Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Sponsored By ZDNet

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Sponsored By Hewlett Packard

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Sponsored By Druva Software

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Sponsored By SAP

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Take Mobility to New Heights with Mobile Workspaces

    In this webcast, the presenter will discuss about mobilize the user's business, the user need an end-to-end mobile workspace solution. Discover how Citrix Workspace Suite is the most complete solution powering mobile workspaces today and how the user can save up to 70%.

    Provided By Citrix Systems

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software

  • Webcasts // May 2014

    Webinar: Why It's Time to Retire that Aging HR System and Embrace the Cloud!

    You need the latest workforce cost reports at your fingertips. And your organization's employees want to go mobile. But you're struggling with a system designed back in the 80s that was last upgraded years ago. In this webinar, HR leaders share the benefits of moving to the cloud.

    Provided By Workday

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    Now It's Easier Than Ever to Get Started with DCIM

    Nlyte On-Demand makes it possible for companies of any size to deploy a scalable DCIM solution without incurring large up-front costs and complexities. Based on the flagship offering Nlyte 7, Nlyte On-Demand enables organizations to begin retooling their data center practices for efficiency and cost control. In this recorded...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    On-demand Webcast: Behind the Scenes in Mobile ROI

    Understanding the value of enterprise mobile adoption is a crucial step toward improving sales and marketing ROI. Additionally, companies that implement mobile processes provide better value for customers and employees. This webcast examines the many ways enterprise mobility is impacting organizations and what they're doing to constantly measure and...

    Provided By SAP

  • Webcasts // Mar 2014

    On-demand Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Provided By Unitrends

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Provided By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Provided By Centrify

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Provided By Hewlett-Packard & Intel®

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Provided By Centrify

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Hacking the iPhone

    Apple's iPhone has made a tremendous impact on the Smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vaccinating Android

    Number of mobile applications is rising and Android still holds large market share. In this webcast, the presenter discusses about some runtime techniques and a tool will be released that offers two approaches to analyze Android applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking NFC Mobile Phones

    Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Exploiting Symbian

    SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Smart Storage Scanning for Mobile Apps - Attacks and Exploit

    Mobile application hacking and its security is becoming a major concern in today's world especially with BYOD and user's jail breaking/rooting their devices. Scanning and vulnerabilities detections are two major areas for mobile applications in current state. Attacking techniques and exploit delivery on different platform are evolving, protection is even...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Locating Mobile Phones Using SS7

    In this webcast, the presenter explains what SS7 features are exploited for locating mobile phones, how the returned information has to be interpreted and what the user can (and can't) do against being located that way without having to turn off their phone altogether.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Running Your Own GSM Network

    In this webcast, the presenter will mark the first public release of a new GPL licensed free software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Anatomy Of Smartphone Hardware

    In this webcast, the presenter will explain about the individual major building blocks and overall architecture of contemporary GSM and UMTS Smartphone. The presenter also explains the general block diagram level and then looks at actual chipsets used in mobile devices, ranging from SoC to RAM and flash memory technologies,...

    Provided By SecurityTube.net