Answer & Explanation:Q1. Respond to the following
questions/scenarios below and post an original thread in this week’s discussion
forum – 400 – 500 words.
What are some of the challenges
organizations face with mobile computing and mobile applications?What are some of the promises of
mobile computing and mobile applications to the enterprise?
Q2. Write a two Page Whitepaper on the
challenges with Enterprise Mobile Applications. You should explain some of the
current challenges faced by enterprises using mobile application to extend the
enterprise. You should also offer suggestion on how to address those challenges
using examples of modern mobile solutions/designs.
For an overview of the purpose and
general format of a Whitepaper, visit the following URL:
https://owl.english.purdue.edu/owl/owlprint/546/
Text Book for Reference:
Mobile Strategy: How Your Company Can
Win by Embracing Mobile Technologies
ISBN: 9780133094916
Chapters 1-3
Q1: Dead line – 12 hours
Q2: Deadline – 24 hours
I have attached the Textbook in the Document. for your reference. mobile_strategies_how_your_company_can_win_by_embracing_mobile_technologies_pdf_version.pdf
mobile_strategies_how_your_company_can_win_by_embracing_mobile_technologies_pdf_version.pdf
Unformatted Attachment Preview
Order Mobile Strategy
from IBM Press and
Save 35%
Navigate the Mobile Landscape
with Confidence and Create a
Mobile Strategy That Wins in
the Market Place
Go to ibmpressbooks.com/title/0133094960
and enter the discount code IBMMOBILE*
during check out to save 35% off the book
or eBOOK**.
Want both? Get the “Best Value” eBook/Print
book bundle for even more savings
(no discount code required).
Coverage includes
t Understanding the profound implications and
challenges of consumerized IT in the mobile
space
t Uncovering powerful new opportunities to
drive value from mobile technology
t Transforming “systems of record” to
“systems of engagement” that fully
reflect context and intelligence
t Identifying proven patterns for delivering
common mobile capabilities in operations,
commerce, collaboration, and marketing
t Choosing mobile data protection, security,
and management options: wrappers,
containers, virtualization, mobile Software
Development Kits (SDKs), virtual private
networks (VPNs), Mobile Device Management
(MDM), Mobile Application Management
(MAM), and anti-malware
t Managing security threats related to lost/
stolen devices, insecure Wi-Fi, and built-in
cameras
t Handling the “app store” distribution model
and managing updates
t Using mobile middleware to support multiple
platforms and back-end connectivity with less
complexity
t Building and integrating high-quality mobile
apps—and getting useful customer feedback
to improve them
t Addressing international considerations and
emerging markets
t Mastering methodologies for successfully
and rapidly executing mobile projects
t Converging mobile, cloud, social, and big data
into a single high-value IT delivery platform
*Discount is applied to list price and is not valid on the already discounted eBook/Print book bundle
**eBook files provided include: EPUB, PDF, and MOBI
5IJT CPPL JT BMTP BWBJMBCMF BU t “NB[PO DPN t CO DPN t 4BGBSJ #PPLT 0OMJOF
Related Books of Interest
Developing and Hosting
Applications on the Cloud
By Alexander Amies, Harm Sluiman,
Qiang Guo Tong, and Guo Ning Liu
The Business of IT
How to Improve Service
and Lower Costs
By Robert Ryan and Tim Raducha-Grace
ISBN: 0-13-306684-3
ISBN: 0-13-700061-8
The promise of cloud computing is that
centralization, standardization, and automation will simplify user experience and reduce
costs. However, achieving these benefits
requires a new mind set. Developing and
Hosting Applications on the Cloud covers
these aspects of application development and
operation and provides practical guidance,
giving numerous code examples and demonstrations of system utilities for deployment,
security, and maintenance.
Drive More Business Value from IT…and Bridge the
Gap Between IT and Business Leadership
This title makes special reference to the IBM
SmartCloud Enterprise, but the principles
explained are general and useful to anyone
planning to automate management of IT
infrastructure using the cloud. Developers using cloud management application programming, architects planning projects, or others
wanting to automate management of IT
infrastructure will value this end to end story
for why they would want to develop a cloud
application, how to do it, and how to make it
part of their business.
IT organizations have achieved outstanding
technological maturity, but many have been slower
to adopt world-class business practices. This book
provides IT and business executives with methods
to achieve greater business discipline throughout
IT, collaborate more effectively, sharpen focus
on the customer, and drive greater value from IT
investment. Drawing on their experience consulting with leading IT organizations, Robert Ryan and
Tim Raducha-Grace help IT leaders make sense
of alternative ways to improve IT service and lower
cost, including ITIL, IT fi nancial management,
balanced scorecards, and business cases. You’ll
learn how to choose the best approaches to
improve IT business practices for your environment
and use these practices to improve service quality,
reduce costs, and drive top-line revenue growth.
Sign up for the monthly IBM Press newsletter at
ibmpressbooks/newsletters
Related Books of Interest
The Art of Enterprise
Information Architecture
A Systems-Based Approach for
Unlocking Business Insight
By Mario Godinez, Eberhard Hechler, Klaus
Koenig, Steve Lockwood, Martin Oberhofer,
and Michael Schroeck
ISBN: 0-13-703571-3
Architecture for the Intelligent Enterprise:
Powerful New Ways to Maximize the
Real-time Value of Information
The New Era of Enterprise
Business Intelligence:
Using Analytics to Achieve a Global
Competitive Advantage
By Mike Biere
ISBN: 0-13-707542-1
A Complete Blueprint for Maximizing the
Value of Business Intelligence in the
Enterprise
Tomorrow’s winning “Intelligent Enterprises”
will bring together far more diverse sources
of data, analyze it in more powerful ways, and
deliver immediate insight to decision-makers
throughout the organization. Today, however,
most companies fail to apply the information
they already have, while struggling with the
complexity and costs of their existing
information environments.
The typical enterprise recognizes the immense potential of business intelligence (BI)
and its impact upon many facets within the
organization–but it’s not easy to transform
BI’s potential into real business value. Top BI
expert Mike Biere presents a complete blueprint for creating winning BI strategies and
infrastructure, and systematically maximizing the value of information throughout the
enterprise.
In this book, a team of IBM’s leading
information management experts guide you
on a journey that will take you from where
you are today toward becoming an “Intelligent
Enterprise.”
This product-independent guide brings
together start-to-finish guidance and practical
checklists for every senior IT executive,
planner, strategist, implementer, and the
actual business users themselves.
Listen to the author’s podcast at:
ibmpressbooks.com/podcasts
Visit ibmpressbooks.com
for all product information
Related Books of Interest
Mining the Talk
Unlocking the Business Value in
Unstructured Information
Spangler, Kreulen
ISBN: 0-13-233953-6
Enterprise Master
Data Management
An SOA Approach to Managing
Core Information
By Allen Dreibelbis, Eberhard Hechler,
Ivan Milman, Martin Oberhofer,
Paul Van Run, and Dan Wolfson
ISBN: 0-13-236625-8
The Only Complete Technical Primer
for MDM Planners, Architects, and
Implementers
Enterprise Master Data Management provides an authoritative, vendor-independent
MDM technical reference for practitioners:
architects, technical
analysts, consultants, solution designers,
and senior IT decision makers. Written
by the IBM® data management innovators who are pioneering MDM, this book
systematically introduces MDM’s key
concepts and technical themes, explains
its business case, and illuminates how it
interrelates with and enables SOA.
Drawing on their experience with
cutting-edge projects, the authors
introduce MDM patterns, blueprints,
solutions, and best practices published
nowhere else—everything you need to
establish a consistent, manageable set
of master data, and use it for competitive
advantage.
Sign up for the monthly IBM Press newsletter at
ibmpressbooks/newsletters
Is Your Company Ready for
Cloud?
Choosing the Best Cloud Adoption
Strategy for Your Business
Isom, Holley
ISBN 0-13-259984-8
Get Bold
Using Social Media to Create a
New Type of Social Business
Carter
ISBN 0-13-261831-1
IBM Cognos 10 Report
Studio
Practical Examples
Draskovic, Johnson
ISBN-10: 0-13-265675-2
Data Integration Blueprint
and Modeling
Techniques for a Scalable and
Sustainable Architecture
Giordano
ISBN: 0-13-708493-5
This page intentionally left blank
Mobile Strategy
This page intentionally left blank
Mobile Strategy
How Your Company Can Win
by Embracing Mobile Technologies
Dirk Nicol
IBM Press
Pearson plc
Upper Saddle River, NJ • Boston • Indianapolis • San Francisco
New York • Toronto • Montreal • London • Munich • Paris • Madrid
Cape Town • Sydney • Tokyo • Singapore • Mexico City
ibmpressbooks.com
The author and publisher have taken care in the preparation of this book, but make no
expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or
arising out of the use of the information or programs contained herein.
© Copyright 2013 by International Business Machines Corporation. All rights reserved.
Note to U.S. Government Users: Documentation related to restricted right. Use, duplication,
or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM
Corporation.
IBM Press Program Managers: Steven M. Stansel, Ellice Uffer
Cover design: IBM Corporation
Associate Publisher: Dave Dusthimer
Marketing Manager: Stephane Nakib
Executive Editor: Mary Beth Ray
Publicist: Andrea Bledsoe
Senior Development Editor: Christopher Cleveland
Technical Editors: Vijay Dheap, Christopher Pepin
Managing Editor: Kristy Hart
Designer: Alan Clements
Project Editor: Jovana Shirley
Copy Editor: Apostrophe Editing Services
Indexer: Cheryl Lenser
Compositor: Nonie Ratcliffe
Proofreader: Jess DeGabriele
Manufacturing Buyer: Dan Uhrig
Published by Pearson plc
Publishing as IBM Press
IBM Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For
more information, please contact
U. S. Corporate and Government Sales
1-800-382-3419
corpsales@pearsontechgroup.com.
For sales outside the U. S., please contact
International Sales
international@pearson.com.
The following terms are trademarks or registered trademarks of International Business
Machines Corporation in the United States, other countries, or both: IBM, the IBM Press
logo, developerWorks, and Lotus. Worklight is a trademark or registered trademark of
Worklight, an IBM Company. A current list of IBM trademarks is available on the web at
“copyright and trademark information” as www.ibm.com/legal/copytrade.shtml.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates. Microsoft, Windows, and ActiveSync are trademarks of Microsoft
Corporation in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
The Library of Congress cataloging-in-publication data is on file.
All rights reserved. This publication is protected by copyright, and permission must be
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying,
recording, or likewise. For information regarding permissions, write to:
Pearson Education, Inc.
Rights and Contracts Department
501 Boylston Street, Suite 900
Boston, MA 02116
Fax (617) 671-3447
ISBN-13: 978-0-13-309491-6
ISBN-10: 0-13-309491-X
Text printed in the United States on recycled paper at R.R. Donnelley in Crawfordsville,
Indiana.
First printing April 2013
To Phyllis and Bruce Nicol for teaching me perseverance.
And to my wife Joy and sons, Luke, Caleb, and Isaiah
for their love and support.
Contents
1
Introducing Mobile Enterprise . . . . . . . . . . . . . . . . . . . . . . . 1
Mobile Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
The Disruption of Smartphones and Tablets . . . . . . . . . . . 5
Catalysts for Disruption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Implications of the Consumerization of IT . . . . . . . . . . . . 9
BYOD: Bring Your Own Device to Work . . . . . . . . . . . . 11
A Preview of Enterprise Mobility Strategy . . . . . . . . . . . . 13
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Endnotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Additional Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2
Defining Business Value . . . . . . . . . . . . . . . . . . . . . . . . . . 17
A Brief History of the Smartphone:
The Power of Context, Intelligence,
and Engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
App Revolution: Bringing Together
Context, Intelligence, and Engagement
While Driving End User Value . . . . . . . . . . . . . . . . . . . . . 21
Contextual Information: Key Ingredient
to Improving Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Mobile Intelligence: Ubiquitous Computing
and Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Engagement: Weaving into Daily Life . . . . . . . . . . . . . . . . . . . . . . . 23
How the Mobile App Enters into Lives
to Add Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
xi
Mobile Strategy
xii
How Your Company Can Win by Embracing Mobile Technologies
Defining Goals Based on Business Value . . . . . . . . . . . . . 27
B2E or B2B Value Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
B2C Value Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Thinking Through Mobile App Value . . . . . . . . . . . . . . . 30
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Endnotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Additional Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3
Mobile Business Challenges . . . . . . . . . . . . . . . . . . . . . . . 35
Mobile Application Development Challenges . . . . . . . . 36
Developing for Multiple Mobile Platforms . . . . . . . . . . . . . . . . . . . 37
Delivering High-Quality Apps That Engage
Users and Meet Business Objectives . . . . . . . . . . . . . . . . . . . . . . . . 40
Connectivity to Back-End Systems and Data . . . . . . . . . . . . . . . . . 40
Meeting Accelerated Time-to-Market Requirements . . . . . . . . . . . . . 41
Integration with Existing Development Processes . . . . . . . . . . . . . . . 42
Security and Management . . . . . . . . . . . . . . . . . . . . . . . . . 43
Management and Post-Deployment Control of Apps . . . . . . . . . . . . 46
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
4
The Mobile Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
A Mobile Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Mobile App Becomes the Fundamental
Value Delivery Vehicle . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Mobile Development, Security, Management,
and Business Transformation. . . . . . . . . . . . . . . . . . . . . . . 57
Mobile Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Management and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Mobile Business Transformation . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5 Mobile Development . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Speed and Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Diversity of Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
xiii
Contents
Rethinking the Development Process
for Radical Speed and Quality . . . . . . . . . . . . . . . . . . . . . 73
Mobile Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Continuous Experience Management . . . . . . . . . . . . . . . 80
Types of Mobile Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Native Mobile Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Mobile Web Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Mobile Toolkits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
HTML5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Future of HTML5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Hybrid Mobile Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Mobile Application Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Strategic Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Mobile Connectivity and Integration . . . . . . . . . . . . . . . . 95
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Endnotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Additional Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
6
Mobile Security and Management . . . . . . . . . . . . . . . . . . . 99
Mobile Has Unique Characteristics
That Impact Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Mobile Devices Are Used Differently Than PCs . . . . . . 100
Enterprise Security Requirements. . . . . . . . . . . . . . . . . . 102
Mobile Device Management and Security . . . . . . . . . . . . . . . . . . . 102
Mobile Network Management and Security . . . . . . . . . . . . . . . . . 103
Mobile Application Management and Security . . . . . . . . . . . . . . . 103
Mobile Security and Management Consideration . . . . . 104
Mobile Device Management and Security . . . . . . . . . . . 106
MDM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Mobile Threat Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Mobile Network Management and Security. . . . . . . . . . 118
Mobile Network Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Mobile Identity and Access Management . . . . . . . . . . . . . . . . . . . 120
Mobile Application Management and Security . . . . . . . 126
Application Security Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
App Security Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Mobile Strategy
xiv
How Your Company Can Win by Embracing Mobile Technologies
Enterprise App Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Mobile Information Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
The Adaptive Mobile Security Approach . . . . . . . . . . . . 144
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Additional Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
7
Mobile Business Transformation . . . . . . . . . . . . . . . . . . . 149
Mobile Business Transformation. . . . . . . . . . . . . . . . . . . 150
Delivering a Mobile Transformation:
Extending Existing Systems to Mobile Employees
and Customers Through Context, Engagement,
and Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Mobile Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Mobile Engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Mobile Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
SoCloDaMo: Co …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more