Welcome!

AJAX & REA Authors: Andreas Grabner, Tim Hinds, Alfredo Diaz, Kevin Benedict, RealWire News Distribution

Related Topics: SOA & WOA, Java, Wireless, AJAX & REA, Web 2.0

SOA & WOA: Article

Service Enablement of Enterprise Data through Mobile Devices

Leveraging Service Architecture in extending enterprise applications to mobile devices

It's well known that in recent times that consumption of data or a service through mobile applications is increasing exponentially due to the increase in the mobile customer base and the increase in the number of mobile devices connected to various systems disproportionately(1). That means in most of the cases, consumers of mobile devices are increasing more than traditional desktop browser based service model of consumption. These end users use a large number of different types of devices starting from standalone desktops, laptops, and tablets to mobile devices. It is expected that applications keep up the data or service while they move from one system to other, for example, if someone starts reading a book from Amazon Kindle and continues to read the same book from an iPad. So the continuity of the service or data is achieved and this is possible only when all the systems are connected with some sort of loose coupled integration. While it is possible for standalone systems to make it easier to get data or service connected, mobile applications also have to be ensured that the same data or service is provided and integrated. In this article, we are discussing the various ways of service-enabling the enterprise applications data in the mobile devices.

Before we discuss about service enablement (2, 3) of enterprise data through mobile devices, the following factors are considered when mobile enabling the enterprise data applications:

  1. Desktop services are accessed through http, while mobile devices predominantly follow WAP (Wireless application protocol).
  2. There are several device vendors in the market each with their own proprietary operating systems
  3. There is plethora of device models with wide range of form factor and screen sizes, hence GUI design to fit to all models is arduous task.
  4. Data security is big challenge, client side security validations are difficult to achieve on memory constraint mobile devices
  5. There would be significant increase in load on the servers.

Technical parameters considered for Service Enablement of Enterprise Data through Mobile devices
The following options are considered when building mobile-enabled services (4), each with its pros and cons.

  • Accessing the enterprise services through mobile browsers
  • Using mobile client by native application or through a framework

The complete application can be developed on the server side and mobile browsers can be used to access selected services. Which services are the best fit for mobile access depends on how critical the data being exchanged is. Unless strict security measures are enforced, sensitive data cannot be exchanged over the mobile network. The data needs to be exchanged through secured network (SSL) with access to authorized users only. This needs seamless integration with identity management systems.

Data such as the product details of inventory, promotional activities, special offers, etc., can be shared across mobile network as this is not security sensitive data. All financial transactions, personal data of users should be transmitted under careful security measures.

Lengthy operations like filling order or feeding sensitive data are not good candidates for operating with mobile browsers as they need a live connection to the server. In all such critical scenarios, mobile clients are best suited as they can operate in offline mode as well.

The JSF technology can be used to develop a presentation tier as it has protocol flexibility. The GUI developed (Component tree) for desktop access can be re-used to render on wireless mobile devices provided a WML (wireless Markup Language) render kit is available. There are some third-party render kits available such as myfaces that can be plugged-in. GUI development with JSF is very fast as most of the standard IDEs (RAD, MyEclipse, NetBeans, JBuilder, JDeveloper, JBoss Developer Wtudio ) support JSF drag & drop (WYSIWYG ) editors.

But there are some serious challenges while developing browser-based applications. The high latency and low bandwidth of networks in mobile environments affects application responsiveness for mobile users. Screens refresh slowly, diminishing the mobile user experience. Hence mobile application development should use Partial Page Rendering (PPR) to display only dynamically changing data without going for complete page reloading. Browsers that do not support AJAX (Asynchronous JavaScript and XML) use full page rendering instead of PPR, seriously choking the network bandwidth. The other important parameter is to take into account form factor and widely differing screen sizes while developing GUI for accessing through mobile browsers. While JSF stack provides a good toolkit for the faster development of GUI, one common opinion is that JSF components are heavy thus leading to slower loading of a requested page.

The other option is to access enterprise services through mobile clients. Mobile clients are small client-side applications hosted on mobile devices. But what is the right technology to develop mobile clients and how they communicate with the server side enterprise applications? As discussed, there are many vendors in the mobile market, each with their own operating systems and SDK. Developing mobile clients for every vendor is not only tedious but not recommended from a cost perspective. There are few mobile frameworks that  abstract the common functionality of different mobile operating systems, some of them are open source and others are proprietary. These mobile frameworks mostly operate using simple HTML, JavaScript, JQuery, JQuerymobile to develop mobile clients and support the SDK of all leading mobile vendors in the market.

Except for some device specific functionality, mobile frameworks can be used to achieve standard enterprise functionality. This promotes "Develop once and deploy on any device" concept of mobile application development.

But how will these mobile clients access enterprise data? Some of the selected services can be exposed as web services, which can be consumed by mobile clients. There are two options, one is SOAP based web services and the other is RESTful web services.

SOAP-based services need client-side stubs to consume services by a mobile client. The client-side stubs take the responsibility of de-marshalling and marshalling data while consuming the service and sending requests to the server. But this needs a SOAP engine to be installed on mobile devices. SOAP-based web services often exchange data using XML, which will have header and footer overheads. There are many tools available to generate WSDL given the details of Java classes whose methods are exposed as web methods. The client application can use WSDL to generate client-side stubs to consume web methods exposed by a server application.

On the other hand RESTful web services are simple and easy to develop. They exchange the data in the JSON format, which can be encoded on the server side while transmitting over the network. The mobile client can use JQuery calls to decode and manipulate the JSON object. The JSON objects are simple and lightweight and hence easy to transmit over the network. But RESTful web services are not meant for stateful transactions.

While mobile clients facilitate an online or offline mode of communication with a server-side application, mobile browsers only work with the online mode.

  • Decide which business processes available for mobility
  • Redefine needed business processes offline/online mode
  • Decide which functionalities should be available on mobile
  • Design a GUI for mobile devices
  • Service enables the functionalities for mobile
  • Create a framework like JSF enabled for java apps, azure developed for Microsoft etc
  • Communication middleware and processing

Service Enabling Framework for Enterprise Applications
The following framework provides the service enablement (5) of enterprise applications.

The simplest option is compatibility of mobile device browser for enterprise applications. However, with the increase of demand for mobile application installations on devices, integration takes significance and it can at web server layer or Application layer or at database layer as shown above. Layered approach of the applications is used for achieving the service enablement.

While the above describes about service enablement of enterprise apps for mobile applications, the following diagram describes various ways of application integration with mobile apps which will make mobile enabled applications.

Integration using APIs:
Mobile applications are driven by open APIs to expose the functionality and most are REST-based APIs, stateless APIs running over HTTP. The significance of Open APIs for integration comes with lot of opportunities in terms of creating visibility of the products for business. For example, The Facebook Auth API is being used by several applications for access of applications.

Conclusion
The mobile enabling of enterprise applications and data is significant with the number of mobile devices increasing every day. Web browsers and mobile client installations are increasing their usage of enterprise data. The integration of web apps to enterprise applications is significant in terms of WAP integration, wireless extended integration, peer-to-peer integration, and web-based integration, and API integrations are gaining significantly. However, going forward, with the advancement of technology, new ways of accessing enterprise data is considered.

References:

  1. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats
  2. http://clouddataanalytics.ulitzer.com/node/2112881
  3. http://sreekusumanchi.sys-con.com/node/837728
  4. http://www.ibm.com/developerworks/library/it-novcc00/
  5. http://msdn.microsoft.com/en-us/library/bb972953.aspx

More Stories By GVB Subrahmanyam

GVB Subrahmanyam an Application Developer, Lead, Project Manager, Development Manager and Delivery Manager in a wide variety of business applications as part of an IT service provider. He focuses on Development, Delivery and Sustenance of IT Applications in Supply Chain/Insurance/Banking/Finance. Albeit most of his projects are Java-based assignments, he is technology agnostic.

In his current role, Subrahmanyam is working as a solution provider for Commercial Healthcare, Insurance, banking and Financial systems with Mahindra Satyam. He is also TOGAF certified Enterprise Architect and IBM certified Ratioanal Software Architect.

GVB Subrahmanyam has an M.Tech. and Ph.D. from IIT Kharagpur in the area of Chemical Technology, India and MS in Software Systems from BITS Pilani. He is also a PMI certified PMP. He attended one year of the Executive Program in Business Management(EPBM) from IIM Calcutta.

More Stories By Sriramachandra Murthy C

Sriramachandra Murthy C is a senior Solutions Architect at Java Competency in Mahindra Satyam. He can be reached at Sriramachandramurthy_C@mahindrasatyam.com

Cloud Expo Breaking News
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuity, speed, mobility, data access and connectivity are staples of the cloud and always will be. But cloud providers that plan to not only exist tomorrow – but to lead – know that security must be the top priority for the cloud and are delivering it now. In his session at 14th Cloud Expo, Kurt Hagerman, Chief Information Security Officer at FireHost, will detail why and how you can have both infrastructure performance and enterprise-grade security – and what tomorrow's cloud provider will look like.
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and organize their digital life through a brand new cloud service, starting from infrastructure to the users’ interface. A revolution that began from inventing and designing our very own infrastructure: we have created the first server network powered solely by ARM CPU. The microservers have “organism-like” features, differentiating them from any of the current technologies. Benefits include low consumption of energy, making Cynny the ecologically friendly alternative for storage as well as cheaper infrastructure, lower running costs, etc.
Cloud backup and recovery services are critical to safeguarding an organization’s data and ensuring business continuity when technical failures and outages occur. With so many choices, how do you find the right provider for your specific needs? In his session at 14th Cloud Expo, Daniel Jacobson, Technology Manager at BUMI, will outline the key factors including backup configurations, proactive monitoring, data restoration, disaster recovery drills, security, compliance and data center resources. Aside from the technical considerations, the secret sauce in identifying the best vendor is the level of focus, expertise and specialization of their engineering team and support group, and how they monitor your day-to-day backups, provide recommendations, and guide you through restores when necessary.
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud. In her session at 14th Cloud Expo, Courtney Behrens, Senior Marketing Manager at Brother International, will discuss how issues that had previously been out of your control, like performance, advanced administration and compliance, can now be put back behind your firewall.
Cloud scalability and performance should be at the heart of every successful Internet venture. The infrastructure needs to be resilient, flexible, and fast – it’s best not to get caught thinking about architecture until the middle of an emergency, when it's too late. In his interactive, no-holds-barred session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will dive into how to design and build-out the right cloud infrastructure.
The revolution that happened in the server universe over the past 15 years has resulted in an eco-system that is more open, more democratically innovative and produced better results in technically challenging dimensions like scale. The underpinnings of the revolution were common hardware, standards based APIs (ex. POSIX) and a strict adherence to layering and isolation between applications, daemons and kernel drivers/modules which allowed multiple types of development happen in parallel without hindering others. Put simply, today's server model is built on a consistent x86 platform with few surprises in its core components. A kernel abstracts away the platform, so that applications and daemons are decoupled from the hardware. In contrast, networking equipment is still stuck in the mainframe era. Today, networking equipment is a single appliance, including hardware, OS, applications and user interface come as a monolithic entity from a single vendor. Switching between different vendor'...
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and security architects need to continue to develop a deep understanding about API security and how it differs from traditional web application security or mobile application security. In his session at 14th Cloud Expo, Sachin Agarwal, VP of Product Marketing and Strategy at SOA Software, will walk you through the various aspects of how an API could be potentially exploited. He will discuss the necessary best practices to secure your data and enterprise applications while continue continuing to support your business’s digital initiatives.
You use an agile process; your goal is to make your organization more agile. What about your data infrastructure? The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver on new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for application developers and slow performance for end users. Further, as data sizes grow into the Big Data realm, this problem is exacerbated and becomes even more difficult to address. A seemingly simple schema change can take hours (or more) to perform, and as requirements evolve the disconnect between existing data structures and actual needs diverge.
SYS-CON Events announced today that SherWeb, a long-time leading provider of cloud services and Microsoft's 2013 World Hosting Partner of the Year, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. A worldwide hosted services leader ranking in the prestigious North American Deloitte Technology Fast 500TM, and Microsoft's 2013 World Hosting Partner of the Year, SherWeb provides competitive cloud solutions to businesses and partners around the world. Founded in 1998, SherWeb is a privately owned company headquartered in Quebec, Canada. Its service portfolio includes Microsoft Exchange, SharePoint, Lync, Dynamics CRM and more.
The world of cloud and application development is not just for the hardened developer these days. In their session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, will pull back the curtain of the architecture of a fun demo application purpose-built for the cloud. They will focus on demonstrating how they leveraged compute, storage, messaging, and other cloud elements hosted at SoftLayer to lower the effort and difficulty of putting together a useful application. This will be an active demonstration and review of simple command-line tools and resources, so don’t be afraid if you are not a seasoned developer.
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based BUMI (Backup My Info!) is a premium managed service provider specializing in data backup and recovery. Founded in 2002, the company’s Here, There and Everywhere data backup and recovery solutions are utilized by more than 500 businesses. BUMI clients include professional service organizations such as banking, financial, insurance, accounting, hedge funds and law firms. The company is known for its relentless passion for customer service and support, and has won numerous awards, including Customer Service Provider of the Year and 10 Best Companies to Work For.
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected world, the enterprise needs to leverage the capabilities of the web and be ready to innovate without fear of DDoS attacks, concerns about application security and other threats. Organizations face great risk from increasingly frequent and sophisticated attempts to render web properties unavailable, and steal intellectual property or personally identifiable information. Layered security best practices extend security beyond the data center, delivering DDoS protection and maintaining site performance in the face of fast-changing threats.
From data center to cloud to the network. In his session at 3rd SDDC Expo, Raul Martynek, CEO of Net Access, will identify the challenges facing both data center providers and enterprise IT as they relate to cross-platform automation. He will then provide insight into designing, building, securing and managing the technology as an integrated service offering. Topics covered include: High-density data center design Network (and SDN) integration and automation Cloud (and hosting) infrastructure considerations Monitoring and security Management approaches Self-service and automation
In his session at 14th Cloud Expo, David Holmes, Vice President at OutSystems, will demonstrate the immense power that lives at the intersection of mobile apps and cloud application platforms. Attendees will participate in a live demonstration – an enterprise mobile app will be built and changed before their eyes – on their own devices. David Holmes brings over 20 years of high-tech marketing leadership to OutSystems. Prior to joining OutSystems, he was VP of Global Marketing for Damballa, a leading provider of network security solutions. Previously, he was SVP of Global Marketing for Jacada where his branding and positioning expertise helped drive the company from start-up days to a $55 million initial public offering on Nasdaq.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 14th Cloud Expo, Marc Jones, Vice President of Product Innovation for SoftLayer, will explain how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.