SlideShare una empresa de Scribd logo
1 de 35
Are you ready for Mobile?
f
1
2
Agenda
 Session Objectives
 Introduction
 Enterprise Mobile situational analysis
 Mobile Strategy
 Challenges in mobile development
- Some approaches for discussion
 Wolters Kluwer mobile success stories
 Lessons learned
 Closing
3
Session Objectives
 Explore how mobile is impacting enterprise business
 Discuss “lessons learned” and how to avoid pitfalls
 Identify key aspects for your mobile strategy
 Understand approach for securing HTML5 apps
 Discuss alternative for secure document handling
4
Donna Burke
Vice President
Exadel
Donna is responsible for Exadel’s Professional Services
engagements and insuring that Exadel’s value to
stakeholders is realized in each and every
engagement. Donna has strategic insight from her
roles ranging from Product Management Director of
Ericsson Global Network Management products to the
founding of LEC Information Systems, a professional
services firm providing unique set of skills for
telecom and hi-tech companies.
Presenter
5
Exadel
A global software engineering
company that provides
services, technology
innovations, and solutions to
businesses worldwide with a focus
on
Enterprise Mobile Enablement.
From Strategy to Delivery
6
Wolters Kluwer and Exadel
Partners since 2006
7
8
Exadel Global Presence
8
Headquarters Delivery CenterSales Office
Donetsk, Ukraine
Kharkov, Ukraine
Munich, Germany
Yekaterinburg, Russia
Chelyabinsk, Russia
Moscow, Russia
Vitebsk, Belarus
Minsk, Belarus
Chicago, IL
New York, NY
Walnut Creek, CA
Implementation Excellence
99
Why Mobile?
1.1 billion smartphones in the world
At the height of Internet bubble, there were only 28
million broadband users 10
The Future: Mobile, Social, and Collaborative..
 Growing demand to use the latest technology
 Increasing trend towards "bring your own device"
 Clients expect a mobile experience (smart phones,
 By 2013, 80% of businesses will support a workforce
using tablets for anytime, anywhere service. *
 By 2014, 90% of organizations will support corporate
applications on personal devices. *
 Online/mobile/social is creating new opportunities to
enrich interactions
*Forrester
11
Information in your pocket
12
Did you know?
The smartphone in your pocket has more computing
power than NASA when it put a man on the Moon in 1969
1313
People and information are rarely co-located
14
What is your mobile strategy?
 One size does not fit all
 Native, hybrid or mobile web – depends on use case
- Native costs are much higher
- Hybrid (HTML5) security
- Mobile web extends reach to more devices
 Platforms
- iOS, Android, Windows
- Devices – Phone or tablet
 Backend support
 Security
 Distribution Approach
15
Challenges in Mobile App development
 Ease of use of mobile phones and tablets creates
impression of simplicity
 Platform & Technology fragmentation
 “Consumer” expectations are high
 Time to market pressure “to be in the game”
 Integration with existing systems
 HTML5 security
 Secure document handling
16
Integration Challenges
 Not all Enterprise back-ends are mobile ready
 Re-use of corporate assets is mandatory
- Changing systems is not realistic
 Securely exposing Enterprise assets via REST
 Expensive, time consuming and tedious work
 Ongoing support and maintenance
17
Integration approach for mobile age
18
Any client device:
- Desktop
- Laptop
- Tablet
- Phone
- …
Corporate
Firewall
REST request (Post, Get, …)
REST response (JSON or XML)
SOAP Server
DB
Server
RestXpress:
Creates SOAP request and
invokes Web Service
Parses SOAP response and
converts it to JSON or XML
RestXpress:
Sends SQL statement to DB
Parses returned dataset and
converts it to JSON or XML
Security Challenges – HTML5 (hybrid) apps
 Hybrid apps are the best way to write once run
anywhere.
 Generic hybrid app is exposed to all sorts of security
threats. Namely code, data at rest/transit.
 There is currently no generic or platform specific
solution on the market.
 HTML5 app source code (HTML5, JS, CSS) is not secure
 Web browser content and data storage not secure.
19
Approach for Secure HTML5 Apps
20
Server
REST API
Business Logic
Cordova Native Libraries
HTML5 Cache
Cookies Cache
HTML5 Local Storage
HTML5 Local Session
Web View Secure Server
Authentication
Authorization
HTML5 Apps Repository
HTML5 App
Secure Cache
HTML5 App
HTML JS
Cordova.js
CSS
HTTPS /
SSL
Channel
HTTPS / SSL Channel
Web SQL Database
Proxy Service
Security Challenges – Secure Document handling
21
Wolters Kluwer Demo
• Develop additional security framework for iOS as
extension creating security for web cache & cookie files
on iOS devices.
• Store any document in the security storage to access it
in offline mode.
• Security storage utilizes AES-256 CBC encryption on
1024 bytes long pages for web cache (and 4096 bytes
long pages for files)
• This security framework can be used with any hybrid
application based on iOS.
• Web sources will be on the private web server and use
client authentication.
Working with Hybrid apps
22
Working in offline mode
23
Success Stories
Wolters Kluwer & Exadel
24
Wolters Kluwer Success Stories
 Assets – Globally reusable components for development and integration
- Vesta project
- OSA Framework
- Velvet
- OWL Framework
 Applications
- CCH Mobile
- ELF
25
Access Tax & Accounting content & research
26
Tax filing data & stats with client portfolio access
27
Value-add component for Kluwer Nav.
28
Closing
29
Lessons Learned
 Assemble small, focused development teams
 Favor simple development tools over complex ALM
processes
 Adapt Agile principles to the realities of mobile
development
 Balance release speed with a focus on quality.
 Prioritize gathering user feedback and forming a rapid
response to it
30
How we can partner
 Strategic Vision
 Provide Technology Innovation
 Professional Consulting
 Practical Implementation and best practices
 Augment your team’s resources
31
The Exadel Difference
 Red Hat….
 Client centric approach
 Efficient, proven development processes
 Top notch talent
 Forward looking Innovation
 Budget friendly
 Uncompromised high standards
 Financially successful, proven management
 Complete Services Portfolio
- Full product life-cycle coverage
32
Donna Burke
Vice President
Exadel
dburke@exadel.com
+1.925.602.5571 (Office)
+1.925.918.1900 (Mobile)
Contact Information
33
Thank You!
34
Questions
35

Más contenido relacionado

La actualidad más candente

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
Netwrix Corporation
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
InishTech
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
Nilay Mishra
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
giladpn
 

La actualidad más candente (20)

Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Highlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case StudiesHighlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case Studies
 
Summary of Career Accomplishments
Summary of Career AccomplishmentsSummary of Career Accomplishments
Summary of Career Accomplishments
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
 
VTG Cloud Solutions
VTG Cloud SolutionsVTG Cloud Solutions
VTG Cloud Solutions
 
Mobilizing windows-apps
Mobilizing windows-appsMobilizing windows-apps
Mobilizing windows-apps
 
ESC Boston 2010
ESC Boston 2010ESC Boston 2010
ESC Boston 2010
 
Technology update
Technology updateTechnology update
Technology update
 
Windows developer program for IoT
Windows developer program for IoTWindows developer program for IoT
Windows developer program for IoT
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
 
Enabling the digital workspace
Enabling the digital workspaceEnabling the digital workspace
Enabling the digital workspace
 
Case Study: Eureka Forbes Limited's Success Story with Vaultastic
Case Study: Eureka Forbes Limited's Success Story with Vaultastic Case Study: Eureka Forbes Limited's Success Story with Vaultastic
Case Study: Eureka Forbes Limited's Success Story with Vaultastic
 
User Innovation - Xbox Kinect
User Innovation - Xbox KinectUser Innovation - Xbox Kinect
User Innovation - Xbox Kinect
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
 

Similar a Are you ready for Mobile?

1st Periodical Test
1st Periodical Test1st Periodical Test
1st Periodical Test
anthony caya
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User Group
Jon Marshall
 

Similar a Are you ready for Mobile? (20)

Microsoft Azure Public Cloud - MDSC1
Microsoft Azure Public Cloud - MDSC1Microsoft Azure Public Cloud - MDSC1
Microsoft Azure Public Cloud - MDSC1
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public Cloud
 
Ibm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcIbm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mc
 
CloudBerry
CloudBerryCloudBerry
CloudBerry
 
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
 
Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014
 
How to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital TransformationHow to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital Transformation
 
Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Enterprise Mobile Development Best Practices for 2015
Enterprise Mobile Development Best Practices for 2015Enterprise Mobile Development Best Practices for 2015
Enterprise Mobile Development Best Practices for 2015
 
AWS Webcast - Datacenter Migration to AWS
AWS Webcast - Datacenter Migration to AWSAWS Webcast - Datacenter Migration to AWS
AWS Webcast - Datacenter Migration to AWS
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
1st Periodical Test
1st Periodical Test1st Periodical Test
1st Periodical Test
 
1st Periodical Test
1st Periodical Test1st Periodical Test
1st Periodical Test
 
Periodical Exam
Periodical ExamPeriodical Exam
Periodical Exam
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
 
Cloud Innovation Tour - Design Track
Cloud Innovation Tour - Design TrackCloud Innovation Tour - Design Track
Cloud Innovation Tour - Design Track
 
Resume-RDn-Detailed
Resume-RDn-DetailedResume-RDn-Detailed
Resume-RDn-Detailed
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User Group
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Último (20)

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 

Are you ready for Mobile?

  • 1. Are you ready for Mobile? f 1
  • 2. 2
  • 3. Agenda  Session Objectives  Introduction  Enterprise Mobile situational analysis  Mobile Strategy  Challenges in mobile development - Some approaches for discussion  Wolters Kluwer mobile success stories  Lessons learned  Closing 3
  • 4. Session Objectives  Explore how mobile is impacting enterprise business  Discuss “lessons learned” and how to avoid pitfalls  Identify key aspects for your mobile strategy  Understand approach for securing HTML5 apps  Discuss alternative for secure document handling 4
  • 5. Donna Burke Vice President Exadel Donna is responsible for Exadel’s Professional Services engagements and insuring that Exadel’s value to stakeholders is realized in each and every engagement. Donna has strategic insight from her roles ranging from Product Management Director of Ericsson Global Network Management products to the founding of LEC Information Systems, a professional services firm providing unique set of skills for telecom and hi-tech companies. Presenter 5
  • 6. Exadel A global software engineering company that provides services, technology innovations, and solutions to businesses worldwide with a focus on Enterprise Mobile Enablement. From Strategy to Delivery 6
  • 7. Wolters Kluwer and Exadel Partners since 2006 7
  • 8. 8 Exadel Global Presence 8 Headquarters Delivery CenterSales Office Donetsk, Ukraine Kharkov, Ukraine Munich, Germany Yekaterinburg, Russia Chelyabinsk, Russia Moscow, Russia Vitebsk, Belarus Minsk, Belarus Chicago, IL New York, NY Walnut Creek, CA
  • 10. Why Mobile? 1.1 billion smartphones in the world At the height of Internet bubble, there were only 28 million broadband users 10
  • 11. The Future: Mobile, Social, and Collaborative..  Growing demand to use the latest technology  Increasing trend towards "bring your own device"  Clients expect a mobile experience (smart phones,  By 2013, 80% of businesses will support a workforce using tablets for anytime, anywhere service. *  By 2014, 90% of organizations will support corporate applications on personal devices. *  Online/mobile/social is creating new opportunities to enrich interactions *Forrester 11
  • 12. Information in your pocket 12
  • 13. Did you know? The smartphone in your pocket has more computing power than NASA when it put a man on the Moon in 1969 1313
  • 14. People and information are rarely co-located 14
  • 15. What is your mobile strategy?  One size does not fit all  Native, hybrid or mobile web – depends on use case - Native costs are much higher - Hybrid (HTML5) security - Mobile web extends reach to more devices  Platforms - iOS, Android, Windows - Devices – Phone or tablet  Backend support  Security  Distribution Approach 15
  • 16. Challenges in Mobile App development  Ease of use of mobile phones and tablets creates impression of simplicity  Platform & Technology fragmentation  “Consumer” expectations are high  Time to market pressure “to be in the game”  Integration with existing systems  HTML5 security  Secure document handling 16
  • 17. Integration Challenges  Not all Enterprise back-ends are mobile ready  Re-use of corporate assets is mandatory - Changing systems is not realistic  Securely exposing Enterprise assets via REST  Expensive, time consuming and tedious work  Ongoing support and maintenance 17
  • 18. Integration approach for mobile age 18 Any client device: - Desktop - Laptop - Tablet - Phone - … Corporate Firewall REST request (Post, Get, …) REST response (JSON or XML) SOAP Server DB Server RestXpress: Creates SOAP request and invokes Web Service Parses SOAP response and converts it to JSON or XML RestXpress: Sends SQL statement to DB Parses returned dataset and converts it to JSON or XML
  • 19. Security Challenges – HTML5 (hybrid) apps  Hybrid apps are the best way to write once run anywhere.  Generic hybrid app is exposed to all sorts of security threats. Namely code, data at rest/transit.  There is currently no generic or platform specific solution on the market.  HTML5 app source code (HTML5, JS, CSS) is not secure  Web browser content and data storage not secure. 19
  • 20. Approach for Secure HTML5 Apps 20 Server REST API Business Logic Cordova Native Libraries HTML5 Cache Cookies Cache HTML5 Local Storage HTML5 Local Session Web View Secure Server Authentication Authorization HTML5 Apps Repository HTML5 App Secure Cache HTML5 App HTML JS Cordova.js CSS HTTPS / SSL Channel HTTPS / SSL Channel Web SQL Database Proxy Service
  • 21. Security Challenges – Secure Document handling 21 Wolters Kluwer Demo • Develop additional security framework for iOS as extension creating security for web cache & cookie files on iOS devices. • Store any document in the security storage to access it in offline mode. • Security storage utilizes AES-256 CBC encryption on 1024 bytes long pages for web cache (and 4096 bytes long pages for files) • This security framework can be used with any hybrid application based on iOS. • Web sources will be on the private web server and use client authentication.
  • 25. Wolters Kluwer Success Stories  Assets – Globally reusable components for development and integration - Vesta project - OSA Framework - Velvet - OWL Framework  Applications - CCH Mobile - ELF 25
  • 26. Access Tax & Accounting content & research 26
  • 27. Tax filing data & stats with client portfolio access 27
  • 28. Value-add component for Kluwer Nav. 28
  • 30. Lessons Learned  Assemble small, focused development teams  Favor simple development tools over complex ALM processes  Adapt Agile principles to the realities of mobile development  Balance release speed with a focus on quality.  Prioritize gathering user feedback and forming a rapid response to it 30
  • 31. How we can partner  Strategic Vision  Provide Technology Innovation  Professional Consulting  Practical Implementation and best practices  Augment your team’s resources 31
  • 32. The Exadel Difference  Red Hat….  Client centric approach  Efficient, proven development processes  Top notch talent  Forward looking Innovation  Budget friendly  Uncompromised high standards  Financially successful, proven management  Complete Services Portfolio - Full product life-cycle coverage 32
  • 33. Donna Burke Vice President Exadel dburke@exadel.com +1.925.602.5571 (Office) +1.925.918.1900 (Mobile) Contact Information 33

Notas del editor

  1. From voice, texting, and emailprovide instant access to information, from weather to stock quotes to location-based services, videos, and social media. Higher network speeds, more advanced devices, high quality user experience driving adoption
  2. Someone said “mobile in the enterprise is like Crack, can’t get enough”
  3. device users generate more transactionsTablets: 87 Million 10” Tablet users by 2013 YE7” table use is not clear yetBackend vs frontend: More focus to frontend – power is driven by the backend Use tools like RESTXpress to simplify and streamline
  4. RESTXPressSecure Document
  5. The app runs out of secured cache inside proprietary developed container.Entire web data content runs inside proprietary developed container.Secure server serves as a proxy for entire app calls as well as the app repository.Secure server will support multiple appsMinimum effort required in order to secure existing hybrid apps.
  6. Application is running after authorization (username and password should be provided to open security storage)User can browse any previously viewed documents
  7. Wolkters Kluwer NLValue add to customer at no additional cost
  8. Application DevelopmentEnd-to-end integrationCustom application developmentMobile Center of ExcellenceCloud ImplementationTesting Test Automation Test ExecutionPerformance Benchmarking and Analysis