Web 3.0 – a Web that you access on your phone and where even grandma is a developer

Mobile Apps

Subscribe to Mobile Apps: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Mobile Apps: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Hidden Benefits of Working with a Software Development Partner Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs. Evolution of the project = evolution of needs Value chain in software product evolution How a software development company can facilitate startups Growing scale and complexity, benefits of ongoing collaboration Engagement models: it's never too late to start a valuable cooperation! All in all, the key value that can be added to the success of your pro... (more)

Mobile Enablement Presents Challenges and Opportunities

Mobile adoption rates are on the rise and if market reports are any indication, growth rates aren’t slowing down anytime soon. Consumers and employees alike are the driving forces behind mobile adoption spurred by the evolution in mobile device capabilities along with the speed of mobile networks. A recent Morgan Stanley research study predicts that sales of smartphones will overtake PC sales (including both desktops and notebooks) in the next two years, supporting the demands of our always-connected society. [Disclosure: Kapow Software is a sponsor of BriefingsDirect podcasts.] The ubiquity of smartphones and more than 300,000 mobile apps available on Apple’s App Store, coupled with the ease and convenience of mobile computing is putting pressure on IT to mobile enable B2C and B2E applications to facilitate organizational efficiency and keep up with consumer and em... (more)

Mobile Development – Are You Asking the Right Questions? Part 2

In my first installment of this post, I discussed how mobile is growing as a marketing vehicle for companies. With this growth in popularity, companies can't just jump into mobile app development without asking questions about business need and development methods. In this post, I will discuss additional questions that need to be asked about infrastructure, the expertise of the development team and user demands and why they are critical to answer before starting the development process. Can your infrastructure handle success? Too often a company develops a mobile app and has high expectations for user engagement, only to have performance and bandwidth issues that bring their servers crashing down. This makes usage difficult and as a result, users  quickly lose interest.  Doesn't make it much of a marketing vehicle, does it? The cloud has emerged as a real and viab... (more)

Five Overlooked Factors of Mobile Application Performance

Too often, little consideration is given to performance testing in the context of mobile application testing. We are reaching a tipping point in how consumers are accessing the Internet, with more than 50% of users expected to access the Web via a mobile device by the end of 2013. With this increase in mobile usage comes the need (really, a requirement) for organizations to meet an increased expectation in application performance. As users demand the same experience whether they are accessing Web-based content from their smart phones, tablets, or laptop computers, the performance of your mobile application has never been more crucial to the performance of your bottom line. Not only are user expectations creating a need for better performing apps, your competitors are rushing to mobilize their apps, creating a sort of "mobile arms race" in which the loser risks mark... (more)

Three Business Decisions for Mobile Application Development

Welcome to a series on three concepts decision makers must understand for their own mobile application development.  Many companies are creating mobile applications for internal and external use.  Some of these mobile apps are systems that exist in some other form, such as a traditional web application. Or, perhaps a company wants to speed up an old Microsoft Access database entry form and increase its accessibility.  Some are pioneering new ways to utilize the mobile connectivity with applications that change the way we interact with our world around us. No matter what kind of mobile application development you are considering, there are several critical decisions you need to make based on your unique product and opportunity in order to create a successful mobile app and spur adoption and entanglement. Audience and Platform Support The first step is to identify th... (more)

What’s In and What’s Out for IT in 2014

Here’s a quick look at what’s out and what’s in for IT in 2014. What’s out: Mobile, especially Mobile First. What’s in? Experience First. Mobility has become a means to an end now. People now demand compelling, engaging, context-aware experiences that catch them in the moment, that deliver services when they most need or want them. People want an emotional connection to the companies they do business with, and mobility is definitely one tool that can be used to deliver that. Certainly, mobility is going to continue to grow, people are still catching up in certain areas. and it will be a critical delivery channel, but it’s not only about mobility any longer. It’s really about the experience. And it’s a multi-channel experience, that will grow to include wearables. What’s out: general-purpose wearables -- Segway for your face? No, thank you.  What’s in, use-specific w... (more)

One Simple Step Can Make Your APIs More Secure

APIs - application programming interfaces -- are an old technology that has become today's hottest method for getting critical data to mobile apps. APIs are good for business. APIs drove $2 billion in business for Expedia by securely exposing valuable content to its affiliate network. But there are hidden dangers to using APIs. APIs share many of the same threats that plague the web, but APIs have unique risk profile that must be managed. It is a mistake to think we can secure APIs the same way we secure the web. But there are some really simple things that anyone implementing an API can do, right now, that will minimize the risk of APIs. Here's one I've pulled from a new eBooklet by Scott Morrison of CA Technologies called Five Simple Strategies for Securing Your APIs. The tip? Turn on SSL for your API and keep it on. Most of us surf the web every day with no SSL... (more)

Eliminating Mobility Silos

While Bring Your Own Device (BYOD) programs are very widely adopted, far fewer companies have implemented a comprehensive enterprise mobility strategy. When there isn't a consistent governance policy in place, the approach to mobility tends to become fragmented and siloed, with each department executing on its own strategy. Without a high-level, enterprise view of mobility and the governance policy to support it, mobility management will be supported by a series of redundant and fragmented point solutions, which can be quite costly. Worse still, failure to implement an end-to-end strategy leads to increased risk and sub-optimal service from lack of coordination. As the mobility phenomenon matures over time, companies are increasingly looking at mobility from a much higher level. Forget about devices. Forget about applications. What matters is the whole end-to-end ex... (more)

BYOID Exposes the “Digital Divide” Between IT and the Business

A growing number of websites allow visitors to log in using a digital identity from a trusted 3rd party -- like Facebook, Microsoft, PayPal, or Google. The fancy term for this is "federated identity," but most people call it Bring Your Own Identity, or BYOID. In today's application economy, organizations need to securely deliver new apps to grow their business quickly. This can increase IT risks, which puts a premium on an organization's ability to simplify the user experience without sacrificing security. Using an existing digital or social identity issued by a trusted third party to access applications can help organizations meet the need for simplicity, security and a positive customer experience. The Ponemon Institute and CA Technologies recently surveyed 1,589 IT security practitioners and 1,526 business users worldwide to understand how companies view BYOID. ... (more)

Security & Mobile Experience Are Symbiotic By @JackieKahle | @CloudExpo [#Cloud]

A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and identities – mobility customer experience, in fact, ranks number two in top security priorities. Yes, that really says 42% of respondents say improving mobile customer experience is a top priority for their organization, which is a great thing. After all, did you see how many iPhones Apple sold last quarter? That’s a lot of mobile devices being used for commerce, data collection, work and play. And latest research sees it having an impact on security practices. Digging a little deeper into the results brings more encouraging data: Controllers rank improving mobile customer experience sl... (more)

How to Deliver Rich Web Apps Accessible from Any Web-Enabled Device

"As end-user demands and requirements have evolved, extending the performance and scalability benefits of our Ultra Messaging software to audiences accessing applications on any Web-enabled device has been a priority for many customers in the financial services arena" said Mike Pickett, VP of Product Marketing for Ultra Messaging at Informatica, as it was announced jointly by Informatics and Kaazing that Kaazing's WebSocket Gateway technology will henceforth be integrated into Informatica's Ultra Messaging product line to enable the seamless, reliable and secure delivery of real-time information to any Web-enabled device. "Ensuring that information is delivered in real-time between a client and a browser," Pickett continued, "Kaazing's WebSocket Gateway technology gives Informatics the power to do just that, allowing customers to reach new audiences and expand thei... (more)