Welcome!

Mobile IoT Authors: Liz McMillan, Pat Romanski, Zakia Bouachraoui, Yeshim Deniz, Elizabeth White

Related Topics: Cloud Computing Bootcamp, Java IoT, Mobile IoT, Microservices Expo, Agile Computing, Log Management, @CloudExpo

Cloud Computing Bootcamp: Article

Why the Smart CIO Trusts in Mobile

Mobile applications are now developed as bespoke/custom pieces of software dedicated to the task in hand

This post is sponsored by The Business Value Exchange and HP Enterprise Services

Mobile is almost old news now isn't it? What more can we say about how important mobile technology is in the workplace? The visionary CIO trusts in a mobile device future with employees securely connecting to the corporate datacenter from an array of tightly locked-down devices - stop me if you've heard this one before.

Workers are "empowered" via mobile smartphones, tablets and laptops to work anywhere securely with appropriate controls and policies in place across the corporate IT stack to ensure that security is never an issue.

Malevolent maliciousness
Security vendors and even device manufacturers constantly remind us that their products are "robust" and "enterprise ready" enough to repel even the most malevolent maliciousness in whatever forms it chooses to attack.

This may all be true, but there are other reasons why mobile is a good option and a lot of it is down to software application development, data management and the arrival of the cloud computing model of service-based IT delivery.

Mobile applications are now developed as bespoke/custom pieces of software dedicated to the task in hand. What this means is that users will access connected services inside a certain level of ring-fencing, i.e., not inside a web service provided by a general-purpose browser.

Think of it as the difference between downloading a dedicated LinkedIn or Facebook application (or even a TV Guide one if you wish) rather than visiting the site itself. This type of connectivity ensures that the user is (at the very least) not subject to vulnerabilities like "cross-site requests" or perhaps even "man-in-the-browser" attacks.

The prudent reader will still note that the dedicated mobile application could still be subject to attack, but this level of specifically commissioned mobile application will at least provide one extra (arguably quite thick) layer of defense.

Welcome to partitioning
There are other reasons too why the smart CIO trusts in mobile. Tim 'TK' Keanini, CTO at Lancope, reminds us that in the world of mobile, each application is partitioned in such a way that it has only what it needs and nothing more.

This technique is known as sandboxing and it clearly manages and dictates what services and information an application will be able to access and requires the user's permission on these options before installation.

Keanini argues as follows, "Windows 8 has begun to bring this technique to the PC world, and I think in a few years the thought of an application just having free reign to anything it needs will be crazy talk. Remember, malware is just another application and, if given its own sandbox, its capabilities are greatly limited. This does not excite the cyber criminals, so they just go play somewhere else."

We know that major vendors like HP are now pushing hard to plant the influence of on-premise Application Lifecycle Management (ALM) solution to Software-as-a-Service based solutions that ultimately produce mobile-based cloud-driven resources - and this is where (arguably) some of the CIOs mobile focus now rests, i.e., in higher level management suites that have been engineered for cloud mobile futures.

Taking stock of these new (and not so new) application realities, the road ahead for mobile is positive, managed and cloud-centric. But it is also complex, multi-discipline (in terms of programming structures), multi data type (and this will cause future integration challenges), plus of course it is multi-platform. Okay so it's not going to be that easy after all, but the future may be better connected.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The Master of Science in Artificial Intelligence (MSAI) provides a comprehensive framework of theory and practice in the emerging field of AI. The program delivers the foundational knowledge needed to explore both key contextual areas and complex technical applications of AI systems. Curriculum incorporates elements of data science, robotics, and machine learning-enabling you to pursue a holistic and interdisciplinary course of study while preparing for a position in AI research, operations, ...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...