Mobile Application Questions List

J.D. Meier, Alex Homer, Jason Taylor, Prashant Bansode, Lonnie Wall, Rob Boucher, Akshay Bogawat

Contents

  • General
  • Authentication and Authorization
  • Caching
  • Communication
  • Configuration Management
  • Data Access
  • Debugging
  • Deployment
  • Device
  • Exception Management
  • Logging
  • Performance
  • Synchronization
  • UI
  • Validation

General

  • What are the types of clients I can build on mobile devices?
  • What are the scenarios when I should build a rich client?
  • What are the scenarios when I should build a thin client?
  • What are the various factors I should consider when choosing device types to be supported?
  • What are the constraints related to mobile devices?
  • When should I use a layered approach for mobile applications?

Authentication and Authorization

  • How do I design authentication strategy for mobile applications?
  • How do I design authorization strategy for mobile applications?
  • What are the challenges while designing authentication and authorization due to device resources?
  • How do I design authentication and authorization for partially-trusted scenarios?

Caching

  • How do I design caching on devices with limited resources?
  • How do I design caching for partially-connected scenarios?
  • How do I select the storage location?
  • Why should I cache data in presentation layer?
  • Why should I cache data in business layer?
  • Why should I cache data in database?

Communication

  • What are the relevant options for communicating with devices?
  • What are the challenges for communication on mobile devices?
  • What are the factors to be considered for wireless communication?
  • What are the options to secure communication with Web service interfaces?
  • What are the scenarios when I should design synchronous communication?
  • What are the scenarios when I should design asynchronous communication?

Configuration Management

  • What are the various options for configuration management in mobile applications?

Data Access

  • What are the deice resource constraints for designing data access?
  • When should I design a separate data access layer for mobile applications?
  • When should I design entities as datasets?
  • When should I design entities as data transfer objects?
  • What are the scenarios when I should consider disconnected databases?

Debugging

  • How do I design mobile applications for easy debugging?
  • What is device emulator and how does it help in debugging applications?

Deployment

  • When should I consider over the air deployment?
  • When should I consider over the ActiveSync deployment?
  • What are the deployment options for Pocket PC?
  • What are the deployment options for Windows CE?

Device

  • What are the various factors to consider while designing for multiple devices?
  • What are the various device resource constraints?
  • What is cradled communication?
  • How do I choose appropriate mobile technology?

Exception Management

  • How do I design effective exception management strategy for devices?
  • How do I design effective exception propagation strategy for devices?
  • What are the common pitfalls in exception management on devices?

Logging

  • How does logging help in securing your mobile application?
  • How do I design logging strategy for various tiers?
  • When should I consider logging on the device?
  • When should I consider logging remotely?

Performance

  • How do I design mobile applications for better performance?
  • How do the device resources and network bandwidth affect performance of mobile applications?

Synchronization

  • What are the relevant options for synchronization?
  • When should I select over the air synchronization?
  • When should I select cradled synchronization?
  • How to implement single-direction synchronization?

UI

  • What are the device constraints for designing UI?
  • How do I design for single window environment?
  • What are the relevant patterns for Web client UI?
  • What are the relevant patterns for rich client UI?

Validation

  • How do I design effective validation strategy?
  • How do I protect applications from cross-site scripting attacks and SQL injection attacks?

Last edited Oct 16, 2008 at 12:31 AM by prashantbansode, version 1

Comments

No comments yet.