Mobile Computing

Community information
Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.

Webinars and videos

  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • As smartphones now play key roles in e-commerce and personal communications for hundreds of millions of mobile users, our advice is, “authenticate early and often.” As using the prevailing PIN and password-based systems is easier said than done, voiceprints provide the easy-to-implement and easy-to-use alternative that supports a “unified” approach to mobile authentication.
     
    Join Dan Miller, senior analyst and founder of Opus Research, and Nik Stanbridge, vice president of product marketing at VoiceVault, to engage in a lively discussion of:
     
    · How mobility is driving the need for stronger authentication to build trusted links between and among individuals and enterprises

    · What voice biometrics technologies are; and how they differ from other factors for promoting security and personalization

    · How a unified approach to design and deployment saves time, money and effort for application developers and solution providers

    · How to get started to gain experience with a unified voice biometric product
     
    Executives at firms with an interest in providing the best, most personalized mobile experience for customers and employees should take part in this webcast. So should mobile application developers who recognize that strong, simple authentication is key to supporting secure payments and highly personalized services. 
  • Beacons are hot. Once dismissed by many, they are now being widely deployed in retail and grocery stores, stadiums and entertainment venues. Apple’s support for Bluetooth (iBeacon) has put the technology on the map and driven its growing adoption.

    While many people have read about iBeacon, they don’t clearly understand what beacons can and can’t do. Join Opus Research Senior Analyst Greg Sterling and Steve Hegenderfer, director of developer programs at Bluetooth SIG, for an informative and interactive discussion about all things beacon.

    Bluetooth SIG is the group that oversees the standards and licensing of Bluetooth. We assure you Hegenderfer will speak plain English during a presentation aimed at marketers, agencies and business decision-makers.

    In this accessible, non-technical session you’ll learn:

    • What iBeacon is and how it fits within the larger Bluetooth landscape
    • How many different types of beacons there are and who makes them
    • The cost, lifespan and transmission range of beacons
    • Optimal indoor beacon use cases (and things that beacons don’t do well)
    • How marketers/retailers can avoid spamming consumers with beacon triggered notifications
    • How indoor messaging and notifications can be personalized
    • Whether beacons can equally be used for indoor marketing and analytics
  • Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.

    Join Arun Bhattacharya, Sr. Director, Product Marketing, Enterprise Mobility, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
  • The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Mobile payments is a wide term which can refer to a multitude of different activities based around a mobile phone (smart phone). These activities can include acquiring (MPOS, QRCodes, NFC and other contactless means of payment), mobile banking, peer-to-peer payment innovations, premium SMS and other pay by phone options and payment/loyalty apps.

    The regulation that covers the above is equally wide ranging from the regulation of payment services and electronic money to the use of personal data and telco regulation.

    The European Commission in its wisdom drafted a very good green paper back in January 2012 entitled "Toward an integrated European market for card, internet and mobile payments" which recognised that mobile was simply a device/medium and not a payment method in itself. The aim of the paper was to increase competition, provide more choice and transparency for consumers, grow innovation and promote payment security and consumer trust. As recently as November 2013, the European Central Bank published its "recommendations for the security of mobile payments" and these have been endorsed by the national banks of the European Union. In the draft Second Payment Services Directive we see a continued push into this space of creating a secure and regulated platform for mobile issuing and acquiring in payments.
  • From natural disasters to hacking attacks, your business needs a plan to respond to adverse events and keep on going. That’s the goal of Business Continuity and Stephen Cobb helps you lay the groundwork for a successful strategy for your organization.
  • In today's data centers, the need for flexibility and agility is undeniable. As businesses continue to grow and leverage technology to remain competitive, they require a new way of simplified IT. IT organizations can no longer deal with complex, cumbersome legacy infrastructure that can't keep at the pace of the business.

    In this webinar, discover:
    - What is hyper convergence
    - The benefits of converged infrastructure
    - Best practices and use cases for leveraging hyper converged architectures
  • Governments and citizens both benefit when services are delivered online. But the adoption of online government services is often constrained by challenges with user registration and authentication. The usual problems of password security, forgotten passwords and sign-up abandonment are heightened for government services - they need to know its you to deliver the service. High credential churn drives up operational costs, weakens security posture, and frustrates users who want to accomplish tasks online.

    To combat password problems, many commercial sites are now introducing “Bring Your Own Credential” solutions. But can BYOC work for government services. Join us as we discuss practical ways that government services can implement BYOC solutions to improve the customer experience while enhancing site security, business assurance and citizen privacy.

    Join this webinar to learn …

    The business case for “Bring Your Own Credential” – Salim Hasham, National Cyber Resilience Leader, PwC Canada
    Customer Spotlight - GC View on implementing BYOC in the Public Sector – Rita Whittle, Executive Director, Government of Canada Security Policy
    Government of Canada
    Top 5 questions that the public sector needs to think about when considering BYOC – Andre Boysen, EVP of Marketing, SecureKey Technologies
    Heartbleed - Andre Boysen, EVP of Marketing, SecureKey Technologies

    Moderated by Neil McEvoy, Cloud Best Practices Network
  • Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.

    Join Arun Bhattacharya, Sr. Director, Product Marketing, Enterprise Mobility, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
  • In business today, it’s all about the applications. Cloud, mobility, big data, and social media have changed applications in the business world, and they are ever more critical to delivering business outcomes. Are you confident that you have the right data center network to support your new business applications? This webinar will examine the network from the point of view of the application:

    • Does it deliver the right performance?
    • Is it reliable to ensure the uptime you need?
    • Is it easy to scale as your needs grow?
    • Is it easy to manage when you need to make changes?

    In this webinar, we will discuss switching architectures, including Juniper’s Virtual Chassis Fabric, to meet these requirements and support your business outcomes.
  • Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • End-users have become increasingly tech savvy and now demand the same consumer-quality experiences when it comes to enterprise mobile applications. Join James Rendell, Sr. Director, Technology Strategist, CA Technologies as he discusses why the mobile end-user experience is a critical element of a successful enterprise mobility management strategy and how organizations can ensure increased innovation and performance of their workforce.
  • Today, a transformation is underway and we are witnessing the next great frontier in computing. Law firms are trading in legacy software and desktop PCs for tools that are more flexible, affordable and allow them to tap into information from applications, smart phones and tablets. The need to facilitate secure communication and collaboration internally and externally on any device and at anytime is essential. The rise of new cloud-based applications and mobile technologies are transforming the delivery of legal services. Many lawyers are abandoning traditional technology in favor of online alternatives, including secure cloud collaboration tools. Learn how law firms can use cloud applications effectively and securely in this webinar.

    Join this webinar to learn:
    -- Common misperceptions about cloud services
    -- How law firms are using cloud and mobile technologies to deliver better legal services
    -- What law firms should be looking for when choosing cloud service providers
  • Join James Rendell, Sr. Director, Technology Strategist, CA Technologies as he explores the common pitfalls organizations experience while managing their mobile enterprise risk and security. Hear practical advice on how you can avoid the same issues and learn how Smart Containerization can make it easier for organizations like yours to implement security policies. Wait- you do not have a security policy - then you definitely want to attend this live interactive session to learn why a security policy is an imperative.
  • We keep hearing about the Internet of Things (IoT), but what does it really mean for businesses today and in the future? Join James Rendell, Sr. Director, Technology Strategist, CA Technologies as he discusses the importance of the Internet of Things and the unprecedented scalability challenges that come with it. Learn about the challenges and opportunities the Internet of Things will mean for tomorrow’s enterprise and what you can do today to prepare for these changes.
  • Many organizations do not have a Mobile App strategy – but they should! Join James Rendell, Sr. Director, Technology Strategist, CA Technologies as he explores the importance of an enterprise Mobile App strategy and why you should implement one at your organization. In the enterprise space learn how deploying Apps on users’ BYOD devices can drive broader Transformation programmes by providing improved ways to enable users to engage with core business processes and subsequently improve overall compliance, and in the B2C space learn about the strategic importance of an App Strategy for reaching new markets, with new products, through new channels.