InfoQ Homepage Mobile Content on InfoQ
-
Can Cordova Fit Your Target Industry?
Cordova is an effective tool when in the right hands and when used for purposes it can cope with. This article discusses what app categories are the good, the bad, and the best for Cordova development.
-
Affordable React Native Mobile App Development
This article reviews the main benefits of developing a React Native mobile app and discusses a number of scenarios to make it more affordable, including local development, offshoring, and outsourcing.
-
Mobile DNUN: Danger Notification and User Navigation
This article introduces the authors’ Danger Notification and User Navigation (DNUN) application, which works in conjunction with a geolocation system to save the location of users or objects for emergency rescue or later navigation. The DNUN mobile application can help rescue a user by sending an email with a danger notification to intended contacts.
-
Model-Based Software Engineering to Tame the IoT Jungle
The ThingML approach, which was inspired by UML, addresses the challenges of distribution and heterogeneity in the Internet of Things. This model-driven, generative approach has been continuously evolved and applied to cases in different domains, including a commercial e-health solution
-
Enabling IoT Ecosystems through Platform Interoperability
The fragmentation of the Internet of Things (IoT) and the lack of interoperability prevent the emergence of broadly accepted IoT ecosystems. The BIG IoT (Bridging the Interoperability Gap of the IoT) project aims to ignite such an ecosystem.
-
Robotic Testing of Mobile Apps for Truly Black-Box Automation
Axiz is a robotic-test generator for mobile apps. Here, we compare our approach with simulation-based test automation, describe scenarios in which robotic testing is beneficial (or even essential), and tell how we applied Axiz to the popular Google Calculator app.
-
Security Implications of Permission Models in Smart-Home Application Frameworks
This article presents an analysis of a popular smart-home programming framework, SmartThings, which reveals that many smart-home apps are automatically overprivileged, leaving users at risk for remote attacks that can cause physical, financial, and psychological harm.
-
Key Abstractions for IoT-Oriented Software Engineering
This article provides an overview of the key general characteristics of complex IoT systems and applications. Based on them, the author identifies the software abstractions that could provide the basis for IoT-oriented software engineering, including stakeholders and users, requirements, avatars, and coalitions.
-
A Roadmap to the Programmable World
The emergence of millions of remotely programmable devices in our surroundings will pose significant challenges for software developers. This article proposes a roadmap from today’s cloud-centric, data-centric Internet of Things systems to the Programmable World highlights those challenges that haven’t received enough attention yet.
-
How to Effectively Collect User Feedback in Mobile Application
This article analyzes a variety of forms of collecting feedback in mobile applications from a number of perspectives, including user experience, development, operations,and cost. It also analyzes in which scenario each form of feedback is more applicable, with the purpose of helping mobile application developers or product managers use the right feedback mechanism and improve their products.
-
Processing Streaming Human Trajectories with WSO2 CEP
Extracting useful information from an inaccurate data stream is a significant issue in data stream processing for IoT applications. This article describes the use of Kalman filters to smooth human trajectory information gathered from an iBeacon sensor network and demonstrates its effectiveness. The solution has been built with WSO2 CEP, a complex event processing middleware.
-
An Introduction to Differential Privacy
Differential privacy leapt from research papers to tech news headlines last year when, in the WWDC keynote, Apple VP of Engineering Craig Federighi announced Apple’s use of the concept to protect user privacy in iOS. This article gives a definition of differential privacy and example of differentially private algorithms.