Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.
In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:
• Why the status quo for transportation data collection is no longer good enough
• The types of Massive Mobile Data that are useful for transportation and urban planning
• Algorithmic processing techniques that are critical for making this data useful
• Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
• A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts
Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.
In this webinar, you’ll learn:
- How to identify if an IoT solution will work for your use case.
- What others in healthcare are using IoT for.
- The challenges of IoT in healthcare
As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.
Mike Nelson and Mike Ahmadi will cover the following topics:
- Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
- How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
- Specific steps security teams can take beginning today.
The increasing mobile workforce is impacting corporate mobility management needs and costs.
Speaker Michele Pelino, Principal Analyst at Forrester, will share Forrester’s research on how enterprises are addressing this challenge.
Joining her will be Pallavi Vanacharla, product marketing at Cisco Jasper, will share how their new platform – Control Center for Mobile Enterprise - puts the control back in the hands of enterprise.
What you’ll learn:
*Real examples of mobility challenges faced by enterprise IT teams
*Forrester data on the top mobility management tools and services in use today
*How Cisco Jasper automates mobility management
Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper
In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.
He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
Many businesses today are driven to make their mobile apps more convenient and user-friendly, which often comes at the expense of security. Increasingly, cybercriminals exploit this oversight, shifting their focus from PCs to mobile devices and driving up the sophistication and rate of mobile attacks. Mobile malware, jailbroken devices, rogue apps, keylogging, screen capture and other threats are becoming serious disruptors of mobile business.
As an application publisher, you cannot stop these attacks from happening but you can render them ineffective — while also providing the best possible user experience. Join this webcast from VASCO Data Security and learn how to reduce your mobile apps’ vulnerabilities and maintain a frictionless user experience.
Topics of discussion will include:
- The nature and anatomy of mobile attacks
- The most common mobile app vulnerabilities
- The key components of holistic mobile app security
- Using “invisible” security such as behavioral authentication and runtime application self-protection to improve user experience
In this short video, Bob Janacek discusses how hacking has evolved, and has become much more sophisticated, going after data previously thought to be relatively safe - and how encryption is imperative to its protection.
Aruba’s asset tracking solution allows organizations to track high value assets using their existing Aruba WLAN infrastructure and BLE-based Aruba Tags. This increases staff efficiency, reduces equipment costs and improves customer satisfaction.
With the advent of massively powerful quantum computers, much of today's encryption will be vulnerable. Preparing for the inevitability of quantum should be an integral part of current risk management strategy. Gemalto is teaming up with ID Quantique, a leader in quantum security, to help security professionals understand quantum-safe cryptography and the impact it will have on enterprise security. Find out how you can create a quantum-safe environment for voice, video, virtualization and mass data today, securing these assets from even the most advanced cybercriminals and their super-computers.
Join Gemalto and ID Quantique for a joint webinar to learn more about:
•What is quantum computing and how it affects security
•Quantum cryptography in action
•Examples of quantum cryptography in the enterprise and government space
•Quantum-safe solutions at a glance
•Future developments of quantum cryptography
Networks are changing. With the vast expansion of IoT, we're experiencing the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.
Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.
This webinar will cover:
- Possible bottlenecks and roadblocks on the path to the Internet of Things
- What leading organizations are doing today to prepare for the coming influx of new types of devices
Zbigniew will provide insight into how Tensorflight is building a digital brain capable of understanding the world from the sky. The approach is based on deep convolutional neural networks, inspired by visual processing in the human brain.
The company has partnered with DroneDeploy, the leading platform for collection aerial imagery via drones.
Tensorflight’s first machine vision solution can count different types of objects such as trees, crops, cars, livestock etc. It is based on state of the art research. Models are easily scalable and deployed on the cloud through almost real-time analysis and a distributed orchestration system. Zbigniew will discuss how they have solved problems of processing maps that are 30.000 x 30.000 pixels in size in almost real time.
The Internet of Things is upon us. Vast amounts of big data are quickly approaching and network traffic, latency and bandwidth are at higher demands than ever. Storing, transmitting, and analyzing this data from IoT devices will require a secure and agile network architecture. Network failover and network security will be of the utmost importance.
How will these changes in demand and technologies have an impact on new standards and protocols? Will network communications between devices and the cloud be safe? Tune into this dynamic panel discussion with leading IoT and network experts for the state of IoT networks.
Ahmed Banafa, SJSU Faculty Member and LinkedIn IoT Influencer
Ryan Allphin, CTO, Cradlepoint
Brenda Boehm, Chief Strategy Officer & Board Advisor, IoT Smart Solutions, TIA
With the growing demands of enterprise outdoor Wi-Fi users, customers’ expectations of outdoor Wi-Fi has gone beyond the basic network connection. Outdoor Wi-Fi deployments for small and large areas are often different and how to improve the user experience while minimizing costs has always been a concern for enterprises.
This webinar will address various outdoor use cases and their most appropriate solution; DreamWorks Animations will share their real-life outdoor deployment experience with the audience, including their unique outdoor Wi-Fi requirements, deployment challenges and their future move to enable an always-on indoor/outdoor Wi-Fi connectivity in the entire work place.
Join us to learn more about the current challenges and benefits of outdoor Wi-Fi and ways to meet the new demands and performance standards.
The possibilities may be endless, but so are the threats. A connected world with Big Data analytics and the Internet of Things opens all kinds of doors, which means forward-looking companies are carefully planning their roadmaps now. How can so much data be captured, analyzed and leveraged effectively? Safely? With data privacy? Hear data security expert Reiner Kappenberger discuss standards and innovations such as NIST / FIPS approved format-preserving encryption technology, for a “build it in” approach to more trusted Big Data and IoT ecosystems. Discover how you can persistently secure your most sensitive data-in-use across the enterprise ecosystem.
Your employees are using more cloud apps than ever, and mobile workers frequently work without turning on their VPN. You need new ways to extend protection anywhere your employees work — and you need it to be simple, yet incredibly effective.
Exciting innovations in network security-as-a-service offer distributed organizations the potential to extend and meaningfully increase security effectiveness. Join this 451 Research webinar with Cisco Security to hear a discussion about new cloud-delivered protection for mobile workers, lean branch offices, and cloud applications. We’ll cover the changing market landscape, the emergence of the Secure Internet Gateway, and highlight important buying considerations for companies looking to add these capabilities.
Which platforms to support? BYOD, CL or Both? Unlocked or Locked? Cover all employees or just some? What about security? We deal with these questions on a daily basis, so why make the same mistakes as your peers? In this webcast we’ll share pitfalls to avoid and best practices to successfully deploy, manage and secure mobile to initiate transformation and promote growth within your organization.
This short case study video gives an overview of how a large payer seamlessly connected their mobile messaging app to their Salesforce Service Cloud, automating customer support inquiries in a secure, HIPAA compliant manner.
Sure, you have a beautiful app, but if your load times are too slow and your file sizes are too large, you're leaving money on the table. The mandate is clear: Your mobile game needs to start up in five seconds, or you’ll start to churn players.
It’s a tough balancing act between delivering rich content and letting players enjoy the game without a painful loading screen. And in some countries, speed and minimalism are a must, not a nice-to-have, if you're going to succeed.
We're going to take a deep dive in the best practice for reducing load times across both the mobile web and apps. We'll look at screen load micro-data and how slow load times are killing publishers in the mobile arena.
In this webinar, you'll:
* Identify the best practices for optimizing load times for games with rich content
* Find out the risks are if you fail to optimize load times, including the dangers associated with global reach
* Discover what to do first, and which technologies can help you get there quicker
* David Holtkamp, CEO, Crimson Moon
* Jonathan Meson, CEO, VisualBlasters
* Martín Domínguez, CIO at Etermax
* Stewart Rogers, Director of Marketing Technology, VentureBeat
As financial service companies battle to build customer loyalty and increase security in the age of FinTech, providing efficient, secure and personal services is a source of competitive advantage. The rapid growth of voice biometrics authentication demonstrates it is a convenient and secure way to authenticate real customers, detect impostors and prevent fraud.
In this webinar, join Interactions and Opus Research as they describe the steps that financial service companies should take to incorporate voice biometrics authentication into the customer care experience.
Topics to be discussed include:
• Identifying Responsibilities and Stakeholders: Contact center, security/risk management, marketing, customer care, IT, and communications infrastructure
• Finding the Budget: Making a business case and finding the budget for voice biometrics authentication
• Best Practices: Engaging Marketing to build customer awareness around voice biometrics
• Preparing for Success: Anticipating the need to scale operations to accommodate new interaction patterns to suit multichannel environments
One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.
This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.
Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
Email is the most frequently implemented application in Office 365, and whether you use a cloud or hybrid solution, email needs to be thoroughly secured. A failure to properly encrypt email can lead to loss of intellectual property, breaches of sensitive customer and employee information, and violations of data breach and privacy laws.
Join Michael Osterman of Osterman Research and DataMotion for a
55-minute webinar that reviews the Office 365 environment, the reasons for securing email, and addresses best practices for implementing and using email encryption.
This webinar will address a number of important questions:
• Why worry about encryption in Office 365?
• Why should you encrypt email?
• What are the best practices for securing email in Office 365?
• Is the native Office 365 email encryption your best option for
Whether you are just beginning your plans to move to Office 365, or you’re already fully implemented, you need to make sure that your organization is moving data as securely as possible.
IoT networks grow by the day - prompting sleepless nights from security professionals the world over. As more and more devices join the network, how can we ensure that they're not becoming the latest weak link in the network?
This expert panel will look at vulnerabilities in the IoT, those that are more obvious and those that perhaps aren't. It'll also cover the latest threats targeting IoT networks; the mechanisms and techniques that are being used and how to stop them.
The IoT will be critical to business and consumer life from hospitals to connected cars to factory floors. Security and privacy remain key concerns and this panel will break down what the explosion of IoT networks will mean for security professionals.
The Google security model is built on over fifteen years of experience in keeping customers safe while using Google applications. The security architecture of the Google Cloud Platform (GCP) is based on the same foundation and offers enterprises the tools they need to secure their data and applications in the cloud. Organizations deploying workloads on GCP need to understand the fundamental ways in which security in the public cloud is different from traditional datacenter security and use the right tools to harden their cloud environments.
Join Alex Corstorphine, Solutions Architect at Dome9 Security, and Naresh Venkat with the Google Cloud Strategic Technology Partnerships team, as they discuss best practices and common pitfalls around managing security, compliance, and governance in GCP environments. They will review GCP network security best practices and available compliance certifications, and provide practical examples of how to harden your cloud network environment.
The webinar will include a live demo of the Dome9 Arc SaaS platform that offers greater network visibility, control, and active enforcement in the cloud. Additionally, we will show how the Dome9 Compliance Engine allows businesses using GCP to assess their compliance posture, identify risks and gaps, fix issues such as overly permissive security group rules and weak password policies, enforce requirements and prove compliance in audits.
In this 45 minute webinar you will learn:
- Key features and capabilities of the GCP network security model
- How to gain visibility into network security posture and misconfigurations
- How to harden your Google Cloud environment by applying security best practices
The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.
Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.
During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:
•The local and global government data privacy regulations (Australia and Europe)
•Gauging the true cost of a data breach and how to reduce the scope of risk
•Understanding privacy by design throughout business
•Strategies for simplifying operations for regulation and internal audits
•Determining current industry compliance, which may be applicable to the APA and GDPR
Containerized applications and microservices challenge existing monitoring tools and processes. The ephemeral nature of containers presents massive tracking issues and the massive increase in objects, service and metrics makes traditional alerting obsolete.
In this webcast, you will learn:
• The benefits of using an agentless application monitoring approach in Docker environments
• How an open data model is key to understanding and tracking microservice relationships and dependencies
• The importance of analytics-driven monitoring to help detect anomalies, predict problems and prevent alert storms
AI presents a framework for managing cloud, telecom, and software consumption in a Hybrid IT world. A must-attend for IT executives managing multi-million dollar cloud, telecom, mobility, and/or software budgets.
In this webinar, Amalgam Insights provides a framework for the CIO and CFO offices to understand the fragmented world of Technology Consumption Management, which you need to understand if you manage:
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.
Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:
-What we can learn from Jason Bourne about knowing one’s surroundings
-What we can learn from hackers to better protect valuable data
-What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
-How to change our mindset in a new era of a hacker driven gold rush
Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.
Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.
A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.
At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.
Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.
* Discover the one trick to never-fail push notifications everywhere, not just apps
* Drive 2770% higher conversion rates through a specific kind of push notifications
* Learn how to apply behavioral triggered push notifications in your own marketing strategy
* Build better timing into your push notifications to increase conversions
* Stewart Rogers, Director of Marketing Technology for VentureBeat
• Wendy Schuchart, Moderator, VentureBeat
Open Banking is coming in January 2018, but what does this mean and does it change anything?
ENVESTNET YODLEE has lead the way for 18 years, helping users access their data via services provided by both banks and fintech providers. This Webinar will provide a perspective from a bank, fintech and platform provider on the changes coming next year.
Computing and applications in IT have shifted over the last decade from a de-centralized to a centralized, cloud-based model. New Internet of Things applications promise to reverse that trend with an emphasis on local edge computing and analytics, and create a continuum of new aggregation points to address the unique needs of each IoT vertical application. This webinar will look at key drivers behind the re-emergence of the edge in IoT analytics and the growing demand for near-edge aggregation models to solve for application latency and cost constraints.
The reality is virtual, but successful VR games still require cold, hard data. For wildly popular games like Survios’ Raw Data, the first VR-exclusive game to reach #1 on Steam’s Global Top Sellers list, data and analytics are the key to success.
And now online gaming companies have the full-stack analytics infrastructure and tools to measure every aspect of a virtual reality game and its ecosystem in real time. You can keep tabs on lag, which ruins a VR experience, improve gameplay and identify issues before they become showstoppers, and create fully personalized, completely immersive experiences that blow minds and boost adoption, and more. All with the right tools.
Make success a reality: Register now for our latest interactive VB Live event, where we’ll tap top experts in the industry to share insights into turning data into winning VR games.
* Understand the role of VR in online gaming
* Find out how VR company Survios successfully leverages the Exostatic analytics infrastructure for commercial and gaming success
* Discover how to deploy full-stack analytics infrastructure and tools
Nicolas Nadeau, President, Exostatic
Kiyoto Tamura, VP Marketing, Treasure Data
Ben Solganik, Producer, Survios
Stewart Rogers, Director of Marketing Technology, VentureBeat
Wendy Schuchart, Moderator, VentureBeat
The rise of Millennials in the workforce, increasing employee
demand for technology flexibility, and a focus on the employee experience continue to disrupt traditional work procedures. Companies launch limited bring-your-own-device (BYOD) deployments, but these programs often stall when an employee is required to install EMM/MAM/MDM software.
In this webinar, we will discuss the best practices related to securing employee devices while maintaining user productivity.
For LTV, engagement, and lifecycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.
ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.
For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!
In this webinar you'll:
* Learn why ASO is fundamental to the success of any app
* Familiarize yourself with the pillars of solid ASO strategy
* Leverage technology to increase your lifetime user value
* Think beyond keywords for your search strategies
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Peggy Anne Salz, Chief Analyst, MobileGroove
* Wendy Schuchart, Moderator, VentureBeat
Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
You better get good at conversational video marketing, fast—or you're going to be obsolete.
Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.
Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.
Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.
By watching this webinar, you'll:
* Optimize your audience takeaways for video content
* Get tips from the savviest sales and marketing people on their video content strategy
* Focus your energy on the right distribution channels for your adverts
* Personalize video content to lock in the close
* Stewart Rogers, Director of Marketing Technology, VentureBeat
More speakers to be announced soon!
Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.
This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.
David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:
- Natural language processing: finding keywords in relevant context within unstructured text
- Statistical NLP: sentiment analysis via supervised machine learning
- Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
- Graph analysis: finding actions outside the usual or expected network of people
- Heuristic rules: finding suspect actions based on past schemes or external datasets
- Topic modeling: highlighting use of keywords outside an expected context
- Anomaly detection: Fully unsupervised ranking of unusual behavior
Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.
Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.
In this webinar you'll:
* Learn what works and what doesn't in 2017's mobile advertising arena
* Mitigate the mobile advertising fraud risk in your own applications
* Create the most engaging mobile advertisements for savvy app patrons
* Use video and 360 advertising to stay abreast of the latest trends in mobile advertising
* Stewart Rogers, Director of Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
More speakers to be announced?
Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.
In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.
Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.
Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
This talk shows how to build a scalable data science platform, using only free, commercially-friendly open source software. The end-to-end architecture covers interactive queries & visualization, machine learning & data mining, deploying models to production, and a full 24x7 operations toolset.
Requirements include what an enterprise typically requires: Strong security (authentication, authorization, audit, encryption, multi-tenancy), active monitoring for both systems & data, backup & restore, user management (with LDAP integration), distributed deployment on commodity hardware, auto scaling, and self-healing when containers or services go down. Technologies covered include Spark, Hadoop, ElasticSearch, Kibana, Jupyter notebooks, TensorFlow, OpenScoring, Docker Swarm, and supporting tools.
This talk is intended for practicing architects and technology leaders, who need to understand how to best leverage the open source ecosystem in this space and what it takes to integrate the available cutting-edge technologies into a cohesive, enterprise-grade and production-grade architecture.
David Talby is Atigeo’s senior vice president of engineering, leading the R&D, product management, and operations teams. David has extensive experience in building and operating web-scale analytics and business platforms, as well as building world-class, agile, distributed teams.