Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Recorded: Sep 26 2017 47 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • The New Frontier: How IoT is Changing Business As We Know It
    The New Frontier: How IoT is Changing Business As We Know It Theresa Bui Revon, Head of Enterprise Product Marketing, IoT Cloud Business Unit, Cisco Jasper Recorded: Sep 21 2017 47 mins
    The Internet of Things (IoT) is empowering businesses with unprecedented ways to serve customers, rapidly solve problems, and optimize operations. Using IoT, savvy companies are transforming their products to enable the delivery of connected services that deliver new customer experiences and unlock new sources of revenue.

    From enabling leaders in agribusiness to increase crop yields, to amplifying connected car innovation, Cisco Jasper Control Center cloud platform powers more than 5,000 companies in dozens of industries. Leveraging learnings from a decade of IoT experience, we’ll look at how real-world businesses are using IoT innovation to capture their share of this multi-billion-dollar opportunity.

    Key takeaways:

    - How IoT helps you drive successful business outcomes

    - Best practices for accelerating your IoT service business

    - Lessons from leaders that can help you work smarter and scale faster
  • Accelerate the BusDevOps Cycle with Storyteller and HPE ALM
    Accelerate the BusDevOps Cycle with Storyteller and HPE ALM Susan D'Angelo Recorded: Sep 21 2017 52 mins
    Agile works well for small, co-located teams that can hover around sticky notes on a Kanban board, and collaborate on-demand. But as initiatives become more complex, and teams become dispersed, Agile can be difficult to scale across the enterprise.

    What’s missing in Agile practices today is the ability to see the whole picture. With user stories as the source of record for an application, it’s hard to connect all the dots to see the complete functionality of a feature or capability. Think about the new team who will be developing additional features on that capability - where can they learn everything it does today? How will they know the impact their changes will have on that capability or potentially other capabilities? How will they collaborate on those changes and get them reviewed in a timely manner? How will your business stakeholder understand the impact of new those changes to the overall business process? Storyteller provides a centralized reusable searchable repository of exiting business and technical process models and requirements (business, non-functional and regulatory). In addition we also offer rich visualization, collaboration and review functionalities. These base capabilities are being used today to address the questions above. And - we do it in a way that everyone can understand from Business Stakeholders down to developers and testers.

    Storyteller is a key player in Enterprise Agile. We bridge the business gaps in the current agile process. For companies struggling with Agile Transformation, we providing guardrails around writing user stories and feature decomposition. Project teams can save time and effort by using our user story and test plan generation which can them be automatically synched over to ALM tools. We are also a key player in the BizDevOps chain by providing that upfront business alignment so what is produced though “Dev” and delivered and maintained by “Ops” is exactly what “Biz” wanted.
  • Bridging the Office 365 Security Gap
    Bridging the Office 365 Security Gap Richard Davis - Director Cybersecurity Strategy EMEA, and Roy Murdoch - Sales Engineering Manager - NEMEA Recorded: Sep 21 2017 45 mins
    As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
    Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
    Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
    • Superior blocking of advanced threats
    • Immediate threat visibility and rapid response
    • Greater protection from compliance violations and information loss
    • Uninterrupted access to live and historic email

    To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com
  • How to pick a winning IoT business model
    How to pick a winning IoT business model Mike Bell Canonical, Ian Hughes 451 Research Recorded: Sep 20 2017 63 mins
    Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW

    In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!

    Join our webinar to find out...
    >How businesses can monetise the internet of things in the long term
    >What skills they need and where to find them
    >How to address fundamental security considerations.
  • IoT and Smart Buildings: The New Construct
    IoT and Smart Buildings: The New Construct Yann Palmore, JLL; Ray Moya, COO/CTO, Argent Associates, Inc., Moderated by Limor Schafman, TIA Recorded: Sep 20 2017 61 mins
    Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.

    This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.

    Speakers:
    Yann Palmore, Vice President, Smart Building Solutions, JLL
    Ray Moya, COO/CTO, Argent Associates, Inc.

    >> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.

    >> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.

    For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
  • Digital Transformation: How Europe will turn disruption into differentiation
    Digital Transformation: How Europe will turn disruption into differentiation Nick Patience 451 Research, Matt Leonard CenturyLink Recorded: Sep 20 2017 59 mins
    Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.

    Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:

    - Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.

    - Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.

    - Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
  • HDFS on Kubernetes: Lessons Learned
    HDFS on Kubernetes: Lessons Learned Kimoon Kim, Pepperdata Software Engineer Recorded: Sep 19 2017 46 mins
    HDFS on Kubernetes: Lessons Learned is a webinar presentation intended for software engineers, developers, and technical leads who develop Spark applications and are interested in running Spark on Kubernetes. Pepperdata has been exploring Kubernetes as potential Big Data platform with several other companies as part of a joint open source project.

    In this webinar, Kimoon Kim will show you how to: 

    –Run Spark application natively on Kubernetes
    –Enable Spark on Kubernetes read and write data securely on HDFS protected by Kerberos
  • Adopt Office 365 With Modern Data Protection and Compliance Measures
    Adopt Office 365 With Modern Data Protection and Compliance Measures Celeste Kinswood, Product Marketing Manager, Stephen Chan, Sr. Director, Product, Proofpoint Recorded: Sep 19 2017 61 mins
    Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk?

    Watch this webinar to learn:

    · Hear about new types of risk this transformation introduces to your people and data
    · Learn about the evolution of compliance requirements in the modern workplace
    · Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.
  • Thinking of SD-WAN? Critical Factors for a Successful Network Transformation
    Thinking of SD-WAN? Critical Factors for a Successful Network Transformation Jim Duffy 451Research, Karim Eljai NTT Recorded: Sep 19 2017 55 mins
    In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.

    Join this webinar to learn:
    • How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
    • How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
    • Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
    • And more
  • Introducing the Network Operations Management Suite from HPE/Micro Focus
    Introducing the Network Operations Management Suite from HPE/Micro Focus Joe Reves, Brian Kaplan, Jon Kies Recorded: Sep 19 2017 57 mins
    Network engineering and operations teams face a complex, moving target. But unfortunately, they’re typically armed with only a disparate collection of management tools - with little or no integration. Network teams deal with equipment outages, slowdowns, security breaches, inability to reach resources, access denials, and other issues that can be caused by anything from a bad connection to devious hackers.

    To address these challenges, we are now offering the 5th suite in the ITOM portfolio – Network Operations Management (NOM). Combining the functionality of Network Node Manager i (NNMi) and Network Automation (NA) and additional suite functionality such as reporting, NOM represents our path forward to managing web-scale networks with their evolving mix of physical, virtual, and software-defined networks.
    Join this webinar to get an in-depth understanding about Network Operations Management including:
    •Enhanced workflows designed to drive productivity and reduce
    •Ongoing capability and content enhancements for both the suite and standalone products
    •New licensing models to enable upgrades at an average of half the cost of a la carte purchases
  • Before the Breach – How Higher Education Can Protect Itself From Advanced Threat
    Before the Breach – How Higher Education Can Protect Itself From Advanced Threat Mark Guntrip, Product Marketing Director - Email Security, ProofPoint Recorded: Sep 15 2017 61 mins
    Recent studies have found attackers using multiple different methods to impact higher education institutions. And email is the common culprit that enables these advanced threats to breach campuses. Attackers continue to evolve their techniques to bypass even the latest email security tools, leaving institutions to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Join this webinar to learn how to build an advanced email security strategy that gives you visibility into threats and empowers you to proactively protect your campus.
  • Android “O” and iOS 11 security updates: What you need to know
    Android “O” and iOS 11 security updates: What you need to know Michael Krueger, NowSecure Mobile Security Analyst // Tony Ramirez, NowSecure Mobile Security Analyst Recorded: Sep 14 2017 47 mins
    Google released Android 8 (Oreo) recently, and soon Apple will release iOS 11. Both updates include a number of security enhancements.

    Don’t miss this 30-minute overview of the security updates that will also touch on:
    -- Changes in iOS 11 that provide better security for app data in transit
    -- App permissions updates in Android Oreo
    -- How Android Oreo and iOS 11 updates affect mobile app security assessments
  • Giga IoT: What You Need to Know About Low Power Wide Area Network Solutions
    Giga IoT: What You Need to Know About Low Power Wide Area Network Solutions Sanjay Khatri, Head of Platform Product Marketing at Cisco Jasper Recorded: Sep 14 2017 33 mins
    The age of Giga IoT has arrived. Characterized by millions and even billions of connected devices, small data volumes, low-cost devices and stringent requirements on energy consumption, Giga IoT turns the conversation from usage and cost to value and scale.

    LPWAN technology, like NB-IoT (Narrowband IoT) enables this shift, but today’s businesses need more than technology. This webinar looks at business solutions needed to transform technology into operational reality to deliver bottom-line growth.

    Join Sanjay Khatri, Head of Platform Product Marketing at Cisco Jasper, to discuss giga IoT business drivers and benefits including:
    - Massive scalability of connected devices
    - Simplified operations via cloud-based IoT platforms
    - New business models for monetizing IoT services
  • Beyond GDPR: Best Practices for Data Protection
    Beyond GDPR: Best Practices for Data Protection Aaron Davis, Sr Product Marketing Manager, PKI, Entrust Datacard & Juan Asenjo Sr Partner Marketing Manager, Thales eSecurity Recorded: Sep 14 2017 55 mins
    In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
    Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.

    Join the webinar to learn:

    • Why GDPR is only the beginning - cutting through the noise
    • How digital business is driving new approaches to data security
    • What are the best practices for improving data hygiene
  • Using Machine Learning in Software License Discovery for Greater SAM Maturity
    Using Machine Learning in Software License Discovery for Greater SAM Maturity Bill Dyck, Nick Rendall Recorded: Sep 13 2017 56 mins
    Accurate software asset management (SAM) is critical to a company’s IT operations in order to optimize usage and cost, and ensure that license compliance is achieved to avoid true-ups and penalties. Keeping a company’s software application library up-to-date for SAM has been a continuous struggle for asset managers given the time it takes for manual entry of new titles, the changing information in software titles, and the sheer number of titles across an enterprise organization. Every software title not recognized in their library causes potential license compliance breaches (leading to true-ups and potential fines) and reduces an organization’s ability to optimize their software license usage for cost optimization.

    Micro Focus (HPE Software) has added the industry leading IDOL unstructured search engine to add machine learning to Universal Discovery, drastically improving in the process of software license recognition and teaching for quicker software license recognition and a consistently up-to-date SAI over time. Join us on September 13th for an introduction to this exciting new capability and to understand the business value it can bring to your SAM program.

    • Introduction to machine learning and the IDOL engine
    • Machine learning in Universal Discovery
    • Current SAM with Machine Learning Success StoriesLive
    • Q&A about this new technology
  • How to Protect Data in the Cloud
    How to Protect Data in the Cloud Brian Lozada, CISO of Zocdoc, and Karthik Venna, Product Manager at Bitglass Recorded: Sep 12 2017 59 mins
    Driven by ease of deployment, cost effectiveness, and improved productivity among employees, many organizations have adopted cloud technology. Although there are significant benefits to cloud adoption, some organizations still face major challenges preventing their move to the cloud. From maintaining security and compliance to managing data on BYO devices, organizations have a unique set of data security requirements.

    In this webinar, Brian Lozada, CISO of Zocdoc, and Karthik Venna, Product Manager at Bitglass, will discuss how to balance the benefits of moving to the cloud with implementing a security solution that protects data end-to-end.

    - Find out the benefits of moving to cloud apps
    - Understand how to maintain control of your data
    - Learn how to use your partner ecosystem to keep your data secure
  • Vivit APM SIG Event - What is new in HPE SaaS APM (AppPulse)
    Vivit APM SIG Event - What is new in HPE SaaS APM (AppPulse) Rocky Pisto, Dan Iuster, Liron Lichterman Recorded: Sep 7 2017 59 mins
    In this presentation we discuss how HPE APM is evolving to keep up with the latest advances in technology and some of the new capabilities that will become available in the next release. You will learn about:

    • Platform - the new, clean and uncluttered HTML5-based interface design and the new Application Health displaying per application availability, performance and underlying infrastructure status in an easy to understand dashboard

    • APM Mobile app - the new mobile app that displays the status of your business applications and enables drill down to RUM and BPM reports

    • BPM - the integration with Mobile Center and support for AWS device farm and emulators

    • RUM - VXLan traffic monitoring, the multi-instance probe for better resource utilization and capacity improvements and the new Docker monitoring capabilities

    • Diagnostics - the new UI and the integration between the on-premises and SaaS solutions

    • SiteScope - the integration with AWS and Azure for hybrid service assurance, the new public APIs, and Kubernetes monitoring capabilities

    We will conclude the presentation with a short demo of some of the features of the product, and provide you ample opportunities to ask questions and become fully informed about the products and their future strategy and roadmap.
  • Monetizing VR: Turning the magic into money
    Monetizing VR: Turning the magic into money Charlie Fink, VR columnist, Forbes Recorded: Sep 6 2017 61 mins
    VR has sprouted a lot of startups, but not a whole lot of revenue yet. Yet the theory is that where there’s investment, there’s got to be fire. In this new wave of VR technology, refined console headsets are being set loose in the world, and mobile VR and mobile 360 are growing more popular with consumers. So it’s time to start thinking about a monetization strategy.

    In mobile, for instance, freemium with a combination of ads and in-app purchases is the powerhouse that generates over 95 percent of revenues. For consoles, downloadable and extended content plus microtransactions are the big money makers. But virtual reality is an entirely new way of interacting with content. Will consumers be willing to stand through advertisements? Will they trust a virtual reality payment method, or is the technology too new to engender consumer confidence?

    In this VB LIve event, you’ll learn about:
    * The future of VR payments, commerce, and innovation
    * How payments technology is revolutionizing VR/AR experiences
    * The challenges that emerge from the consumer and merchant side
    * The global perspective of VR/AR and where it is headed

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VB
    * Cleveland Brown, CEO, Payscout
    * Charlie Fink, VR columnist, Forbes
    * Rachael Brownell, Moderator, VentureBeat
  • APM SIG Meeting - What is new with HPE APM on-premises
    APM SIG Meeting - What is new with HPE APM on-premises Rocky Pisto, Dan Iuster, Liron Lichterman Recorded: Sep 6 2017 63 mins
    In this presentation we discuss how HPE APM is evolving to keep up with the latest advances in technology and some of the new capabilities that will become available in the next release. You will learn about:

    • Platform - the new, clean and uncluttered HTML5-based interface design and the new Application Health displaying per application availability, performance and underlying infrastructure status in an easy to understand dashboard
    • APM Mobile app - the new mobile app that displays the status of your business applications and enables drill down to RUM and BPM reports
    • BPM - the integration with Mobile Center and support for AWS device farm and emulators
    • RUM - VXLan traffic monitoring, the multi-instance probe for better resource utilization and capacity improvements and the new Docker monitoring capabilities
    • Diagnostics - the new UI and the integration between the on-premises and SaaS solutions
    • SiteScope - the integration with AWS and Azure for hybrid service assurance, the new public APIs, and Kubernetes monitoring capabilities

    We will conclude the presentation with a short demo of some of the features of the product, and provide you ample opportunities to ask questions and become fully informed about the products and their future strategy and roadmap.
  • Eight Telecom Expense Solutions Gartner Missed
    Eight Telecom Expense Solutions Gartner Missed Hyoun Park Recorded: Aug 31 2017 32 mins
    Update: Amalgam Insights' report "8 Hidden Gems for Telecom Expense Management" now available: http://amalgaminsights.com/product/vendor-smartlist-8-hidden-gems-for-telecom-expense-management/

    Recommended Audience of Business managers considering a telecom, network, SaaS, or cloud services audit including:
    Telecom Directors and Managers, Network Directors and Managers, Mobility Directors and Managers, IT Procurement, IT Finance, IT Architects

    Amalgam Insights has been covering the Telecom Expense Management (TEM) market for over a decade. In May of 2017, Gartner released "Market Guide for Telecom Expense Management Services, 2017". In this guide, Amalgam believes that eight key vendors were overlooked that can provide enterprise-grade services and represent billions of dollars in technology spend including:

    * Asignet - A pioneer in Robotic Process Automation
    * Ezwim - The largest standalone TEM in Europe
    * GSG - A SaaS solution partnering with IBM, Unisys, and Verizon
    * ICOMM - A Fortune 1000-focused vendor with 100% referenceable clients
    * Mobichord - A fast-growing technology management platform built on ServiceNow
    * Netplus - A commercial and government-focused vendor with over 4 million lines under management
    * Smartbill - The largest Australian provider with over 500,000 items under management
    * Vcom - One of the Bay Area's best rated places to work with spend management expanding to IoT, data center, & SD-WAN
  • Security Briefings Part 1: GDPR - Using Technology for Compliance
    Security Briefings Part 1: GDPR - Using Technology for Compliance Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap, Moderator Recorded: Aug 31 2017 63 mins
    The General Data Protection Regulation (GDPR) is designed to ensure the privacy and security of European citizens’ personal data. The regulation takes a comprehensive approach to guaranteeing that organizations protect personal data completely and consistently as it is collected, stored, and used. As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. Fortunately, there are technology solutions that can address a breadth of GDPR-related concerns. Join Bitglass and (ISC)2 on August 31, 2017 at 1:00PM Eastern for the first in a three part Security Briefings series where we will discuss how the components of a cloud access security broker (CASB) can help organizations meet the regulation’s various requirements.
  • Virtual Reality Simulation & Training for Industry
    Virtual Reality Simulation & Training for Industry Amy Peck, Founder, EndeavorVR Sep 26 2017 9:00 pm UTC 60 mins
    VR Simulation & Training has been used successfully for decades, but often at a cost of tens of millions in industrial hardware. Now Sim & Training is far more accessible and has myriad use cases in Industry - Oil & Gas, Retail (warehousing), Manufacturing, even Corporate Training.

    Amy Peck will share how industries are embracing this technology and seeing measurable ROI. The critical component is end-to-end execution, from building bespoke training modules to integrating into existing Learning Management Systems (LMS) and back-end data stores and analytics.
  • 了解安全威胁态势和凭证盗用(撞库)攻击
    了解安全威胁态势和凭证盗用(撞库)攻击 演講人: 李文涛, 阿卡迈(Akamai)大中华区解决方案部门总经理, 萧锦明, Akamai亚太高级企业安全系统架构师; 主持人: 阎光,(ISC)² 上海分会主席,德勤风险咨询副总监 Sep 27 2017 6:00 am UTC 60 mins
    安全威胁态势不断变化,并且极为迅速。因此,组织应持续了解最新的攻击信息,以此来确定在当前的威胁态势下应该寻找的应对方式并预计攻击在未来变化的方式,从而免受该类威胁的影响。这一点至关重要。

    在今天的会议当中,Akamai 将基于已发布的《2017 年第二季度互联网安全现状》报告,与大家分享有关安全威胁态势的深度见解。

    近些年来,凭据滥用(撞库)攻击已成为一种普遍的威胁,而且复杂性正日益增加。我们也将对此进行详细介绍。凭据滥用(撞库)攻击活动一旦成功,用户将遭受无法访问、数据泄露或欺诈性交易等损失。Akamai 将揭示这些攻击活动中使用的技术以及难以检测出这些活动的原因。我们还将展示抵御此类攻击的方法和解决方案,从而使您的组织不再遭受此类攻击的影响。

    参加Akamai 和 (ISC)² 在09月27日下午2:00至3:00的在线论坛《了解安全威胁趋势和凭证盗用(撞库)攻击》,聆听专家对时下安全威胁的解读,还等什么?赶紧加入我们吧。
  • [Panel] Protecting Data in the Age of Ransomware
    [Panel] Protecting Data in the Age of Ransomware Josh Downs, BrightTALK; David Cook, Eversheds Sutherland; Jonathan Wright, Commvault & Jason Kent, AsTech Consulting Sep 27 2017 12:00 pm UTC 60 mins
    - Protecting Data in the Age of Ransomware -

    2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.

    With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.

    This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!

    Topics for discussion:

    - Why ransomware should still be top of your list of concerns in 2018

    - Methods to protect your organisation's sensitive data

    - Steps to take if your organisation does suffer a damaging breach
  • IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS
    IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS Chris Helm, COO & Co-Founder, Blend Media Sep 27 2017 1:00 pm UTC 45 mins
    Brands typically invest in one-off, high end immersive experiences that
    deliver difficult to measure ROI metrics whilst also being challenging to
    consume for viewers.

    Multiple friction points along this journey make us ask “So What?” when it comes to the immersive visual experience.

    Blend Media specialise in 360˚ video and have built a creator network,
    content library and web editor to pass the ‘So What?’ test.

    We enable brands to create immersive, affordable visual experiences that deliver longer term campaign value that are engaging and easy for consumers to enjoy.
  • Forget the Buzzwords - It's Time for Virtual Reality to Deliver Real Value
    Forget the Buzzwords - It's Time for Virtual Reality to Deliver Real Value Brian Herrera, CEO and Co-Founder of Vidi VR Sep 27 2017 3:00 pm UTC 60 mins
    Despite the past two years of hoopla surrounding VR technology, adoption rates are low and retention rates are even worse. Giants such as Facebook, Google, and Samsung have dumped billions into the space, but why isn't it taking off yet? In this webinar, Brian Herrera, CEO of Vidi VR, will give an outsider's look at the inside of this nascent industry and lead a candid discussion about:

    - Hurdles in the way of widespread adoption (spoiler alert: it's NOT technology)
    - The true value proposition of VR for consumers
    - What the big players and "thought leaders" got wrong
    - How Vidi VR is a differentiator in the industry
  • Defending Against Cyber Crime
    Defending Against Cyber Crime Lisa Forte, Cyber Protection Officer, South West Police Cyber Crime Unit Sep 28 2017 10:00 am UTC 45 mins
    The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.

    As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.

    Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.

    Speaker bio:

    Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • How the GDPR Impacts Your Enterprise Mobility Management Practices
    How the GDPR Impacts Your Enterprise Mobility Management Practices Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance Sep 28 2017 2:00 pm UTC 60 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Sep 28 2017 4:00 pm UTC 60 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • AI for Autonomous Response: The Machine Fights Back
    AI for Autonomous Response: The Machine Fights Back Joseph Poupard Sep 29 2017 4:00 pm UTC 60 mins
    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.

    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats?

    Darktrace recently ran tests across enterprises of all sizes in a variety of industries and has subsequently deployed AI-autonomous response in over one hundred organizations. In this presentation, we will discuss our lessons learned and explore several use-cases in which AI-based ‘Autonomous Response’ technology augmented human security teams.

    This session will cover:
    AI approaches and algorithms for detecting and responding to threats
    How human teams adopt (or resist) automated defenses
    The concepts of ‘human confirmation’ mode and ‘active defense’
    Real-world examples of autonomous response in action
  • Forging our Future with ARKit: Balancing Tech Investments in Augmented Reality
    Forging our Future with ARKit: Balancing Tech Investments in Augmented Reality John Buzzell, Ricardo Olivo Oct 3 2017 6:00 pm UTC 60 mins
    Apple and Google have joined the call for an Augmented Reality future, bringing hundreds of millions of users with them. Given multiple visions for the massive opportunity ahead, how should we divide our efforts? In this webcast, you’ll hear expert opinions from a group living this challenge. VR/AR Association Marketing Committee Chair John Buzzell and YOU ARE HERE technology lead Ricardo Olivo will reveal their journey – from Vuforia and HoloLens to ARKit and beyond – covering use cases, technology insights, hardware challenges and more. You’ll learn where to place your bets, and how to make the most of this transition. This session will also include 30 minutes of Q&A to help you make sense of your VR/AR options.
  • Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud
    Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Oct 5 2017 5:00 pm UTC 75 mins
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they also face heavier regulations than many other verticals. In particular, these organizations must reach compliance with regulations like the Gramm-Leach-Bliley Act (GLBA). As cloud adoption continues to spread within the industry, financial firms must be particularly focused on achieving cybersecurity in ways that ensures compliance. Join Bitglass and (ISC)2 on October 5, 2017 at 1:00PM Eastern as we discuss the different aspects of GLBA that financial services organizations need to know and how different tools that can help with compliance.
  • Pulse doesn't make your security road map - Pulse One makes it better.
    Pulse doesn't make your security road map - Pulse One makes it better. Jim Hebler & Greg Bassett Oct 5 2017 6:00 pm UTC 30 mins
    Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. We will also cover how Pulse Profiler, Policy Secure and Pulse One co-join to enhance monitoring, reporting and unified alignment-and-visibility-reporting from the front-edge of your network. Also walk away with how the recent vADC acquisition enables Pulse to deliver applications, distribution, management and compliance extensions throughout your network.
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Oct 10 2017 3:00 pm UTC 60 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.
    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • AI facts vs fiction: AI business decisions that really work
    AI facts vs fiction: AI business decisions that really work Avinash Gangadharan, Sr Director of Engineering, Walmart Oct 10 2017 5:00 pm UTC 60 mins
    Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.

    As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?

    Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.

    In this webinar, you’ll explore:
    * Myths and realities of AI replacing vs. augmenting staff functions
    * How to bake AI into your business strategy
    * On- and offline use cases for AI
    * The future of AI for business

    Speakers:
    * Avinash Gangadharan, Sr Director of Engineering, Walmart
    * Allen Sebrell, Senior Manager E-Commerce Team, Amtrak
    * Deep Varma, Director of Engineering, Trulia
    * Stewart Rogers, Director of Marketing Technology, Venturebeat
    * Rachael Brownell, Moderator, VentureBeat
  • Virtualization: Impacts on Performance Assurance and Business Models
    Virtualization: Impacts on Performance Assurance and Business Models Andrew Young, iconectiv, Jay Stewart, Spirent, Moderated by Limor Schafman, TIA Oct 11 2017 3:00 pm UTC 75 mins
    The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPEX and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.

    Speakers:
    >> Andrew Young, VP of Business Development, iconectiv
    >> Jay Stewart, Senior Product Line Manager, Lifecycle Service Assurance, Spirent
  • Forrester Total Economic Impact Study of CA APM
    Forrester Total Economic Impact Study of CA APM Dean Davison, Principal Consultant, Forrester Research and Pete Waterhouse, Advisor, CA Technologies Oct 12 2017 3:00 pm UTC 60 mins
    In this golden age of software applications, delivering a great customer experience at scale is a business differentiator. Microservices platforms, containers and cloud-native applications promise faster time-to-market but introduce unparalleled complexity. Added value can quickly be eroded by failing to understand and manage your application performance across environments that are in a constant state of change.

    Join us for this special webcast, where guest speaker Dean Davison, Principal Consultant, Forrester Research will discuss findings from the recent Total Economic ImpactTM (TEI) of CA Application Performance Management (APM) that can assist businesses evaluating this solution – including the potential to realize: $5.4 Million NPV, 316% ROI and payback in 3 months.

    Joining Dean, Pete Waterhouse, Advisor, CA Technologies will outline the essential elements of a modern APM solution needed to deliver these outcomes.
  • Case Study: Transform Threat Investigation With a Stretched Security Team
    Case Study: Transform Threat Investigation With a Stretched Security Team Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT Oct 12 2017 3:00 pm UTC 60 mins
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Instant Payments - Is Your Business Ready for the Real-time Challenge?
    Instant Payments - Is Your Business Ready for the Real-time Challenge? Jean-Noel Georges, Global Program Director, Frost & Sullivan, Tristan Blampied, Pelican and Petra Plompen, EBA Clearing Oct 12 2017 3:00 pm UTC 60 mins
    In today’s digital marketplace, consumers and businesses increasingly expect to be able to make instant payments, wherever they are, and at any time of day. The adoption of real-time payments capabilities is very much an essential for banks who wish to retain market share and capture new customers.
  • What your marketing analytics model is missing
    What your marketing analytics model is missing Helen Pan, Director of Marketing, Boxed Oct 12 2017 5:00 pm UTC 60 mins
    Customers expect fully personalized brand experiences every time. And if you don’t deliver, they’ll walk. The good news: as they adopt an increasing number of digital channels, we’ve become privy to a sea of customer data. And that’s opened up the ability to not just understand what they do, where they go, and when, but what they actually want.

    If you do it right, you can figure out what they want before they do, then deliver it and find yourself with yet another loyal customer.

    Doing it right isn’t about how much you collect, but what you’re collecting. It’s knowing what metrics to track, what KPIs to watch, and understanding exactly what you’re looking at. Join our latest VB Live event to learn all of this — plus get insight into the marketing analytics investments you need to make, how to turn data into action, and more.

    Register now!

    You’ll hear about:
    * Generating meaningful AND actionable data insights from marketing analytics
    * The role of analytics in creating an engaged, loyal, and high spending customer
    * The new segmentation: how analytics drives a more personalized customer experience
    * How to prioritize investments in marketing analytics

    Speakers:
    * Helen Pan, Director of Marketing, Boxed
    * Kelsey Cohen, Director of Marketing, FarmLogs
    * Stewart Rogers, Director of Marketing Technology, VB
    * Rachael Brownell, Moderator, VB
  • Connected devices and the rise of invisible payments
    Connected devices and the rise of invisible payments Kevin Gordon, Lead Innovation Architect, Worldpay Oct 17 2017 4:00 pm UTC 30 mins
    By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.

    As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!

    As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.

    Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:

    •How companies are already dealing with device connectivity
    •How the challenges posed by IoT are being solved for today
    •Global consumer attitudes around payments made by devices
    •How payments will become ‘invisible’ or ‘translucent’ for users
    •Payment technology that will enable devices to make decisions

    SPEAKERS:
    * Kevin Gordon, Lead Innovation Architect, Worldpay
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Worldpay