.

    Join Ray to learn the best strategies that lead to successful ETL and data visualization. He'll cover the following and what it means for visualization:

    1. Data at Different Levels of Detail
    2. Dirty Data
    3. Restartability
    4. Processing Considerations
    5. Incremental Loading

    Ray Rashid is a Senior Business Intelligence Consultant at Unilytics, specializing in ETL, data warehousing, data optimization, and data visualization. He has expertise in the financial, manufacturing and pharmaceutical industries.
  • Improve Your Cybersecurity Visibility by Thinking Beyond the Network Improve Your Cybersecurity Visibility by Thinking Beyond the Network SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint Recorded: Feb 8 2017 53 mins
    Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

    In this webinar you will learn:

    • How cyber attackers gain visibility into organizations.
    • How you can see across all major threat entry points and stop attacks.
    • How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats.
    • How to eliminate social media risk so you can focus on social success.
    • How to protect against malicious apps that mishandle data or install malware.
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking The Foundations and Future of PKI: Yes, it’s Alive and Kicking Asaf Lerner, PKI product development at Gemalto Recorded: Feb 6 2017 59 mins
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology
  • Master any Cloud with Hybrid Cloud Management from HPE Master any Cloud with Hybrid Cloud Management from HPE Danny Cavion, Keri Sprinkle, Marc Bernis, HPE Recorded: Feb 2 2017 66 mins
    In our first web event in this series, we presented the next generation of hybrid cloud management platform from HPE. Join our second web event for a more in-depth look into the primary design use case: hybrid and multi-cloud management. Learn about the advantages that Hybrid Cloud Management can provide to you and your organization:
    Freedom to choose any cloud
    Cloud agnostic service designs
    Native container support
    Provide master-level control over other clouds and orchestrator
  • Cloud Next: The Next Generation of Cloud Management Software from HPE Cloud Next: The Next Generation of Cloud Management Software from HPE Danny Cavion, Keri Sprinkle, HPE Recorded: Feb 2 2017 67 mins
    HPE continues to refine and strengthen the capabilities of their cloud management platform with their newest software generation, Hybrid Cloud Management (HCM). HCM brings together hybrid and multi-cloud management, world class orchestration, application release automation, cloud compliance and an intelligent cloud service portal. Join us for this web event to find out how the HPE Hybrid Cloud Management platform can help you accelerate operations responsiveness and achieve cloud freedom.
  • Supporting the Idea Economy in Finance: IntelliQA with HPE Mobile Center Supporting the Idea Economy in Finance: IntelliQA with HPE Mobile Center Paul Kaye, IntelliQA Recorded: Feb 2 2017 52 mins
    Mobility has revolutionized the financial services industry and in many cases has changed the ways organizations work. It is changing the language of business and technology – and has become a competitive necessity.

    Join this webinar to learn how a Financial Times Stock Exchange (FTSE) 100 organization is leveraging HPE Application Delivery Management solutions and HPE Mobile Solutions to deliver high-quality experiences to customers, accelerate time to market and ensure innovation is alive and kicking in the world of finance.
  • 6 Essentials for Secure BYOD in Healthcare 6 Essentials for Secure BYOD in Healthcare Salim Hafid, Product Marketing Manager Recorded: Feb 1 2017 31 mins
    For healthcare organizations struggling to secure BYOD, Mobile Device Management (MDM) was widely heralded as a solution, one that could completely control unmanaged assets. However, physicians with multiple hospital affiliations coupled with privacy concerns has resulted in stagnant adoption.

    In this webinar, we explore alternatives to MDM that protect mobile data and devices without impeding on employee privacy. We'll also explore 6 critical capabilities for securing BYOD to help your firm achieve compliance.
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Mike Vien, former CounterTack Sales Engineer and current Malware And Forensic Expert Recorded: Feb 1 2017 63 mins
    Incident response is changing. IR professionals and security teams consistently need tools that provide a deeper level of intelligence around threats impacting their environments. The capability to drill down into information on incidents upon alerts from other tools is critical when investigating root cause and ultimately impact. 

    CounterTack is dedicated to helping incident response and forensics teams leverage behavioral intelligence to track attacks and determine exactly how to work that knowledge into the response workflow. Leveraging behavioral traits and predictive analytics through its products, CounterTack understands the demands IR teams face for improving response time and accuracy.

    This webinar will feature an interactive demonstration of exactly how an IR professional would leverage CounterTack’s industry-leading Responder PRO tool to reverse engineer key risk indicators. This demo will detail real-world uses of not just features in the solution, but show you how to investigate common and uncommon types of threats through a forensic lens.

    Attendees of this session will receive a limited-time only incentive to buy Responder PRO.

    Register Today.
  • Don’t Underestimate the Power of Good Apps Don’t Underestimate the Power of Good Apps Toby Marsden HPE Recorded: Jan 31 2017 61 mins
    Bad apps happen to good people. But they don’t have to. Join us for this session, where industry leaders and customers will show you how to successfully deliver high-quality apps at speed and scale. Learn tips and tricks to help you maneuver past obstacles and avoid bad apps. See some of the high-powered solutions Hewlett Packard Enterprise will bring to market that enable you to address the needs of the digital economy.
  • The Future belongs to the Fast, Transform your Business with IT Management The Future belongs to the Fast, Transform your Business with IT Management Genefa Murphy, Roy Ritthaler, HPE Recorded: Jan 31 2017 30 mins
    Join Roy Ritthaler, VP of Product Marketing IT Operations Management and Genefa Murphy, VP of Partner and Product Marketing, Application Delivery Management at Hewlett Packard Enterprise Software, as they discuss the challenges and opportunities of digital transformation in organizations today. They will also discuss how IT management can accelerate your transition to the digital enterprise. Transformation is driven by business needs, and innovations in application delivery and testing, hybrid cloud, machine learning, collaboration and mobility. By leveraging these innovations you can manage risk while also realizing rapid time to value and to market.
  • The True State of Security in DevOps and Expert Advice on How to Bridge the Gap The True State of Security in DevOps and Expert Advice on How to Bridge the Gap Stan Wisseman, Security Strategist, Security & Information Governance, HPE and Jeff Payne, CEO and Founder, Coveros Recorded: Jan 26 2017 56 mins
    Rapid application delivery is dramatically transforming how software is created and delivered, pushing the limits on the speed and innovation required of development teams. If you are wondering how this change in culture, process and operations affects Application Security, you are not alone.

    HPE research reveals that while fully mature DevOps programs are rare, well over half of organizations surveyed are implementing key DevOps methodologies such as Automated Testing and Frequent Delivery. And while most agree that this presents an opportunity to integrate Application Security methodologies – that is not the reality. In fact, only 20% of organizations cite Static Testing during the coding process.

    Join HPE and Coveros to discuss practical advice that DevOps and Application Security Teams, of any maturity level, can take away from these findings and begin to build a roadmap for building security into every step of the SDLC, from coding through production.
  • Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Bernard Sanders, CTO and Cofounder, CloudBolt; Chris Sells, Product Management Lead, Google Cloud Developer Tools Recorded: Jan 26 2017 24 mins
    Enterprise IT organizations looking to get a foothold into public cloud need solutions that deliver the efficiency and innovation promised by cloud platforms—without throwing away the investments they've made in on-prem technology, policies, and skills.

    Creating self-service Development & Test (or Dev/Test) environments is one of the first and most popular cloud workloads enterprise IT organizations explore in their journey to cloud. Google Cloud and CloudBolt have partnered to create a hybrid cloud solution for this important workload that's easy to set up, and can be fully tailored to your environment. CloudBolt is a cloud management platform that integrates your on-prem virtualization and private cloud resources with the public cloud, serving as a bridge between your existing infrastructure and Google Cloud Platform.

    With these hybrid solutions, users can rapidly provision the resources they need through an intuitive self-service portal. IT organizations maintain full control over system configuration, usage quotas, and cost transparency. By delivering a self-service, fully auditable alternative to shadow IT, CloudBolt and Google Cloud let you tap the latest cloud innovations from Google directly from the technology you're already familiar with on-prem.

    For more details, check out: https://www.cloudbolt.io/self-service-devtest-envs/
  • Value at the Speed of Business: Insights from the 2016-17 World Quality Report Value at the Speed of Business: Insights from the 2016-17 World Quality Report John Jeremiah, Product Marketing Manager, Hewlett Packard Enterprise Recorded: Jan 26 2017 49 mins
    Today we are in an age of digital consumers who are hyper-connected, expecting information and service wherever and when ever they want. Companies must be able to respond to the increasing demands of their customers with superior products and services without sacrificing quality or security.

    In this webinar you will learn about key findings from the eighth edition of the World Quality Report, which illustrates the impact of trends like Agile, DevOps, IoT and others. These trends are forcing organizations to disrupt with digital at an ever faster pace. Specifically you will learn more about these 4 key trends in QA and Testing:

    • Digital Transformation driving and shaping IT strategy
    • Agile and DevOps continue to expand and grow in adoption
    • Internet of Things a disrupting force with real implications on quality
    • Infrastructure costs (test environments); a rising concern
  • Improving Developer Engagement – A Q&A Session with CA API Product Management Improving Developer Engagement – A Q&A Session with CA API Product Management Dana Crane - Program Manager, Guillermo Tellez - Product Manager, Bill Oakes - Product Marketing Feb 28 2017 5:00 pm UTC 60 mins
    This Q&A session will examine the role of a developer portal in API Management, as well as the importance of its function as a hub to bring API Owners, Developers, Business Managers and Operations together to execute a successful API program. Dana and Guillermo will answer questions relating to developer engagement, API Publishing, the importance of the UX, and how a modern cross-platform portal can improve integrations with existing infrastructure.

    Join to learn about the latest in enabling your developers and get your questions answered live!
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • The Nuix Black Report: Find Out What Hackers are Really Thinking The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Mar 1 2017 5:00 am UTC 60 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • Network Security From the Cloud: the New Frontier  Network Security From the Cloud: the New Frontier  Mike Rothman, Analyst and President at Securosis and Ken Ammon, Chief Strategy & Technology Officer at OPĀQ Networks Mar 1 2017 4:00 pm UTC 60 mins
    By 2020, 68 percent of the cloud workloads will be in public cloud.The combination of cloud computing, mobility, and IoT is disrupting traditional bolt-on network security methods and requires a new approach to ensure corporate data and systems are protected, wherever they happen to be.

    The reality is that you can't possibly scale the management of infinite perimeters without breaking down longstanding barriers between network and security management. More and more organizations are no longer thinking in terms of a single, monolithic network. Instead, they are implementing application, site and user-specific networks, leveraging policies specifically designed to meet the needs of its constituent. Controls and policies are being defined within the network, using software defined networking technologies to route traffic efficiently and layer security services where necessary.

    Join Mike and Ken to see what steps organizations are taking to eliminate the complexity of today's traditional network security approach, more easily adapt to business changes, and tighten the reins on security control. 
  • Pattern your DevOps success & avoid the anti-pattern landmines: best practices Pattern your DevOps success & avoid the anti-pattern landmines: best practices Ashish Kuthiala and Kelly Emo, HPE Mar 1 2017 6:00 pm UTC 45 mins
    Everyone’s talking DevOps and today, many are also doing. While first movers have advantage, they also leave a legacy of success patterns and fast failures. In this webinar, HPE DevOps technologists will share the aggregated knowledge of working with HPE’s own IT and R&D teams and global customers and partners who have been embarking on unique DevOps journeys for several years now and continuously implementing, learning and improving. This collective experience begins to shape DevOps patterns and anti-patterns that teams can learn from and apply as needed for their own unique DevOps scenarios.

    Explore proven patterns for connecting development and test teams in Continuous testing pipelines, integrating quality analytics into pipeline processes to accelerate progress, and assessing and engineering in the optimal level of automation to a continuous delivery toolchain to balance speed and risk. Avoid common anti-patterns such as “develop, deploy and forget” or “runaway build branches”.

    Join HPE’s Ashish Kuthiala and Kelly Emo as we share and explore these real-world DevOps anti-patterns, patterns and success stories.

    This is part one in a three-part DevOps webinar series. Join us also for:
    A look at the future of software testing: HPE vision for Continuous Testing, March 29
    Taking on Enterprise Agile with HPE, April 26
  • Redefining Endpoint Threat Hunting with Behavioral Analysis Redefining Endpoint Threat Hunting with Behavioral Analysis Mike Vien, Malware and Forensic Expert Mar 1 2017 7:00 pm UTC 60 mins
    Join Mike Vien, Malware and Forensic Expert, for an interactive demonstration of determining the infection of know and non-know malware thru endpoint scanning using CounterTack’s powerful DDNA core that relies on behavioral intelligence, not signatures or patterns.

    Unknown threats don’t execute with any indicators and are not previously seen in an organization’s network, data center or within the user base. These are commonly referred to as zero-day threats. And most endpoint detection engines will not identify the right behaviors associated with unknown threats because they rely on signatures.

    ThreatScan PRO lets IT and security teams of any size and skill level apply the most powerful memory-based, endpoint scanning technology to determine the infection state based on malware infiltration. CounterTack delivers visibility into endpoint state for teams with a 100% cloud-delivered technology, and the expertise of a CounterTack expert to analyze critical scans. Leverages behavioral intelligence to identify malware artifacts and other indicators of potential compromise, calculating a module-level threat score, to give users the data they need, or the capability to remove it and eradicate it automatically.

    Attendees of this session will receive a limited-time only incentive to buy ThreatScan PRO.
  • From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] Gonen Stein, CloudEndure and Andy Tzou, Google Mar 2 2017 4:00 pm UTC 30 mins
    Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud without the technical, performance, or financial challenges that normally strain IT resources. They'll dive into the technology behind the new automated migration service, which utilizes CloudEndure’s continuous, block-level replication, automated machine conversion, and application stack orchestration.

    This video will provide an overview of how Google and CloudEndure have partnered to create a self-service VM migration service. This service enables you to move your existing server infrastructure to Google Cloud Platform at no cost.

    Have you been waiting for just the right moment to migrate to the cloud? Have your questions answered about how companies are using the new automated migration service to simply and easily move to the cloud.
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 4:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime.

    Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink.

    Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • Mobile World Congress 2017: 5 Trends to Watch Mobile World Congress 2017: 5 Trends to Watch TIA, David Heard, John Jacobs, Susan Schramm, Brenda Boehm, Limor Schafman Mar 9 2017 4:00 pm UTC 60 mins
    Mobile World Congress is one of the foremost annual conferences that brings together companies from around the world to showcase the latest in mobile and wireless technologies. With the growing international movement toward 5G, the expansion of Internet of Things (IoT) applications and the proliferation of Smart Communities projects, MWC17 promises to provide an interesting view of coming trends.
    The TIA Team will be attending MWC17 and hosting a CTO Council Meeting event on IoT. Join TIA for this webcast on sights and insights from the MWC17 show floor and discussions the TIA Executive Team had with TIA Members and communications leaders from around the world.

    Speakers:

    > David Heard, Chairman of the Board, TIA

    > John Jacobs, Vice President, Market Intelligence and Research

    > Brenda Boehm, Chief Strategy Officer and Executive Vice President of Technology and Products

    > Susan Schramm, Chief Marketing Officer & Senior Vice President of Membership and Marketing
  • When will 5G come to Latin America? When will 5G come to Latin America? Wally Swain, Ken Rehbehn Mar 9 2017 5:00 pm UTC 75 mins
    Going into this year’s Mobile World Congress, it is easy to predict that 5G will be the hottest topic of conversation. Targeting revolutionary use cases beyond the reach of LTE, 5G presents opportunity and challenge. But while pre-commercial trials in South Korea, Japan and Russia get the headlines, decision-makers planning for network investment must ask hard questions. When will these technologies come to emerging markets like Latin America? Do emerging markets users need the firepower that 5G promises? Why would operators spend money on 5G if they have not yet realized all their investments in 4G? How does LTE Advanced Pro play into the 5G timeline?

    Join 451 Research analysts Wally Swain and Ken Rehbehn as they debate the impact and timing of these new wireless ultra-broadband technologies across the globe.
  • Empower your mobile testing with HPE Mobile Center’s unique integrations Empower your mobile testing with HPE Mobile Center’s unique integrations David Landsberg, HPE and Dean Carvin, Checkpoint Technologies Mar 9 2017 6:00 pm UTC 60 mins
    Mobile application development projects are expected to outnumber desktop development projects four to one over the next few years. These mobile applications pose testing challenges not shared by their desktop counterparts.

    In this webinar, we will cover how HPE Mobile Center, an integrated mobile application testing software development suite, combined with its unique integrations, helps you and your organization rapidly build, test and deliver high-quality mobile applications.

    Join us to hear more about:

    • Mobile Analytics - incorporate usage data from production, including most problematic devices, popular devices, common flows etc.
    • Security Scans - run security code scans at the click of a button on .apk or .ipa files powered by Fortify on Demand
    • Sentiment Analysis - analyze the comments users write about your application in the public app stores and categorize and score them
    • Crowd Testing - manually test applications internally or externally while communicating directly to ALM
    • SDK scanning - scan .apk files and list all the SDKs inside the application including which SDKs are deprecated and which ones are not actually in use
  • How Platforms Are Conquering Challenges in Large Mobility Programs How Platforms Are Conquering Challenges in Large Mobility Programs Chris Marsh, 451 Research; Avinash Harsh, Sonata Software; & Michael Ong, Halosys Mar 15 2017 5:00 pm UTC 60 mins
    Enterprises are facing an ever growing demand for mobile applications. To create and manage meaningful and sustainable mobility programs, while keeping up with the pace of this demand, enterprises should seek solutions that help them conquer the top challenges in large scale mobility programs by providing:

    •Security across apps, data, users & devices
    •Reducing cost & increasing the speed of development
    •Seamless connectivity to multiple systems including legacy and home grown environments
    •Holistic & consistent experience across mobile & web channels
    •Deployment of applications to customers, partners, employees and vendors
    •Streamlined post launch operations by providing real time monitoring abilities

    We will discuss these challenges and look at how one of the next generation mobile platforms is simplifying enterprise mobility and addressing these key challenges.
  • ASO or GTFO: App store optimization FTW ASO or GTFO: App store optimization FTW Stewart Rogers, Director of Marketing Technology, VentureBeat Mar 29 2017 5:00 pm UTC 60 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • A look at the future of software testing: HPE vision for Continuous Testing A look at the future of software testing: HPE vision for Continuous Testing Clint Sprauve, HPE Mar 29 2017 5:00 pm UTC 45 mins
    Many organizations struggle with the implementation of the engineering practices of DevOps, specifically with continuous testing. What if software development teams had a solution that was 100% cloud based (for distributed teams), provided real-time data analytics (for quick feedback), and supported the activities of build, edit and execution of test scripts in the cloud (nothing on the desktop). Couple that with the ability to test mobile apps on multiple devices (for scale and efficiency), the option to use containers plus existing tools (including open source), and support visual UX testing (for user experience and accessibility) while linking directly to existing continuous delivery infrastructure, and the goal of continuous testing becomes in reach.

    Join Clint Sprauve, Product Marketing Manager for Continuous Testing & Automation, to see the future of continuous testing in action and get a sneak preview of the latest software solutions for test automation. See what HPE is doing to push the envelope and take a key leadership role for the future of DevOps, quality and automation.

    This is part two in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    Taking on Enterprise Agile with HPE, April 26
  • Effective Application Security Testing at DevOps Speed: Get Started Effective Application Security Testing at DevOps Speed: Get Started James Rabon, Fortify Product Mgr/Security Specialist, HPE and Poonam Yadav, Fortify Product Mgr/Security Specialist, HPE Mar 30 2017 5:00 pm UTC 60 mins
    Is your business challenged with competing priorities and resources when it comes to application security testing and the need for more rapid application development? Are you impacted by costly and cumbersome remediation of security issues? In a world of competing requirements, how can your application security keep up with the rapid pace of development, and still remain effective?

    Learn how some of the most advanced and innovative application security customers tackle this problem by:

    • Using automation - where modern security tools are being included in the “treat infrastructure as code” mantra
    • Making static and dynamic analysis of applications more efficient and effective
    • Integrating application security throughout the software development lifecycle (using a DevOps toolchain)
    • Gaining visibility and insights into production application behavior and exploits via low-impact Continuous Monitoring
    • Protecting security flaws in production to buy time for true remediation
  • The Ways Machine Learning and AI Can Fail The Ways Machine Learning and AI Can Fail Brian Lange, Partner and Data Scientist, Datascope Apr 13 2017 5:00 pm UTC 45 mins
    Good applications of machine learning and AI can be difficult to pull off. Join Brian Lange, Partner and Data Scientist at data science firm Datascope, as he discusses a variety of ways machine learning and AI can fail (from technical to human factors) so that you can avoid repeating them yourself.
  • Using 3D, Virtual Reality and Social Virtual Worlds for Data Visualisation Using 3D, Virtual Reality and Social Virtual Worlds for Data Visualisation David Burden - CEO, Daden Limited, An Immersive Learning and Visualisation Company Apr 26 2017 12:00 pm UTC 45 mins
    This presentation will look at the new opportunities being opened up for the visualisation of data within both personal and collaborative 3D spaces, delivered to mobile, browser, desktop, virtual reality and social virtual world/social virtual reality environments. The pros and cons of both 3D and VR environments for the creation and sharing of data visualisations will be considered, tools which let you do dataviz in 3D and VR today presented, and future development pathways discussed.
  • Taking on Enterprise Agile with HPE Taking on Enterprise Agile with HPE Tye Davis, HPE Apr 26 2017 5:00 pm UTC 45 mins
    One of the largest challenges that we see organizations faced with when adopting agile methodologies and practices, is to deliver fast with quality at scale. Agile and scaling Agile in the enterprise is a core part of HPE’s strategy as we continuously learn from our own R&D and HPE IT efforts, as well as our customers and partners to implement scaled Agile. This learning is applied to our software solutions that help enable Agile development, testing and scaled Agile including the Scaled Agile Framework. ALM Octane acts as the communication hub and decision support system to organize, plan, and deliver Agile projects on teams and scaled up in the enterprise. The tools empower programs and teams to manage their backlog with visibility into development and testing data, and with analytics/insights for release forecasting, tasks completion and resource allocation.

    Join Tye Davis, Product Marketing Manager for Enterprise Agile, to see enterprise agile in action and get a preview of the latest software solution for application lifecycle management. See what HPE is doing to help organizations implement scaled agile.

    This is part three in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    A look at the future of software testing: HPE vision for Continuous Testing, March 29
  • Mobile commerce + AI: Not just a nice-to-have Mobile commerce + AI: Not just a nice-to-have Stewart Rogers, Director of Marketing Technology, VentureBeat May 11 2017 5:00 pm UTC 60 mins
    AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.

    Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.

    In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.

    Don't miss out!

    In this webinar you'll:
    * Dive into the current AI landscape, from free tools to enterprise-class options
    * Learn how conversational UI and AI will transform your mobile commerce
    * Understand which new platforms are right for your own commerce strategy
    * Get the key points to convince your CEO and CFO to put these master class tools in your hands

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • Mobile advertising: Stop fraud and step up clicks Mobile advertising: Stop fraud and step up clicks VentureBeat May 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers to be announced?

    Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.