InfoQ Homepage Mobile Content on InfoQ
-
Evaluating Kotlin Multiplatform: Benefits and Trade-Offs in Cross-Platform Development
KMP is emerging as an alternative for cross-platform development, offering a path to share code without sacrificing the performance and feel of a native application. KMP comes with its own set of trade-offs and this article dives deep into those. While it focuses primarily on Android and iOS, KMP can be used to build desktop, web, and server-side applications, all from the same shared logic.
-
Engineering Principles for Building a Successful Cloud-Prem Solution
Discover how Cloud-Prem solutions combine cloud efficiency with on-premise control, meeting data sovereignty and compliance demands while optimizing operational costs and enhancing customer security.
-
Building Efficient Mobile Streaming Apps
This article explores efficient preloading systems for mobile video streaming apps, balancing user experience with technical constraints. We will dive into practical implementation strategies that leverage network intelligence, buffer management techniques, AI-driven preloading, and real-world testing methodologies to enhance video delivery in mobile environments.
-
Beyond the Numbers: Decoding Metrics for Assessing Client-Side Engineer Impact
This article will delve into metrics that can be used for assessing the impact of client-side engineers. Our aim is to provide a more comprehensive perspective that can be useful when developing performance assessment guides for organizations building full-stack software, ensuring a more balanced and fair evaluation of engineers’ contributions and impact.
-
Service Assurance in Private LTE/5G Networks
This article talks about service assurance in the context of cellular networks, how private networks pose additional needs, and how an end-to-end service assurance framework can be designed and developed for such networks.
-
Mobile Video-Conferencing Using Jitsi
In this article, we will look at alternatives for providing video meetings on mobile devices. We take Jitsi as a popular open source option, which provides Jitsi Meet, an ad-hoc video meetings service, and JaaS, a service platform for developers. Looking at user engagement data, we see there’s no "one size fits all" solution.
-
The Parity Problem: Ensuring Mobile Apps are Secure across Platforms
The problem of security parity is a big one, but it’s part of a larger problem: a general lack of security in mobile apps. By embracing automation for security implementation to the same or greater degree than it has been adopted for feature development, developers can ensure that every app they release for every platform will be protected from hackers, fraudsters, and cybercriminals.
-
InfoQ Culture & Methods Trends Report - March 2022
The culture and methods trends report for 2022 shows that organizations, teams, and individuals face challenges on multiple fronts. Tackling hybrid work, the impact of the great resignation, wellness, diversity, and inclusion are topics that leaders need to address head-on to build creative and collaborative cultures
-
A Quick Look at Advanced IoT Sensors for the Enterprise Going Digital
Thanks to IoT developing at a rapid pace, devices, including sensors, are becoming more affordable, and the entire ecosystem has gotten smarter. These results allow businesses to satisfy more specific needs according to their manufacturing process, as well as to take measurements in complex conditions. In this article we will provide an overview of where IoT sensors currently stand.
-
InfoQ Mobile and IoT Trends Report 2022
This report summarizes the views of the InfoQ editorial team and of several practitioners from the software industry about emerging trends in a number of areas that we collectively label the mobile and IoT space. This is a rather heterogeneous space comprising devices and gadgets from smartphones to smart watches, from IoT appliances to smart glasses, voice-driven assistants, and so on.
-
How to Harden Applications against IIoT Security Threats
This article will explore two sides of the IIoT security equation: understanding how and why IIoT systems can become vulnerable to hacking attempts, and which solutions and strategies are available to harden them. It will provide also a set of best practices to address IoT security concerns.
-
Mobile DevSecOps Is the Road to Mobile Security
In this article, I’ll discuss some of the most common security deficiencies in mobile apps and explain the potential risks to consumers, app developers, and brands, as well how to break the cycle of poor app security, using automated, rapid, continuous, and iterative deployment.