la prima impressione conta ...e non hai una seconda occasione per farla - marco mantegazza -...

17
MILAN November 28 th /29 th , 2014 La prima impressione conta... e non hai una seconda occasione per farla. [email protected] Marco Mantegazza http://it.linkedin.com/in/mantegazza

Upload: codemotion

Post on 05-Jul-2015

163 views

Category:

Technology


0 download

DESCRIPTION

Nel mondo delle applicazioni per smartphone, diventa sempre più fondamentale essere rapidi nello sviluppo di nuove idee e dare un'ottima prima impressione. Vediamo come IBM BlueMix può venire incontro a queste esigenze sviluppando una semplice applicazione e distribuendola ai tester per un rapido feeback.

TRANSCRIPT

MILAN November 28th/29th, 2014

La prima impressione conta... e non hai una

seconda occasione per farla.

[email protected]

Marco Mantegazza

http://it.linkedin.com/in/mantegazza

MILAN November 28th/29th, 2014 – Marco Mantegazza

Agenda

• A bad app is bad…

• Beyond the User Interface

• IBM Bluemix and the Mobile Application Development

• End-to-end delivery process: DEMO!

• Q&A

MILAN November 28th/29th, 2014 – Marco Mantegazza

A bad app is bad…Bad mobile app experiences by

consumers:

50percent

of consumers would uninstall

your app -immediately

57percent

of employees have to duplicate a given

action

65percent

of consumers would not purchase

products from your company

Bad mobile app experiences at work:

54percent

of those involved in developing apps say

it makes business processes more

difficult

MILAN November 28th/29th, 2014 – Marco Mantegazza

Mobile is different

Development is different.

Mobile apps are different.

Management is different.

Security is different.

The customer expectation

is different!!!

MILAN November 28th/29th, 2014 – Marco Mantegazza

If good apps are the expectation, what does a great app look like?

Data rich

Secure

Relevant

Always improving

Faster

Always better

Context-aware

MILAN November 28th/29th, 2014 – Marco Mantegazza

Beyond UI

z

Operations

Back-end

Front-end

30%of the

value and

effort is

visible

(mobile

UI)

70%of the

value and

effort lies

under the

surface

Short time to market

Web? Hybrid?

Native?

Teamwork

Integrate with SDLC

Ensuring continued

support in a quick-

changing landscape

Track problems that

affect UX

Manage and enforce

app versions

Security

Data

protection

Push

upgradesApp

security

User

authentication

User engagement

Connect to back-end

Efficient and flexible

push notifications

Offline availability

B2E app distribution

Track and leverage

location

MILAN November 28th/29th, 2014 – Marco Mantegazza

How does an end-to-end delivery process looks like?

Scan & Certifyto proactively mitigate risk

Testto get the best feedback on app quality

Integratewith back-end systems,

data and cloud services

Obtain Insightto better understand your

users and their mobile experiences

Manageauthentication,

updates and versions

Deployacross app stores

Design & Developusing a holistic approach

Instrumentyour apps for analytics, security and management

MILAN November 28th/29th, 2014 – Marco Mantegazza

Failing

Fast

Seconds to

Deploy Friction

Free

Any

Language

Continuous

Integration

Mobile

Ready

Focus on

Code

Choice of

Tools

Useful

APIs

What is IBM Bluemix?

MILAN November 28th/29th, 2014 – Marco Mantegazza

Leverage the IBM Bluemix services with on-premises solutions

API from

Bluemix App

API from

On-Premises App

API from

On-Premises Data

Data Sync from

On-Premises Data

Customer’s Data Center IBM Bluemix

CastIron Live

Connector

Blumix Cloud

integration

MILAN November 28th/29th, 2014 – Marco Mantegazza

Mobile Services on IBM Bluemix

MILAN November 28th/29th, 2014 – Marco Mantegazza

IBM DevOps Services on Bluemix1. Agile development,

tracking & collaboration

2. Use your favorite

tool or web IDE

6. Continuously deliver

8. Get instantaneous

feedback from mobile apps

7. Manage and monitor your

app’s performance

4. Continuously

integrate your code

AgilePlanning

5. Scan your app for

vulnerabilities

Jazz SCM Hosted Git

Web IDE

DeliveryPipeline AppScan

Mobile & Web

ContinuousIntegration

Mobile QualityAssurance

Monitoringand Analytics

EclipseSublime

3. Use the repo you like

Auto Scaling

MILAN November 28th/29th, 2014 – Marco Mantegazza

The end-to-end delivery process: demos!

Scan & CertifyTo proactively mitigate risk

TestTest the app, provide feedback and crash reporting directly to the CCM tool

Integrate

Obtain Insightto better understand your

users and their mobile

experiences

ManageAdminister the service

environment

Deploy

Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management

InstrumentInstrument the application for testing

MILAN November 28th/29th, 2014 – Marco Mantegazza

Design & Develop

Scan & CertifyTo proactively mitigate risk

TestTest the app, provide feedback and crash reporting directly to the CCM tool

IntegrateIntegrate with BaaS for dataand push notification management

ManageAdminister the service

environment

Deploy

Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management

InstrumentInstrument the application for testing

Obtain Insightto better understand your

users and their mobile

experiences

MILAN November 28th/29th, 2014 – Marco Mantegazza

Instrument and Test the App

Scan & CertifyTo proactively mitigate risk

TestTest the app, provide feedback and crash reporting directly to the CCM tool

Integrate

ManageAdminister the service

environment

Deploy

Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management

InstrumentInstrument the application for testing

Obtain Insightto better understand your

users and their mobile

experiences

MILAN November 28th/29th, 2014 – Marco Mantegazza

Scan and Certify the App

Scan & CertifyTo proactively mitigate risk

TestTest the app, provide feedback and crash reporting directly to the CCM tool

Integrate

ManageAdminister the service

environment

Deploy

Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management

InstrumentInstrument the application for testing

Obtain Insightto better understand your

users and their mobile

experiences

MILAN November 28th/29th, 2014 – Marco Mantegazza

Manage the App

Scan & CertifyTo proactively mitigate risk

TestTest the app, provide feedback and crash reporting directly to the CCM tool

Integrate

ManageAdminister the service

environment

Deploy

Design & DevelopUse IBM DevOps Services onIBM Bluemix for change and configuration management

InstrumentInstrument the application for testing

Obtain Insightto better understand your

users and their mobile

experiences

MILAN november 28th/29th, 2014 – Giulio Santoli

© 2014 IBM Corporation

IBM Security Systems

17

www.ibm.com/security

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes

only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use

of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any

warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement

governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in

all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole

discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any

way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United

States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response

to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated

or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure

and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to

be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,

products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE

MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

ibm.biz/bluemixeurope

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes

only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use

of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any

warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement

governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in

all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole

discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any

way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United

States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response

to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated

or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure

and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to

be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,

products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE

MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.