MOBILE APP DEVELOPMENT LEAPS FORWARD



Similar documents
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE

CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

How to Develop Cloud Applications Based on Web App Security Lessons

E-Guide to Mobile Application Development

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE

Advanced analytics key component for decision management systems

Hybrid cloud computing explained

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Evaluating SaaS vs. on premise for ERP systems

Data warehouse software bundles: tips and tricks

ios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE

Securing the SIEM system: Control access, prioritize availability

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

Benefits of virtualizing your network

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING

Social channels changing contact center certification

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES

Best Practices for Scaling a Big Data Analytics Project

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT

3 common cloud challenges eradicated with hybrid cloud

Rethink defense-in-depth security model

Social media driving CRM strategies

Does consolidating multiple ERP systems make sense?

The changing face of scale-out networkattached

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY

Making the move from a tactical to a strategic supply chain

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED

2013 Cloud Storage Expectations

Software Defined Networking Goes Well Beyond the Data Center

Cloud Security Certification Guide What certification is right for you?

Tips to ensuring the success of big data analytics initiatives

E-Guide SHAREPOINT UPGRADE BEST PRACTICES

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools

E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS

Big Data and the Data Warehouse

A Guide to MAM and Planning for BYOD Security in the Enterprise

E-Business Risk: The Coming SaaS As a Service

Aligning Public Cloud Strategies to Improve Server Efficiency

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates

Order Management System Best Practices

E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

Managing Data Center Growth Explore Your Options

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT

How to Define SIEM Strategy, Management and Success in the Enterprise

Expert guide to achieving data center efficiency How to build an optimal data center cooling system

Managing Virtual Desktop Environments

Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY

6 Point SIEM Solution Evaluation Checklist

TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE

Managing the supply chain for SAP

Unlocking data with document capture and imaging

Virtualization backup tools: How the field stacks up

MDM features vs. native mobile security

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration

Skills shortage, training present pitfalls for big data analytics

Is Your Data Safe in the Cloud?

Best Practices for Database Security

5 free Exchange add-ons you should consider Eliminating administration pain points on a budget

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS

Social Media-based Customer Loyalty Programs

Key best practices for cloud testing

- Solution Spotlight ACCELERATING APPLICATION DEPLOYMENT WITH DEVOPS

E-Guide CRM: THE INTEGRATION AND CONSOLIDATION PAYOFF

Supply Chain Management Tips and Best Practices

Cloud Platform Warfare in 2013 and Beyond

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS

How SSL-Encrypted Web Connections are Intercepted

Advantages on Green Cloud Computing

Get Started on your Journey to the Cloud Retail Industry

5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

The state of cloud adoption in India The use cases, industry trends, business demands, and user expectations driving cloud adoption in Indian

Desktop virtualization: Best practices for a seamless deployment

Integrating and Managing SAP HANA

TS03: Operational Excellence by Leveraging Internet of Things Technologies

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS

Connect for new business opportunities

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

E-Guide UNIFIED COMMUNICATIONS TRENDS: WHAT S IN STORE FOR 2014?

Strategies for Writing a HIPAA-Friendly BYOD Policy

LTO tape technology continues to evolve with LTO 5

Server OS Buyer s Guide Vendor-neutral tips for choosing the best server operating system for your organization

Integrated Social and Enterprise Data = Enhanced Analytics

Bringing Together Data Integration and SOA

Moving to the Cloud: A guide for Southeast Asian IT and Business Managers

Essential Elements of an IoT Core Platform

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS

How To Protect Your Online Backup From Being Hacked

Cloud Business Intelligence Trends to Watch

Intelligent Integration For Software Vendors

Transcription:

E-Guide MOBILE APP DEVELOPMENT LEAPS FORWARD SearchSOA

B ackend as a Service (BaaS) is making waves in the mobile application development space. In this e-guide, learn how you can implement BaaS and how it functions similarly to Platform as a Service (PaaS). Additionally, learn how incorporating the Internet of Things (IoT) with mobile worker support can enhance business productivity. PAGE 2 OF 13

DEVELOPERS GET INTO BAAS, MOBILE APIS FOR NEW OPPORTUNITIES Tom Nolle, CIMI Corporation A new development in the application programming interface (API) market, Backend as a Service (BaaS), offers devel opers a whole new dimension of opportunity: cloud services to build the mobile applications of the future. Mobility, mobile broadband and mobile apps are transforming the Internet and the way people communicate and use information. For developers, the mobile app represents an enormous, lucrative new market. From a business perspective, each of the mobile platforms has its own benefits and limita tions. Each also has its technical framework -- its own APIs. Mobile develop ment platform APIs generally fall into two categories: platform APIs related to the mobile device s own operating system and middleware, and service APIs related to the access of Web-hosted material. The new opportunity in APIs is Backend as a Service, an extension of the service API model. The goal of BaaS is to convert common and useful elements of mobile application logic -- storage, identity management, social network PAGE 3 OF 13

integration, photo enhancing -- into representational state transfer (REST) Web services that the application invokes as needed, making these services back ends to mobile apps. As a concept, BaaS is similar to Software as a Service (SaaS) and Plat form as a Service (PaaS): It offers functionality as a Web service. With SaaS, what s offered is an application or application component. Salesforce.com s CRM is a good example. PaaS offers a collection of services designed to pres ent a complete virtual operating system; Microsoft s Windows Azure is the best-known PaaS example. BaaS is somewhere in between; it offers PaaS-like features, but not as a complete programming platform. Like SaaS, those features might perform business functions oriented to vertical markets or functionalities that can be used across industries. In all cases, though, BaaS aims to enhance mobile development. IMPLEMENTING BAAS Success with BaaS requires a targeted business case and careful implementation to support mobile development practices. Most BaaS deployments today are horizontal -- they cover a variety of markets -- and deal with well-known issues such as social network integration. The problem with these types of BaaS PAGE 4 OF 13

implementations is that they are so obvious that competition is inevitable, and so basic that differentiation is difficult. For example, it s likely that major cloud providers will move into BaaS services related to storage and iden tity, and social network companies will offer social network BaaS integration. Vertical markets, where a developer already has skills, contacts and software products, are useful places to look into for BaaS opportunity. In horizontal mar kets, data analysis and reduction tools, or forecasting and projection tools, are good candidates for BaaS. Technically, the key issue for BaaS is preserving the dominant RESTful Web service model of interface. These in terfaces appear as a simple PUT/GET transactional model that doesn t re main in a processing state between calls. Most of the major PUT/GET giants have exposed their own service APIs as RESTful interfaces that receive and re spond using XML data structures. XML handling can be a chore, however, and it s helpful to either accept a simpler data structure or provide programming logic to use the interface as a reusable function in each of the target mobile devices. Creating a BaaS service with the correct level of functional granularity is also important. Mobile users typically expect a quick response to a request, and there are interface timing issues that make it unadvisable to turn a com plex PAGE 5 OF 13

function with a long execution time into a single service. Since RESTful interfaces are expected to be stateless, care is required in turning a complex function into a series of elements that can be used independently, but can function together when needed. Each request must stand on its own, and data from the response to a given request, if needed later, must be stored in the device and returned or maintained and updated by the service. PASSING AS PAAS Perhaps the most significant aspect of BaaS, from the developer s perspec tive, is the relationship with PaaS. Any developer who has reviewed the APIs for search or social network giants, or for cloud management, knows that mul tiple APIs typically form an ecosystem that, if it grows large enough, can ap proach the functionality of a platform, as in PaaS. A few disconnected BaaS APIs are less compelling than, for example, an entire BaaS ecosystem aimed at supporting mobile-social network collaboration for enterprises. Popular open source blogging or chat room tools, for instance, could be built on uni fied communications and collaboration, augmented with APIs to create voice and video calls. BaaS will lead to a systematized view of background services for mobile development, which is for all practical purposes a mobile-driven PaaS plat form. PAGE 6 OF 13

Developers, operators and enterprises need to think about this evolu tion -- because a cooperative and symbiotic collection of BaaS tools are more valuable to developers and consumers than individual APIs could ever be. The BaaS movement could be a catalyst for moving developer focus from de vices to the cloud -- and that means faster service and increased competition among handset vendors. But BaaS, like any cloud trend, is in the early stages, and there s a whole mobile world out there. PAGE 7 OF 13

HOW TO MAKE DESIGN CHOICES AS MOBILE AND IOT APPLICATIONS COLLIDE Tom Nolle, CIMI Corporation The Internet of Things has been getting considerable coverage, causing companies to explore ways IoT concepts can enhance productivity. Often, this research leads to one specific IoT model that shows promise: combining IoT with mobile worker support. Architects and planners charged with designing for this model must understand what the mobile/iot model really means, address how adding IoT changes the equation in mobile empowerment, and define their own design pattern to represent how mobile/iot applications will be handled going forward. Most legitimate IoT applications involve interaction between users and what could be called a sensor and control network (SCN). In process control applications, the SCN is a machine-to-machine, or M2M, network that uses sensor information to drive changes in material handling or processing. These applications might use mobile technology as a means of communicating with sensors, but they don t force major changes in application design as normal PAGE 8 OF 13

industrial control applications would. Mobile in applications where a worker is visualized as moving through a sensor and control space and interacting with elements. If their full potential is to be realized, these applications require very different design concepts than normal mobile or IoT applications do. TAKING THE FIRST STEP The first step in designing mobile/iot applications is to ensure enterprise architecture process models are up to date and reflect the business information flows and activity sequences the mobile/iot application will generate. Many early attempts at harnessing the benefits of mobile/iot failed because those benefits weren t linked to specific enterprise processes and flows, and so neither could be validated or supported. The second step in mobile/iot application design is understanding what s in the SCN space. Is the application one where a worker gets information from sensors, one where a worker activates networked control elements to perform a specific task, or both? The answer will determine the best starting point for new application design -- is it contextual in nature or registration and activation? When mobile workers get sensor information from an IoT application, PAGE 9 OF 13

that information can be viewed as enhancing the notion of context that forms the underpinning of all mobile empowerment applications. This approach embodies two broad alternative models: the extended-senses model and the sensor-driven model. Extended-senses models use IoT sensors to augment what a worker can know about the current context -- the point of activity. Generally, a worker s location establishes what IoT sensor information is available nearby, and that information is collected automatically into the worker s contextual inventory, to be processed as any context data would be. This is an easy model to implement because it extends, but doesn t change, the application model for mobile empowerment. In a sensor-driven model, the application identifies a situation that needs handling based on sensor information, and then alerts and perhaps dispatches the worker to the right spot. This model differs sharply from normal mobility applications because the worker is driven by the application rather than driving it. The context of the job is set by the conditions at the point where the worker is expected to be active, and the goal is getting the worker there. PAGE 10 OF 13

A KEY INGREDIENT The key ingredient in this sensor-driven model is identifying an alert condition in the first place. If a sensor and control network is already being used for process control, facilities monitoring and so on, it might be possible to generate a trigger for IoT/mobile activity from the current process or monitoring application. Taking that approach is wise because it reduces the risk of loading down sensors or sensor networks with additional traffic. If it s not possible to piggyback on current process or monitoring applications, sensor information will need to be analyzed. If possible, avoid reading sensors from a new application. Most sensor and control applications store sensor data in a database regularly. By running analytics processes on stored data, it might be easier to spot unusual conditions. For example, temperature and humidity changes are easier to view as a trend line because any sudden change would be unusual and likely warrant a visit from a technician. Using DBMS-based analytics as the source of IoT context also will reduce the complexity of finding and reading relevant sensors. The final point is the importance of consistency. Virtually every user who has looked at the mobile/iot combination will admit that many applications would fit that description, but few represent the low-hanging fruit that PAGE 11 OF 13

typically drive projects in a new technology area. A major risk is that each application could produce its own software based on a unique approach, and that would compromise application agility and component reuse. It could also create operational problems if the worker empowerment element varied between applications. Software architects and developers know the accepted way to address these risks is the creation of a design pattern, a template-like approach to a problem that can be implemented as needed. For applications blending mobility and IoT, a design pattern would likely be needed for both the extended-senses and sensor-driven models. It s possible to conceptualize a design pattern that accepted a condition set that represents testable sensor conditions and an optional worker location, and returned a set of values representing sensor results. It can be tempting to jump in to API design too quickly. Be sure to have enough exposure to the complete range of mobile/iot applications, at least at the business process level, before committing to specific componentization and API design. Taking the intermediate step of developing one or more formal design patterns will ensure the API transition is made with a broad knowledge of the needs and opportunities the union of mobility and IoT can bring. PAGE 12 OF 13

FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 13 OF 13