Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • How to Defend Against Email Fraud - in partnership with CSO How to Defend Against Email Fraud - in partnership with CSO Scott Brown, CERT Australia & Mark Guntrip, Email Protection, Proofpoint Recorded: Aug 25 2016 55 mins
    Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

    These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

    Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

    Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

    · How cybercriminals craft Email Fraud messages and where they get their information
    · How to help executives hide the information that cybercriminals may be using to shape Email Fraud
    · Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
    · What kind of business controls can be put in place to protect against Email Fraud manipulations
  • Executive Survey on Speech Analytics: Proven Value and Future Potential Executive Survey on Speech Analytics: Proven Value and Future Potential Dan Miller, Lead Analyst, Opus Research; Umesh Sachdev, CEO & Co-Founder, Uniphore Recorded: Aug 24 2016 49 mins
    In a recent survey commissioned by Uniphore, Opus Research asked 500 influential executives in the contact center and customer experience domain about the perceived value of Speech Analytics and to ascertain the impact on plans to procure and deploy such resources in the future.

    With completed interviews of decision-makers (Director, VP, C-level) from firms with revenue of more than U.S. $50 million, the survey respondents included a mix of vertical industries, including: telecommunications, healthcare, financial services, retail, pharmaceuticals, travel & tourism, and commercial banking.

    Join Dan Miller, lead analyst & founder at Opus Research, and Derek Top, director of research with Opus Research, as they unveil the key findings from this exclusive executive survey on speech analytics:

    * Implementation of speech analytics is poised for growth: New, real-time applications create better customer experience
    * Findings attest to maturity of technologies, applications and options: Support of multi-channel support strategies
    * Mix of premises, cloud and “hybrid” architectures
    * Respondents see a bright future: Most expect to increase spending and investment & finding means to build a business case
  • 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 周德振(Adam), 高级解决方案顾问, Akamai Technologies Recorded: Aug 24 2016 59 mins
    *This webinar will be conducted in Mandarin
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    各家机构正越来越倾向于使用大数据资源来“查找”各种恶意行为的迹象、甚至是破坏的先兆,来帮助机构把有限的安全资源集中在关注现有的威胁之上。但是,挑战在于如何处理这样大量的数据,而且保证数据的相关性、及时性和可用性不会受到影响。而且,随着安全威胁使用了更多样的技术来保证其匿名性、减少留痕并掩盖其意图,机构所面临的安全挑战也越来越严峻。

    在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

    8月24日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin
  • New Legal Requirements for Mobile Security – EMM is not Optional New Legal Requirements for Mobile Security – EMM is not Optional Ojas Rege, MobileIron VP Strategy, and Carl Spataro, MobileIron Chief Privacy Officer Recorded: Aug 23 2016 36 mins
    As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.

    This webcast is for Mobile IT and information security professionals and their legal and compliance teams. This webcast will cover:

    The foundational security controls now required by law
    How these controls are applied to mobile
    Best practices to achieve compliance
    The central role of Enterprise Mobility Management (EMM)
  • Become a Cloud Master with the HPE Helion Cloud Suite Become a Cloud Master with the HPE Helion Cloud Suite Keri Sprinkle, Neil Miles, Kiran Makarla HPE Recorded: Aug 23 2016 56 mins
    In our first Helion Cloud Suite web event, we introduced you to the new software suite from HPE that brings together a full range of hybrid cloud capabilities, enabling you to deliver and manage the full spectrum of applications and technologies -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments.


    Join this web event for a deeper dive, and be the first to see this new suite in action:

    Manage hybrid and multi-cloud environments
    Develop, deploy, and scale cloud-native applications
    Drive business performance with focused analytics

    More than just a hybrid cloud management platform, the HPE Helion Cloud Suite can help you manage any cloud, any environment, and any technology for any application. Go beyond cloud management, and learn what it means to become a cloud master.


    View Part 1 of this 2 part series at: http://www.vivit-worldwide.org/members/group_content_view.asp?group=103644&id=600517
  • GamesBeat: How to build a thriving games community GamesBeat: How to build a thriving games community Mathieu Nouzareth, CEO of FreshPlanet Recorded: Aug 18 2016 61 mins
    Pokemon Go has taken the gaming world by storm. Released in a few countries on July 6, Pokémon Go shot to No. 1 in the top downloads, shooting ahead of games like Clash Royale, Clash of Clans, and Candy Crush Saga. Pokémon Go is making at least $1.6 million a day in the U.S. alone, according to tracking firm Sensor Tower. Even more importantly, it appears to be getting reluctant indoors-y types out of doors. Together. In groups.

    Building an explosively thriving games community is no longer a pipe dream for many companies. And the elements that make a community thrive can be understood as a combination of brilliant idea, content marketing, smart analytics, and great platforms. It turns out that the success of games like Pokemon Go are within reach.

    Join VentureBeat and gaming experts as they deconstruct what it means to build and maintain a thriving games community and learn to:

    * Understand the aspects of gaming platforms that can help a community succeed
    * Define and refine the elements of community success
    * Turn content marketing opportunities into actionable insights
    * Utilize Google to harness unique insights and tools to maximize community performance.

    Speakers:

    * Mathieu Nouzareth, CEO of FreshPlanet
    * Wright Bagwell, CEO of OutPost Games
    * Alexis Fritzsche, Developer Partner Manager, Mobile Apps, Google
    * Dean Takahashi, Lead Writer, GamesBeat
    * Wendy Schuchart, Moderator, VentureBeat

    Register today for this free executive session.

    Sponsored by Google
  • Unleash the Power of Your Operational Data: Take an Analytic Approach to Service Unleash the Power of Your Operational Data: Take an Analytic Approach to Service Heath Ramsey Director, Analytics and Reporting Customer Success Recorded: Aug 18 2016 58 mins
    As a leader in IT, you are constantly challenged to build and deliver higher quality services while minimizing cost. This is difficult to do while managing daily operations, meeting service level agreements (SLAs), and sifting through data to pinpoint areas of improvement.

    Service automation is a key strategy to drive major improvements across cost, quality and agility in service delivery. There are many areas that could be candidates for automation. Which would be the ones to drive the greatest business impact? This is where analytics come into play. By taking an analytical approach to automation, you’ll be making the best use of the operational data you already have.

    Join us and find out how to:

     Establish the value of structured communications as a baseline for organizing business goals and services

     Leverage leading and lagging indicators to measure performance of a structured process

     Align data and analytics to drive action across all stakeholders in an organization

     Integrate benchmarking as the next step in business outcome improvement
  • Masters of Mobile Data: Harnessing Mobile to Drive Omnichannel Success Masters of Mobile Data: Harnessing Mobile to Drive Omnichannel Success Brian Kim, VP of Media & Acquisition, Dollar Shave Club Recorded: Aug 17 2016 61 mins
    In part 2 of this compelling Masters of Mobile Data series, you'll learn that there’s no such thing as a smartphone user, tablet user, or web user. Rather, it’s the same user who hops between the different experiences. By the same logic, there’s no point in developing a “push messaging” strategy when what you need is a holistic communications strategy.

    How are some companies able to use mobile as part of a broader customer engagement strategy, when so many others struggle to even get mobile right within its own silo? How are these marketers able to know what’s really working, taking into account all of the various multichannel effects that drive people to the app and from the app into transactions that occur outside the app, using real data, not guesswork.

    Join our group of experts from retail, ecommerce, and travel as they review what works and what doesn’t when it comes to omnichannel success.

    In this webinar you’ll learn:
    * How to think about mobile apps versus the web, and the role of mobile in the wider customer journey
    * How omnichannel marketers integrate user preferences and profile information across multiple sources
    * Mobile strategies that work in an omnichannel environment (hint: it’s more than in-app messaging and email)
    * Techniques for leveraging user-knowledge to personalize messages across channels

    Speakers:
    * Brian Kim, VP of Media & Acquisition, Dollar Shave Club
    * Brian Monahan, Former CMO Walmart.com, CEO/Founder NewCo
    * Paul Mander, Director Solutions Consulting, mParticle
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Register for this free event today

    Sponsored by: mParticle
  • 5 Must-Haves for Successful Enterprise Mobile Apps (Part 1) 5 Must-Haves for Successful Enterprise Mobile Apps (Part 1) Alfred Chuang, CEO Magnet Systems Recorded: Aug 17 2016 20 mins
    From Facebook Messenger’s bots to the recent Pokémon Go craze, mobile apps are becoming the vehicles for some of the most disruptive consumer technologies today. Yet, enterprise mobile innovation continues to lag behind. As Gartner reported in June, the average mobile enterprise application development budget is actually shrinking even though demand for mobile apps in the enterprise is actually quite high.

    Join Alfred Chuang, CEO Magnet Systems, as he shares the five must-haves for implementing successful enterprise mobile apps – quickly and efficiently.
  • Avoid DevOps, Agile and Lean Transformation Failures Using Lifecycle Integration Avoid DevOps, Agile and Lean Transformation Failures Using Lifecycle Integration Betty Zakheim, VP Industry Strategy, TaskTop Technologies Recorded: Aug 16 2016 61 mins
    Everyone is talking about DevOps, scaling Agile, and delivering software faster and with great quality. For many traditional companies in banking, insurance, automotive, manufacturing and healthcare, trying to adopt DevOps or Agile are daunting tasks. There has to be a marriage between adopting new processes and tools, and using the existing processes and tools that are necessary for enterprise-scale software development and delivery. Join us in the webinar to discuss:
    •The elements of a DevOps, Agile or Lean transformation
    •The realities of DevOps, Agile or Lean at enterprise-scale
    •Common pitfalls in executing a transformation
    •How using lifecycle integration and automation of handoffs in the development process are critical to avoiding these mistakes
  • Hacking mobile retail: Marketing automation for LTV Hacking mobile retail: Marketing automation for LTV Jason Allen, VP Multi-Channel, GameStop Recorded: Aug 16 2016 61 mins
    Shoppers have an unlimited number of retail apps that promise to deliver the right product at the right price at the right time. The latest and greatest app bells and whistles may attract the new user, but developing them into a long-term follower/ user is easier said than done. It’s easier to get them then to keep them, after all.

    With an increasing number of apps on a user’s device, app marketers are challenged to draw the user's attention not only through efficient user acquisition initiatives, but also via engagement and retention activities. Leveraging marketing automation technology to increase user lifetime value and minimize cost per install is the crux of the issue. Let VentureBeat’s panel of experts shed light on how to use marketing automation to implement acquisition strategies that work.

    By identifying synergies between acquisition and user engagement, this webinar hits the high points of reactivation tactics (via push, email, retargeting). Join Jason Allen from mega-retailer GameStop and Marissa Tarelton from RetailMeNot as they discuss how to increase LTV and lower CPI.

    In this webinar, you will:

    * Harness the power of marketing automation to build a user acquisition program that works
    * Explore key strategies for efficient, highly-optimized user acquisition
    * Gain new best practices for engaging and retaining users while reducing churn
    * Learn acquisition-engagement synergy tactics such as: pre- and post-install segmentation, organic growth, retargeting and reward-based acquisition

    Speakers
    * Jason Allen, VP, Multi-Channel at GameStop
    * Marissa Tarleton, CMO, RetailMeNot
    * Stewart Rogers, Director of Marketing Technology
    * Rachael Brownell, Moderator, VentureBeat


    Sponsored by IBM Marketing Cloud

    Register today for this free VB Live event!
  • Windows 10 - One Year Later Windows 10 - One Year Later Andreas Fuchs, Senior Product Manager - HEAT Software | Mario Schwalm, Senior Systems Engineer - HEAT Software Recorded: Aug 16 2016 55 mins
    In the one year since the launch, Windows 10 is off to the fastest start in Windows history, with over 350 million active devices. Are organizations reaping the productivity benefits, how far along are they in their migration efforts, what best practices have distilled around how to handle apps and carry out updates with Windows 10?

    Join us on Tuesday, August 16th to find out the latest Windows 10 tips and tricks.

    In the webinar, we'll explore:
    •Windows 10 adoption rates
    •Windows 10 provisioning process best practices (hardware refresh, legacy migration, self-service)
    •Application configuration management and how to deal with Apps in the new AppStore
    •Security: configuration, remediation, patching Windows 10 and protecting personal data
  • Mobile User 30 min series 4 of 6:  Understanding monetization Mobile User 30 min series 4 of 6: Understanding monetization Eyal Grundstein, VP Growth & User Acquisition, Game Show Network Recorded: Aug 11 2016 30 mins
    Recent studies show that people spend 80 percent of their time using only five apps on their smartphones. This makes monetizing apps even more difficult than it used to be.

    Not surprisingly, apps that have a chat element such as SnapChat, WhatsApp, and Facebook remain the most popular. Apps with less obvious but potentially higher benefits remain untouched. And as people are drawn away from apps to chatbots, app makers are faced with some difficult decisions.

    In the highly competitive world of mobile apps, how to monetize is an increasingly difficult challenge. And customizing a strategy for each app isn't always a scalable solution. Join VentureBeat expert Stewart Rogers and GSN Games executive Eyal Grundstein as they discuss the challenges facing app makers and how to address them.

    In this webinar, you'll learn to:

    * Customize your monetization strategy so that it's scalable
    * Unlock the revenue potential of lower spending users
    * Attract higher-spend users
    * Negotiate monetization strategies without alienating current users

    Speakers:
    * Eyal Grundstein, VP Growth & User Acquisition, Game Show Network
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat
  • Gateway to Gamification: Using Pokemon Go to Connect with Bank Customers Gateway to Gamification: Using Pokemon Go to Connect with Bank Customers Suzan Szollar, Solution Manager at NCR/Digital Insight Recorded: Aug 11 2016 59 mins
    No doubt, you’ve heard about the mobile app that’s taken the world by storm. Within a week of going live in the US, Pokémon Go reached 26 million daily active users, approximately 60 percent of which were Millennials. Businesses across the country have taken notice and many have begun exploring ways to take advantage of this trend, such as leveraging proximity to Pokéstops and generating Pokémon-themed marketing content and campaigns.

    Suzan Szollar and a panel of some of our adventurous Digital Insight financial institution clients will discuss what they’ve tried, and what business goals may be supported by participating in augmented and virtual reality mobile gaming. They’ll also share our recommended approach to stepping into this space, and what’s on the horizon for Pokémon Go.
  • Performance Engineering and Proven Practices Performance Engineering and Proven Practices Petar Puskarich, NTT Innovation Institute, Inc., Brandon Teets, Nationwide Insurance Recorded: Aug 9 2016 74 mins
    Join us for an informative presentation covering several best practices in the Performance Engineering field.

    Topics to be covered include:

    Staffing
    Tooling
    Visibility
    Organizational Structure
    Process Integration (Agile, Waterfall, Hybrid)
    Technical Considerations

    We hope you may find some new ideas to implement with your team. The field of Performance Engineering is changing rapidly over the last few years due to technology and perception of the field by the business areas. The presentation today will cover several areas that have proven successful in this new era of engineering.
  • Five Steps to Overcome Customer Authentication Chaos Five Steps to Overcome Customer Authentication Chaos Dan Miller, Lead Analyst, Opus Research; Brand Whichard, IBM Security Recorded: Aug 9 2016 49 mins
    As digital, mobile commerce crescendos, Identity and Access Management (IAM) techniques are key to providing a consistent, individualized experience, regardless of the device used or communications channel employed. Providing secure access from a trusted device was hard enough. Now customers control their device-of-choice, channel-of-choice and time-of-choice. It is important to develop and employ technologies that make authentication friction-free and pleasant.

    Join Dan Miller, lead analyst at Opus Research, and Brandon Whichard, from IBM Security, as they provide “Five Concrete Steps” toward keeping each customer happy. Opus Research has coined the term “Intelligent Authentication” (IAuth) to describe simple, secure and seamless ways to authenticate individuals and support digital commerce.
  • MobileIron Access Demonstration MobileIron Access Demonstration Vijay Pawar, Director of Product Management Recorded: Aug 5 2016 4 mins
    Cloud apps offer tremendous business advantages, but preventing users from copying files from business to personal cloud repositories is a top concern for IT. Admins must also prevent users from accessing cloud data through unapproved third-party apps or on unmanaged or compromised devices, such as a jailbroken iPhone. Watch this demonstration of MobileIron Access, and learn how IT can finally solve these persistent cloud security challenges.

    - Control access and secure business data both on-premises and in the cloud.
    - Gain visibility and in-depth reporting on cloud service usage.
    - Easily track users, devices and apps being used to connect to enterprise cloud services.
    - View policy violation and enforcement events.
    - Easily connect to and secure enterprise cloud services including Box, Salesforce, Google Apps and Office 365.

    MobileIron Access is a security capability that is fully integrated with and extends the capabilities of the MobileIron enterprise mobility management (EMM) platform. Admins can define granular cloud access control policies based on application, IP address, identity, and device posture. As a result, IT can bridge the gap between mobile and cloud security and get better insight into how users are accessing enterprise cloud services.
  • Secure Enterprise Cloud Apps on Mobile Devices with MobileIron Access Secure Enterprise Cloud Apps on Mobile Devices with MobileIron Access MobileIron Animated Video Recorded: Aug 5 2016 2 mins
    MobileIron Access secures enterprise cloud apps on mobile devices. Reduce information security risks by allowing only trusted users, on trusted devices, using trusted apps to access business data. By establishing a data boundary for mobile cloud apps, IT can prevent users from accessing enterprise cloud services on unsecured devices or through unauthorized apps or browsers. Watch this overview to learn more.
  • Mobile ROI: How to achieve massive results Mobile ROI: How to achieve massive results Jonathan Winters, Miniclip Games Recorded: Aug 4 2016 61 mins
    If it's done right, ROI is the ultimate marketing metric. There are few marketing initiatives that aren't ultimately supposed to strengthen the bottom line. Yet without a clear idea of how your campaigns are targeted, and what your objectives are, a fuzzy focus on ROI becomes an insecure and confusing metric. So how do you do it? When should you start focusing on ROI as your main metric? How do you encompass all the different ways in which marketing outreach (email campaigns, in-app messaging, retargeting, segmentation) contributes to and multiplies ROI?

    Join VentureBeat and its panel of experts from top gaming and ecommerce outfits to discuss their own approaches to the problem. In this webinar, we'll be debating:

    + How the best of the best measure ROI (Calculations, methods & techniques: how the experts do it)
    + How to solve key challenges and roadblocks to getting great results
    + Why and when ROI should become your core metric

    Speakers
    * Sebastian Goldt, Lead Performance Ad Networks, Lead Performance Ad Networks, Innogames
    * Jonathan Winters, User Acquisition Specialist, Miniclip Games
    * Paul H Müller, Co-Founder and CTO, adjust
    * Stewart Rogers, Director of Marketing Technology, VentureBeat

    Join us for this executive session and register for free today.

    Sponsored by adjust
  • Identity & KYC Webinar Series Identity & KYC Webinar Series Jonathan Hardinges, Dominic Mac Recorded: Aug 4 2016 32 mins
    Rethinking the way we verify identity and how this feeds through to improved KYC, client onboarding and AML
  • Masters of Mobile Data: Acquiring High-Value Users, The Right Way Masters of Mobile Data: Acquiring High-Value Users, The Right Way Ashley Blackmon, VP marketing, Zillow Group Recorded: Aug 3 2016 61 mins
    In Part 1 of this compelling Masters of Mobile Data series, you'll learn how to acquire high value users the right way. If you build it, they will come. Right. That may be the hope of many mobile app publishers, but it’s not even remotely true when it comes to the battle for quality users in 2016. And while most app publishers know it’s essential to have a fierce user acquisition strategy in place, what that consists of and how they put it into practice is another thing altogether.

    That’s why VentureBeat took a deep dive into mobile user acquisition. We were determined to find out what’s working for successful app publishers, what you should be paying to acquire high-value users, and which user acquisition solutions you need to partner with in order to have an ironclad UA methodology in place.

    In the process, we surveyed over 700 mobile developers with a billion users among them. We also studied data summarizing the results of almost 14 billion mobile ads, and talked to leading user acquisition experts.

    Of course, you could read the full report -- or you could tune into this not-to-be missed webinar that will cover the most essential takeaways needed to hook those quality users.

    In this webinar, you’ll:

    * Learn the price app publishers are currently paying to acquire quality users across several categories
    * Review the top user acquisition platforms and why
    * Understand the role of timing in UA
    * Maximize organic installs of your mobile application

    Speakers:

    * Dave Myers, COO and Co-Founder, mParticle
    * Ashley Blackmon, VP marketing, Zillow Group
    * Alexandra Press Maguire, Digital Marketing Director, Gilt Group
    * John Koetsier, Mobile Economist, TUNE
    * Rachael Brownell, Moderator, VentureBeat

    SPONSORED by mParticle

    Register today for this free VentureBeat Live event
  • The Intersection of IoT and Payments: An Emerging Commerce Opportunity The Intersection of IoT and Payments: An Emerging Commerce Opportunity Jordan McKee, Christian Renaud Recorded: Aug 3 2016 64 mins
    Join 451 Research to learn how IoT and connectivity are shifting user behavior and payment vendors' offerings, and will ultimately make transactions far more integrated while far less visible to consumers and enterprises. In this webinar we’ll examine previous attempts at integrated commerce, discuss what worked and what didn't, and detail the drivers underpinning the next frontier of commerce. Throughout the discussion, 451 will leverage recent insights from its Voice of the Connected User Landscape and Voice of the Enterprise: IoT surveys to paint a 360 degree picture of the key opportunities rapidly emerging at the intersection of IoT and payments.
  • Masters of Mobile Data: Maximizing the Lifetime Value of App Users Masters of Mobile Data: Maximizing the Lifetime Value of App Users Aaron Price, SVP of Marketing, Expedia Aug 30 2016 5:00 pm UTC 60 mins
    Join us for Part 3 of this compelling 4-part series on mobile data. After all, it’s not news that when it comes to apps, consumers can be very fickle, engaging for one download and then abandoning the app. In many ways, an app marketer’s real job only begins after the install. Boosting engagement metrics and increasing the lifetime value of app users is what really matters more than ever.

    A compelling value prop and smart design are necessary but not sufficient to keeping people engaged. You also need to apply data and technology on an ongoing continuous basis to strengthen and sustain your user relationships, and in turn boost the LTV of the average app user by extending both their “lifetime” and their value. Furthermore, being proactive about managing churn, and retargeting users outside of the app itself, can mean the difference between success and failure.

    Join this exclusive VB Live event as experts from retail, hospitality and on-demand services demonstrate how to:

    * Use the right technology to maximize LTV of app users
    * Optimize each user engagement to avoid app abandonment and churn
    * Learn acquisition-engagement tactics such as: pre- and post-install segmentation, organic growth, retargeting and reward-based acquisition

    Speakers include:
    * Aaron Price, SVP of Marketing, Expedia
    * Rob Willey, VP of Marketing, TaskRabbit
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Register today for this free executive session!

    Sponsored by: mParticle
  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Aug 30 2016 5:00 pm UTC 60 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • Magnet Mobile Platform: A Deep Dive (Part 2) Magnet Mobile Platform: A Deep Dive (Part 2) Tom Ku, VP Enterprise Mobility Aug 30 2016 5:00 pm UTC 30 mins
    The journey to the mobile enterprise is a challenging one. Employees expect consumer-app-like experiences, business owners want sophisticated apps quickly and IT is dealing with maintaining current infrastructure while tackling other hot priorities such as moving to the cloud and big data.

    At Magnet, our mission is to help the enterprise move to mobile. Our enterprise-grade Magnet Mobile Platform empowers companies to build powerful and highly engaging mobile apps that take advantage of all the innovative features in the native OS.

    Join Tom Ku, VP Enterprise Mobility to learn more about the Magnet Mobile Platform and see how you can build and deploy successful enterprise mobile apps.
  • Google Cloud Storage Nearline - Take Your Data To The Next Level Google Cloud Storage Nearline - Take Your Data To The Next Level Brian Stevens and Carl Schachter, Google Aug 30 2016 7:00 pm UTC 30 mins
    Find out about how organizations can dramatically lower storage infrastructure costs by deploying a cloud-based object storage solution.

    Led by Google executives, Brian Stevens and Carl Schachter, this webcast will discuss:
    ●The benefits of using cloud as another storage tier?
    ●When to consider Cloud Storage (GCS) for secondary storage
    ●How to potentially use Cloud (Google Compute Engine) for Disaster Recovery
    ●Potential issues with bandwidth, recovery time, cost, security and usability

    Google Cloud Storage Nearline is a low-cost, highly-durable and highly available storage service for infrequently accessed data, data archiving, online backup and disaster recovery. Data is available instantly, not within hours or days. With sub-second average response times and 1 cent per GB/month pricing, Cloud Storage Nearline gives you terrific performance at a low cost.
  • BotBeat: B2B and B2C use case for bots BotBeat: B2B and B2C use case for bots Jon Cifuentes, Analyst, VentureBeat Aug 30 2016 7:30 pm UTC 45 mins
    Bots are more than just trendy. They’re increasingly becoming a smart business decision and one that more than just the big players are sitting up and noticing. From Foursquare’s Marsbot (eatery recommendations) to Uber (rides) to the many bots that plug in to Slack, it’s clear there is both a B2B and B2C purpose for bots.

    For Activision, using bots via Facebook to announce this year’s Call of Duty: Infinite Warfare release to consumers netted them over 6 million messages between users. The beauty of bots, as Activision and others have discovered, is that they allow businesses greater access to increasingly mobile messaging consumers. Facebook is investing fully in the chatbot experience with brands including Staples, Bank of America, and Taco Bell.

    For both consumer brands and B2B companies, the time is now to consider the implications of bots for the bottom line.

    Join this panel of executive leaders as they discuss the use cases for bots for consumers and between businesses, including:

    • Elements of a successful bot strategy
    • Where consumers prefer to interact with bots
    * In-depth discussion of the B2B use cases for bots

    Speakers include:
    * Amir Shevat, Head of Developer Relations, Slack
    * Robert Hoffer, "The Bot Father"
    • Jon Cifuentes, Analyst, VentureBeat
    • Rachael Brownell, Moderator, VentureBeat


    Register today for this free executive event.
  • RegTech Webinar Series RegTech Webinar Series Shane Brett Aug 31 2016 1:00 pm UTC 45 mins
    Regulatory compliance is one of the biggest immediate challenges affecting the financial services industry today. Many market participants are unsure how to meet constantly evolving reporting requirements or how to move to an open API framework in a secure and compliant way.
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Manage any device, anywhere from a single console with HEAT LANrev Manage any device, anywhere from a single console with HEAT LANrev Margreet Fortune Sep 6 2016 9:45 am UTC 60 mins
    HEAT LANrev was Highly Commended in the recent Computing Vendor Excellence Awards in London - Mobile Management category.
    With the fragmentation of technology platforms and proliferation of mobile devices organisations today need a unified management approach for smart connected devices. Join this session to learn how HEAT LANrev can provide end to end multi-platform support for Windows, Mac, Linux, iOS and Android.
  • Digital UX Webinar Series: Digital Transformation - Where the World is Heading Digital UX Webinar Series: Digital Transformation - Where the World is Heading Bruce Temkin, Customer Experience Transformist, Temkin Group Sep 6 2016 5:00 pm UTC 45 mins
    Companies are increasing their focus on customer experience, but many are destined for mediocre results. What's the problem? A lack of emotion. While new digital and cross-channel experiences are being developed, they aren't tapping into the most powerful component of the experience.

    As part of our 3 part series, "User Experience isn't Everything, Its the Only Thing", join Bruce Temkin from the Temkin Group, who will share leading-edge research on why emotion is so important and what it takes to tap build experiences that tap into its power.
  • 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 홍세진, 부장, HPE 소프트웨어 보안사업부, 휴렛팩커드 엔터프라이즈(HPE) Sep 7 2016 5:00 am UTC 60 mins
    공격자들은 지하 시장에서 점점 전문화 , 조직화하고 있으며, 공격 기법도 무서운 속도로 고도화하고 있습니다.
    정보 보호 업체인 “Websense Security Labs”이 미국, 영국, 캐나다, 호주의 IT관리자 1,000명 을 대상으로 조사한 결과 보고서에 따르면 대부분의 데이터 유출 사고는 “인가된 사용자”에 의해 이루어지고 있다고 합니다.
    또한 그 동안 국내/외 많은 보안 사고 사례를 통해 알 수 있듯이 대부분의 정보 유출 사고는 탈취된 정상 사용자 계정 권한을 이용해서 이루졌다는 사례를 언론 등을 통해서 접할 수 있었습니다.

    정보 유출 사고 예방을 위해 대부분의 보안 담당자는 이러한 알려진/알려지지 않은 다양한 보안 위협과 고도화된 내/외부에서 발생되는 위협을 식별 및 대응을 위한 위협 관리 체계의 필요성을 느끼고 있으며, 가트너에서는 향후 내/외부 다양한 보안 위협 예측 그리고 예방을 위해User Behavior Analytics (UBA) 사용은 필수이며, 2018년까지 최소 25%이상의 보안사고가 UBA 기술에 의해 탐지될 것이라고 리포트를 통해 예측하고 있습니다.

    프로파일링 기반 이상행위 분석은 정상적인 사용자 및 시스템의 행동과 적절한 연관성의 정상 기준선을 설정하고 사용자 및 동료 그룹 간 이상 현상을 실시간으로 분석을 통해 권한 보유 사용자의 비정상 행위를 시각화 및 위협 예측 그리고 예방합니다.

    또한 전체 IT 환경에 대한 보안을 더욱 민첩하고 지능적으로 변모하도록 요구하고 있으며, SIEM 보안 플랫폼과 연계 가능하며 UBA 기술은 알려진 위협과 알려지지 않은 위협에 관한 조치 가능한 정보를 생성하여, 사용자 및 시스템에 대한 세부적인 가시성을 제공함으로써 위협을 선제적으로 대응할 수 있는 보안 인텔리전스와 내부 위협를 보다 신속하게 해결할 수 있습니다.
  • Digital UX Webinar Series: Build a Great UX - Build, Monitor, Optimize Digital UX Webinar Series: Build a Great UX - Build, Monitor, Optimize Antoine Aymer, HPE Sep 7 2016 5:00 pm UTC 45 mins
    Whether you are solely responsible for an application in your company, or you support a team that is, its critical to your business that quality, speed, and performance of your apps are never compromised for your users.

    As part of our 3 part series, "User Experience isn't Everything, Its the Only Thing", join Antoine Aymer from HPE for "Foundations to Build a Great UX: Build, Monitor, Optimize" to learn how to deliver a great user experience thru:

    - Implementing continuous testing
    - Blending virtual users and real devices to get an accurate picture of your end-to-end mobile performance
    - Seamlessly report back on defects
  • Digital UX Webinar Series: Optimize Through Analytics and Feedback Digital UX Webinar Series: Optimize Through Analytics and Feedback Eric Odell, HPE Sep 8 2016 5:00 pm UTC 45 mins
    As part of our 3 part series, "User Experience isn't Everything, Its the Only Thing", join Eric Odell from HPE for "Most Important: Optimize Through Analytics and Feedback"

    Eric will share how to:
    - Improve the quality of your testing practices by using real-time analytics and sentiment analysis to track your user’s experience
    - Detect and resolve issues to lower your app abandonment
    - Increase adoption rates and deliver a great user experience
  • What the MFA?! Moving Beyond Passwords What the MFA?! Moving Beyond Passwords Stacy Blaiss (Director of Product Marketing), Tal Guest (Senior Product Manager) Sep 8 2016 6:00 pm UTC 45 mins
    Despite the rise of credential theft via phishing attacks and cyber-breaches, passwords alone are still the most common form of protection for employee accounts; many of which are used to gain access to sensitive data and systems. Not only are passwords often static, too easy to guess, and prone to theft, it’s also difficult to verify who is actually using them. These security issues with passwords are bringing two factor authentication to the spotlight, which enable a second security check beyond user name and password. Implementing this extra layer of security not only protects sensitive data and critical systems, but also verifies the user is who they say they are. This webinar will feature expert insight into multi-factor authentication technology and how organizations can shore up their security practices to better protect their networks and privileged accounts.
  • 5 ways to get more money from your mobile app 5 ways to get more money from your mobile app Maximo Cavazzani, CEO & Founder, Etermax (Trivia Crack) Sep 8 2016 7:30 pm UTC 30 mins
    Given that only a small portion of apps are utilized regularly (versus those downloaded), app publishers are faced with the difficulty of creating relationships with users, not just downloads. Take the world of freemium games, for example. Of those consumers downloading their games, only a very small portion actually bring money to the table.

    In fact, a recent report found that 0.19 percent of all mobile game players contributed 48 percent of revenue. How can one identify the high-spend users while not alienating the remaining percentage that only have potential to spend within the app?

    VB'S own Stewart Rogers is going to sit down the CEO of TriviaCrack and talk about how to maximize mobile monetization through these ever-growing mobile touch points for whatever kind of app you have.

    Webinar attendees will learn to:

    * Customize your monetization strategy so that it's scalable
    * Unlock the revenue potential of lower spending users
    * Attract higher-spend users
    * Negotiate monetization strategies without alienating current users


    Speakers:
    * Maximo Cavazzani, CEO & Founder, Etermax (maker of Trivia Crack)
    * Jessy Hanley, VP Marketing & Customer Experience, GSN Games
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Register for this free event today!
  • The Social Future of Virtual Reality The Social Future of Virtual Reality Alice Bonasio, Technology Author and Journalist Sep 13 2016 10:00 am UTC 45 mins
    VR is sometimes perceived as an isolating technology, where the user is cut off entirely from the real world in order to be fully immersed in the virtual one. Yet this doesn’t take into account how much of our lives are lived online, and how our identities and relationships are already built in connected virtual worlds. The Internet and social media have transformed every aspect of society by connecting people in ways that were previously unimaginable. Virtual Reality will build upon this interconnectedness, while at the same time making those connections much more compelling, meaningful and emotional. This introductory webinar will look at the unique aspects of the medium and ask how VR content producers can best leverage them to engage their audience.
  • Professional usage of AR/VR in architectural design and building collaborations Professional usage of AR/VR in architectural design and building collaborations Kim Bleshøy Nielsen - CEO, Intertisement Sep 13 2016 12:00 pm UTC 45 mins
    During the processes associated with architectural design and construction good communication, insight and understanding between different departments is paramount. In an increasingly visual world, we need to equally involve people with technical and visual backgrounds. Common insight and understanding will reduce errors, save time, costs and provide important common base of perception.

    Through proper use of AR and VR visualization, we are creating important tools for a constantly evolving industry.

    See more at www.planimetria.net
  • Marketing & Advertising in a personalized world: the impact of Augmented Reality Marketing & Advertising in a personalized world: the impact of Augmented Reality Nik Badminton, Futurist & CEO, Design:Culture:Mind & Simon Gosling, Creative Evangelist, Happy Finish Sep 13 2016 1:00 pm UTC 45 mins
    Everyone knows what a huge success Pokemon Go has been - combining Augmented Reality with GPS location tracking. We can also see the impact of personalized ads “following us” when we visit different websites online... But how will we feel when we start seeing personalized location based marketing in the ‘real’ world, as Augmented Reality starts to change the way we experience supermarkets, high streets, and even getting around on public transport?

    Join us as we speak to two highly regarded experts in the world of Augmented and Mixed Reality:

    - Nik Badminton - Futurist & CEO at Design:Culture:Mind
    - Simon Gosling - Creative Evangelist at Happy Finish

    Using Keichi Matsuda’s "Hyper-Reality" video as a starting point, we will be asking where we think boundaries will be set by consumers and how much our lives will change as a result of Augmented Reality infiltrating our daily lives.
  • VR in Education: Moving the Classroom to Mars (and other field trips)! VR in Education: Moving the Classroom to Mars (and other field trips)! David Burden - CEO, Daden Limited, an immersive learning and visualisation company Sep 13 2016 2:00 pm UTC 45 mins
    For years, even decades, people have talked about how virtual and augmented reality and technologies could be used in the classroom, but it is only with the current wave of consumer VR devices that there is in schools on a large scale is becoming practicable. But to be effective we need to understand the pedagogic basis on which such technologies can be used, and provide the tool for teachers to be able to create their own VR experiences tailored to their own students.

    This presentation will look at the scope for the use of VR technologies in schools, describe some of the pioneering systems, and summarise the pedagogic underpinnings of VR use. It will then describe the Fieldscapes system as one example of a VR authoring system that will allow educators to create and share VR content, and how for the short-medium term a mix of VR and non-VR usage will need to be supported in order to cope with school ICT budgets, issues and concerns and different modes of use in and out of the classroom.
  • Augmented Reality: Engaging a Minecraft Generation Augmented Reality: Engaging a Minecraft Generation Drew Minock - Education Program Manager, DAQRI Sep 13 2016 3:00 pm UTC 45 mins
    Why will kids sit for hours immersed in a Minecraft world, but have trouble staying engaged during class? As a group, we will discuss how new augmented reality (AR) tools give educators and students the power to:

    - Create meaningful learning experiences that combine the digital and physical worlds
    - Build interactive experiences to show and share knowledge with a global audience
    - Understand complex concepts
    - Retain information longer

    Together will we address how we can take existing curriculums, and enhance them to appeal to the Minecraft Generation.
  • AR & VR in Education - Going Beyond the Page! AR & VR in Education - Going Beyond the Page! Paige Brooks-Jeffiers - Director for Innovative Strategies, Office for Professional Development and Innovation Sep 13 2016 4:00 pm UTC 45 mins
    If a picture is worth a thousand words, what would an interactive picture be worth? What about an entire interactive world where you can learn, play, and experiment in a safe environment?

    Student engagement is not only a 21st century buzz word, it is an important step in getting students to take on the responsibility of their own learning. Engaging students is not a new issue but, thanks to technology, there are now new ways to bring more engaging content to students – one example is through AR and VR.

    These new technologies are allowing students to get inside the content and learn from a different perspective - giving them a better understanding. Initial research is showing much improved engagement from the student’s perspective. Join us for some ideas on using AR and VR to go beyond the page and improve your students' engagement.
  • Social VR: Empowering Individuals and Effecting Positive Change Social VR: Empowering Individuals and Effecting Positive Change Ryan A Bell, Head of Studio, VRScout & Rob Crasco: VR Influencer/Entrepreneur Sep 13 2016 4:00 pm UTC 45 mins
    Virtual Reality puts you on the other side of the computer screen, but it isn’t all about games. VR has the ability to enable individuals, bring them together and invoke true empathy and feelings. This technology has the potential to change people’s lives for the better.

    Join us for an informative discussion of the power of Social VR.

    Ryan A Bell talks about the beginning of content creation in VR, how it fits into social and a very powerful case study of one nonprofit utilizing the empathy machine to reach the masses. Rob Crasco talks about the power of virtual worlds to empower people, bring them together and create true connections across the globe.
  • DDoS Fossils to Future: A Brief History and What to Expect DDoS Fossils to Future: A Brief History and What to Expect Darren Anstee, Chief Security Technologist, Arbor Networks Sep 13 2016 4:00 pm UTC 45 mins
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective
  • Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Deb J, SME & Solution Architect – APAC & Middle East, Qualys Inc. Sep 14 2016 6:00 am UTC 60 mins
    One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.

    Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.

    Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
    Bios:
    Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
  • Virtual Reality is About to Change Everything: Developing VR Innovation Strategy Virtual Reality is About to Change Everything: Developing VR Innovation Strategy David Mullett, Virtual Reality Content Innovator, Virtualize Sep 14 2016 3:00 pm UTC 45 mins
    We are on the doorstep of the biggest tech revolution in the history of the world. This new digital universe is a virtual reality ecosystem that is a convergence of a range of exploding technologies - virtual and augmented reality, AI, cloud computing, nano, wifi penetration - to name just a few. The radical toolkit provided by VR will transform every industry and sector across the board and even create new ones along the way.

    Every brand and company needs to start thinking strategically now about how they port their existing business into the new VR computation platform.

    - What is your VR strategy?

    - How can you bring VR to your business to create profound solutions that will define a next generation of your companies offerings?

    This talk will be big picture thinking around how you can 'virtualize' your brand and company with strategic VR innovation. We'll talk the types of things you need to be thinking about as we make the leap in the new virtual world web and beyond.