Mobile App Development: 8 Best Practices

...

The underground marketplace is booming and only getting bigger, more sophisticated, and competitiv

Creating great mobile enterprise apps isn't necessarily easy, but it can be easier if you follow these eight critical tips.

If you're in enterprise IT in 2016, the odds are pretty good that you've already been tasked with building a mobile app, or that you'll get that type of project sometime in the next few months. We get it. Mobile apps are cool.

When you're asked to build an app for the first time, it's natural to start looking at all the things that are different between building an app and developing an enterprise application. You might look at frameworks, languages, APIs, and SDKs.

While you're doing all that, you might well miss the really important things -- the things that will make a difference between an app that your users find delightful and an app that finds itself in the trash folder.

Here's a little secret: In many ways, developing a mobile app is just like developing that big enterprise application. Oh, sure, the details are different, but when it comes to the foundation issues, you can take the secrets for a successful mobile app, apply them to an enterprise application, and still be in pretty good shape.

[See 10 Programming Languages That Will Keep You Employed.]

I've put together the following list by talking to developers, looking at stories of how successful apps were developed, and drawing on my own experience managing application development. I hope that you'll find most of these pointers obvious. If you do, it means that you've been paying attention as you developed applications in your own career.

If that's the case, then why present this list at all? I'm putting it together because it might allow you to talk about these points with your executive management, your colleagues, and your teammates. Frankly, if it helps start a useful conversation at the front end of a development project, it will have done a pretty good job.

With that said, I recognize that there are other tips that can make a huge difference when it comes to putting together a successful app. I'm curious about the tips that make up your list.

Are there tips on this list that you don't find useful? Are there additional tips you think should go on this list, even if putting them there means kicking one of the incumbents to the curb?

I'd love to know your list and the tips that have made the biggest difference when it comes to the teams you've managed -- and the apps that have been your biggest successes.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Russian Hackers Target New York Times

    The New York Times appears to be the latest target of Russian hackers.Security agencies believe the hackers are part of the same Russian group that infiltrated the Democratic Party over the summer.
  • 5300c769af79e

    10 Tools To Bring Virtual Reality To Life

    Here's a look at 10 tools that will shape that virtual world.Of all the virtual reality technology emerging from labs or on the horizon, Magic Leap appears to be the most mesmerizing.
  • 5300c769af79e

    FCC Votes to Boost Emergency Alerts With Links, Better Targeting

    But it still struck some as odd that in 2016, when we can seemingly do everything with our phones, that emergency alerts did not support photos.The Federal Communications Commission this week took steps to change that when it approved new rules for the Wireless Emergency Alerts (WEA) system that, among other things, requires carriers to supports links to photos.
  • 5300c769af79e

    Every Time You Check to See if Your OnePlus 3 Has an Update, You Expose Your IMEI

    According to users on reddit and the OnePlus forums, every time an owner of a OnePlus 3 checks to see if they have an update via the Settings menu, their IMEI is sent to the OnePlus servers in plain HTTP and not HTTPS.Because of this, OnePlus 3 owners on an unsecured network (a coffee shop with public WiFi access point, for example), potentially expose their device’s specific IMEI number to would-be evil doers.