Welcome!

GovIT Authors: Jim Kaskade, Elizabeth White, Adrian Bridgwater, Bob Gourley, Patrick Carey

Related Topics: SOA & WOA

SOA & WOA: Article

Corporate Applications on a Mobile Device Near You

Web services as the lingua franca of the mobile enterprise

In the enterprise building mobile applications is as much about integration and the corresponding challenges as it is about pure application development.

Recent industry reports reveal that more than 70% of mission-critical data and most of the pivotal business logic that runs worldwide commerce still resides on existing host systems. Based on this dependency, as well as their speed and power, host systems are unquestionably here to stay for most large organizations and will continue to be a foundation for business success as organizations design and implement new business initiatives.

However, many of those same organizations have also invested in packaged applications (SAP, Siebel, Oracle Applications, PeopleSoft, etc.) to manage their businesses. When building mobile solutions that leverage these systems, enterprise developers want to use the existing business logic of these applications (to ensure data integrity, security, etc.) and not have to recreate this logic in new systems.

For many organizations a mobile enterprise solution will need to expose business functions from numerous core business systems in a single, seamless, easy-to-use interface, delivering real business value.

That core business functionality is housed on multiple platforms, including structured data such as databases and unstructured data such as host, ERP, CRM applications and middleware. Without a comprehensive mobile platform with built-in connectivity to these core systems, delivering mobile solutions becomes very difficult.

Therefore, in the enterprise, mobile applications are an extension of the company's existing systems and processes and are very rarely standalone applications in their own right. They are about allowing a mobile workforce to have real-time and continuous access to corporate business processes and information.

Many mobile enterprise applications require real-time access to multiple existing business systems. For example, to provide the sales team with a complete view of the customer, the mobile application might need to interact with the corporate SAP system for sales information, the Siebel system for customer care issues and the mainframe for customer records. To be practical, (limited real estate, data bandwidth, etc.) the mobile enterprise solution should only provide the specific data required for the task and not try to be general-purpose.

As such, mobile integration follows the same principles and tenets as any other integration issue in the corporation. Today's guiding principle for integration is Service Oriented Architecture (SOA) and its major delivery mechanisms XML and Web Services. SOA promises to decouple the end devices and their operating environments from the integration of mobile services with corporate applications. The adoption of XML and Web Services will help this come about.

Today, the consensus supports the adoption of mobile middleware. It's clear that off-the-shelf integrated application adapters combined with the capability to define and coordinate transactions across multiple back-end corporate applications (with process management) is the recipe for delivering corporate business processes and applications to mobile devices.

Mobile Computing
The spike in laptop, notebook, and tablet-type devices over the last few years underscores the demand for information that travels with people as they move around. These devices have become essential tools for many different types of mobile workers, from sales people to service technicians, who need to access and enter data electronically.

In recent years, the market for small handheld computers such as Personal Digital Assistants (PDAs) has grown rapidly and trends are pointing toward exploiting mobile technology even more. Research shows that while laptops are still the mobile device of companies, smaller handheld devices are being used to deliver mobile e-mail to field personnel. The RIM Blackberry has been at the forefront of this new age of mobile communication, but other vendors are able to deliver mobile e-mail on other handheld devices such as those using the Microsoft Windows Mobile and Symbian platforms. In addition, many employees have purchased handheld devices and are looking to leverage these devices in their business lives. Many companies now face the challenge of coming up with a strategy that turns PDAs into useful productivity and communications devices. These companies face an equal challenge due to the rapid evolution of PDA technology - much faster than conventional PCs and laptops.

Nowadays most of these devices come loaded with more than one wireless option for data communications including Bluetooth, Wi-Fi, General Packet Radio Service (GPRS), and other 3G network technologies such as EDGE. All of these devices come with browser support, which in most cases, goes beyond support for Wireless Application Protocol (WAP) to support standard HTML-based Web sites. Most of these modern devices also support development frameworks, such as J2ME and the Microsoft .NET Compact Framework, which creates new opportunities to develop solutions beyond mobile e-mail. With this, the availability of literally thousands of Wi-Fi hotspots has meant that a combination of 3G GPRS and Wi-Fi can realistically be used to deliver the mobile infrastructure needed by the enterprise.

The real opportunity for companies is to move beyond mobile e-mail and begin to leverage the millions of mobile devices already in the hands of salespeople, service representatives, and customers, delivering corporate information directly to the point where it's needed.

The Mobile Internet - Reality versus Hype
In the past the media - with plenty of eager help from overzealous marketing campaigns - has generated a massive amount of hyperbole about the potential of the mobile Internet. By confusing "Internet-capable" with "can do everything that the wired Internet can do," the mobile Internet has been over-sold. Many companies' inflated expectations have been dashed by the realities of yesterday's first-generation implementation of the mobile Internet.

If we look back to the year 2000, it was estimated that by 2004 the number of Internet-capable cell phones being shipped and used would outstrip - by a large margin - those that didn't have a data communications capability. That milestone was reached in half the time.

According to Forrester Research in 2005 mobile networks covered 80% of the world's population, which means that more than five billion people are within range of a cellular network. And a quarter of the world's population - some one-and-a-half billion people - use mobile services. In addition, 78% of those users are connected to GSM networks, with the greatest penetration of mobile use in Europe followed by the United States.

IDC has estimated that more than 55 million mobile devices were sold in 2005, a boost of 165% over 2004. In other surveys IDC has said that approximately 40% of these devices will possibly require middleware in an enterprise environment. It's estimated that there are tens of millions of phones capable of running J2ME applications - all of which can integrate with the enterprise through their HTTP and Web capabilities.

Gartner, the research company, estimates that mobile terminal sales is likely to reach 848 million by 2008. Gartner also estimate that in the third quarter of 2005 shipments of Smartphones exceeded 12 million units. World Smartphone shipments surpassed those of PDAs for the first time in 3Q04 by 1.2 million units, and in 3Q05 this gap widened to nine million units.

Lessons Learned
Mobile Internet pioneers have learned some important lessons:

  1. The mobile Internet is not suitable for all of the same applications you find on the wired Internet. The key is choosing applications that fit in the screen space and speed constraints of today's mobile devices. Applications that provide on-the-spot order entry, sales force automation, customer lookups, and equipment service are all excellent candidates for mobile Internet use.
  2. Mobile Internet technology, at all levels, is moving very fast - handsets, network speeds, interoperability standards, and protocols are all evolving rapidly. Mobile phone manufacturers, network infrastructure players, and mobile network providers are investing massive amounts of resources in developing and deploying the next-generation networks. Today's devices have bigger full-color screens as well as faster networks that enable even more types of applications and services to go mobile.
  3. Mobile network technology is not a North American technology, or European, or is it GSM-specific or tied to any transport network or technology. Mobile applications mask all the local differences and enable worldwide deployment of mobile applications using virtually any handset and wireless network.
Many corporations have started to deploy mobile applications to small projects and a substantial number in experimental or pilot stages. The types of mobile applications being deployed range from packaged mobile applications, used to deliver solutions for specific groups (such a field service), to custom mobile applications where they need access to multiple corporate systems in a singe solution.

When it comes to the benefits of mobile technology in the enterprise, most companies cite better employee productivity as the major gain, with the advantages of real-time access to corporate information a close second. The more information people have at their disposal, the better decisions they will make.

Forrester defined mobile enterprise technology as a set of technologies - including networks, infrastructure, and portable devices - that enable employees and systems to use applications in a mobile environment. Key deliverables from mobile-enabling corporate applications include a boost in customer service, an increase in productivity, and a reduction in costs.

The concept of multi-channel and multi-modal applications means that corporate applications should inherently be able to support access from any device. Of course, in reality this is not the case and won't be for quite some while. In the meantime, mobile application middleware will deliver solutions that allow both legacy custom-developed applications and contemporary packaged applications to be accessed from handheld devices from a multiplicity of vendors. Obviously, any mobile middleware solution should have built-in support for as many enterprise applications, old and new, as possible.

Back in 2004 Gartner said that companies should plan for a widening range of mobile application platforms to become available. It advised companies to plan on mobile applications becoming a strategic part of their IT portfolio and not just tactical solutions.


More Stories By Roy Mitchell

Roy Mitchell is a senior product manager at NetManage (www.netmanage.com), a software company that provides solutions for accessing, Web enabling, and integrating enterprise information systems. Roy has more than 10 years of product management experience in enterprise software solutions.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the industry’s first all flash version of HyperConverged Appliances that include both compute and storag...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from hardware to software, or as we like to say, it’s an Internet of many different things. The difference ...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...