IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe

IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe

Publisher Description

Today, organizations engage with customers, business partners, and employees who are increasingly using mobile technology as their primary general-purpose computing platform. These organizations have an opportunity to fully embrace this new mobile technology for many types of transactions, including everything from exchanging information to exchanging goods and services, from employee self-service to customer service. With this mobile engagement, organizations can build new insight into the behavior of their customers so that organizations can better anticipate customer needs and gain a competitive advantage by offering new services.

Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational rather than incremental innovation.

This IBM® Redbooks® publication has an end-to-end example of creating a scalable, secure mobile application infrastructure that uses data that is on an IBM mainframe. The book uses an insurance-based application as an example, and shows how the application is built, tested, and deployed into production. This book is for application architects and decision-makers who want to employ mobile technology in concert with their mainframe environment.

GENRE
Computing & Internet
RELEASED
2014
26 November
LANGUAGE
EN
English
LENGTH
480
Pages
PUBLISHER
IBM Redbooks
SIZE
17.6
MB

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011