Mobile Application Architecture Initiative Steve Wheat Chief IT Architect.

Slides:



Advertisements
Similar presentations
Siebel Web Services Siebel Web Services March, From
Advertisements

First create and sign up for a blue host account Through the help of Blue Host create a WordPress website for the business After you created WordPress.
The International Security Standard
DirectAccess Infrastructure Planning and Design Published: October 2009 Updated: November 2011.
Internet of Things Security Architecture
ARCH-01: Introduction to the OpenEdge™ Reference Architecture Don Sorcinelli Applied Technology Group.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Scale Up Access to your 4GL Application using Web Services
UNIT-e Research & Development Microsoft Technology Day Stephen Cain (System Architect)
Information Security Policies and Standards
SOA with Progress Philipp Walther Consultant. © 2007 Progress Software Corporation2 Agenda  SOA  Enterprise Service Bus (ESB)  The Progress SOA Portfolio.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Technical Brief v1.0. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats Easy.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
Mobile Agents for Integrating Cloud-Based Business Processes with On-Premises Systems and Devices Janis Grundspenkis Antons Mislēvičs Department of Systems.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Creation of hybrid portlet application for file download using IBM Worklight and IBM Rational Application Developer v9 Gaurav Bhattacharjee Lakshmi Priya.
Course 201 – Administration, Content Inspection and SSL VPN
Presented by…. Group 2 1. Programming language 2Introduction.
Emory Mobile App Catalog Administration Part 1: Mobile App Processes & Background.
Sharing Geographic Content
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
The Design Discipline.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
Open source administration software for education next generation student system Using the Kuali Student Configurable User Interaction Model & Framework.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Introducing Axis2 Eran Chinthaka. Agenda  Introduction and Motivation  The “big picture”  Key Features of Axis2 High Performance XML Processing Model.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
4/2/03I-1 © 2001 T. Horton CS 494 Object-Oriented Analysis & Design Software Architecture and Design Readings: Ambler, Chap. 7 (Sections to start.
Center-to-Peer-to-Center A model for building maximal value from peer services.
An Operators Input for oneM2M Baseline  Group name: TP#2/WG1  Source: DTAG, Vodafone Group  Meeting Date:  Agenda Item: WG1 agenda item.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
Windows Server ® 2008 R2 Remote Desktop Services Infrastructure Planning and Design Published: November 2009.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
Getting Started with Chatter Nina Jameson Senior Business Analyst, ISU-ITS (office)
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
TANGO TANGO ALTERNATE NETWORK GRAPH ORGANIZER Olof Hellqvist Zak Blacher.
.  A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate.  Taken advantage of Spring’s multi layer injection.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
SAURABH PANT PROGRAM MANAGER MICROSOFT CORPORATION Client Application Services in Orcas Authentication, Roles & Web Settings.
INT-9: Implementing ESB Processes with OpenEdge ® and Sonic ™ David Cleary Principal Software Engineer.
Real-Time Cyber Physical Systems Application on MobilityFirst Winlab Summer Internship 2015 Karthikeyan Ganesan, Wuyang Zhang, Zihong Zheng Shantanu Ghosh,
© 2013, published by Flat World Knowledge Chapter 10 Understanding Software: A Primer for Managers 10-1.
Dyalog’08. Conga, SSL and WebServices Morten Kromberg Dyalog’08 - Elsinore.
ARCH-7: Integrate this! SonicMQ® and the OpenEdge® Reference Architecture Christian Stiller Technical Architect.
California Department of Public Health / 1 CALIFORNIA DEPARTMENT OF PUBLIC HEALTH Standards and Guidelines for Healthcare Surge during Emergencies How.
and LMAP liaison Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
REST API to develop application for mobile devices Mario Torrisi Dipartimento di Fisica e Astronomia – Università degli Studi.
Added Value to XForms by Web Services Supporting XML Protocols Elina Vartiainen Timo-Pekka Viljamaa T Research Seminar on Digital Media Autumn.
APACHE Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server.
Process 4 Hours.
My2N – Mobile Video Technical Training
Sample Fit-Gap Kick-off
Rapid Launch Workshop ©CC BY-SA.
About Client Client is a pioneer in industry that provides catastrophe risk modeling, real-time risk exposure and risk management through available live.
Select and Implement an ESB Solution
EMV® 3-D Secure - High Level Overview
Chapter 18 MobileApp Design
SharePoint Online Authentication Patterns
Saravana Kumar CEO/Founder - Kovai Atomic Scope – Product Update.
SOA-09: Conducting Business with OpenEdge® and SonicMQ®
Presentation transcript:

Mobile Application Architecture Initiative Steve Wheat Chief IT Architect

Agenda Goals of the Mobile Application Architecture Initiative Method of Achieving the Goals of the Initiative Progress and Overview of Current Recommendations This presentation and links to everything referenced here are available at

Goals Design and develop a number of mobile applications Write a mobile application reference guide similar in scope and detail to guides prepared for EAI/SOA and web application frameworks Review, expand and amend the reference guide with review and input from units that develop, support, and implement mobile applications Implement the recommendations of the reference guide in the architecture review checklists and technical design review processes as appropriate

Mobile Applications Over the past two years we have designed, developed, and/or deployed and integrated the following mobile applications: BioCatalogue Mobile EdUnify Mobile Emory Mobile PKU Mobile* WebEase Mobile Mass Transfusion Protocol (MTP) Mobile* WebEase Mobile for Kids* * Design stage only, no funding yet for implementation and deployment

Mobile Application Reference Guide Like the EAI/SOA and web application reference guides it provides both a high-level overview and low-level detail (microarchitectures) for developing mobile applications Serves as both an instructional guide and architecture compliance reference Implemented as a wiki so everyone who uses it may comment, propose and collaborate on new sections Intended to facilitate communication in detail. The engineering of modern software requires written documentation and schematics to facilitate intelligent discussion

Review, Expand, Amend… The outline of these guides follow high-level scenarios of the types of projects we undertake. For example: – Build a mobile application – Engage consultants to build a mobile application – Implement/customize a vended mobile application – Store and manage data collected by existing mobile applications – Expose Emory data to existing mobile applications Well address most of these major scenarios, but there may be others identified in the review The low-level details require extensive review of the goals of each microarchitecture and code samples from reference implementations and actual projects

Implement Recommended Architecture Train technical leads and reviewers in the details of the architecture described in the reference guide. Most should already be well acquainted with the approach from reading, commenting, and proposing new sections to the guide on the wiki Add clear guidelines to implement these architectures to the technical design, architecture, and security review templates as appropriate

HALS WebEase Service Proxy Service Routing Service Sonic Cluster Logging Service We b Eas e Ap p We b Eas e Ap p We b Eas e WS Mobile App Architecture Overview We b Ap p We b Ap p Web Servi ce Faca de Web Servi ce Faca de HIPAA Audit Logging Service Web Apps ESB Service Proxy Service Routing Service JMS Provider Cluster Logging Service https ssl client cert auth Certificate Service Key Mgmt. Service

Progress and Recommendations to Date (1) Mobile application architecture relies heavily on the existing EAI/SOA and web application architectures Mobile applications must access application logic and data through a service layer, which also implements additional security---SOA is no longer optional OITs Google Web Toolkit web application frameworks allow us to provide alternative views for mobile devices within the same framework we use to create desktop web views. Because almost all mobile applications have a need for desktop interfaces, developing mobile web apps using this common framework should be our default approach

Progress and Recommendations to Date (2) There are use cases that trigger the need for native iOS and Android mobile applications that are not readily accommodated with mobile web applications. These include the need for: – Continuous background processing or collection of data (i.e. connecting seizure motion data from an accelerometer) – significant amounts of frequent or rapid data entry (i.e. entering detailed diet information throughout each day) – Unreliable or intermittent network connectivity (i.e. running a diagnostic algorithm in the ER at Grady)

Progress and Recommendations to Date (3) Native iOS and Android applications bring with them the need for additional microarchitectures and security considerations, especially for applications subject to HIPAA compliance policies. These architectures include the need for: – Message object API to represent application data and logic for iOS and Android – Web service client generator for iOS and Android to generate web service clients for each web service with which applications must interact and to implement access of server side resources in a consistent and uniform manner – Client authentication mechanism to authenticate the distributed client application – Client authentication mechanism to authenticate the device deployment of the client application – User authentication mechanism to authenticate the user of the client – Data encryption for persistent data stored on the mobile device – Distribution mechanism for internal mobile applications (apps that are not distributed through publicly accessible app stores)

Progress and Recommendations to Date (4) In each of these areas weve implemented or are working on the following: – Objective C Message Object API generator comparable to MOA gen in Java – Web service client generator for Objective C similar to Apache Axis wsdl2java for Java – Client certificate authentication for all mobile applications we distribute – Replacing the distribution certificate with a deployment certificate upon first use (this and the preceding item require certificate generation and management ESB/web services) – User authentication ESB/web service – Data encryption framework for application data on the mobile device (requires key management ESB/web services) – Over the air internal mobile application distribution available at

Status and Documentation All of these findings and recommendations are appearing in one of two wiki spaces: – Google Web Toolkit Reference Guide – Mobile Application Architecture Reference Guide GWT Guide is already complete and vetted with more details being added for mobile web app interfaces Mobile App Reference Guide will be ready for in depth discussion and review by Summer 2013 after the release of a couple more mobile apps

The End Questions?