|By GVB Subrahmanyam, Sriramachandra Murthy C||
|November 14, 2012 03:17 PM EST||
It's well known that in recent times that consumption of data or a service through mobile applications is increasing exponentially due to the increase in the mobile customer base and the increase in the number of mobile devices connected to various systems disproportionately(1). That means in most of the cases, consumers of mobile devices are increasing more than traditional desktop browser based service model of consumption. These end users use a large number of different types of devices starting from standalone desktops, laptops, and tablets to mobile devices. It is expected that applications keep up the data or service while they move from one system to other, for example, if someone starts reading a book from Amazon Kindle and continues to read the same book from an iPad. So the continuity of the service or data is achieved and this is possible only when all the systems are connected with some sort of loose coupled integration. While it is possible for standalone systems to make it easier to get data or service connected, mobile applications also have to be ensured that the same data or service is provided and integrated. In this article, we are discussing the various ways of service-enabling the enterprise applications data in the mobile devices.
Before we discuss about service enablement (2, 3) of enterprise data through mobile devices, the following factors are considered when mobile enabling the enterprise data applications:
- Desktop services are accessed through http, while mobile devices predominantly follow WAP (Wireless application protocol).
- There are several device vendors in the market each with their own proprietary operating systems
- There is plethora of device models with wide range of form factor and screen sizes, hence GUI design to fit to all models is arduous task.
- Data security is big challenge, client side security validations are difficult to achieve on memory constraint mobile devices
- There would be significant increase in load on the servers.
Technical parameters considered for Service Enablement of Enterprise Data through Mobile devices
The following options are considered when building mobile-enabled services (4), each with its pros and cons.
- Accessing the enterprise services through mobile browsers
- Using mobile client by native application or through a framework
The complete application can be developed on the server side and mobile browsers can be used to access selected services. Which services are the best fit for mobile access depends on how critical the data being exchanged is. Unless strict security measures are enforced, sensitive data cannot be exchanged over the mobile network. The data needs to be exchanged through secured network (SSL) with access to authorized users only. This needs seamless integration with identity management systems.
Data such as the product details of inventory, promotional activities, special offers, etc., can be shared across mobile network as this is not security sensitive data. All financial transactions, personal data of users should be transmitted under careful security measures.
Lengthy operations like filling order or feeding sensitive data are not good candidates for operating with mobile browsers as they need a live connection to the server. In all such critical scenarios, mobile clients are best suited as they can operate in offline mode as well.
The JSF technology can be used to develop a presentation tier as it has protocol flexibility. The GUI developed (Component tree) for desktop access can be re-used to render on wireless mobile devices provided a WML (wireless Markup Language) render kit is available. There are some third-party render kits available such as myfaces that can be plugged-in. GUI development with JSF is very fast as most of the standard IDEs (RAD, MyEclipse, NetBeans, JBuilder, JDeveloper, JBoss Developer Wtudio ) support JSF drag & drop (WYSIWYG ) editors.
Except for some device specific functionality, mobile frameworks can be used to achieve standard enterprise functionality. This promotes "Develop once and deploy on any device" concept of mobile application development.
But how will these mobile clients access enterprise data? Some of the selected services can be exposed as web services, which can be consumed by mobile clients. There are two options, one is SOAP based web services and the other is RESTful web services.
SOAP-based services need client-side stubs to consume services by a mobile client. The client-side stubs take the responsibility of de-marshalling and marshalling data while consuming the service and sending requests to the server. But this needs a SOAP engine to be installed on mobile devices. SOAP-based web services often exchange data using XML, which will have header and footer overheads. There are many tools available to generate WSDL given the details of Java classes whose methods are exposed as web methods. The client application can use WSDL to generate client-side stubs to consume web methods exposed by a server application.
On the other hand RESTful web services are simple and easy to develop. They exchange the data in the JSON format, which can be encoded on the server side while transmitting over the network. The mobile client can use JQuery calls to decode and manipulate the JSON object. The JSON objects are simple and lightweight and hence easy to transmit over the network. But RESTful web services are not meant for stateful transactions.
While mobile clients facilitate an online or offline mode of communication with a server-side application, mobile browsers only work with the online mode.
- Decide which business processes available for mobility
- Redefine needed business processes offline/online mode
- Decide which functionalities should be available on mobile
- Design a GUI for mobile devices
- Service enables the functionalities for mobile
- Create a framework like JSF enabled for java apps, azure developed for Microsoft etc
- Communication middleware and processing
Service Enabling Framework for Enterprise Applications
The following framework provides the service enablement (5) of enterprise applications.
The simplest option is compatibility of mobile device browser for enterprise applications. However, with the increase of demand for mobile application installations on devices, integration takes significance and it can at web server layer or Application layer or at database layer as shown above. Layered approach of the applications is used for achieving the service enablement.
While the above describes about service enablement of enterprise apps for mobile applications, the following diagram describes various ways of application integration with mobile apps which will make mobile enabled applications.
Integration using APIs:
Mobile applications are driven by open APIs to expose the functionality and most are REST-based APIs, stateless APIs running over HTTP. The significance of Open APIs for integration comes with lot of opportunities in terms of creating visibility of the products for business. For example, The Facebook Auth API is being used by several applications for access of applications.
The mobile enabling of enterprise applications and data is significant with the number of mobile devices increasing every day. Web browsers and mobile client installations are increasing their usage of enterprise data. The integration of web apps to enterprise applications is significant in terms of WAP integration, wireless extended integration, peer-to-peer integration, and web-based integration, and API integrations are gaining significantly. However, going forward, with the advancement of technology, new ways of accessing enterprise data is considered.
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Sep. 27, 2016 10:45 PM EDT Reads: 3,386
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
Sep. 27, 2016 10:45 PM EDT Reads: 2,839
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 10:30 PM EDT Reads: 2,174
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 27, 2016 09:30 PM EDT Reads: 2,961
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 27, 2016 09:30 PM EDT Reads: 478
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Sep. 27, 2016 08:30 PM EDT Reads: 2,041
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 27, 2016 08:15 PM EDT Reads: 2,233
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 07:00 PM EDT Reads: 2,862
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 27, 2016 06:45 PM EDT Reads: 1,820
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 06:30 PM EDT Reads: 2,210
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 27, 2016 06:30 PM EDT Reads: 3,568
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Sep. 27, 2016 06:15 PM EDT Reads: 414
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 27, 2016 06:00 PM EDT Reads: 1,701
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 05:45 PM EDT Reads: 1,666
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 05:30 PM EDT Reads: 2,036
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 05:15 PM EDT Reads: 2,773
[session] Understanding the Inscrutable Chinese Internet By @CDSGlobalCloud | @CloudExpo #API #Cloud
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 27, 2016 05:15 PM EDT Reads: 323
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 27, 2016 05:00 PM EDT Reads: 1,603
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Sep. 27, 2016 04:00 PM EDT Reads: 2,670
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Sep. 27, 2016 03:15 PM EDT Reads: 2,882