Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED



Similar documents
Hybrid cloud computing explained

A Guide to MAM and Planning for BYOD Security in the Enterprise

E-Guide to Mobile Application Development

MDM features vs. native mobile security

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE

How to Develop Cloud Applications Based on Web App Security Lessons

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

3 common cloud challenges eradicated with hybrid cloud

ios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden

Benefits of virtualizing your network

CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Strategies for Writing a HIPAA-Friendly BYOD Policy

Securing the SIEM system: Control access, prioritize availability

E-Guide SHAREPOINT UPGRADE BEST PRACTICES

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY

Software Defined Networking Goes Well Beyond the Data Center

Managing Data Center Growth Explore Your Options

E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES

Data warehouse software bundles: tips and tricks

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE

How to Define SIEM Strategy, Management and Success in the Enterprise

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE

Aligning Public Cloud Strategies to Improve Server Efficiency

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT

2013 Cloud Storage Expectations

Advanced analytics key component for decision management systems

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Evaluating SaaS vs. on premise for ERP systems

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools

Expert guide to achieving data center efficiency How to build an optimal data center cooling system

How SSL-Encrypted Web Connections are Intercepted

Managing Virtual Desktop Environments

LTO tape technology continues to evolve with LTO 5

Rethink defense-in-depth security model

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT

MOBILE APP DEVELOPMENT LEAPS FORWARD

Is Your Data Safe in the Cloud?

6 Point SIEM Solution Evaluation Checklist

Virtualization backup tools: How the field stacks up

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration

5 free Exchange add-ons you should consider Eliminating administration pain points on a budget

How To Protect Your Online Backup From Being Hacked

The changing face of scale-out networkattached

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

Social channels changing contact center certification

5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS

Desktop virtualization: Best practices for a seamless deployment

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE

Server OS Buyer s Guide Vendor-neutral tips for choosing the best server operating system for your organization

The skinny on storage clusters

Unlocking data with document capture and imaging

Lecture 4 Cross-Platform Development. <lecturer, date>

Tips to ensuring the success of big data analytics initiatives

The Challenge of Mobile Devices in the Enterprise

TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE

About Me. Cross-platform Mobile Development Challenges, Best Practices and more.

- Solution Spotlight ACCELERATING APPLICATION DEPLOYMENT WITH DEVOPS

Enterpise Mobility Lexicon & Terminology

E-Guide BYOD: THE EVOLUTION OF MOBILE SECURITY

Advantages on Green Cloud Computing

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS

Best Practices for Scaling a Big Data Analytics Project

Exchange Server 2010 backup and recovery tips and tricks

Best Practices for Database Security

Key best practices for cloud testing

The state of cloud adoption in India The use cases, industry trends, business demands, and user expectations driving cloud adoption in Indian

Whitepaper. Trans. for Mobile

Simplifying and Empowering the Implementation of Enterprise Mobile Strategy

Does consolidating multiple ERP systems make sense?

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates

Mobile web apps: The best option for business? A whitepaper from mrc

Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY

E-Guide UNIFIED COMMUNICATIONS TRENDS: WHAT S IN STORE FOR 2014?

Article. One for All Apps in HTML5

By Kevin Benedict and André Guillemin Netcentric Strategies LLC Publication Date: February 2012 ID Number: NCS022012B

Skills shortage, training present pitfalls for big data analytics

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS

How To Protect Your Mobile Devices From Security Threats

Cross-Platform Development: Target More Platforms and Devices with a Minimal Amount of Source Code

Statement of Direction

Big Data and the Data Warehouse

... Introduction Acknowledgments... 19

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES

Mobile Application Platform

RapidValue Enabling Mobility. How to Choose the Right Architecture For Your Mobile Application

Making the move from a tactical to a strategic supply chain

Dave Haseman, Ross. Hightower. Mobile Development for SAP* ^>. Galileo Press. Bonn. Boston

Transcription:

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED

T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is best for your organization? This e-guide sheds light on the pros and cons of each, and expert Bill Claybrook offers key advice on how to successfully develop your future mobile cloud apps. PAGE 2 OF 10

BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED Bill Claybrook Author s note: In the past, mobile apps have been viewed as either native apps or Web apps. In this article, we include Web apps in the grouping of mobile cloud apps because they run outside the mobile device and have data storage outside the mobile device. The phrase mobile cloud computing typically refers to an enterprise cloud computing infrastructure that has been extended to handle mobile devices. Users are provided with data storage and compute processing that reside on a cloud-computing platform rather than on the mobile devices themselves. When developers build mobile apps, they have the choice of building either apps that are installed and run natively on remote devices (native apps), or those that run in mobile cloud environments (mobile cloud apps). Native apps and mobile cloud apps each have their inherent advantages and disadvantages. Native apps run on remote devices such as smartphones and tablets and are built specifically for a device and its operating system. Native apps have the PAGE 3 OF 10

ability to leverage device-specific hardware and software, meaning that they can take advantage of the latest technology available on mobile devices, such as GPS, camera, location and locomotion. This can be construed as an advantage for native apps over mobile cloud apps. Mobile cloud apps run on servers with their data stored in the cloud. Users access the app through a browser window on the device. Mobile cloud apps are generally developed independent of operating systems and can be more robust than native apps because there is more compute power and storage available in the cloud than on the much smaller remote device. Mobile cloud apps present advantages over native apps because security and other management aspects can be more easily centralized. Here are some best practices to help ensure that the mobile cloud application development process goes as smoothly and successfully as possible: DEVELOP ONCE, RUN EVERYWHERE Because many organizations are implementing Bring your own device (BYOD) strategies, it is important to try to design and implement mobile apps that can be built once and run on multiple remote devices regardless of the device s characteristics. Mobile apps developed to run natively only on the targeted PAGE 4 OF 10

devices, requiring the apps to be ported or rewritten to run on another device. Mobile cloud apps run in the cloud and are created independently of operating systems and specific device features. By using various technologies such as HTML5 and mobile enterprise application platforms (MEAPs), mobile cloud apps can be developed and made available for many devices without the need to rewrite the code. IMPLEMENT HYBRID APPS TO TAKE ADVANTAGE OF DEVICE HARDWARE Hybrid apps allow mobile cloud apps to take greater advantage of mobile device hardware. With a hybrid mobile app, the user interface to the mobile cloud app appears in a browser window, with a native app wrapped around it to provide access to onboard device functionality that is not available via the browser. A hybrid app looks to the user like a native app. It is downloaded from an app store, stored on the mobile device and initiated like a native app. But there is a difference from a developer point of view. The developer does not have to rewrite the entire mobile app for each device. Some of the code written in HTML5, CSS and JavaScript is reused across multiple, different mobile devices. PAGE 5 OF 10

USE TECHNOLOGIES SUCH AS HTML5 AND MEAPS HTML5 is a set of technologies consisting of CSS3, rules, properties and JavaScript APIs. It simplifies your development cycle by letting you use the same technology stack across multiple devices. You can deploy on more devices more quickly and easily by cloud apps instead of native apps for a quickly growing list of mobile devices. HTML5 supports remote device functionality, providing an experience closer to the look and feel of a native app while allowing you to write code once and enable it across various mobile devices. It discovers characteristics of remote devices to present information automatically adjusted to fit the remote device s display size, resolutions, display orientation, height and other unique features. Not all browsers, smartphones and tablets support all of the HTML5 features, but most of the major browsers support some of them. You should make sure that HTML5 is supported on the browser that you are using. A mobile platform is software that sits between a mobile device and an app. It runs on the mobile cloud and does some tasks specifically for mobile devices, such as converting data into a user-friendly interface and making sure everything fits well on the device s screen. It also has an authentication mechanism that reaches all the way down into the device so that if it is lost or stolen, it can PAGE 6 OF 10

be wiped remotely. MEAPs allow organizations to deploy mobile apps across a variety of devices by reusing code and without having to implement an app for a specific device. They also allow administrators to selectively run applications natively on the remote device when it is very important to take advantage of key features or when it is difficult to emulate native functionality on a mobile cloud server. A number of MEAP or MEAP-like platforms are available, including Sybase Unwired Platform, WebMobi and Appcelerator Titanium. SYNCHRONIZE DEVELOPMENT AND TESTING Even though mobile cloud apps run on mobile cloud servers, you should synchronize application development with testing and development done for mobile devices and the technologies used to make mobile cloud apps write once and run everywhere. The average lifespan of a mobile device is now about one year, and the lifespan of mobile software technologies is even shorter, according to technology firm Lionbridge. This challenging environment requires a new approach to software development and testing. Rather than waiting until the development of a mobile cloud app is complete, app testing needs to be in step with cloud PAGE 7 OF 10

development and device testing in order to detect and correct flaws as early in the project lifecycle as possible. TAKE ADVANTAGE OF MOBILE CLOUD SECURITY Running security software such as Kaspersky and McAfee and antivirus programs on mobile devices is one of the simplest ways to detect security threats. But mobile devices have limited power and processing capabilities so protecting them from threats is difficult. For instance, it is difficult, if not impossible, to keep virus detection software running continuously on a mobile device because of the device s power limitations. Most, if not all, security threat detection capabilities can be moved from mobile devices to the mobile cloud. Multiple virtualized malware detection engines (running on the mobile cloud) can then be used to do the actual threat detection. This involves deploying a simple software agent on each mobile device and placing the complex, mobile device-specific detection software on the mobile cloud. The agent inspects file activity on the device, places this activity in a file, and sends the activity file to a mobile cloud service for analysis. The cloud service periodically receives activity files from agents and identifies malicious or unwanted content. A single agent activity file can be analyzed by PAGE 8 OF 10

multiple virtualized detection engines to determine if the file contains intruder attempts to compromise the mobile device. This cloud-based approach has several benefits, including increased virus detection coverage, less complex mobile software and reduced mobile device resource consumption. This approach will become even more valuable as the scale and sophistication of mobile threats increase. PAGE 9 OF 10

FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 10 OF 10