Browse communities
Browse communities
Presenting a webinar?

Mobile Computing

Community information
Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
  • To win in today’s complex, noisy selling environment, you need marketing and sales to rally around the same goal: engaging customers. While it seems simple, more often than not these teams aren’t playing by the same rules. Join us as we dive into how you can referee the following common marketing and sales scuffles:

    - Countless dead-end calls: your sales reps complain that all the leads sent over by marketing are a waste of their time
    - Operating in the dark: marketing doesn’t know what happens to their leads, and sales doesn’t know where to start their conversations — how can either expect to deliver a personalized customer experience?
    - Reps gone rogue: your marketing team is concerned about the content of messages that sales is sending to prospects

    Tune in on April 21st, as Bob Kelly, Founder & Chairman - Sales Management Association, and Katie Doyle, Product Marketing Director - Pardot, walk through how to address these scenarios and eliminate common roadblocks on the path to becoming a sales and marketing super team.
  • Implementing a communication system for a growing business is no easy task. Between the time of design and implementation, a magnitude of factors may arise that require on-the-fly changes to the process. In this short video, hear about “zero-down implementation” that allows for flexibility in deploying a reliable system that is able to support the growing needs of the business. Learn more about:

    - Assembling an experienced team
    - Planning and designing phase
    - Deployment and training
  • Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.

    Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.

    Join this webinar to learn about

    - Advances in Wi-Fi security
    - Multi-layers approach to holistic protection
    - Controlling user and device access
    - Controlling applications
    -Xirrus security solutions
  • Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • As revealed in Workshare’s recent ‘Exposing Legal Productivity Challenges’ report, 78% of legal professionals are struggling to deal with the sector's productivity demands.

    In response, Head of Market Strategies at DLA Piper, Stephen Allen, Matt Brown, VP Product Management and Owen Oliver and Ben Ridgway, Product Managers at Workshare, will discuss how these challenges inhibit legal efficiency, and present measureable ways to overcome them.

    Join the discussion to take advantage of top tips to address the efficiency struggle, and be more productive.
  • Are you challenged by delays in releasing new application code within your enterprise? If your answer is “yes,” you can accelerate the release process through automation across the various stages of the software development and release lifecycle. Bridge gaps and learn the practice of collaboration between business, development, and operations teams with Agile development, continuous integration (CI), continuous testing (CT), continuous delivery, and continuous deployment.

    Join us and learn about HP’s approach to the DevOps Lifecycle by examining DevOps problems and potential solutions from three points of view: people, process, and tools—from planning to operation. Find out how the integration of HP and third-party development and deployment toolsets provides a seamless, end-to-end implementation of the DevOps lifecycle to increase your release velocity. You will learn about CODAR, Agile Manager, ALM, Unified Functional Testing, Performance Center and Change Impact Testing during this session.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • Decision making criteria for strong authentication solutions are increasingly being driven by the need to apply cost efficiency, manageability, and technological flexibility.

    Join this webinar on April 28th to gain insights into how IT professionals can reduce up to 60% of the time and resources needed to implement and manage strong authentication within their organizations, while taking advantage of a technological edge that will allow you to adapt to new technologies in a rapidly changing IT environment.
  • Decision making criteria for strong authentication solutions are increasingly being driven by the need to apply cost efficiency, manageability, and technological flexibility.

    Join this webinar on April 28th to gain insights into how IT professionals can reduce up to 60% of the time and resources needed to implement and manage strong authentication within their organizations, while taking advantage of a technological edge that will allow you to adapt to new technologies in a rapidly changing IT environment.
  • In our always-connected business world today, customers expect instant and seamless communications. Come learn how companies of all sizes can decrease response times, increase agent productivity and improve customer satisfaction while reducing demand for IT support.

    What attendees will learn:
    - Trends in customer care and communications – expectations in our always-on world.
    - Ways to offer consistent customer experiences across an array of communications mediums
    - How to enable high-definition voice and video collaboration to users – even those on mobile devices
    - Exciting new developments in integrated communications and customer
    - Ability to streamline communications in the cloud
    - How Zendesk and RingCentral integrations enhance customer satisfaction
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Mobility is the new frontier that is ‘still arriving’ and enterprises are grappling with how best to enable it, keeping enterprise security and employee satisfaction front and center of mind. Inherent in that balance is a careful trade-off as security is paramount but it should not come at the expense of productivity. On one hand is the Wild West with no security whatsoever and happy employees bringing in devices and apps of their choosing. On the other hand are happy enterprises with strict security controls but dissatisfied and disappearing employees! This webcast will help strike a balance that works for both entities - the User and the Enterprise. No utopia promised but you will come away with an understanding of:

    1) What the challenges around Mobility in the Enterprise are
    2) Why you should look into tacking them
    3) How one approach works for both the employees and the enterprises
  • Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.

    In particular, the panel will discuss:
    •Whether Big Data necessarily increases the risk of a security breach
    •How to assess the risks associated with different types of Big Data solutions
    •How to avoid data breaches in a Big Data environment
  • April 30th 10am PST / 1pm EST

    Speakers:
    John Koetsier: VP Research; VentureBeat
    Andrew Laffoon: CEO & Co-Founder; Mixbook

    Abstract:

    Is Mobile Marketing Automation the silver bullet to your apps success? How do you successfully leverage mobile marketing automation solutions to meet your business needs? With an increasingly complex market landscape, which solutions are tailored to your business?

    We surveyed 375 mobile developers with over 900 million monthly average users, analyzed 1.8 million apps in Google Play and the iOS app store, conducted 17 live interviews, and surveyed 19 MMA providers to find answers to these questions.

    Join us to learn how to successfully leverage mobile marketing automation to your advantage.

    Sponsored by: Swrve
  • Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
  • Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.

    You will learn about:

    ·A qualified, trained talent pool with skillsets aligned to match client needs
    ·Lower attrition rates and higher corresponding levels of employee engagement
    ·Opportunities to fulfil corporate social responsibility and diversity objectives
  • People are mobile. Business is mobile. Advances in communications technologies have made it easier for a mobile workforce to stay connected and productive from anywhere. Attend this session to gain insights you will want to adopt for your business, to ensure your business is capitalizing on the mobile revolution.

    Join the expert team from 8x8, Senior Product Marketing Manager Mike Reinhart and Business Communications Consultant David Leach, as they share market trends, new innovations and customer stories on the following topics:

    •The mobile office
    •Extending your ecosystem
    •Growth flexibility
    •Secure communications
    •Assured performance
    •Advanced analytics
  • Unified Communications and Collaboration has been here over 8 years, and yet adoption of the technology has been marginal at best. Yet there are best practices for implementing a highly successful UCC adoption strategy.

    Join Independent UC consultant and industry expert Steve Leaden for this lively BrightTalk Webinar and learn:
    - Understanding the market drivers that are driving adoption for UCC today
    - Learn the process for high adoption, from Assessment to Procurement to best Implementation strategies
    - Discover the key elements that drive high adoption UCC rates
    - Identify the discovery process for moving your UCC project forward
    - Identify the ROI factors for getting project approvals and ways of paying for a UCC project from day one
    - Learn about use cases and test bedding as strategic stepping stones in the process
    - Leverage best practices for a successful, high adoption UCC environment
    - From this Webinar you will take away a baseline for how to leverage strategies for delivering a high adoption UCC model for your own organization.
  • As use of UC continues to grow throughout the enterprise environment, the proliferation of mobile and BYOD devices will drive UC onto the wireless network. Deploying a network for UC requires more consideration than simpler data connectivity. This presentation will look at how to design a wireless network for reliable UC use, and what steps to take to troubleshoot issues when things (inevitably) go wrong.
  • Network functions virtualization (NFV) and Software-defined networking (SDN) have the potential to revolutionize mobile service provider networks. The transformation of moving the functions out of dedicated appliances and into virtualized applications that can run on generic hardware makes carriers faster and leaner, allowing them to roll out new services more quickly and be more flexible in how they run their networks. Here we will discuss the different mobile use cases that can take benefit of SDN/NFV paradigm. This new programmable network is also future-protected and designed to help support the new demands that come with the Internet of Things (IoT), BYOD, video and more.