Welcome!

Mobile IoT Authors: Zakia Bouachraoui, William Schmarzo, Liz McMillan, Elizabeth White, Yeshim Deniz

Related Topics: Mobile IoT, Microservices Expo, @CloudExpo

Mobile IoT: Blog Post

Enterprise Mobile App Development By @Exadel | @CloudExpo [#Cloud]

Identifying the obstacles in mobile app development, and overcoming them

Top Three Challenges in Enterprise Mobile App Development

Enterprises are adopting mobile technologies at an unprecedented rate. As Business News Daily recently reported, 1.3 billion workers will go mobile by 2015, and with that massive number, the need for enterprise mobile apps can only skyrocket.

With that increase, many mobile app developers will be called upon to create internal mobile enterprise apps. These apps have many requirements and considerations that differ from the typical app destined for the public app stores. In this article, we will take the top three challenges and share some tips on how to meet these challenges:

  1. Security
  2. User Interface
  3. Choosing a Development Technology

Security
This subject leads in our "Top 3" because of its indisputable importance. Here's a short list of security tips:

  • Authentication
    This is probably the most vulnerable place in the app because of the need to provide user credentials, such as login and password. In the shortened time available in rapid development, it's really challenging to implement a secure authentication routine from scratch. Integration with the enterprise's LDAP directory is usually required to ensure proper authentication, and it also offers the convenience of single-sign-on (SSO) across all enterprises apps.
  • Server-side validation
    It's easier and more reliable to implement important checks and validations on the server, rather than on the client side. Such an approach has two advantages: app performance will not be slowed down by complex validations, and the logic will be always be up-to-date because of its on a central server - bug fixes, including security fixes, can be applied immediately without the need to update the app itself, because all the logic is on the server.
  • Encrypting data
    It's always a good idea to keep all sensitive data encrypted, especially if it will be stored on the mobile device. This is usually accomplished with a secure container that protects the enterprise apps in cases where devices are lost or compromised.

It's also important to remember that security is a flexible thing. The need for it directly depends on the type of app. For example, enterprise apps like mobile shops or bank apps with bill pay need to be secured more strongly than informational apps.

User Interface
Enterprise apps are typically used by employees within the organization, so, for these apps, functionality will beat out "beauty" in importance almost every time. This isn't to say certain fundamentals shouldn't be met - aesthetics will always be important - but most often, in the case of enterprise apps, excellent usability comes before aesthetic concerns. People are using enterprise apps to be better at their jobs, and they will more deeply appreciate an app for making their job easier than for how trendy it looks.

The key to creating a successful enterprise app is to emphasize intuitiveness. One way to do this is through the use of icons. Icons can be a great foundation for creating a useful and natural mobile UI. Use them to immediately explain a button's functionality.

Also, don't forget that you can override hardware buttons (for example, Home, Back, or Menu buttons). Doing this can add more intuitiveness to your app navigation. For example, in mobile browsers, the "back" button will navigate you to the previously visited page. It's become intuitive - when you press a back button in any context, you expect to be taken to the last page you visited. You can incorporate this kind of intuitiveness into your app via those hard buttons.

Choosing Between HTML5 vs. Native
Choosing which development technology to use can be a real challenge, under any circumstances, but there are special considerations with enterprises. For many enterprises, there is a growing backlog of smaller, internally facing apps that need to be built quickly and efficiently.Before deciding what the best approach is let's look at the technology approaches.

The two main approaches are native and hybrid/HTML5. Both have their pros and cons.

Obviously, if your app is targeting only iOS, and you have the budget, time and skills, it can be built as native, with the help of Objective C (or Swift) to gain more performance and total access to native features. This is a really rare situation, however, because of Bring your Own Device (BYOD) policies. You should anticipate the need to support a variety of mobile devices.

Meanwhile, HTML5 is constantly gaining momentum and becoming increasingly popular. Gartner, Inc., a leading information technology research and advisory firm, recently confirmed this trend by going on record to say that 90% of all enterprise apps in 2015 will be HTML5 or Hybrid and only 10% will be native.

So, for these enterprise apps, all the benefits of HTML5 in terms of cost, time-to-market, and portability across platforms overshadow the diminishing advantages of native development.

For more on the HTML5 vs. Native debate, take a look at this article, published earlier this year.

This article was written on December 10, 2014, and originally appeared here.

More Stories By Fima Katz

Fima Katz is the President and CEO of Exadel, Makers of Appery.io. Fima has over 20 years of experience in the information technology industry. His technical expertise includes the design of complex, mission-critical distributed systems, and the integration of complex legacy enterprise systems into business services. Mr. Katz is a recognized authority and speaker on open source, JAVA, XML and DOA technologies and has co-authored The Essential Guide to Object Monitors (Wiley, 1999).

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...