Welcome!

Mobile IoT Authors: Elizabeth White, Zakia Bouachraoui, Pat Romanski, Maria C. Horton, Yeshim Deniz

Related Topics: Mobile IoT, Microservices Expo, @CloudExpo

Mobile IoT: Blog Post

Enterprise Mobile App Development By @Exadel | @CloudExpo [#Cloud]

Identifying the obstacles in mobile app development, and overcoming them

Top Three Challenges in Enterprise Mobile App Development

Enterprises are adopting mobile technologies at an unprecedented rate. As Business News Daily recently reported, 1.3 billion workers will go mobile by 2015, and with that massive number, the need for enterprise mobile apps can only skyrocket.

With that increase, many mobile app developers will be called upon to create internal mobile enterprise apps. These apps have many requirements and considerations that differ from the typical app destined for the public app stores. In this article, we will take the top three challenges and share some tips on how to meet these challenges:

  1. Security
  2. User Interface
  3. Choosing a Development Technology

Security
This subject leads in our "Top 3" because of its indisputable importance. Here's a short list of security tips:

  • Authentication
    This is probably the most vulnerable place in the app because of the need to provide user credentials, such as login and password. In the shortened time available in rapid development, it's really challenging to implement a secure authentication routine from scratch. Integration with the enterprise's LDAP directory is usually required to ensure proper authentication, and it also offers the convenience of single-sign-on (SSO) across all enterprises apps.
  • Server-side validation
    It's easier and more reliable to implement important checks and validations on the server, rather than on the client side. Such an approach has two advantages: app performance will not be slowed down by complex validations, and the logic will be always be up-to-date because of its on a central server - bug fixes, including security fixes, can be applied immediately without the need to update the app itself, because all the logic is on the server.
  • Encrypting data
    It's always a good idea to keep all sensitive data encrypted, especially if it will be stored on the mobile device. This is usually accomplished with a secure container that protects the enterprise apps in cases where devices are lost or compromised.

It's also important to remember that security is a flexible thing. The need for it directly depends on the type of app. For example, enterprise apps like mobile shops or bank apps with bill pay need to be secured more strongly than informational apps.

User Interface
Enterprise apps are typically used by employees within the organization, so, for these apps, functionality will beat out "beauty" in importance almost every time. This isn't to say certain fundamentals shouldn't be met - aesthetics will always be important - but most often, in the case of enterprise apps, excellent usability comes before aesthetic concerns. People are using enterprise apps to be better at their jobs, and they will more deeply appreciate an app for making their job easier than for how trendy it looks.

The key to creating a successful enterprise app is to emphasize intuitiveness. One way to do this is through the use of icons. Icons can be a great foundation for creating a useful and natural mobile UI. Use them to immediately explain a button's functionality.

Also, don't forget that you can override hardware buttons (for example, Home, Back, or Menu buttons). Doing this can add more intuitiveness to your app navigation. For example, in mobile browsers, the "back" button will navigate you to the previously visited page. It's become intuitive - when you press a back button in any context, you expect to be taken to the last page you visited. You can incorporate this kind of intuitiveness into your app via those hard buttons.

Choosing Between HTML5 vs. Native
Choosing which development technology to use can be a real challenge, under any circumstances, but there are special considerations with enterprises. For many enterprises, there is a growing backlog of smaller, internally facing apps that need to be built quickly and efficiently.Before deciding what the best approach is let's look at the technology approaches.

The two main approaches are native and hybrid/HTML5. Both have their pros and cons.

Obviously, if your app is targeting only iOS, and you have the budget, time and skills, it can be built as native, with the help of Objective C (or Swift) to gain more performance and total access to native features. This is a really rare situation, however, because of Bring your Own Device (BYOD) policies. You should anticipate the need to support a variety of mobile devices.

Meanwhile, HTML5 is constantly gaining momentum and becoming increasingly popular. Gartner, Inc., a leading information technology research and advisory firm, recently confirmed this trend by going on record to say that 90% of all enterprise apps in 2015 will be HTML5 or Hybrid and only 10% will be native.

So, for these enterprise apps, all the benefits of HTML5 in terms of cost, time-to-market, and portability across platforms overshadow the diminishing advantages of native development.

For more on the HTML5 vs. Native debate, take a look at this article, published earlier this year.

This article was written on December 10, 2014, and originally appeared here.

More Stories By Fima Katz

Fima Katz is the President and CEO of Exadel, Makers of Appery.io. Fima has over 20 years of experience in the information technology industry. His technical expertise includes the design of complex, mission-critical distributed systems, and the integration of complex legacy enterprise systems into business services. Mr. Katz is a recognized authority and speaker on open source, JAVA, XML and DOA technologies and has co-authored The Essential Guide to Object Monitors (Wiley, 1999).

IoT & Smart Cities Stories
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...