Click here to close now.

Welcome!

API Journal Authors: Elizabeth White, Liz McMillan, Pat Romanski, Carmen Gonzalez, AppDynamics Blog

Blog Feed Post

Apple iOS and the Enterprise - Latest Developments

My friend and mobile expert Dave Akka shares his insights on the latest Apple strategies and developments to support the enterprise in this guest article.

Following the recent Apple WWDC developer conference, it’s worth looking at what they are doing to make their products more attractive to the enterprise?

iOS: The accidental leader?

As NetApp’s Mike Elgan noted recently, iOS became the leading operating system for enterprise mobility almost by accident, although it might be more accurate to say that it wasn't originally designed for the enterprise or expected to be such a hit.  The iPhone was released as a consumer device like the iPod into a world of feature phones with a small smartphone market dominated by Nokia’s Symbian, while the Blackberry was the fully-locked-down enterprise mobility device of choice.  No one expected that the consumers who bought the iPhone would consider it to be so much better than their work devices that they would break every policy imaginable to use them at work, and kickstart the BYOD or Bring Your Own Device phenomenon.

The iPhone became the dominant enterprise mobile platform for several reasons, including the ease of developing corporate apps, the iPhone’s popularity as a status symbol that made it the choice for senior managers who were able to insist on using it, and a few enterprise-friendly features that were added to iOS over time.  However the biggest reason is that it has a large, loyal customer base that love the device and feel it makes them more productive.

In the pre-BYOD world, it was assumed that consumers wanted usability, photo quality and a wide choice of applications (or the ability to do anything with the device), whereas enterprise users weren't important because it was all about management tools and easy integration into corporate systems. BYOD showed that enterprise users are also consumers, and want the same things from a work phone that they do from a personal one.

A good demonstration of this is that the first time I saw BYOD in action was at the end of a meeting when one participant took out his iPhone, took a photo of the whiteboard we had covered in notes, and sent it to everyone in the meeting.  The reaction around the table was “what a useful device; what else can we do with it?” That team had woken up to the potential of BYOD and enterprise mobility.

The iPad took off in a similar way: originally sold as a media consumption device, it has become the enterprise mobility device to take to business meetings with an array of apps that let you present, collaborate, take notes and network far more effectively than was previously possible, and you can even catch up with that latest TV series on the train on the way home.

Possibly as important as any enterprise functionality is the way that Apple sells and supports iOS devices for business in its retail stores.  I recently had a problem with my iPhone and while it was being repaired (which happened easily and seamlessly, by the way) the store staff were keen to discuss whether I used it for business, what apps and functionality I liked, what requirements it filled and so on. This showed a real commitment to making iOS devices easy for business users to get started with.  iOS devices in the enterprise also lead to Mac sales as you need to use a Mac in order to deploy enterprise apps and settings to iOS.

Apple Adding Enterprise Features

The recent preview of iOS8 shows that Apple is now very deliberately targeting the enterprise mobility market both by reinforcing the user experience that got it this far but also by providing features that make it a more attractive choice for IT.

The newly-announced Device Enrollment Program allows corporate-issued iOS devices to automatically configure and access corporate apps, reducing the time and support needed to get a new device working; and LDAP is a key component as it brings auditability to the iOS deployment with account control and authentication.

Meanwhile, the ability to passcode-protect corporate data on the device, by protecting access to the calendar, contacts, mail, third-party apps and more mean greater security for the enterprise while fingerprint unlocking means the user doesn’t have a headache accessing that data.  VIP messages allow users to keep track of important conversations more easily and even small things like automatic VPN connectivity could make a big difference to the user.

Overall, iOS8 brings advances with:

  • Simplified IT administration and security, between MDM tools; enterprise grade security including encryption, per app iCloud controls and certificate-based single sign-on; and managed book and PDFs to easily deliver content
  • Improved application development, with the TouchID API, document provider APIs, content filtering and extensibility, not to mention the new Swift language
  • Greater ease of use and productivity with improved mail, seamless working between iOS and Mac, improved calendar and peer-to-peer AirPlay

I don't want to go into too much technical detail here, but if you are interested you can find a more detailed breakdown here.

From the enterprise mobility perspective, features like Continuity, which allows users to pick up work where they left off across multiple Apple devices and the ability to create purpose-built keyboards for specific task-related apps could help increase productivity.

iOS is unlikely to completely own the enterprise mobility space in a BYOD world, but it is certainly set to continue its strong performance.

In addition, Apple and IBM announced a partnership yesterday, to aggressively go after the enterprise market.  Here is an excerpt from The New York Times, "In a deal that could deepen Apple’s sales to corporations and strengthen IBM’s position in business software, the two companies announced a wide-ranging partnership intended to spread advanced mobile and data analysis technology in the corporate world."

David Akka, MBA, M.Sc.
Managing Director, Magic Software Enterprises UK  Ltd.
[email protected]

Thanks for sharing Dave!

************************************************************************
Kevin Benedict
Writer, Speaker, Editor
Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict is the Senior Analyst for Digital Transformation at Cognizant, a writer, speaker and SAP Mentor Alumnus. Follow him on Twitter @krbenedict. He is a popular speaker around the world on the topic of digital transformation and enterprise mobility. He maintains a busy schedule researching, writing and speaking at events in North America, Asia and Europe. He has over 25 years of experience working in the enterprise IT solutions industry.

@ThingsExpo Stories
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a business application to multiple users (multi-tenancy). Docker, a container technology, was used to ...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry.
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers is very hard. You have to learn five new and different technologies and best practices (libswarm, sy...
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...