Today, organizations engage with customers, business partners, and employees who are increasingly using mobile technology as their primary general-purpose computing platform. They have an opportunity to fully embrace this new mobile technology for many types of transactions, including everything from exchanging information to exchanging goods and services, from employee self-service to customer service. This mobile engagement allows organizations to build new insight into their customers’ behavior so that they can better anticipate their needs and gain a competitive advantage by offering new services.
Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disrupt or be disrupted technology.
This brings some specific challenges:
- React to a new set of user expectations about the way they interact with your company
- Deliver high-quality mobile applications quickly and efficiently
- Cope with sudden unexpected increases in mobile initiated transactions, for example when a new sales offer becomes available
- Manage a wide range of different devices and adapting the existing enterprise security framework to the unique security challenges of a mobile environment
This IBM Redbooks publication provides an end-to-end example of creating a scalable, secure mobile application infrastructure that uses data located on an IBM mainframe. The book uses an insurance-based application as an example, and shows how the application is built, tested, and deployed into production.
Table of contents
Part 1. Understanding the business context in a mobile world
Chapter 1. Business drivers for a mobile enterprise
Chapter 2. Introducing IBM MobileFirst for enterprise mobile solutions
Chapter 3. Bridging the gap from mobile to transactional systems
Chapter 4. IBM Worklight: the foundation for mobile solutions
Part 2. Architecting and planning a mobile solution
Chapter 5. Deployment model for a mobile solution on IBM System z
Chapter 6. The mobile enterprise architecture IBM System z
Chapter 7. Designing for resilience
Chapter 8. Designing for security
Part 3. Customer scenario
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors.
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.
IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer's ability to evaluate and integrate them into the customer's operational environment.