Rethink mobile app development: Re-use rather than rip and replace
- 20 July, 2012 08:00
There is no question that mobile use is on the increase. According to Telsyte, nearly 90 per cent of all mobile phone users in Australia will have a smartphone as their primary device in 2015, up from just under 50 per cent in 2011. That equates to 18.5 million smartphone users. Visits to e-commerce websites from mobile devices are becoming a significant part of the shopping experience, with 15 per cent of mobile phone owners doing so on a monthly basis at present.
As technology evolves, and new trends emerge, end users’ demands and expectations of software applications are constantly changing. The emergence of social media and Web 2.0 applications are driving users to expect more from applications in a business environment. However, in reality businesses are encountering system incompatibilities when creating enterprise mobile apps.
One main challenge is the supporting of new operating environments. The growing popularity of smartphones means that different mobile platforms need to be considered. Applications therefore need to be platform agnostic, even if they are mobile web based. More importantly, these apps need to be thoroughly tested to reduce the risk of failure and help lower ongoing maintenance costs.
Many core IT systems will already be comprised of well-defined functions that individually or collectively provide a valuable business service. Hence, exposing the mechanics of these services is often the main challenge and a good test of architectural prowess for mobile app developers who usually face the challenge of ‘how’ rather than ‘what’.
In developing mobile apps, the trick is to re-use as much of what is already working, and only build new what is absolutely needed. Rewriting a back-end IT system for the sake of a new mobile interface is overcomplicating an already complex IT task.
The trick of re-using proven technology isn’t a new idea: Existing web portals, which themselves are usually just hooks into pre-existing IT systems, can be harnessed for mobile apps. If applications are already connected with the Internet, IT can focus on the content delivery and management of existing functionality to mobile devices. In theory, then all that has to be created is a mobile interface.
Older core systems are typically better architected for re-use, as the core logic is more easily accessible from calling services such as remote devices.
As a result, many businesses are choosing to build application portals that allow new (mobile) interfaces to access existing business functions as the simplest approach to providing new mobile applications and services.
According to a recent survey carried out by market research firm Vanson Bourne, Australia, together with New Zealand and Hong Kong, has one of the highest rates of mobile deployments of mainframe applications in the world. To-date, close to a quarter (23 per cent) of Australian organisations have extended access to a modernised mainframe application to mobile devices, and more than a third (34 per cent) are planning to do so in the next three to six months.
In order to future proof systems for the rise of mobile, businesses should assess existing infrastructure and proven business services; and not fall into the trap of re-writing systems just to support a new channel. The key to this is to re-use as much that is already working as possible and look at how this can be built upon where needed.
Bruce Craig is country manager at Micro Focus Australia and New Zealand
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.