Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • What’s New in LEAP: Concert What’s New in LEAP: Concert Hironmay Basu, Product Manager - LEAP Recorded: Jan 19 2017 42 mins
    LEAP, is a suite of purpose-built, cloud-native content apps designed to revolutionize the content management industry and transform interactions with business content.

    Concert, allows multiple contributors to collaborate structurally on a single version of a document by easily dividing and assigning sections to individuals. Concert can be used for RFPs, Product Launch Documents, Contracts, Clinical Trials or similar use cases, bringing order to these collaborative processes while freeing participants to do their best work. Divided documents, workflow notifications, and authoritative controls are all combined to prevent unauthorized or unnecessary content changes.

    Topics to be discussed: LEAP Concert has the following key capabilities:
    •Document creation, editing and collaboration
    •Section based assignment and control
    •Review and approval workflows for individual sections
    •Document history and version comparison
  • 2017 Trends in Infrastructure 2017 Trends in Infrastructure Al Sadowski, Research Vice President - Infrastructure Recorded: Jan 19 2017 64 mins
    Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.

    Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless Recorded: Jan 19 2017 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?


    Speakers:
    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Recorded: Jan 18 2017 57 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • 2017 Trends in Services 2017 Trends in Services Kelly Morgan, Research Vice President - Services Recorded: Jan 18 2017 32 mins
    The next wave of cloud computing is coming, and it is going to take the shape of serving distinct enterprise needs in an on-demand fashion. It is normal for enterprise IT departments to provision or procure IaaS, PaaS or SaaS services now. That in turn means that a larger galaxy of business needs and operational complexities will be tackled as the next way to monetize cloud infrastructure. The trickle of specialized providers doing boutique services such as disaster recovery as a service, compliance as a service and database as a service could well become a flood.

    Join Kelly Morgan, Research Vice President for Services as she uncovers what service providers will need to change in order to gain a competitive advantage in 2017, and what the sources of demand for multi-tenant datacenters will be in the coming year.
  • 2017 Trends in Mobility 2017 Trends in Mobility Brian Partridge, Research Vice President - Mobility Recorded: Jan 17 2017 57 mins
    Mobility in 2017 is all about 5G, which is not just another “G” – its scope is far larger. Previous G’s focused on increasing bandwidth and latency to support Mobile Internet consumption patterns accelerated by universal adoption of smart devices. The revolutionary attributes of 5G converge the latest innovations in network, cloud, and devices in a way that has never been done before. 5G’s impact will be far reaching across industries generating massive value not possible in previous technology shifts. Ultra-broadband communication and computing power will combine and extend across networks and devices such that information and computing power will be instantaneously available.

    Join Brian Partridge, Research Vice President for Mobility, as he explores how this will catalyze a wave of innovation in applications, services and functions built to run on the new 5G infrastructure.
  • Powering digital transformation and driving business value with new LEAP family Powering digital transformation and driving business value with new LEAP family Ahson Ahman, Head of Products & Design- LEAP Dell EMC Recorded: Dec 21 2016 33 mins
    Watch and learn how the LEAP family of products will power digital transformation strategies, while creating new value proposition across the larger ECD portfolio. 

    Attend this session to learn the value proposition for our new LEAP family of products and to understand why and how LEAP will bring value in the context of digital transformation. We’ll also explain the role of the LEAP family within the larger ECD Portfolio.
  • Addressing a Key Challenge in Network Security – ZERO DOWNTIME Addressing a Key Challenge in Network Security – ZERO DOWNTIME Joshua Kooh, Strategic Security Solutions Consultant, Forcepoint Recorded: Dec 21 2016 60 mins
    One of the top CIO challenges is to maintain 100% uptime. Access to applications, data, and resources on the network is mission-critical for every organization. Downtime costs can be high and in various forms - loss of revenue and productivity, the cost of recovery and other intangible costs, such as damage to their reputation and brand value. Downtime is simply unacceptable. Hence, security for that network must be highly available and not cause any performance degradation of the network - in migration, deployment or through human error.

    In this session, we will explore these questions:
    • Is it possible to have no downtime when maintaining network security?
    • What are the different causes of downtime?
    • What are the different approaches to minimize downtime?
    • How do you manage the costs to achieve 99.999% uptime in the network security solutions?

    Join Forcepoint and (ISC)² on Dec 21 (Wed) at 1:00p.m. (Singapore time) and learn how to maintain 100% uptime.
  • Performance Engineering Core Capabilities Performance Engineering Core Capabilities Todd DeCapua, CSC, Petar Puskarich, Bank of America Recorded: Dec 19 2016 62 mins
    Please join us for a roundtable discussion around several topics concerning what core capabilities performance engineering provides to your organization big and small.

    Topics include:
    * Visibility
    * Accountability
    * Consistency
    * Reliability
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Michael Angelo Vien, CounterTack Cyber Response Expert Recorded: Dec 15 2016 48 mins
    Cybersecurity teams and incident responders struggle to gather the most accurate intelligence on threats, and targeted, specific security incidents. Teams need technology to drill down into information on incidents, often to respond quickly, and in doing so, determine root cause.

    Is it malware? Are there other indicators that you are blind to? Are your systems maligned with attack residue that you can’t analyze in-memory?

    The art of incident responses contains three key components typically:

    1)Understanding your threat landscape to the point where you can effectively begin to eradicate threats quickly and with confidence
    2)Determining through deep investigation the root cause of security incidents, and the broader impact incidents that are not triaged
    3)Applying forensic-level analysis to add a layer of intelligence based on what was found, and what can be predictably analyzed

    CounterTack delivers incident response capabilities built for analyzing today’s threats, and for drilling down forensically into incidents that might stem from varying levels of malicious code associated with malware and other IOC’s. Leveraging behavioral traits and predictive analytics through its solutions, CounterTack is dedicated to continually improving IR for organizations globally.

    This webinar will feature key trends on how the discipline of incident response has shifted toward needing more definitive analysis. The presentation will convey a few real-world use cases, leveraging CounterTack technology across multiple common and uncommon types of threats from a forensic point of view, so attendees can learn new techniques to elevate their IR workflow.

    As a takeaway, we’ll leave you with an endpoint IR checklist and a set of best practices, and a special incentive to acquire Responder PRO for detailed incident investigation.
  • Masters of Mobile Data IV: From hype to reality in 2017 and beyond Masters of Mobile Data IV: From hype to reality in 2017 and beyond James Peng, Head of Mobile and Social Acquisition, Match Group Recorded: Dec 15 2016 59 mins
    Remember when the experts scoffed at the idea that people would buy stuff with their smartphones? In an industry that reinvents itself every five years, what was once groundbreaking becomes table stakes in the blink of an eye.

    Staying ahead of the curve isn’t simply adopting new technology, but reinventing your approach as new platforms and channels emerge. The next wave is about to crest with the advent of wearables, VR, and the Internet of Things. Are you ready to catch it?

    In our latest VB Live event, we’re going to smash the myths that are holding your company back, and make some big, audacious predictions about the state of mobile business over the next five years—from 2017 and beyond.

    Join industry leaders for a lively hourlong discussion on the future of mobile apps -- and get your real world questions answered live.

    In this webinar you’ll:
    * Learn which mobile analytics will matter in the next five years
    * Understand the ways that KPIs monthly active users (MUA) can be interpreted
    * Measure beyond smartphones -- including wearables, connected cars and more.


    Speakers:
    * James Peng, Head of Mobile and Social Acquisition, Match Group
    * Bob Sherwin, VP Direct Marketing, Wayfair
    * Jesse Robbins, CEO, Orion Labs former CEO of Chef
    * Evan Schuman, Moderator, VentureBeat

    Sponsored by mParticle
  • The Realities of Testing High Speed Fiber “Engineered Links” in the Field The Realities of Testing High Speed Fiber “Engineered Links” in the Field Robert Reid, Panduit Recorded: Dec 15 2016 66 mins
    This webinar will focus on the pitfalls associated with tight field test specification of pre-terminated fiber systems for high speed channels in the context of the real capability of portable testers.
    Best practices are discussed (proper test limit specification) such that field test costs will be minimized.

    Attendees will earn one BICSI CEC
  • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst Recorded: Dec 14 2016 62 mins
    The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

    Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

    Topics include:
    - How to grapple with “malware-free” threats, like BEC spoofing
    - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
    - Managing a move to the cloud without losing visibility into attacks
  • Instant messaging: The future of mobile marketing Instant messaging: The future of mobile marketing Stewart Rogers, Dir. of Marketing Technology, VentureBeat Recorded: Dec 14 2016 62 mins
    The rise of instant messaging has created the largest and fastest-growing potential consumer audience ever—and a powerful opportunity to form instant, one-to-one connections between your brand and your customers. According to Juniper research, by 2019, over 160 trillion messages will be sent every year. That amounts to 438 billion messages daily.

    Most messages are read within three minutes of being opened—this kind of immediacy is unparalleled in other communications. And IMs can include a stunning variety of contextual, relevant, interactive content, and create conversations, engagement, and a deeply personalized connection that’s never been possible with email.

    Join our latest VB Live executive workshop to learn how to leverage the power of instant messaging to form meaningful connections and reimagine how you think about retail, customer service, and the entire customer experience.

    By participating in this VB Live event you’ll:
    * Learn how to leverage instant messaging
    * Capture customer details in IM
    * Leverage instant messaging technologies to improve your marketing strategy overall
    * Use the high engagement of messaging in terms of viewabilty

    Speakers:
    * George Corbin, Senior Vice President, Marriott Digital
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Quinn Banks, Sr. Mobile Marketing Manager, Farmer's Insurance
    * Wendy Schuchart, Moderator, VentureBeat
  • How to accelerate your transition to embracing Secure Access How to accelerate your transition to embracing Secure Access David Goldschlag, CTO & Senior VP of Strategy Recorded: Dec 14 2016 29 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Secure Access.

    The final webinar in our series will show you how to get up to speed on a new robust security perimeter with policy at its core, compliance for the cloud, and frictionless experience for workers.
  • 5G, IoT and Autonomy 5G, IoT and Autonomy George Karayannis, Chris Clayton and Limor Schfman Recorded: Dec 14 2016 62 mins
    The Internet of Things will redefine services offered in such industry sectors as eHealth, smart communities, retail, transportation and energy.  To provide the levels of service required, infrastructure networks will be suffused with levels of complexity beyond any deployed and operated to date. 

    The concept known as “5G” is still being defined.  It will include legacy systems such as 3G, expand the development of 4G LTE, incorporate newly developed technologies such as holographic beamforming and virtualization, and include other types of networks such as WPLANs, satellite, and fiber.  Interoperability of the networks, seamless integration of applications and the transfer of data across the networks and systems will require autonomous and artificial intelligence to ensure seamless, secure and ensured delivery. 
     
    Chris Clayton, Head of Solution Design & Delivery for Beyond Limits, and George Karayannis, Vice President of CityNOW for Panasonic, will take us on a deep dive on how the integration of networks and autonomous artificial intelligence capabilities will enable trusted IoT connectivity demands within Smart Cities.
  • IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント 中西一博, セキュリティプロダクトマーケティングマネージャ, アカマイ・テクノロジーズ 合同会社 Recorded: Dec 14 2016 61 mins
    現在、最も頻繁に用いられるサイバー攻撃のひとつとなったDDoS攻撃。Mirai Botnetに代表されるIoTを媒介する新たな攻撃手法によって、ビジネス停止のリスクがかつてないほど高まっています。実際にその攻撃を受け止めたAkamaiが観測した最新の攻撃データに基づき、現在のDDoSの特徴としくみ、その対策を用意する際に留意すべきポイントを中心に、企業Webを中心にしたシステムが今まさに直面しているリスクを解説します。
  • Evolving the Digital Experience in 2017 Evolving the Digital Experience in 2017 Simon Crawley Recorded: Dec 13 2016 59 mins
    The digital revolution within society is in full swing, as the rate of consumer-facing technological advancement accelerates to unprecedented levels. Your users have never been so tech aware, and businesses need to keep up in order to stay relevant in the current marketplace. The pressure on businesses is two-fold – not only do they need to successfully transform themselves and their processes, but they need to apply that transformation to their customers’ experience.
    So where do organizations need to focus their digital transformation efforts in order to be successful? And what part does analytics play in this digital revolution? How beneficial is a comprehensive and experienced analytics partner to organizations currently attempting to transform digitally?
    During this webinar we will discuss the difficulties organizations are encountering when undertaking their digital journey, investigate why some organizations are more successful at digital transformation than others, and take a look at the impact and repercussions of failing to successfully transform in 2017.
    Huge business challenges are also often opportunities, and where some businesses struggle, others will excel. Organizations today need to view digital transformation as their defining moment, and reap the benefits moving into the future.
  • Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Chris Marsh, 451 Research; Chris Dunn, Easy Vista; & Bruce Aboudara, Scalable Software Recorded: Dec 13 2016 59 mins
    The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.

    To support this demand the service desk must be aware of and prepared for several key trends:

    •Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?

    •Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?

    •New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?

    Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.

    If you have any questions, feel free to email Chris Dunn at cdunn@easyvista.com
  • Smart Planning and Design for the Evolving Data Center Landscape Smart Planning and Design for the Evolving Data Center Landscape McKenzie Hughes and Carrie Goetz, The Siemon Company Recorded: Dec 13 2016 59 mins
    This webinar will cover latest trends, the shift to hybrid IT/cloud and colocation, the value of modular designs with preconfigured cabinets, growing vertically instead of horizontally, 40/100G migration (and future 400G) and the importance of low-loss fiber connectivity in backbone switch to switch links.
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Recorded: Dec 13 2016 63 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • The End of Proprietary Software The End of Proprietary Software Merav Yuravlivker, Co-founder and CEO, Data Society Recorded: Dec 8 2016 49 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • Smarter Cybersecurity™ solutions start with next-gen protection Smarter Cybersecurity™ solutions start with next-gen protection Shane Cooper | Senior Sales Engineer Recorded: Dec 8 2016 44 mins
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • Customer Service: Maximizing Service Management Beyond IT Customer Service: Maximizing Service Management Beyond IT Paul Kelsey, Kifinti Solutions Inc. & Mike Heberling, HEAT Software Recorded: Dec 8 2016 57 mins
    Customer Service: Maximizing Service Management Beyond IT

    There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.

    Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

    Join us for this Customer Service webinar & learn:

    Instant information to clients
    - Workflow to run based on known and secure criteria
    - Voice system knows everything the Service Desk knows

    Multiple communication channels
    - Integration and capabilities
    - Omni Channel
    - Single message representation

    Distributed Support/Telecommuting
    - Globalization
    - Repatriation of Call Centers

    Voice of the Customer Score
    - Personalization of Interaction and Routing
    - Custom Surveys based on Service and Category

    Auditing and Compliance
    - Reporting on actual effort for Labor Law compliance

    Who should attend?
    - VP of Support
    - IT Service Desk managers
    - Desktop Support managers