The mobile space presents large and varied opportunities for our customers including the business-to-enterprise benefits to an organization of increasing worker productivity, improving processing times, and efficiencies gained through extending existing applications to mobile workers and customers. In addition, mobile offers opportunities in the business-to-consumer or B2C space with benefits such as improved customer satisfaction, opportunities to deepen customer engagement and drive increased sales and levels of customer service allowing them to differentiate themselves.
1 – Dispatching notifications by polling back-end apps or receiving back-end-originated events 2 – Uniform server-side API for pushing notifications via Apple, Android, BlackBerry and SMS 3 – Maintaining push state of each user and device details 4 – Dispatching the notification via the appropriate notification service 5 – Uniform client-side API for subscribing to notifications and handling them on the device 6 – Monitoring and controlling notification delivery; Statistics of notification delivery
From the Application Center console you can: Upload different versions of Android and iOS applications. Remove unwanted applications. Control access to applications. Access to the applications stored in the Application Center can be controlled from the Application Center console. Each application is associated with the list of people that can install the application. View feedback that mobile users have sent about an application. Obtain information about applications installed on a device. Make an application inactive so that it is not visible in the available applications for download. From the mobile client you can: List available mobile applications. Install a new application on a device. Send feedback about an application. The Application Center supports applications for Android and iOS devices. Therefore, the mobile client comes in two versions: an Android and an iOS version. These mobile applications are built on the Worklight® platform. You will find instructions in this document about how to configure the Application Center server-side component on various Java™ application servers after IBM Worklight is installed, as well as how to build Worklight applications for the Application Center client.
Icon sources Woman: http://www.iconfinder.com/icondetails/3698/128/female_lady_user_woman_icon Car: http://www.iconfinder.com/icondetails/60237/128/car_transportation_vehicle_icon Pizza: http://www.iconfinder.com/icondetails/34958/24/pizza_icon Restaurant: http://www.iconfinder.com/icondetails/91829/128/shop_icon Truck: http://www.iconfinder.com/icondetails/15247/128/lorry_transport_transportation_truck_vehicle_icon Blue signal: http://www.iconfinder.com/icondetails/15239/128/free_wi-fi_gprs_radio_signal_wi-fi_wifi_wireless_icon Shopping bag: http://www.iconfinder.com/icondetails/47686/128/bag_shopping_icon Man: http://www.iconfinder.com/icondetails/56299/128/anonymous_male_man_user_icon Red sale coupon: http://www.iconfinder.com/icondetails/67721/128/8_coupon_sale_table_icon Beige sale coupon: http://www.iconfinder.com/icondetails/91828/128/sale_icon Smart card: http://www.iconfinder.com/icondetails/47539/128/card_contact_credential_id_identification_phonebook_profiles_icon Hospital: http://www.iconfinder.com/icondetails/81018/64/hospital_icon Doctor: http://www.iconfinder.com/icondetails/46731/32/doctor_female_lady_woman_icon Sattelite: http://www.iconfinder.com/icondetails/85761/30/satellite_icon Building: http://www.iconfinder.com/icondetails/95071/46/building_icon Dollar sign: http://www.iconfinder.com/icondetails/12821/32/%24_bank_cash_dollar_money_icon QR code created with http://2dbarcode.innovate.ibm.com/urlbarcode#; leading to http://www-01.ibm.com/software/mobile-solutions/worklight/ Hotel check-in ·Person made a registration at Hotel Chain ·Person landed at airport, gets a notification from the Hotel Chain to start the app (base on his expected time or arrival as logged as part of the registration) ·When approaching the hotel, gets an Auto Check In button, showing reservation details ·Person clicks button to check in ·If person has Platinum status, shift manager gets notification to greet the person ·When entering the hotel door, shift manager gets notification that person arrives ·Person approaches kiosk or a fast check-in lane to get key, showing bar code on app to get the key ·App shows upgrade features (better room, room service) Trucks arriving a warehouse ·Driver scans QR code with shipment using Warehouse's app ·Warehouse's app tracks truck ·Operations HQ tracks track location ·Warehouse can direct truck to the appropriate dock to unload and provide better and faster service ·Warehouse can know if driver is being delayed Person entering a mall ·Person enters a mall and scans a QR code ·QR code opens mall app and registers the person + his location at the mall's server ·App presents to person interesting and relevant information: promotions, new points of interest in the mall, events in the mall ·Person scans QR codes when entering particular shops to get particular coupons ·Application can collect the location of the person within the mall (based on the scanned QR Codes) and can track the coupons consumed by the person). Application can also track user's location based on available wifi signals in the mall ·Mall management can analyze the information to track movement patterns of people in the mall; visited businesses; congestions Hospital Physician ·While in Hospital, authorized doctor on shift, being called to assist in emergency in a different building in the campus ·Using single-factor authentication, all app features are available, full data access and storage ·While in coffee ship, in remote alert, being called to advise regarding a certain patient ·Using multi-factor authentication, certain app features are available, all data access is strongly encrypted
Geo-location data is one of the most powerful differentiators of mobile apps. With it, organizations can transform marketing, operations and other business processes by delivering content and other business actions when and where it is needed by customers and employees. Yet because geo-location coordinates must be constantly polled to understand where a mobile device is located, it creates a stream of geographic information that is difficult to manage without exhausting resources such as battery and network. Worklight 6.0 provides a new geo-location toolkit that allows developers to efficiently collect geo-location data within the mobile app without exhausting mobile resources such as battery and network. The new toolkit provides organizations with a practical way to trigger business actions based on geographic data and to analyze it to gain business and operational insight on application usage. * Location data can be based on GPS and Wifi coordinates * Triggers can be created when user reaches a point of interest, or enters or exits a region (geo-fencing) * Developers can set policies for acquiring geo data and sending it in batch to control battery and network utilization
New! Embedded functional testing The accelerated delivery cycles of mobile applications requires fast and effective test cycles. Whether you are developing native, or hybrid applications, you need to validate that mobile apps work as expected across multiple platforms and hundreds of devices in market at any time – each with its own form factor. Until now, accomplishing this task required teams to undertake tedious and time-consuming manual test processes on every target platform and device. This typically involved creating a list of user actions and expected responses, codifying these test cases in spreadsheets or text documents, and laboriously (and manually) running the test scenarios on all target platforms and devices, one test and one device at a time. Often companies lack the time to properly test their apps, with mobile’s accelerated pace of change – ultimately leading to lack of testing, poorly performing software and inevitably, customer frustration and lack of confidence. Five app stars can become one star apps overnight when poorly performing software erodes consumer confidence. With IBM Worklight 6.0, we have replaced much of this tedious and time-consuming testing by providing the industry’s first integrated, cross-platform mobile app testing capability. Here’s how it works. Either developers or testers can simply press a button to record a sequence of actions on a mobile device. Once the recording has been captured, it becomes the basis of an intelligent, resilient and code-less test case that can be played back on demand on any iOS or Android device within the same OS family – and even on simulated devices. This capability allows organizations to test faster, at lower cost, and more methodically – leading to higher quality apps, delivered to consumers faster, and at lower cost. This embedded functional testing capability is not an upsell, but an integrated component within IBM Worklight 6.0. IBM Worklight 6.0 provides exceptional value on a standalone basis – and can be upgraded to Rational Test Workbench to gain the added advantages of service virtualization, multi-tier testing and automated batch and regression testing. Integration with the IBM Mobile Development Lifecycle Solution provides traceability across requirements and defects for full visibility and control of the software delivery lifecycle.
IBM secure the mobile enterprise with a framework mapped to a comprehensive integrated security solution set…. AT THE DEVICE IBM Endpoint Manager for Mobile delivers data security on the mobile device. It enforces the compliance of device configurations with enterprise security policies and employs platform facilities to enforce data encryption. IBM Hosted Mobile Device Security Management is a turnkey software-as-a service (SaaS) solution that provides assurance of data security and policy compliance with anti-malware IBM Worklight offers developers application-level data security by providing facilities with the tools needed to encrypt their applications’ data OVER THE NETWORK & ENTERPRISE IBM Security Access Manager for Mobile protects access to enterprise resources by authenticating and authorizing mobile users and their devices. also integrates with IBM Worklight to deliver seamless user and application security. IBM WebSphere DataPower message protection and XML firewall capabilities guarantee the integrity of message content IBM QRadar offers a unified collection, aggregation and analysis architecture facilitating the consumption of security logs from IBM Worklight; security events from IBM Endpoint Manager for Mobile Devices and IBM Access Manager for Mobile; IBM AppScan app vulnerabilities. IBM Lotus® Mobile Connect enables secure encrypted connectivity over non-secure networks and infrastructure from mobile devices to backend systems FOR THE MOBILE APP IBM Security AppScan detects vulnerabilities in mobile web applications, in the web elements of hybrid mobile applications and in Android applications through static analysis during development IBM WebSphere DataPower protect application programming interface calls. IBM Worklight enable organizations to efficiently develop, deliver and run safe HTML5, hybrid and native mobile applications with direct updates and application validation