Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Webcasts // Mar 2011

    Webinar: Powerful Control of Privileged Users

    In this webinar learn about Privileged User Management and why organizations need it. The challenges of Privileged User Management will be discussed as well as the CA Technologies solution for overcoming them. Please watch to learn more.

    Provided By CA

  • Webcasts // Mar 2011

    IDC Webcast: Automation: Prerequisite for Cloud

    The promise and benefits of Cloud are impossible without automation. Join our moderator, Ryan Shopp and industry experts Mary Johnston Turner, Research Director - IDC and Stephen Elliot, VP Strategy - CA Technologies in an open discussion walking through the challenges, explaining pragmatic approaches to increase the odds of success...

    Provided By CA

  • Webcasts // Mar 2011

    Cracking Stuxnet, a 21st-Century Cyber Weapon

    When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: Its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target and its covert origins.

    Provided By TED Conferences

  • Webcasts // Feb 2011

    Tech Trends Forecast From CES 2011

    What does new technology really mean for small business? How do one sort out the hype from the must-have? Hear industry thought leaders share their perspectives on how trends like tablet computing and mobility will enhance the lives of small business owners, from behind the scenes at this year's Consumer...

    Provided By American Express Company

  • Webcasts // Feb 2011

    The Fruits Of Diversity

    In a webcast the authors offers a bounty of visual and aural pleasures, a museum curator and two artists describe how their work "Dissolves boundaries," in the words of moderator, often "Leading to new frontiers."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Top Five: The Best of CES

    The halls of CES are filled with plenty of new gadgets and tools for small business owners. Here are five of the best that one may want to check out.

    Provided By American Express Company

  • Webcasts // Jan 2011

    Aydogan Ozcan: Mobile Microscopes

    The presenter has discovered how to convert cell phones into microscopes by relying on shadow imaging instead of expensive optics. In time, the ability to conduct tests and detect infectious diseases by leveraging mobile technologies in resource-poor settings could transform public health.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    Webcast: Working with Big Data - and how it WILL power the Second Industrial Revolution

    Live Webcast: January 18th, 2011Time: 12:00pm ET | 9:00am PT | 16:00 GMT We are witnessing the birth of the second industrial revolution. This revolution is being fueled by the factories of the future - data factories. The early data factories are here already - Google, Facebook, Zynga, ComScore....

    Provided By Tableau Software

  • Webcasts // Jan 2011

    Webinar: Working with Big Data - and how it WILL power the Second Industrial Revolution

    Live Webcast: January 18th, 2011Time: 12:00pm ET | 9:00am PT | 16:00 GMT We are witnessing the birth of the second industrial revolution. This revolution is being fueled by the factories of the future - data factories. The early data factories are here already - Google, Facebook, Zynga, ComScore....

    Provided By Tableau Software

  • Webcasts // Jan 2011

    Episode 1 - Setting Up Wireless Security

    In this webcast, the presenters explain about how to enable security on a wireless network connection using both WEP and WPA. The presenter reveals his hair secrets and their secure.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    WiFi Hotspot Safety

    In this webcast, the presenters explain about how to be safe at Wi-Fi hotspots. They give some few pointers on how to make sure that all of their private data remain safe when using public access Wi-Fi.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    It's All Geek to Me: Wireless Internet Security

    In this webcast, the presenter explains about how secure is the average public wireless Internet hotspot? Take a look and learn more about the Internet in this video.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    Diversity Is Not Diversity Is Not Diversity

    Measuring diversity in terms of broad demographic categories such as gender, race or age fails to take into account the underlying dynamics that can play a more decisive role within groups of people - diversity in attitudes, skills, knowledge and power, for example. "It's hard to just say 'oh, there's...

    Provided By INSEAD

  • Webcasts // Jan 2011

    CRESCENT: Capgemini Consumer Products & Retail Solutions Center

    This webcast shows that today, more than ever, systems must go live quickly, with lower cost, minimal risk and measurable benefits. CRESCENT industrializes the way that we integrate complex systems for consumer products and retail companies. CRESCENT offers tools to help businesses reach their objectives more quickly, while minimizing risk...

    Provided By Capgemini

  • Webcasts // Jan 2011

    Kimberly Pace On The Art Of Business Communication

    The presenter says effective communication is one of the most valuable tools for a successful business career. A former communications consultant, the presenter led marketing and communications efforts for two international non-profit agencies based in Nashville prior to coming to Vanderbilt.

    Provided By Vanderbilt University

  • Webcasts // Jan 2011

    How to Secure Your Computer's Wireless Network

    In this Webcast, the presenter gives expert video advice on: How to secure their computer's wireless network. Whether it's a wired network or a wireless network, one want to make sure that one either have file-sharing permissions turned off or they're only accessible through an account that one have set...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Protect Your Cell Phone or PDA From Identity Theft

    In this Webcast, the presenter gives expert video advice on: how do one protect their cell phone or PDA from identity theft? Make sure that their PDA or their cellular phone is password protected, because most of one have that. It's defaulted and it just turns on and off at...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Save Money With a Wi-Fi Cell Phone

    In this Webcast, the presenter gives expert video advice on: How does a wi-fi cell phone save the money? Cell phone carriers are coming out with a new service called "UMA". UMA actually allows the customer to trade in their bucket of minutes for more minutes by using wi-fi. By...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Extend the Battery Life on Your Cell Phone

    In this Webcast, the presenter gives expert video advice on: how can one extend the battery life on the cell phone? For most cell phones, locking the keypad puts the phone into a power-save mode where none of the lights come on until one unlock the keypad. As a result,...

    Provided By Videojug

  • Webcasts // Jan 2011

    Guardly

    Guardly is the first mobile personal safety service that gives people the ability to alert family, friends and local authorities about an emergency in a single tap. Guardly uniquely allows one's responding network to collaborate with them and among themselves through mobile Web and Web incident pages, SMS, e-mail and...

    Provided By DEMO

  • Webcasts // Jan 2011

    Ken Banks: Mobile-Enabled Change

    The presenter is the founder of kiwanja.net, which helps non-profits put mobiles to work through innovative offerings like FrontlineSMS - free software enabling coordinated, many-to-many, two-way text messaging. His solutions are being used worldwide to improve communications in a variety of critical situations.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    Yasser Ansari: Networked Organisms

    The presenter self-described bio geek-turned-telecom nerd, wants to help boost eco-literacy. To do so, he has created Noah, an online platform and mobile application that allows "Curious naturalists" to contribute to ongoing scientific research through data collection and documentation efforts.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    Ben Lyon: Mobile Microcredit

    The webcast describes about the presenter who found the FrontlineSMS: credit to allow microfinance institutions to send and receive secure loan payments, track loans and develop a micro-insurance model using the ubiquitous mobile phone.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    Josh Nesbit: Mobile Healthcare

    The presenter co-founded medic mobile to bring the innovative use of mobile phones for healthcare to the developing world. A central clinic laptop runs FrontlineSMS software, enabling community health workers to use text messages to coordinate patient care, offer mobile diagnostics, and map health services.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    Erik Hersman: Mapping Crises

    The presenter is an innovator and technologist advancing the use of technology as an empowerment tool in the developing world. He is a co-founder of Ushahidi - a free, open source, Web/mobile-based platform capable of crowd-sourcing, sharing and mapping crisis information in near real time.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    James Fowler: Power of Networks

    Can the peoples social network make one fat? Affect one's mood? The speaker reveals the dynamics of social networks, the invisible webs that connect each of one to the other. The speaker recently coauthored, connected: the surprising power of the social networks and how they shape the lives.

    Provided By CC PopTech

  • Webcasts // Jan 2011

    Global Mobile Workforce

    In this Webcast, the presenter describes about global mobile workforce. The presenter is harnessing mobile phone data in emerging markets. The presenter launched txteagle, a program that enables the under-employed to earn money or phone credits by performing tasks on their cell phones. Through partnerships with over 220 mobile phone...

    Provided By CC PopTech

  • Webcasts // Dec 2010

    Working with Big Data - and how it WILL power the Second Industrial Revolution

    We are witnessing the birth of the second industrial revolution. This revolution is being fueled by the factories of the future - data factories. The early data factories are here already - Google, Facebook, Zynga, ComScore. And a lot more are coming with the explosion in sensors, data and...

    Provided By Tableau Software

  • Webcasts // Dec 2010

    How Cell Phones Save Lives in Developing Countries

    In this webcast, the presenter explains about some of the same technologies, such as cloud computing and semantic search, that make the most popular social networking applications possible are now being applied to development, education and healthcare delivery.

    Provided By 5min

  • Webcasts // Dec 2010

    We Are All Cyborgs Now

    Technology is evolving people, says Amber Case, as the people become a screen-staring, button-clicking new version of homo sapiens. The presenters now rely on "External brains" (cell phones and computers) to communicate, remember, and even live out secondary lives. But will these machines ultimately connect or conquer one? Case offers...

    Provided By TED Conferences

  • Webcasts // Nov 2010

    Why SIEM Should Be on Your 2011 Short List

    In this webcast, the presenters say about information security is in a rapid state of change. The threat landscape grows more pervasive and sophisticated each day with new attacks targeting applications, zero-day vulnerabilities, and even industrial control systems. At the same time, IT infrastructure is also in the midst of...

    Provided By NitroSecurity

  • Webcasts // Nov 2010

    Compensation: Which Model Is Right For You?

    Compensation is the single largest cost in most organizations and one of the most important factors influencing a firm's performance. Compensation can have a beneficial or disastrous impact, depending on how it is allocated.

    Provided By IESE School Of Business

  • Webcasts // Oct 2010

    Dollars & Sense: Intellectual Property

    With both individuals and businesses extending their reach online, you need to make sure your digital intellectual property is protected. Business attorney Hanna Hasl-Kelchner has some advice for a more secure IP environment.

    Provided By American Express

  • Webcasts // Oct 2010

    Healthcare: Secure, Reliable Virtual Desktops for Healthcare

    Learn how healthcare organizations can use PCoIP technology to secure patient data in the datacenter, provide flexible access throughout their facility and supply high-resolution lossless viewing capability for medical images. Key advantages of Teradici PCoIP technology include supporting any user type throughout your healthcare facility, increasing security of patient data,...

    Provided By VMware

  • Webcasts // Oct 2010

    Windows Phone 7 and Why it's a GAME-CHANGER

    This webinar gives an insider's preview of integration with Office, SharePoint, BPOS, and Exchange. Interested in gaming, music and videos? This webcast will help you to learn how there is seamless integration with Xbox and Zune. They will also review: - How Windows Phone 7 can leverage the existing infrastructure...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Small Business Rules: The Native Land Design?

    This episode of Small Business Rules is going native. In 2001, Ben Collinsworth started Native Land Design, with a lifetime of landscaping experience but no formal business training. After a rocky start, he's grown the business into a multimillion dollar enterprise with four locations across Texas and growing.

    Provided By American Express

  • Webcasts // Oct 2010

    Addicted To Taking Risks

    Dan Rosensweig, former COO of Yahoo! and current CEO of Chegg, speaks about the value of acquisitions for organizations that face operational pressures that can inhibit internal invention. Yahoo! bought other companies for either their team or their technology, but the ultimate goal of any acquisition on their radar was...

    Provided By Stanford University

  • Webcasts // Oct 2010

    Reasons To Acquire A Company

    Dan Rosensweig, former COO of Yahoo! and current CEO of Chegg, speaks about the value of acquisitions for organizations who face operational pressures that can inhibit internal invention. Yahoo! bought other companies for either their team or their technology, but the ultimate goal of any acquisition on their radar was...

    Provided By Stanford University

  • Webcasts // Oct 2010

    Managing People You Can't See

    Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.

    Provided By Citrix Online

  • Webcasts // Sep 2010

    Cutting The Chaff From The Team

    When you know that some players on your team are not a good fit, let them go quickly, says Hara CEO Amit Chatterjee. In his estimate, one-third of your employees will be passionate devotees, one-third will be willing to follow, and the remaining third will voice their discontent. Members of...

    Provided By Stanford University