Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
-Summarize the Studies on Non-immersive Virtual Reality Therapy
-Summarize the Studies on Immersive Virtual Reality Therapy
-Discuss Current uses of Technology
-Discuss the Future of the Field
-Q & A
Brandon Birckhead is a physician who founded Immergence Technologies, LLC, a company to help dentists use virtual reality in their practice and collaborate with developers to create tailored content. He is also the coordinator of the VRARA Digital Health Committee. Current research focus has been on exploring the immersive effect of different VR applications. He graduated from Mayo Clinic Medical School in 2016.
One of the largest challenges that we see organizations faced with when adopting agile methodologies and practices, is to deliver fast with quality at scale. Agile and scaling Agile in the enterprise is a core part of HPE’s strategy as we continuously learn from our own R&D and HPE IT efforts, as well as our customers and partners to implement scaled Agile. This learning is applied to our software solutions that help enable Agile development, testing and scaled Agile including the Scaled Agile Framework. ALM Octane acts as the communication hub and decision support system to organize, plan, and deliver Agile projects on teams and scaled up in the enterprise. The tools empower programs and teams to manage their backlog with visibility into development and testing data, and with analytics/insights for release forecasting, tasks completion and resource allocation.
Join Tye Davis, Product Marketing Manager for Enterprise Agile, to see enterprise agile in action and get a preview of the latest software solution for application lifecycle management. See what HPE is doing to help organizations implement scaled agile.
This is part three in a three-part DevOps webinar series. Join us also for:
Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
A look at the future of software testing: HPE vision for Continuous Testing, March 29
Augmented, mixed, and virtual reality compose a spectrum for next-gen computing that is disrupting or accelerating the business objectives of companies across almost every industry. With an ever growing number of pilots and available solutions, it is imperative that businesses develop a strategy of where to play and how to win, while avoiding technology for technology’s sake, in order to create new value.
Jiten Dajee is a subject matter expert on digital reality technology spanning the entire value chain of augmented, mixed, and virtual reality. Jiten has been involved with Digital Reality technology since his first joint-venture in healthcare wearables in 2011. He joined Deloitte Consulting Innovation to lead the rapid commercialization of digital reality across industrial and commercial sectors. He brings an end-to-end understanding of how optics, networks, semiconductors, platforms, products, and will interact in the next-gen computing medium. Jiten specializes in market intelligence, technology adoption, solution integration, and strategic growth planning of digital reality in enterprise.
While many companies and institutions understand the need to investigate AR and VR, the path to success is a long one. Often, there are several teams at a single company looking at ways to leverage this technology, for internal processes as well as customer- and consumer-facing solutions.
This panel will explore ways to effectively bring this vision to fruition:
• Identifying the right use cases
• Getting internal buy-in and budget
• Finding development resources
• Rolling out new AR/VR processes and products
Enterprise is the best starting or entry point for AR and VR because the pain points are high, the dollars are there to make a strong ROI case for use, and the wearable form factor is much less of an issue. AR and VR technologies will be instrumental in closing the skill gap that is responsible for the shortage of skilled manufacturing workers. We are optimistic that industrial productivity will grow and that this will ultimately translate into higher wages because AR and VR will allow more workers to do high-skill jobs, and improve their performance.
Augmented Reality in Business: Assessing the Potential
This live panel will set the scene for augmented reality (AR) in business; what are the use cases? Who's beginning to adopt the technology? Where are we seeing success? The panel of experts will then discuss areas of growth and the challenges that lie ahead.
The panelists will try to break through the surrounding hype and discuss in detail the true potential and challenges for AR when business look towards adoption.
Featuring an industry-leading selection of Augmented reality experts:
- Josh Downs, Community Manager, BrightTALK (Moderator)
- Alice Bonasio, Technology Author and Journalist
- Max Dawes, Partnerships & Marketing Director, Zappar
- Mickael Jordan, Co-Founder & COO, Augment
For more information on Alice Bonasio please visit:
This presentation will look at the new opportunities being opened up for the visualisation of data within both personal and collaborative 3D spaces, delivered to mobile, browser, desktop, virtual reality and social virtual world/social virtual reality environments. The pros and cons of both 3D and VR environments for the creation and sharing of data visualisations will be considered, tools which let you do dataviz in 3D and VR today presented, and future development pathways discussed.
The newest VR Intelligence survey clearly shows that the lack of engaging content is holding the industry back. On the other hand content creators need better distribution of VR/AR headsets. In comparison we can ask ourselves: 'how much would I pay and what kind of mobile phone would I buy if it would not allow me to have video calls or take pictures and share them live on my social networks'?
EF EVE™ is a live holographic streaming engine which is changing the industry by bringing real time 3D VR/AR experiences. Just imagine putting on your VR/AR glasses and in a split second traveling miles to visit your friend in New York or standing next to Ed Sheeran during his performance in Brazil.
Lets have a live demo of EF EVE™, and discuss the future of live 3D events for VR/AR.
The new age of immersive digital media is just beginning. As we start to transition from flat 2D displays of the smartphone to the immersive 3D displays of VR/AR, brands have new opportunities to leverage the power of this new medium to better tell their stories and connect with their audience.
Join this webcast with Brian Herrera, CEO of Vidi VR, a 3D VR video sharing platform, as he draws from his acute knowledge of the evolving VR media space to cover:
- The current state of the VR/AR industry
- VR/AR content Spectrum
- Choosing the right VR/AR content strategy for your brand
- Predictions for the future of mixed media
This short video provides an overview of how to integrate the DataMotion secure email platform with Salesforce. The platform allows users and developers to easily send sensitive data in and out of Salesforce in a secure manner.
Content Creation & Production that drives User Engagement because you Experience the Content.
George Egbuonu is the founder of VR eCards a VR platform and content creation tool that allows you to personalize and share a virtual reality experience instantly in the form of a VR eCard. He is a technology entrepreneur and product centric visionary with both a mechanical engineering and MBA degrees. He is also a bestselling Author and a movie producer.
This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.
As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.
Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.
She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.
Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:
• The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.
•Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.
• How to respond to and mitigate security risks faster and more reliably at a reduced cost.
Join us April 27th for a panel discussion on how to put the human first while creating for Virtual Reality. Part of the VR/AR BrightTALK Summit, our panelists will exchange on how to take user and audience in consideration during the Virtual Reality creation process.
As Virtual Reality is getting more and more exposure, it is time to highlight the right practices of designing a Virtual Reality project and see what we can do to put the human first.
- Do Virtual Reality creators consider the audience they address before/while developing their projects? Why is this crucial? How and when to do so?
- Are we more careful today to offer more accessible VR experiences than a year ago?
- How is this evolving? Do studios and creators tend to integrate more the human in the creation process?
The panel will be led by Amandine Flachs, Events and Communication manager at the Realities Centre. She will be joined by a variety of Virtual Reality leaders, including creators, game developers, agency and B/B professionals.
- Amandine Flachs, Events & Comms Manager, Realities Centre
- Tom Evans - CEO and co-founder at Trojan VR
- Komal Sable - COO at Tengio
- Doug North Cook - Creative director and co-founder at Decoder.
Join the hosts of the EMEA Software Customer Forums 2017 for a sneak peek of the exciting customer presentations and product news from our strategy and best practice-sharing event.
The EMEA Software Customer Forums are a great opportunity for IT Operations Management and Application Delivery Management practitioners to learn how their peers are utilizing HPE solutions to successfully reach technology and business objectives. Delegates will also get a preview of some new product developments from HPE Product Management and executives.
Don’t miss out – join us on this webinar for a preview of the great content we’ll be sharing in-depth at the EMEA Customer Forum in Dublin from 15-19 May, more info and registration at www.hpe-customerforums2017.com.
As the digital experience proliferates in everyday life and we begin to migrate into the new virtual reality medium, how do we create the most human and organic digital experience?
Moving forward, digital devices not only grow smaller and closer to the body, but daily use time explodes. The challenge is using design strategies around user experience to mitigate consumer pain points to allow for seamless immersion in your experience or VR product.
We will talk about how about how design must be incorporated as a process and strategy in VR builds for success.
In today's rapidly changing landscape of Virtual Reality, it can be difficult to stay on top of the plethora of technologies and use-cases for this emerging market. Joseph Radak, Course Developer at Udacity and Co-Founder of Eerie Bear Games, will share his insights on how to stay relevant in the world of VR and keep up with consumer demand - not just in gaming, but in other industries like mobile, technology, media, healthcare and more. Joseph will share trends on VR consumption, up-skilling your existing workforce for VR, and finding the right talent that will help your company excel in the rapidly changing landscape of VR.
Consumers want more mobile-friendly financial services, and they want them now -- without any security or privacy compromises. These expectations create tension in the delivery of mobile financial services and apps. What’s the best way to strike a balance between a frictionless mobile experience and the security diligence customers demand?
Learn how to answer this question for your enterprise during a webinar with Ted Eull, NowSecure VP of Risk and Privacy. Ted will apply insights from mobile security engagements with NowSecure customers in the financial services industry, explain best practices, and provide guidance on topics such as:
-- Where do you draw the line between frictionless mobile UX and authentication?
-- What constitutes good two-factor authentication for financial services apps that doesn’t hinder adoption or inconvenience users?
-- How can FFIEC guidance help enterprises develop secure financial services apps?
Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.
In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:
•Digital technology accelerators
•Security and compliance brakes
•Secure data exchange services solutions
We'll take a look at some real world success stories including:
•Turning a costly background check workflow into a profit center
•Simplified statewide financial reporting workflows
•Secure data collection for sensitive population health reporting
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the enterprise
•What cloud access management is
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.
Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.
In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.
Don't miss out!
In this webinar you'll:
* Dive into the current AI landscape, from free tools to enterprise-class options
* Learn how conversational UI and AI will transform your mobile commerce
* Understand which new platforms are right for your own commerce strategy
* Get the key points to convince your CEO and CFO to put these master class tools in your hands
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Jonathan Jarvis, CEO, Token
* Wendy Schuchart, Moderator, VentureBeat
As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.
Now in its second published release, it is being deployed in a number of projects.
Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:
• 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
• In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
• Overview of oneM2M certification(including background of the need for oneM2M certification program).
• Introduction of Certified Product (Target service and use cases are included per each company).
• An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.
-- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
-- Sookhun Jeon, Telecommunications Technology Association (TTC)
-- JaeSeung Song, Assistant Professor, Software Engineering and Security group (SESlab), Computer and Information Security Department, Sejong University
-- Dr. David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST
To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at email@example.com.
To learn more about oneM2M, visit: http://www.onem2m.org/
To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
Financial Services enterprises and quickly moving into the 21st century and adopting the BYOD, enterprise mobility and mobile workforce mentality. But with this they are unknowingly increasing the risks their companies face, creating thousands of new end-points with the potential for breaches, hacks and compromises.
Mobility teams can manage devices through EMM (Enterprise Mobility Management) software, but these platforms only go so far. Fully securing an environment from the hidden risks embedded deep in applications, and real time threats from compromised network connections and devices are threats that require a new Mobile Threat Defense strategy (as outlined by Gartner) including state of the art automation and machine learning. But how could, and should you implement this - and where do you start?
Join Domingo Guerra, President & Co-Founder of Appthority as he discusses how Fortune 1000 financial services companies are implementing measures to solve their mobile device challenges. In this session Domingo will cover:
- How to gain visibility of your mobile risks
- How leading financial services companies secure mobile use, while maintaining productivity and privacy
- How to get additional value from an existing EMM deployment while adding security coverage.
In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system.
Join Mandiant’s live webinar and hear real world experts as they discuss recent interbanking messaging system breaches, what lessons should be learnt, and how to avoid such pitfalls in the future.
A hole in the way the global email infrastructure works exposes every business to cyber-criminals. DMARC is a new security protocol that secures your email, protects your clients and improves the deliverability of every email you send.
This webinar will provide you with an overview about the DMARC protocol and the types of attack that it protects against, its email configuration and deliverability benefits and how to protect your business.
The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.
• Examine the realities of IoT data processing and analytics
• Describe the architectures needed to support the capability
• Analyze drivers and technique to secure IoT data elements
The old threat of ransomware—locking files and demanding money to release the files—is back, bigger and more dangerous than ever. In the first three months of 2016, cyber criminals used ransomware to collect $209 million from victims. The volume of attacks for that period was 10 times higher than all of 2015. And the ransomware attacks have continued to grow. In fact, security experts estimate that criminals will collect around $1 billion this year.
How can you protect your people, data and brand from those attacks? With information. Join us for this webinar and learn about:
- How ransomware works
- What to look for
- What critical safety measures can be employed to prevent a successful attack.
Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.
Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:
-- Address DevOps stakeholders' worries and concerns about integrating security testing
-- Determine the right depth of analysis for continuous mobile app security testing
-- Track mobile DevSecOps metrics over time to measure success