MicroStrategy Mobile SDK: Developing Custom Mobile Solutions

untidytonganeseΚινητά – Ασύρματες Τεχνολογίες

19 Ιουλ 2012 (πριν από 5 χρόνια και 4 μήνες)

3.827 εμφανίσεις

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

1

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

1

MicroStrategy Mobile
SDK: Developing Custom
Mobile Solutions

Presented by:
Tom Abbott

Date:
February 2, 2012


CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

2

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

2


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demo: Building a Mobile Solution


Deployment


Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

3

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

3


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demo: Building a Mobile Solution


Deployment


Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

4

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

4

App Store

Devices

Simulator

Overview: Integrated Development Environments Support
Mobile Application Development

Integrated Development Environment


IDE provides tools for coding, building, and debugging your application and has several project templates
that get you started


Debug

Deploy

Test

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

5

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

5

Development Comparison

Java
Development

Flex
Development

iOS

Development

Android
Development

Operating
System

Windows

Mac
Linux Unix

Windows

Mac
Linux

Mac

Windows
Mac Linux

Developer
Tools

Eclipse

Netbeans

Flash

Builder

Xcode

Eclipse

SDK

Java SDK

Flex SDK

iOS

SDK

Android

SDK

Dev
Membership


Oracle Dev

Adobe Dev

iOS

Development

Program

Google
Account

Compile /
Test

Browser

/ App /
Server

Flash Player /
AIR Runtime

Simulator /
Devices

Simulator

/
Devices

Deploy

Intranet / Portal /
Desktop


Browser

/
Desktop /
Mobile

Public

or
Enterprise
App Store

Public

or
Enterprise
Markets

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

6

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

6


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demo: Building a Mobile Solution


Deployment


Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

7

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

7

What does MicroStrategy Mobile SDK Ship

Out of the Box & SDK Widgets

Samples and Documentation

Rebranding MicroStrategy Mobile

MicroStrategy

Wood Works

SDK Framework

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

8

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

8


Built similar to
iOS

and Android frameworks


Packages numerous MicroStrategy features into one
library




MicroStrategy SDK Framework

SDK Framework

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

9

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

9

Mobile SDK
Framework Overview
for Running Mobile
Applications

MicroStrategy Mobile
Server

Tasks

Mobile SDK Application

Infrastructure


I/O

HTTP

Data Binding

Security

Caching

Gesture Support

Component Communication

Data Loading

Devices

Device

Local Store

Widgets

UI
Components

Utilities

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

10

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

10

Workflow for Building Mobile Applications with MicroStrategy

IDE

Import

Frameworks

MicroStrategy

Frameworks

Test / Debug

Retrieve Data
Using Tasks

App

Store /
Market

Deploy

Android

SDK

iOS

SDK

Mobile Sever

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

11

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

11


One API that can be accessed from multiple protocols,
multiple clients

MicroStrategy SOA: Task/Services Infrastructure

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

12

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

12


Ships as individual frameworks


Includes widgets as part of your app


Allows the ability to build visualizations that consume
MicroStrategy data

Out
-
of
-
the
-
Box & SDK Widgets

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

13

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

13

Samples & Documentation

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

14

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

14

Samples &
Documentation

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

15

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

15


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demo: Building a Mobile Solution


Deployment


Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

16

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

16


Rebranding MicroStrategy Application


Building Custom Visualizations /
Mash
-
ups


Linking / Embedding MicroStrategy Applications


Preconfiguring the MicroStrategy Mobile Application


Performing Checks Before Launching the Application


Top 5 Scenarios with the MicroStrategy Mobile SDK

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

17

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

17


Rebranding MicroStrategy Application


Building Custom Visualizations / Mash
-
ups


Linking / Embedding MicroStrategy Applications


Preconfiguring the MicroStrategy Mobile Application


Performing
Checks Before Launching the Application



Top 5
Scenarios with the
MicroStrategy Mobile SDK

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

18

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

18


Externalized as
references for the
application



Can be quickly
modified


Rebranding MicroStrategy Mobile


Icon and Text

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

19

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

19


Splash screen
can be re
-
referenced or
replaced

Rebranding MicroStrategy Mobile
-

Splash Screen

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

20

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

20

Running More
T
han
O
ne MicroStrategy Application
on One Device

Two icons

Splash Screen

Splash Screen

Home Page

Home Page

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

21

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

21


Rebranding MicroStrategy Application


Building Custom Visualizations / Mash
-
ups


Linking / Embedding MicroStrategy Applications


Preconfiguring the MicroStrategy Mobile Application


Performing
Checks Before Launching the Application



Top 5 Scenarios with the MicroStrategy Mobile SDK

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

22

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

22

Build
C
ustom Visualizations, Widgets, and Mash
-
ups


Image
map source included
for
:



USA


Brazil


Poland


France


Europe


World




Custom Image Maps can be
created with the MicroStrategy
Image Map Coordinates Utility


Germany


Spain


England


Japan


Singapore


Italy


CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

23

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

23

Image Map Coordinate Utility Aides Image Map Creation

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

24

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

24

Image Map Coordinate Utility Aides Image Map Creation

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

25

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

25

Build Custom Visualization


Map Mash
-
ups

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

26

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

26

Each Widget can have an Editor in MicroStrategy Web for
Configuration

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

27

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

27

Build Custom
V
isualizations and Mash
-
ups
-

Additional
Samples

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

28

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

28


Rebranding MicroStrategy Application


Building Custom Visualizations / Mash
-
ups


Linking / Embedding MicroStrategy Applications


Preconfiguring the MicroStrategy Mobile Application


Performing
Checks Before Launching the Application



Top 5 Scenarios with the MicroStrategy Mobile SDK

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

29

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

29


Any app can insert
MicroStrategy Mobile
URL API to link to
specific content
within MicroStrategy
Mobile


When clicked, the
other app will close
and MicroStrategy
app (if installed) will
open with the
specific content

MicroStrategy Mobile URL API Launches MicroStrategy
C
ontent from Other Application

Default Apps
(Apple)

Other

3
rd

party Apps


Collaboration

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

30

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

30


From MicroStrategy
Mobile, links can be
made to open
specific content on
other apps.


Features are based
on other apps
support for URL API


MicroStrategy app
will close and it will
open the other
application

Linking from a MicroStrategy App to Other Apps

Default Apps
(Apple)

Collaboration

Other

3
rd

party Apps


CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

31

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

31


Embedding MicroStrategy content within a 3
rd

party
application

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

32

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

32


Rebranding MicroStrategy Application


Building Custom Visualizations / Mash
-
ups


Linking / Embedding MicroStrategy Applications


Preconfiguring the MicroStrategy Mobile Application


Performing
Checks Before Launching the Application




Top 5 Scenarios with the MicroStrategy Mobile SDK

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

33

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

33


Embeds configuration parameters on the device


Configuration is done by the developer


App is ready to go at download


Configure:


Server


Project


Mobile Server Location


Uses the Administration Page to design the
preconfigured options

Preconfiguring the MicroStrategy Mobile
Application

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

37

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

37


Rebranding MicroStrategy Application


Building Custom Visualizations / Mash
-
ups


Linking / Embedding MicroStrategy Applications


Building Custom Write
-
back and Workflow
Applications


Performing
Checks
Before Launching the Application



Top 5 Scenarios with the MicroStrategy Mobile SDK

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

38

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

38


applicationShouldLaunch

method:


Part of the MicroStrategy Mobile workflow


Returns a Boolean value


False


Application can not launch


True


Application can launch


Error message can be set to display to an end user



Common scenarios:


Do not launch if the phone is jail broken


Only launch when an secure/encrypted Wi
-
Fi connection
exists


Only launch when device is in a geographical area


Near a state or city, such as Virginia, or Paris


N
ear client locations only



Performing Checks Before Launching the Application

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

39

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

39


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demo: Building a Mobile Solution


Deployment


Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

40

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

40


Demo: Building a Mobile Solution



Demo: Building a Mobile Solution

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

41

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

41


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demos


Deployment



Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

42

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

42

Deploying Custom MicroStrategy Mobile
Applications


Deploy the Application to the
App Store / Android Market









Deploy the Application using Enterprise Deployment



MicroStrategy
Custom Mobile
Application

MicroStrategy
Custom Mobile
Application

Business Users

Business Users

Internal
App store /
Market

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

43

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

43


Overview


What is MicroStrategy Mobile SDK


Top 5 Scenarios / Use Cases


Demos


Deployment


Summary

Agenda

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

44

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

44

What is Included in MicroStrategy Mobile SDK


Shell Project for Rebranding MicroStrategy Mobile


SDK Frameworks


Out of the Box & SDK Widgets


Samples & Documentation

Top 5 Scenarios


Rebranding the OOB MicroStrategy iPhone Application


Building Custom Visualizations


Building
Writeback

/ Workflow iPhone Applications


Linking / Embedding MicroStrategy in to 3rd party applications


Performing Checks Before Launching the Application



Summary

CONFIDENTIAL



The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

45

CONFIDENTIAL

The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This Docume
nt
Agrees That They Will Not Disclose Its Contents To

Any Third Party Or Otherwise Use This Presentation For Any Purpose Other Than An Evaluation Of MicroStrategy's Business Or It
s O
fferings. Reproduction or Distribution Is Prohibited.

45


Thanks for attending the
presentation


tabbott@microstrategy.com

Questions