Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Sponsored By Druva Software

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Sponsored By SAP

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // Oct 2010

    How to use TCO to build a business case for Unified Communications

    Discover how to provide quantifiable bottom-line proof to support a unified communications purchase.

    Sponsored By ShoreTel

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software

  • Webcasts // May 2014

    Webinar: Why It's Time to Retire that Aging HR System and Embrace the Cloud!

    You need the latest workforce cost reports at your fingertips. And your organization's employees want to go mobile. But you're struggling with a system designed back in the 80s that was last upgraded years ago. In this webinar, HR leaders share the benefits of moving to the cloud.

    Provided By Workday

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    Now It's Easier Than Ever to Get Started with DCIM

    Nlyte On-Demand makes it possible for companies of any size to deploy a scalable DCIM solution without incurring large up-front costs and complexities. Based on the flagship offering Nlyte 7, Nlyte On-Demand enables organizations to begin retooling their data center practices for efficiency and cost control. In this recorded...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    On-demand Webcast: Behind the Scenes in Mobile ROI

    Understanding the value of enterprise mobile adoption is a crucial step toward improving sales and marketing ROI. Additionally, companies that implement mobile processes provide better value for customers and employees. This webcast examines the many ways enterprise mobility is impacting organizations and what they're doing to constantly measure and...

    Provided By SAP

  • Webcasts // Mar 2014

    On-demand Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Provided By Unitrends

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Provided By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Provided By Centrify

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Provided By Hewlett-Packard & Intel®

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Provided By Centrify

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Hacking the iPhone

    Apple's iPhone has made a tremendous impact on the Smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vaccinating Android

    Number of mobile applications is rising and Android still holds large market share. In this webcast, the presenter discusses about some runtime techniques and a tool will be released that offers two approaches to analyze Android applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking NFC Mobile Phones

    Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Exploiting Symbian

    SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Smart Storage Scanning for Mobile Apps - Attacks and Exploit

    Mobile application hacking and its security is becoming a major concern in today's world especially with BYOD and user's jail breaking/rooting their devices. Scanning and vulnerabilities detections are two major areas for mobile applications in current state. Attacking techniques and exploit delivery on different platform are evolving, protection is even...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Locating Mobile Phones Using SS7

    In this webcast, the presenter explains what SS7 features are exploited for locating mobile phones, how the returned information has to be interpreted and what the user can (and can't) do against being located that way without having to turn off their phone altogether.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Running Your Own GSM Network

    In this webcast, the presenter will mark the first public release of a new GPL licensed free software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Anatomy Of Smartphone Hardware

    In this webcast, the presenter will explain about the individual major building blocks and overall architecture of contemporary GSM and UMTS Smartphone. The presenter also explains the general block diagram level and then looks at actual chipsets used in mobile devices, ranging from SoC to RAM and flash memory technologies,...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Analyzing RFID Security

    RFID tags and contact-less smart cards are regularly criticized for their lack of security. While many RFID tags have weaknesses, the security level of different tags varies widely. Using the Mifare classic cards as an example, the presenter illustrate the complexity of RFID systems and discuss different attack vectors.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Short Attention Span Security

    In this webcast, the presenter will explain about script injection in flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors, Auto-WEP key cracking with ITX, porting network security tools to the iPhone. Along with this, the presenter can make some code available for the hex editor, a bunch...

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Provided By Centrify

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River

  • Webcasts // Nov 2013

    The On Demand Workforce: Accelerating Performance with Tablet Solutions

    We live in an "on demand" world where customers have instant access to critical information on every product and service they consider purchasing. This ubiquitous "awareness" creates a highly educated market that expects quality, simplicity and convenience at all times. To effectively meet the needs of this highly dynamic...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Hands-on with ServiceNow: An In-Depth Demo

    We will show you the power of the ServiceNow single system of record through some easy-to-follow demonstrations. This webinar includes demonstrations of: Incident, Problem and Change Management Service Catalog & Self Service Performance Analytics

    Provided By ServiceNow

  • Webcasts // Nov 2013

    The Now State of IT

    Join Craig McDonogh and Rob Phillips for a live demonstration of what can happen when ServiceNow is used across an enterprise. You'll see representative examples from the CIO to the Facilities Manager and everyone in between.

    Provided By ServiceNow