Upload
codemotion
View
163
Download
0
Embed Size (px)
DESCRIPTION
Nel mondo delle applicazioni per smartphone, diventa sempre più fondamentale essere rapidi nello sviluppo di nuove idee e dare un'ottima prima impressione. Vediamo come IBM BlueMix può venire incontro a queste esigenze sviluppando una semplice applicazione e distribuendola ai tester per un rapido feeback.
Citation preview
MILAN November 28th/29th, 2014
La prima impressione conta... e non hai una
seconda occasione per farla.
Marco Mantegazza
http://it.linkedin.com/in/mantegazza
MILAN November 28th/29th, 2014 – Marco Mantegazza
Agenda
• A bad app is bad…
• Beyond the User Interface
• IBM Bluemix and the Mobile Application Development
• End-to-end delivery process: DEMO!
• Q&A
MILAN November 28th/29th, 2014 – Marco Mantegazza
A bad app is bad…Bad mobile app experiences by
consumers:
50percent
of consumers would uninstall
your app -immediately
57percent
of employees have to duplicate a given
action
65percent
of consumers would not purchase
products from your company
Bad mobile app experiences at work:
54percent
of those involved in developing apps say
it makes business processes more
difficult
MILAN November 28th/29th, 2014 – Marco Mantegazza
Mobile is different
Development is different.
Mobile apps are different.
Management is different.
Security is different.
The customer expectation
is different!!!
MILAN November 28th/29th, 2014 – Marco Mantegazza
If good apps are the expectation, what does a great app look like?
Data rich
Secure
Relevant
Always improving
Faster
Always better
Context-aware
MILAN November 28th/29th, 2014 – Marco Mantegazza
Beyond UI
z
Operations
Back-end
Front-end
30%of the
value and
effort is
visible
(mobile
UI)
70%of the
value and
effort lies
under the
surface
Short time to market
Web? Hybrid?
Native?
Teamwork
Integrate with SDLC
Ensuring continued
support in a quick-
changing landscape
Track problems that
affect UX
Manage and enforce
app versions
Security
Data
protection
Push
upgradesApp
security
User
authentication
User engagement
Connect to back-end
Efficient and flexible
push notifications
Offline availability
B2E app distribution
Track and leverage
location
MILAN November 28th/29th, 2014 – Marco Mantegazza
How does an end-to-end delivery process looks like?
Scan & Certifyto proactively mitigate risk
Testto get the best feedback on app quality
Integratewith back-end systems,
data and cloud services
Obtain Insightto better understand your
users and their mobile experiences
Manageauthentication,
updates and versions
Deployacross app stores
Design & Developusing a holistic approach
Instrumentyour apps for analytics, security and management
MILAN November 28th/29th, 2014 – Marco Mantegazza
Failing
Fast
Seconds to
Deploy Friction
Free
Any
Language
Continuous
Integration
Mobile
Ready
Focus on
Code
Choice of
Tools
Useful
APIs
What is IBM Bluemix?
MILAN November 28th/29th, 2014 – Marco Mantegazza
Leverage the IBM Bluemix services with on-premises solutions
API from
Bluemix App
API from
On-Premises App
API from
On-Premises Data
Data Sync from
On-Premises Data
Customer’s Data Center IBM Bluemix
CastIron Live
Connector
Blumix Cloud
integration
MILAN November 28th/29th, 2014 – Marco Mantegazza
IBM DevOps Services on Bluemix1. Agile development,
tracking & collaboration
2. Use your favorite
tool or web IDE
6. Continuously deliver
8. Get instantaneous
feedback from mobile apps
7. Manage and monitor your
app’s performance
4. Continuously
integrate your code
AgilePlanning
5. Scan your app for
vulnerabilities
Jazz SCM Hosted Git
Web IDE
DeliveryPipeline AppScan
Mobile & Web
ContinuousIntegration
Mobile QualityAssurance
Monitoringand Analytics
EclipseSublime
3. Use the repo you like
Auto Scaling
MILAN November 28th/29th, 2014 – Marco Mantegazza
The end-to-end delivery process: demos!
Scan & CertifyTo proactively mitigate risk
TestTest the app, provide feedback and crash reporting directly to the CCM tool
Integrate
Obtain Insightto better understand your
users and their mobile
experiences
ManageAdminister the service
environment
Deploy
Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management
InstrumentInstrument the application for testing
MILAN November 28th/29th, 2014 – Marco Mantegazza
Design & Develop
Scan & CertifyTo proactively mitigate risk
TestTest the app, provide feedback and crash reporting directly to the CCM tool
IntegrateIntegrate with BaaS for dataand push notification management
ManageAdminister the service
environment
Deploy
Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management
InstrumentInstrument the application for testing
Obtain Insightto better understand your
users and their mobile
experiences
MILAN November 28th/29th, 2014 – Marco Mantegazza
Instrument and Test the App
Scan & CertifyTo proactively mitigate risk
TestTest the app, provide feedback and crash reporting directly to the CCM tool
Integrate
ManageAdminister the service
environment
Deploy
Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management
InstrumentInstrument the application for testing
Obtain Insightto better understand your
users and their mobile
experiences
MILAN November 28th/29th, 2014 – Marco Mantegazza
Scan and Certify the App
Scan & CertifyTo proactively mitigate risk
TestTest the app, provide feedback and crash reporting directly to the CCM tool
Integrate
ManageAdminister the service
environment
Deploy
Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management
InstrumentInstrument the application for testing
Obtain Insightto better understand your
users and their mobile
experiences
MILAN November 28th/29th, 2014 – Marco Mantegazza
Manage the App
Scan & CertifyTo proactively mitigate risk
TestTest the app, provide feedback and crash reporting directly to the CCM tool
Integrate
ManageAdminister the service
environment
Deploy
Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management
InstrumentInstrument the application for testing
Obtain Insightto better understand your
users and their mobile
experiences
MILAN november 28th/29th, 2014 – Giulio Santoli
© 2014 IBM Corporation
IBM Security Systems
17
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
ibm.biz/bluemixeurope
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.