Alpha Software Blog



New Research: Treat Mobile Apps as Products, Not Projects

Marty Resnick and Adrien Leow of Gartner Research just released a report on mobile app development with some great points. "Treat Mobile Apps as Products, Rather Than Projects, to Maximize Their Value" advises application developers to apply product management principles to optimize applications' ROI, increase their adoption and reduce end-user abandonment. They declare:
"Business as usual risks negatively affecting application adoption and user retention."

The report goes on to explain that if you don't break from business as use the app risks becoming detached from the user experience, hurting application adoption and retention by users. The caution readers that the application needs to be "economical, targeted and business-function-specific." They also remind users to remove functions that users aren't accessing and add the functions they're more likely to use. To achieve this, Gartner stresses an iterative process used in product management:

Gartner iterative product management process for app development. Source: "Treat Mobile Apps as Products, Rather Than Projects, to Maximize Their Value" September 2016

Gartner iterative product management process for app development. Source: "Treat Mobile Apps as Products, Rather Than Projects, to Maximize Their Value" September 2016



The team at Alpha Software believes that mobile and web apps should be easy to build and fast to update, so encourage an ongoing iterative process. We believe apps should be built quickly, easy for end-users to use, and should streamline and simplify everyday business processes. Our recent Alpha DevCon conference was testament to this focus.

Use the best app maker for building mobile apps.

Prev Post Image
Why Choose Alpha Anywhere? Our Customers Say It Best
Next Post Image
TechTarget At Alpha DevCon 2016: The World Has Moved to JSON

About Author

Amy Groden
Amy Groden

Amy Groden has served more than 15 years in marketing communications leadership roles at companies such as TIBCO Software, RSA Security, and Ziff-Davis. An expert in enterprise software strategy and data analytics, she developed marketing programs that helped achieve 30%+ annual growth for Spotfire analytics products and for a $1Bil, NASDAQ-listed business integration company. Her accomplishments include establishing the first co-branded technology program with CNN, a communication strategy for launching a public company on the NYSE, and leading digital transformation branding for NASDAQ-listed firms. Amy is a dedicated mentor to future industry leaders, serving as a Guest Instructor for the Sales Practicum at Babson College. She’s also served as a Healthbox Accelerator Program Mentor, a Marketing Committee Lead for the MIT Enterprise Forum of Cambridge and on the inaugural planning team for Boston TechJam. Amy currently serves on the Board of Directors for Hearts and Paws Comfort Dogs, a Massachusetts-based nonprofit. She holds an MBA from Northeastern University.

Related Posts
The Impact of AI on the Workplace: What You Need to Know
The Impact of AI on the Workplace: What You Need to Know
Top Security Concerns for Low-code and No-code Development
Top Security Concerns for Low-code and No-code Development
Low-Code/No-Code Skills Help Job Seekers Find their Ideal Jobs
Low-Code/No-Code Skills Help Job Seekers Find their Ideal Jobs

The Alpha platform is the only unified mobile and web app development and deployment environment with distinct “no-code” and “low-code” components. Using the Alpha TransForm no-code product, business users and developers can take full advantage of all the capabilities of the smartphone to turn any form into a mobile app in minutes, and power users can add advanced app functionality with Alpha TransForm's built-in programming language. IT developers can use the Alpha Anywhere low-code environment to develop complex web or mobile business apps from scratch, integrate data with existing systems of record and workflows (including data collected via Alpha TransForm), and add additional security or authentication requirements to protect corporate data.

Comment