Instrumented Interconnecteds Intelligent

Mobile Business Insights. An IBM Mobile Blog.


 

It’s time to get back to our series on better managing your mobile application projects. So far we have covered mobile application requirements and application design, so in this post I’d like to discuss application development.

Imagine that we are leading a team of 30 new mobile developers who are working on a large-scale mobile enterprise application. What can we do to ensure the quality of the application? Bingo! It would be best if we establish proper team practices from day one. I interviewed a number of mobile developers involved in current mobile projects, and here are some team practices that have benefitted them the most.

Mobile application project management

Standardizing mobile development tools Continue Reading »

Technorati Tags: ,

Bookmark and Share
September, 1st 2014
8:33
 

I was at an internal regional technical exchange event recently, and one of the speakers mentioned how pervasive and commonplace acronyms are for IBM employees. Acronyms are part and parcel of an IBMer’s daily routine. As an IBMer I’m bombarded daily with acronyms, whether they stand for the various divisions within IBM such as SWG, STG, GTS, GBS and so forth; or for product names such as IEM, ILMT and TADDM;  or for software brands such as C&SI, AIM, BA and so on. I guess the heavy use of acronyms is to be expected from a company that is commonly known by its acronym! Multiple websites are devoted to deciphering these acronyms and jargon. Often an acronym has several definitions, so you have to be careful that you’re using the correct meaning. There is even a bot in our internal chat system that we can ask for the definitions of a particular acronym.

It is no different in the mobility space, where acronyms such as MDM, MAM and EMM are commonly used. But what do they stand for?

Mobile devices Continue Reading »

Technorati Tags: , , , , , , , ,

Bookmark and Share

I had the pleasure of attending DEF CON 22 conference in Las Vegas earlier in August 2014. I heard many interesting talks, one of which was too cool not to write about. The title was “Learn how to control every room at a luxury hotel remotely: The dangers of insecure home automation deployment” by Jesus Molina (slides available here; find Molina on Twitter @verifythentrust).

In this post I want to first introduce the talk and paraphrase some of what the speaker said. Then I’ll go on to talk about how we might better secure the kinds of infrastructures that Molina discussed. Molina opened and closed his session at DEF CON by asking this thought-provoking question: If I were to tell you that someone is able to control every appliance in your hotel room, would you move to another hotel tonight? Continue Reading »

Technorati Tags: , , , ,

Bookmark and Share

Mobile pacesetters

Mobile deployments continue to grow, driven by a variety of factors from customer service to work productivity. In fact, according to a new study just released by the IBM Center for Applied Insights, 78 percent of enterprises have deployed mobile technologies and solutions at their organization . During the next two years, over three quarters of enterprises plan to increase investments in the mobile arena.

For pacesetters—those enterprises that believe emerging technologies are critical to their business success and are adopting them ahead of competitors—it seems that the only downside to mobile is not fully committing to it. Not only do these pacesetters integrate mobile into the fabric of their enterprise, but they combine other key technologies with mobile in order to realize its full potential. One of these technologies is cloud, with 55 percent of pacesetters using cloud to deliver and use their mobile initiatives. These enterprises are four times more likely than lagging enterprises to use cloud to deliver mobile applications and functionality.

So how can you prepare your enterprise to fully realize mobile? You must take into account three factors: Continue Reading »

Technorati Tags: , ,

Bookmark and Share

Mobile app stores
The introduction of the centralized app store has proven to be a very successful software distribution model for the consumer market. However, in the enterprise this model flips things around, with users getting software directly from the producers, bypassing the information technology (IT) group.

Having worked in the IBM Cognos Mobile development team for the past several years, I’d like to share some of the challenges the app store model has introduced (both for us and our enterprise clients) and some of the best practices we’ve developed around adapting to this new world.

Software developers release directly to the users, bypassing IT. Continue Reading »

Technorati Tags: , , , ,

Bookmark and Share

Subscribe to this blog Subscribe to this blog