Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • GamesBeat: How to get gamers to love your games and love your brand GamesBeat: How to get gamers to love your games and love your brand Matt Marshall, CEO, VentureBeat Recorded: Sep 29 2016 59 mins
    Building brand affection is one of the best things you can do for any product. Think about it -- do you ask for a tissue or do you ask for a Kleenex? Do you look for a plastic bandage or do you ask for a Band-Aid? Do you "use a search engine to find out information about your blind date" or do you Google them?

    This is more than performance marketing -- which evolved solely to drive transactions and downloads -- this is awareness marketing. And for the games community, it's about getting people to remember and associate an emotion with your game, so they seek it out now -- and later. But brand awareness is hard to measure -- and hard to get your arms around. Many games teams spend little to no budget, favoring the results-focused performance marketing. We're going to show you how to be better than them -- and get the advantage for your mobile game, starting today.

    Venturebeat's own CEO Matt Marshall will sit down with execs from the gaming industry such as Seriously's VP of marketing and Eli Danziger, product manager for YouTube Ads as well as the CMO of Smule, Rob Singer. Together, we'll discuss storytelling and brand awareness marketing tips tailored to mobile games today.

    In this third installment of our Building Games Communities series, you will:

    * Learn how to use YouTube and other channels to drive brand awareness for mobile games;
    * Find the right time to invest in brand awareness marketing in your mobile game lifecycle; and
    * Understand the right KPIs to measure ROI on awareness marketing.

    Our esteemed panel for this rockstar discussion includes:

    * Matt Marshall, CEO, VentureBeat
    * Phil Hickey, VP Marketing and Communications; Seriously
    * Rob Singer, CMO, Smule
    * Eli Danziger, product manager, YouTube
    * Wendy Schuchart, Moderator, GamesBeat

    Don't miss out. Register today and attend live for this interactive mobile gaming panel.
  • Reality Check for Digital Wallet Security Reality Check for Digital Wallet Security Hannah Preston (Hannah.Preston@ca.com), Solution Strategist, Payment Security, CA Technologies & D.J. Murphy, CNP Recorded: Sep 29 2016 25 mins
    Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.

    As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.

    Learn the "must haves" for any digital wallet solution:
    • Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
    • Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
    • Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
  • Drawbacks of MDM Drawbacks of MDM Salim Hafid, Product Marketing Manager Recorded: Sep 28 2016 2 mins
    Why has MDM adoption stagnated? Privacy, user experience, and the growing popularity of agentless mobile security.
  • Enterprise Mobile Journey–The 3 keys to digital transformation success (Part 3) Enterprise Mobile Journey–The 3 keys to digital transformation success (Part 3) Tom Ku, VP Enterprise Mobility Recorded: Sep 28 2016 17 mins
    Digital transformation is a top business priority and it includes embracing consumer trends around mobility. However, recent stats on the state of mobile app development in the enterprise are dismal. Gartner has also concluded that the enterprise mobile app journey is a complicated one for IT.

    All too often mobile apps fail before they’re off the ground because companies try to do too much, too quickly. The road to digital transformation – and mobile – is a journey, not a race.

    Join Tom Ku, VP Enterprise Mobility and hear him share our recommendation around breaking this journey down into digestible, easy to rollout and test steps before achieving ultimate mobile nirvana!
  • Get to know your apps by implementing Continuous Application Monitoring Get to know your apps by implementing Continuous Application Monitoring Dylan Thomas, Senior Product Manager, HPE Security Fortify Recorded: Sep 28 2016 32 mins
    As application security moves into the realm of monitoring and protecting applications in production, it’s becoming even more critical to adopt solutions that are automated, continuous and natural. New technology innovations from HPE Security Fortify enable practitioners to continuously discover, profile and assess application portfolios of all sizes.
  • China, India set to emerge as cloud powerhouses: The why, how, and when China, India set to emerge as cloud powerhouses: The why, how, and when Agatha Poon Recorded: Sep 28 2016 75 mins
    The competitive landscape of cloud computing in China and India looks very different today than it did a few years ago. Aside from gaining wholehearted support from local governments, positive investment climate has a role to play to ignite market interest and vendor support. While early cloud leaders like Amazon and Salesforce have helped define the evolving marketplace and invited further competition, local players, which used to be hampered by process oversights, are now turning to cloud-based business models and service delivery to reinvent themselves and stay agile as technology innovation collides with reality. How does the cloud market shape up in China and India so far? What types of cloud services will be important in near future? What does it mean for you going forward?
  • Top 3 Critical Factors to Consider for Network Protection Top 3 Critical Factors to Consider for Network Protection Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Recorded: Sep 28 2016 61 mins
    Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.

    In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?

    What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:

    • Latest trends in NGFW
    • Addressing total cost of ownership
    • Security effectiveness in increasingly complex threat landscape
    • Challenges in policy management

    Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
  • 5 Ways Digital Learning Helps Build Amazing IT Organizations 5 Ways Digital Learning Helps Build Amazing IT Organizations Jeanette Jacobs, HPE Recorded: Sep 27 2016 48 mins
    Success in the idea economy requires technological agility. You have to act quickly to seize opportunity, respond to threats, turn great ideas into reality and stay ahead of the competition – and these capabilities rely on having an amazing IT organization.

    Amazing IT teams are competent, aligned to the business, highly collaborative and constantly adapting to change. These attributes just don’t happen. You need talent, you need a continuous education strategy and you need the tools to make it happen. Join this webinar to learn how implementing a continuous education strategy using the new HPE ART Enterprise Learning Edition (ELE) will help your journey to amazing.
  • Ransomware (R)evolution Ransomware (R)evolution Tyler Moffitt | Senior Threat Research Analyst Recorded: Sep 22 2016 49 mins
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
  • Live Q&A with David Leighton, President, Women in Technology Live Q&A with David Leighton, President, Women in Technology Katie Broderick, 451 Research & David Leighton, President, Women in Technology International Recorded: Sep 21 2016 24 mins
    Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
  • Examining the SWIFT Bank Hack: An In-depth Look at the $81 Million Cyber Attack Examining the SWIFT Bank Hack: An In-depth Look at the $81 Million Cyber Attack Michael Davis - CTO, CounterTack and Prashant Verma - Sr. Practice Manager, Paladion Networks Recorded: Sep 21 2016 46 mins
    Join CounterTack and Paladion Networks for a live webinar as we walk through the attack that shook banks across the globe. We'll hear from the incident response team at Paladion who supported the investigation, and will discuss:

    · How the criminals gained access to the SWIFT servers
    · The timeline of events that took place
    · A fatal mistake that led investigators to the discovery
    · Takeaways organizations can learn from to prevent similar attacks
  • CA UIM per il controllo di infrastrutture IT tradizionali e ambienti cloud CA UIM per il controllo di infrastrutture IT tradizionali e ambienti cloud Luigi Benocci & Cristiana Darra, CA Technologies Recorded: Sep 21 2016 42 mins
    Oggi l’Application Economy richiede un approccio Agile anche nel controllo quotidiano delle infrastrutture IT e nel controllo delle sue performance.
    Gli ambienti IT tendono sempre di più ad essere eterogenei con la presenza di sistemi legacy e cloud sia in forma privata che pubblica (hybrid cloud). Allo stesso tempo agli operation manager viene chiesto di essere proattivi e sempre più veloci nel tenere sotto controllo lo stato dei servizi di business erogati.
    Un approccio ai tool di monitoraggio a “silos” non risponde a questi requisiti e rischia di mantenere alti i tempi di risoluzione delle criticità e dei problemi (MTTR alti).
    CA Unified Infrastructure Monitoring (UIM) consente di avere una visibilità a 360 gradi sulle applicazioni, servizi e infrastruttura (fino al mainframe) in modo moderno e ottimale unificando i vari tools di monitoraggio dipartimentali, offrendo un controllo puntuale sia sui sistemi più tradizionali che sulle nuove tecnologie cloud e micro-service.
  • Phishing Awareness and Response: Can Technology Alone Make a Difference? Phishing Awareness and Response: Can Technology Alone Make a Difference? Jim Hansen, Chief Operating Officer, PhishMe Recorded: Sep 21 2016 63 mins
    Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
    That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
    In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
    •The current state of phishing
    •The success and failure of technology systems and how human systems can protect the last mile
    •How conditioning – not training - activates employees to identify and report phishing attacks
    •The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response

    Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.

    Presenter: Jim Hansen, Chief Operating Officer, PhishMe
    Bios:
    Jim has over twenty-two years’ experience in sales, operations and
    executive management in the information security industry,
    including co-founding and serving as COO of Mandiant. He has also
    held numerous executive and management positions in both sales
    and consulting organizations, and regularly speaks and publishes
    articles on information security topics.
  • Mobile Endpoints: Detect Threats and Improve Mobile Security Mobile Endpoints: Detect Threats and Improve Mobile Security Andrew Kellett, Principal Analyst, Ovum; John Michelsen, Chief Product Officer, Zimperium Recorded: Sep 20 2016 47 mins
    Controlling and protecting smartphones and tablets and the applications they run is an important part of the extended endpoint protection environment. Endpoint security is vital, and you need to treat your mobile endpoints with the same urgency as your Windows and server endpoints.

    Join Zimperium’s latest webinar featuring Ovum’s Andrew Kellett. Andrew and John will discuss the importance of adding mobile devices to your endpoint security procedures and how to detect attacks via mobile OSs, applications, malware and Wi-Fi networks.

    Agenda

    - Mobile Devices are a Viable Vector of Attack
    - Ovum Research: Endpoint Security & Mobile Security Requirements Differ
    - Enabling mobile devices as threat detection sensors
  • Are you ahead or behind? Research findings on Application Security in DevOps Are you ahead or behind? Research findings on Application Security in DevOps Cindy Blake Recorded: Sep 20 2016 53 mins
    DevOps is an immensely popular topic. And there is frequent debate over whether practicing DevOps makes your applications more secure or less secure. So we conducted a blind study to research the state of Secure DevOps. We will share our findings such as:

    What tools and processes are mature DevOps shops using?
    How mature is the average DevOps shop?
    How is application security thought of in DevOps methodology?
    Common misunderstandings around application security and the resulting risk.
    See how we incorporated these findings to help you integrate application security into an Agile or DevOps methodology. You need not compromise.
  • Documentum viewing from mobile devices Documentum viewing from mobile devices No Presenter Recorded: Sep 19 2016 2 mins
    Document viewing designed for mobile.

    Reading, section jumping, and reviewing content on mobile phones has never been easy – until now. LEAP Focus replaces pinching and zooming with a responsive mobile experience that’s perfect for whatever device you use for whatever long-form business document. No laptop required.

    For more information please visit: http://www.emc.com/en-us/enterprise-content-management/leap/focus.htm
  • Delight users with easy Content access and approval Delight users with easy Content access and approval No Presenter Recorded: Sep 19 2016 2 mins
    Content anywhere, anytime.

    Content access and subsequent approvals are often more friction-filled than they should be. LEAP Express delights casual and infrequent users with its ability to easily browse, search, and approve all content, anywhere, anytime. It’s repository-agnostic, eliminating the need to jump across multiple content apps, and it supports approval workflows from D2, Documentum, and solutions such as Life Sciences.

    For more information please visit: http://www.emc.com/en-us/enterprise-content-management/leap/express.htm
  • Document Capture for Everyone Document Capture for Everyone No Presenter Recorded: Sep 19 2016 2 mins
    Document capture for everyone.

    IT document capture solutions are complex. As a lightweight app, LEAP Snap overcomes this problem in minutes while still delivering the enterprise-grade development, test, production, template, and configuration features your business needs.

    For more information please visit: http://www.emc.com/en-us/enterprise-content-management/leap/snap.htm
  • Achieving Content Exchange Without Chaos Achieving Content Exchange Without Chaos No Presenter Recorded: Sep 19 2016 2 mins
    Content exchange without chaos

    Exchanging mortgage, insurance, or other business content can be chaotic. LEAP Courier improves this exchange by delivering a visually rich, clearly marked, and easy- to-follow experience so you don’t have to settle for risky sync and share solutions.

    For more information please visit- http://www.emc.com/en-us/enterprise-content-management/leap/courier.htm
  • How to Make Video for Mobile Audiences How to Make Video for Mobile Audiences Mark Mallchok, Director of Accounts; Dave Less, Director of Video; Mark Rochon, Content Team Manager Recorded: Sep 15 2016 45 mins
    This presentation will explore not just who is my marketing video audience, but how are they viewing the video? David, Mark, and Mark will discuss the different approaches required for mobile video from the storytelling and the aesthetic/technical perspective.

    We'll breakdown these important questions: Can you be sure that your audience will have the audio turned on? Why does direct address to camera work so well for mobile? What’s the ideal length for a mobile video? Could a slick, commercial style video actually be less successful than a playful more personal story?

    Addressing these ideas through the concepts of mobile aesthetics, user authenticity, personalization, humor, narrative, and serialization, David, Mark, and Mark explain how to optimize your video marketing for the vast mobile audience.
  • Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense David Jevans, VP Mobile Security Recorded: Sep 15 2016 49 mins
    Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
  • Agile Load Testing using StormRunner Load Agile Load Testing using StormRunner Load Kristina Avrionova, Oded Keret HPE Recorded: Sep 15 2016 56 mins
    In between scrum meetings, user stories and ever shortening sprints, have you penciled in load testing? How do you detect performance degradation and shorten time spent finding and fixing problems in production? Join us and learn how StormRunner can help you deliver high quality projects faster and make load testing a natural fit into your agile development. Your admission also secures you a live demo of the product.
  • Accelerate Cloud Outcomes With Hybrid Cloud Management Accelerate Cloud Outcomes With Hybrid Cloud Management Louise Ng, Sebastien Reister, HPE Recorded: Sep 14 2016 61 mins
    To accelerate your business outcomes should you use public or private cloud? The jury has decided and the verdict is: “hybrid.” So you need to manage a hybrid cloud, but what does this exactly mean? Hybrid Cloud Management means managing the entire cloud lifecycle: from design, through workload provisioning, to operations (e.g. monitoring, finance, change, and configuration). This Cloud Model Office webinar will show you Hybrid Cloud Management use cases in action. In this webinar you will see how you can implement capabilities like

    Dynamic scalability (flexing)
    Hybrid cloud provisioning
    Service monitoring
    Automated remediation
    Capacity-driven service provisioning
    Automated Change & Configuration management
    Showback
  • Self-service BI for SAP and HANA – Dream or Reality? Self-service BI for SAP and HANA – Dream or Reality? Swen Conrad, CEO, Ocean9 Recorded: Sep 14 2016 48 mins
    Gartner predicts that “analytics will be pervasive … for decisions and actions across the business.” Sounds like analytics nirvana with instant access for any analysis you want to do, in other words self-service BI. Is this dream or reality?

    Join this webinar to find out how clouds like AWS or Azure are moving the industry close to this nirvana today through simple assembly of cloud services combined with the appropriate consumption model of these services.

    We will demonstrate how easy it is to provision your high end SAP HANA Database right next to your BI Analytics tier.

    Maybe we are closer to this nirvana than you think?
  • The Six W's of Pulse Secure Webinar Series: Who is Pulse Secure? The Six W's of Pulse Secure Webinar Series: Who is Pulse Secure? Phil Montgomery, VP of Marketing Oct 6 2016 3:30 pm UTC 30 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.

    The first webinar in our series will provide an overview of who Pulse Secure is, taking you on a trip down memory lane through the past, providing updates on the present, and provide a glimpse on what the future holds.

    Don't forget to join us with the rest of the webinars in the series!
  • Database as a Service: What should you consider before migrating to the cloud? Database as a Service: What should you consider before migrating to the cloud? Matt Aslett - 451 Research Director, Data Platforms and Analytics Oct 11 2016 3:00 pm UTC 45 mins
    Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.

    While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.

    Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:

    • Highlight the trends driving enterprises to move database workloads to the cloud
    • Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
    • Identify the use-cases that are prime candidates for migrating database workloads to the cloud
    • Highlight the critical success factors for database migration to the cloud
  • Dell EMC LEAP Snap – Distributed Capture for the Cloud Dell EMC LEAP Snap – Distributed Capture for the Cloud Kris Mills, Justin Bettencourt Oct 11 2016 3:00 pm UTC 75 mins
    Capture has been traditionally deployed in our local mail rooms; however, as we move to a distributed work force organizations are realizing that their remote workers also require capture functionality. With the release of LEAP Snap we offer a cloud based capture solution that will meet your organizational capture needs.

    Dell EMC's LEAP is a platform that responds to the changing needs of organizations as they move from the classic content management offerings into this new era of lightweight, cloud, purpose-built apps that deliver on the promise of content for all. Snap supports real time auto-classification and data extraction to support any immediate business processes & needs.

    Join our session to get an overview of the LEAP Platform with a focus on Snap.
  • Is Your PKI Future-Proofed? Is Your PKI Future-Proofed? Larry Ponemon, Chairman & Founder Ponemon Institute, and John Grimm, Senior Director of Security Strategy, Thales e-Security Oct 12 2016 3:00 pm UTC 60 mins
    Enterprises are dealing with a new and evolving set of challenges and requirements that are driving changes to their core public key infrastructure (PKI). The number of applications that depend on certificate issuance services is increasing dramatically, and ranges from basic SSL and user/device authentication to cloud services and now to the Internet of Things (IoT). So, what are enterprises doing to meet these new challenges?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings of the 2016 Global PKI Trends Study, including:
    •PKI best practices that enterprises are adopting
    •The latest trends in PKI deployment – from internal to managed to the cloud and more
    •How hardware security modules (HSMs) are being used to improve the trust and assurance level of mission-critical PKIs
  • Beyond OEM Pay: Mobile payment strategies for banks Beyond OEM Pay: Mobile payment strategies for banks Sarah Clark and Martin Cox Oct 13 2016 2:00 pm UTC 45 mins
    Join NFC World and Bell ID to find out how banks can move beyond standard handset maker and card network schemes to provide differentiated mobile payment offerings that retain customers, attract new business and add fresh revenue streams.
  • Webinar: Solving the “password1” Problem: Why Businesses Need 2FA Webinar: Solving the “password1” Problem: Why Businesses Need 2FA Ben Reed, Senior Technical Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products Oct 13 2016 5:00 pm UTC 60 mins
    Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.

    With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.

    In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
    •Account credential theft: What can be done to prevent employees from falling into a trap?
    •How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
    •The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
  • The Six W's Webinar Series: What Makes our VPN the First Choice for IT? The Six W's Webinar Series: What Makes our VPN the First Choice for IT? Scott Erickson, Technical Marketing Engineer Oct 18 2016 3:30 pm UTC 30 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.

    The second webinar in our series will guide you through what makes Pulse Connect Secure the industry-leading SSL VPN solution as the demand for security continues to increase, and the reasons why that should matter to you. In combination with our new Pulse Secure Appliance (PSA), Pulse Connect Secure meets your organization’s secure access needs by providing fast, secure, and optimized access to a rich set of applications and services. Join us to learn more about why Pulse Connect Secure is the solution for your secure access needs.
  • Big Data Drives Big Efficiency Big Data Drives Big Efficiency Matt Aslett - 451 Research Director, Data Platforms and Analytics with Aali Masood, Senior Director, Oracle Oct 18 2016 4:30 pm UTC 60 mins
    Improving the efficiency of existing processes is critical for enterprises, and one of the first proof points of many big data projects. In the long-term enterprises may be looking for big data to generate revenue from new projects and applications, but proving the potential benefits by improving the efficiency of existing business processes – such as optimizing supply chains, or accelerating compliance – is a good place to start. Additionally, operating more efficiently at lower cost and with lower risk enables an organization to redirect budget towards driving growth.

    Join Oracle and 451 Research for a webinar exploring how to make this operational efficiency possible through a combination of data management, statistical analysis and visualization.
  • Metrics that matter: Mastering mobile marketing KPIs Metrics that matter: Mastering mobile marketing KPIs Sheila Bhardwaj, Director of Account Management, TUNE Oct 20 2016 5:00 pm UTC 60 mins
    In an era when analytics and business intelligence allows just about anything to be measured, how do you determine the metrics that matter to your app’s marketing performance? Apps have the potential to drive major value for your company, with the global revenue from mobile apps stores set to reach $52 billion this year. How do you ensure you’re capitalizing on the potential that a popular, engaging app can offer? Avoid analysis paralysis by focusing on a few key performance indicators (KPIs).

    Join Gwen Murray, Mobile Marketing Lead at Staples, and Sheila Bhardwaj, Director of Account Management at TUNE, for a webinar that will teach you everything you need to know about mobile marketing KPIs, including how to decide on the right ones based on your goals, app, and business. If you’re a mobile marketer looking to understand which KPIs are available and how to use them, you won’t want to miss this.

    By registering for this webinar you'll:


    * Learn the most widely used mobile marketing KPIs
    * Understand KPIs to target depending on your type of app, goals, and user lifecycle stage
    * Know unique KPIs that can help demonstrate value even if not a mobile-first business
    * Get action items for your new KPI data geared toward moving the needle for your business
    * See how your app stacks up against key industry benchmarks.

    Speakers:
    * Gwen Murray, Mobile Marketing Lead, Staples
    * Sheila Bhardwaj, Director of Account Management, TUNE
    * Wendy Schuchart, Analyst, VentureBeat
  • Security Threat from Auto Attacks:Web Behavior Analytics to Protect Websites Security Threat from Auto Attacks:Web Behavior Analytics to Protect Websites Eric Ogren, Senior Analyst at 451 Research, & Omri Iluz, CEO of PerimeterX Oct 20 2016 5:00 pm UTC 60 mins
    Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.

    Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.

    In this webinar you will learn:

    •How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
    •How to protect against advanced modern attacks utilizing real-user browsers
    •How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
    •Real-world attacks and how organizations use behavioral analysis to prevent them
    •How to future-proof your business and your infrastructure
  • Storage Performance Benchmarking: File Components Storage Performance Benchmarking: File Components Mark Rogov, EMC, Ken Cantrell, NetApp, Alex McDonald, NetApp Oct 20 2016 5:00 pm UTC 75 mins
    The storage performance benchmarking dynamic duo, Mark Rogov and Ken Cantrell, are back. Having covered storage performance benchmarking fundamentals, system under test and most recently block components, this fourth installment of the Webcast series will focus on File Components.

    Register now to learn why the File World is different from the Block World. Mark and Ken will walk through the basic filesystem theory to how filesystem data layout affects performance, covering:

    • Why file?
    • Local vs. shared filesystems
    • Compare and contrast typical file performance use cases
  • Reduce Risks and Secure Your Mobile Endpoints Reduce Risks and Secure Your Mobile Endpoints Phil Hochmuth, Program Director, IDC’s Enterprise Mobility; John Michelsen, Chief Product Officer, Zimperium Oct 27 2016 4:00 pm UTC 60 mins
    A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.

    Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.

    Agenda

    - How to privately secure BYOD mobile endpoints
    - How to classify risky devices by examining installed applications
    - How to create a plan to reduce risks introduced by mobile devices
  • BotBeat: The state of chatbots -How to win BotBeat: The state of chatbots -How to win Veronica Belmont, Product Manager, Growbot Oct 27 2016 5:00 pm UTC 60 mins
    Chatbots are everywhere right now, but there's a problem. Almost every article is telling you about a particular bot, or the future implications of chatbots. That's fine, but where are the instructions on how to build chatbots, what they can do to help your business, how to set them up for success, and what the market opportunity is?

    Look no further as in this session we'll reveal the results of a new study into chatbot usage, detail how to build your own (at any budget), explain why you should care about the bot revolution, and help you take grab a competitive advantage while it still exists. It is time to jump on the bot-wagon, and we'll help you steer the right course.

    From this webinar, attendees will learn to:

    * Identify and harness competitive advantage
    * Understand the bot landscape and the opportunities it presents
    * Build your own bot on a budget

    Speakers:
    * Veronica Belmont, Product Manager, Growbot
    * Stewart Rogers, Director of Marketing Technology
    * Wendy Schuchart, Moderator, VentureBeat

    More speakers coming soon!
  • Build the Rocket for Your Journey Build the Rocket for Your Journey Eva Tsai, VP Marketing and Business Operations, vArmour Nov 1 2016 6:00 pm UTC 45 mins
    Eva Tsai will share her experience as a woman in tech charting a journey spanning multiple disciplines and excelling as a strategic business leader, her thoughts on the challenges women are facing, both in entering and advancing in their careers, and what her recommendations are on both professional and personal fronts.

    Presenter Bio:
    Eva has extensive experience leading go-to-market transformation and managing company telemetry to drive growth worldwide. Her innovation and leadership has been recognized with significant industry awards and patents. She was selected by Silicon Valley Business Journal in 2015 as one of Silicon Valley's 100 Most Influential Women and won the 2014 Marketer That Matters™ award, sponsored by The Wall Street Journal. At vArmour, Eva has transformed the company into a growth machine via innovative and well-executed go-to-market strategy, insightful telemetry, and process optimization. vArmour has been named a “Company to Watch” by TechCrunch and a "Cool Vendor" by Gartner. Prior to vArmour, Eva held strategic roles at Citrix, BroadVision and Oracle. Eva holds a BS and a MS in Computer Science from Massachusetts Institute of Technology.
  • The Six W's Webinar: Where to Access 100% Visibility on Existing Endpoints? The Six W's Webinar: Where to Access 100% Visibility on Existing Endpoints? James Gonsalves, Product Line Manager - Pulse One Nov 2 2016 3:30 pm UTC 30 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.

    The third webinar in our series will take you in a deep dive into a demo of Pulse One, displaying the benefits of mobility and group management, central administration, and compliance reporting – where you have 100% visibility on your existing endpoints - all in one place!
  • Are buy buttons working? Social commerce for 2017 Are buy buttons working? Social commerce for 2017 Stewart Rogers, Director of Marketing Technology, VentureBeat Nov 15 2016 8:30 pm UTC 30 mins
    A recent survey of 506 marketers indicated that 36 percent of respondents reported an increase in sales from buy button integration into social media and email interfaces. That percentage will likely increase in 2016 with 60 percent more marketers projected to utilize buy buttons throughout the year. Selling through social, social commerce, is a hot topic and one to watch as marketers look for more ways to connect with consumers.

    Companies use buy buttons and the like within social networks like Facebook to increase their visibility to the consumer, have one-on-one conversations with potential buyers, and make it easier to bridge the gap between consumers and brands. With the insights gained from the analytics provided by various social networks, companies are armed with more data about customers and a greater ability to personalize offerings. Join VB experts and panelists as they suss out trends to watch in the social commerce space.

    Attendees at this webinar will learn how to:

    * Optimize social selling across social media outlets
    * Understand the impacts of increasingly mobile consumers on social commerce
    * Unlock sales using social networks
    * Find and connect with more prospects
    * Leverage the analytics from social sites to gain a deeper understanding of customers

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat


    Register for this free executive session today
  • How to use AI in designing the customer experience How to use AI in designing the customer experience VentureBeat Nov 17 2016 4:00 pm UTC 60 mins
    How to use AI in designing the customer experience

    Smart marketers know that the sweet spot between AI and the org’s branding is where true customer engagement spikes. It’s not enough to give the customers what they want. It’s about giving them what they didn’t realize they wanted. Like how every time you upload a photo to your Facebook account -- its DeepFace artificial intelligence program suggests that you need to tag your friend. Or how Starwood’s bot butler “Botlr” has not only freed up staff time in Aloft properties but also underlined its brand’s enthusiasm for AI and machine learning technologies.

    It’s time to take that AI one step further. We’ll talk about how to build and design the customer experience by using AI and machine learning. We'll show you how successful companies are making tremendous strides in moving the needle toward optimized customer engagement. And what's more, we're going to show you how to get started today by taking the guesswork out of your marketing strategy.

    Join us for this hour long deep dive into using AI and machine learning to design the customer experience. In this VB Live curated hour long workshop.

    In this webinar, you'll:
    * Learn how to build a customer engagement strategy from the ground up using artificial intelligence.
    * Hear valuable tips on improving your customer engagement now
    * Get insight from top execs who have been down this road and have the best advice

    Sponsored by Boomtrain
  • Current State of Storage in the Container World Current State of Storage in the Container World Eric Forgette, Technical Director, Nimbus Software, Chad Hintz, SNIA Board, Cisco Nov 17 2016 6:00 pm UTC 75 mins
    The first wave of adoption of container technology was focused on micro services and ephemeral workloads. The next wave of adoption won’t be possible without persistent, shared storage. This webcast will provide an overview of Docker containers and the inherent challenge of persistence when containerizing traditional enterprise applications. We will then examine the different storage solutions available for solving these challenges and provide the pros and cons of each.

    In this webcast we will cover
    •Overview of Containers
    ◦Quick history, where we are now
    ◦Virtual machines vs. Containers
    ◦How Docker containers work
    ◦Why containers are compelling for customers
    ◦Challenges
    ◦Storage
    •Storage Options for Containers
    ◦NAS vs. SAN
    ◦Persistent and non-persistent
    •Future Considerations
    ◦Opportunities for future work

    This webcast should appeal to those interested in understanding the basics of containers and how it relates to the storage used with containers.
  • Hacking the Brain: Unlocking the power of NeuroVR Hacking the Brain: Unlocking the power of NeuroVR Luciana Carvalho Se, Chief Evangelist, Racefully & Founder SE3 Solutions Nov 29 2016 3:00 pm UTC 45 mins
    Can immersive reality actually help us better understand each other? Understand ourselves? How does human cognitive processing change, or become enhanced, once VR and AR are added to the mix?

    What does that mean for our (future) sense of self? What is the impact of literally ‘putting oneself in somebody else’s shoes’ and what that means for human empathy?

    Exploring recent findings on the treatment of phobias, PTSD and mental health issues using VR, and theories around the virtual-physical illusion of presence, this webinar asks how neuroscience has been affected and/or advanced by the development of immersive tech.
  • Cloud Customer Architecture for Big Data and Analytics Cloud Customer Architecture for Big Data and Analytics Heather Kreger, Gopal Indurkhya, Manav Gupta, Christine Ouyang from the Cloud Standards Customer Council Dec 7 2016 7:00 pm UTC 60 mins
    Using analytics reveals patterns, trends and associations in data that help an organization understand the behavior of the people and systems that drive its operation. Big data technology increases the amount and variety of data that can be processed by analytics, providing a foundation for visualizations and insights that can significantly improve business operations.

    In this webinar, the Cloud Standards Customer Council will discuss how to support big data and analytics capabilities using cloud computing. The speakers will walk through a cloud reference architecture and cover the various considerations and best practices for building big data and analytics solutions in the cloud.
  • Get 'em and keep 'em - Connecting the dots between CPI and LTV Get 'em and keep 'em - Connecting the dots between CPI and LTV VentureBeat May 4 2017 5:00 pm UTC 60 mins
    With an increasing number of apps on a user’s device, app marketers are challenged to draw the user's attention not only through an efficient user acquisition initiatives, but also via engagement and retention activities.

    But in such a competitive market, where ROI has to be maximized, how do you increase your user lifetime value (LTV) and minimize your cost per install (CPI)?

    Join VentureBeat a panel of mobile execs for an inside look at how to best utilize user acquisition strategies while maintaining a high-value, loyal app user-base. We'll share secrets about the various synergies between user acquisition and user engagement, highlight reactivation tactics through a combination of different communication channels (push, email, retargeting), and lay out strategies for lowering CPI through virality initiatives and organic growth.

    In this webinar, you will:

    * Explore key strategies for efficient, highly-optimized user acquisition
    * Gain new best practices for engaging and retaining users while reducing churn
    * Learn about acquisition-engagement synergy tactics such as: pre- and post-install segmentation, organic growth, retargeting and reward-based acquisition

    Speakers:

    More panelists to be announced soon!

    Moderator: Wendy Schuchart, VentureBeat