Published on 10 Feb 2016
“ We haven't found another NoSQL database that has the intuitive tools for iPhone development that Cloudant has. ”
Jason Brooks, Ivy League university student and codeveloper of the Noteable app.
In September 2014, a team of Ivy League university students led by Jason Brooks and Minh Tri-Pham with Sachith Gullapalli and Micah Rosales entered PennApps, a weekend-long programming competition at the University of Pennsylvania. Some 1,000 students took part in the 36-hour "hackathon" where student teams learn and work together to develop an application for solving a real-world problem.
At a weekend programming competition, a team of Ivy League university students needed to quickly prototype and develop an iPhone app for digitizing handwritten notes, searching and editing text, and collaborating in real time.
The students' award-winning Noteable app harnessed IBM® MobileFirst Platform cloud software, which include the IBM Cloudant® database as a service (DaaS) and IBM Bluemix platform as a service (PaaS) solutions.
The IBM platform provides DaaS for server hosting, processing, and data management and offers easy-to-use capabilities for rapid app prototyping, data security, fault tolerance and scalability.
IBM products and services that were used in this case study.
Cloudant Data Layer Local Edition, IBM MobileFirst Platform Cloudant Data Layer Local Edition, IBM MobileFirst Platform Foundation
© Copyright IBM Corporation 2016 IBM Corporation Systems Group Route 100 Somers, NY 10589 Produced in the United States of America January 2016 IBM, the IBM logo, ibm.com, IBM MobileFirst, Cloudant and Bluemix are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.This document is current as of the initial date of publication and may be changed by IBM at any time.The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions.THE INFORMATION IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.