Welcome!

Mobile IoT Authors: Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Carmen Gonzalez, Liz McMillan

Related Topics: Cloud Computing Bootcamp, Java IoT, Mobile IoT, Microservices Expo, Agile Computing, Log Management, @CloudExpo

Cloud Computing Bootcamp: Article

Why the Smart CIO Trusts in Mobile

Mobile applications are now developed as bespoke/custom pieces of software dedicated to the task in hand

This post is sponsored by The Business Value Exchange and HP Enterprise Services

Mobile is almost old news now isn't it? What more can we say about how important mobile technology is in the workplace? The visionary CIO trusts in a mobile device future with employees securely connecting to the corporate datacenter from an array of tightly locked-down devices - stop me if you've heard this one before.

Workers are "empowered" via mobile smartphones, tablets and laptops to work anywhere securely with appropriate controls and policies in place across the corporate IT stack to ensure that security is never an issue.

Malevolent maliciousness
Security vendors and even device manufacturers constantly remind us that their products are "robust" and "enterprise ready" enough to repel even the most malevolent maliciousness in whatever forms it chooses to attack.

This may all be true, but there are other reasons why mobile is a good option and a lot of it is down to software application development, data management and the arrival of the cloud computing model of service-based IT delivery.

Mobile applications are now developed as bespoke/custom pieces of software dedicated to the task in hand. What this means is that users will access connected services inside a certain level of ring-fencing, i.e., not inside a web service provided by a general-purpose browser.

Think of it as the difference between downloading a dedicated LinkedIn or Facebook application (or even a TV Guide one if you wish) rather than visiting the site itself. This type of connectivity ensures that the user is (at the very least) not subject to vulnerabilities like "cross-site requests" or perhaps even "man-in-the-browser" attacks.

The prudent reader will still note that the dedicated mobile application could still be subject to attack, but this level of specifically commissioned mobile application will at least provide one extra (arguably quite thick) layer of defense.

Welcome to partitioning
There are other reasons too why the smart CIO trusts in mobile. Tim 'TK' Keanini, CTO at Lancope, reminds us that in the world of mobile, each application is partitioned in such a way that it has only what it needs and nothing more.

This technique is known as sandboxing and it clearly manages and dictates what services and information an application will be able to access and requires the user's permission on these options before installation.

Keanini argues as follows, "Windows 8 has begun to bring this technique to the PC world, and I think in a few years the thought of an application just having free reign to anything it needs will be crazy talk. Remember, malware is just another application and, if given its own sandbox, its capabilities are greatly limited. This does not excite the cyber criminals, so they just go play somewhere else."

We know that major vendors like HP are now pushing hard to plant the influence of on-premise Application Lifecycle Management (ALM) solution to Software-as-a-Service based solutions that ultimately produce mobile-based cloud-driven resources - and this is where (arguably) some of the CIOs mobile focus now rests, i.e., in higher level management suites that have been engineered for cloud mobile futures.

Taking stock of these new (and not so new) application realities, the road ahead for mobile is positive, managed and cloud-centric. But it is also complex, multi-discipline (in terms of programming structures), multi data type (and this will cause future integration challenges), plus of course it is multi-platform. Okay so it's not going to be that easy after all, but the future may be better connected.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Blockchain is a new buzzword that promises to revolutionize the way we manage data. If the data is stored in a blockchain there is no need for a middleman - the distributed database is stored on multiple and there is no need to have a centralized server that will ensure that the transactions can be trusted. The best way to understand how a blockchain works is to build one. During this presentation, we'll start with covering the basics (hash, nounce, block, smart contracts) and then we'll crea...
History of how we got here. What IoT devices are most vulnerable? This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems explained in 6 basic steps. On the other side, protecting devices continue to be a challenging effort. Product vendors/developers and customers are all responsible for improving IoT device security. The top 10 vulnerabilities will be presented a...
As the fourth industrial revolution continues to march forward, key questions remain related to the protection of software, cloud, AI, and automation intellectual property. Recent developments in Supreme Court and lower court case law will be reviewed to explain the intricacies of what inventions are eligible for patent protection, how copyright law may be used to protect application programming interfaces (APIs), and the extent to which trademark and trade secret law may have expanded relev...
Never mind that we might not know what the future holds for cryptocurrencies and how much values will fluctuate or even how the process of mining a coin could cost as much as the value of the coin itself - cryptocurrency mining is a hot industry and shows no signs of slowing down. However, energy consumption to mine cryptocurrency is one of the biggest issues facing this industry. Burning huge amounts of electricity isn't incidental to cryptocurrency, it's basically embedded in the core of "mini...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Where many organizations get into trouble, however, is that they try to have a broad and deep knowledge in each of these areas. This is a huge blow to an organization's productivity. By automating or outsourcing some of these pieces, such as databases, infrastructure, and networks, your team can instead focus on development, testing, and deployment. Further, organizations that focus their attention on these areas can eventually move to a test-driven development structure that condenses several l...