Tag Archives: App

Blog Cover Security

Protect Your Enterprise with the Top Mobile App Security Tips of 2019

A recent study conducted by AppKnox concluded that out of 100 top E-commerce apps, 95% failed basic security testing, 68% had four or more loopholes present in them, and 68% of apps were diagnosed with high severity threats.

Some of the most popular applications, including WhatsApp, Pokemon Go, and Facebook Messenger, are among the most frequently blacklisted among top enterprises due to the security risks they pose.

As a mobile app developer, security can lead to disaster for both your business and your consumers. Here are our top security tips for 2019:

TESTING AND CODE OPTIMIZATION

The two most important processes for building a secure app are extensive testing and constant refinement of code.

Disorganized code often causes data security risks. Minify code to ensure it is clean and concise and does not burden the application. When coding, think like an attacker and address any vulnerability a hacker could use to penetrate your application. Use libraries that show coding errors to ensure you catch security risks.

By budgeting for a rigorous testing and quality assurance process from the outset of the application development process, software developers ensure their applications will be thoroughly secure. Do not allow time-constraints getting a product to market to interfere with this crucial step. Test for functionality, usability, and security. Test, test, and test some more.

SECURE YOUR APIs

Enterprise developers are relying on application programming interfaces (APIs) more than ever, posing additional security requirements. API development and mobile app development share security considerations. Any vulnerability in an API is a vulnerability in the applications that the API connects. Solve potential headaches with the following tips:

  • Ensure all APIs integrated in your app are optimized for security.
  • Monitor all add-on software carefully to ensure that they do not present any system vulnerabilities.
  • Budget time to test the security of your APIs as well.

Check out TechBeacon’s 8 essential best practices for API security for additional reading.

LIMIT DATA COLLECTION AND PERMISSIONS

By collecting as little data as possible and minimizing permissions, app developers limit vulnerable attack points on their app. If the app does not require access to the camera or contacts, don’t request it. The same sentiment can be applied to data: make sure  users are aware of what data your application is collecting from them and only collect user data that is vital to the application’s functionality.

INTEGRATE A SECURITY TEAM FROM DAY ONE

Incorporating a dedicated security team from the inception of the development process on will ensure that the application has a cohesive security strategy intertwined with app functionality. Bringing the security team in from day one will minimize vulnerabilities that otherwise may slip through the cracks if they are brought on later in the process.

PROTECT CONSUMER DATA

Consumer data is generally the most vulnerable element for any app. The higher the volume of consumer data, the more there is for hackers to steal. In addition to limiting data collections, app developers should look into new data encryption technologies and biometric authentication. Decentralized database technology like the blockchain cryptology are among the most high-tech data protection measures tech companies can undertake.

Learn more about the Blockchain for mobile development via Application Development Trends.

CONCLUSION

In order to maintain secure environments, app developers must stay constantly stay up-to-date on the latest security technologies. Reading tech publications and maintaining awareness of the latest trends will ensure your enterprise is ready to integrate with tomorrow’s tech.

Android Pie (Image Via XDA Developers)

App Developers Take a Bigger Slice of the Pie with Android P

App developers looking to witness what Machine Learning can do to improve UI should take note of Android 9.0 Pie. First announced in March 2018, Android P was made public in August 2018. Android 9.0 marks a major overhaul of the Android OS focusing on UI and integrating Artificial Intelligence to optimize user experience.

AI HELPS ANDROID PIE HELP YOU

Android’s latest OS takes a big step forward integrating AI into the UI. The Android website advertises that “Android 9 Pie harnesses the power of AI for a truly intuitive experience”.

One of the major implementations of AI in Pie is called App Actions. Android 9.0 monitors your routines, processes data, and offers predicted actions directly in the phone’s app launcher when appropriate. For example, it can recommend a song to you on Spotify when you’re on your morning commute. Android has focused on quality over quantity with regard to App Actions and they are startlingly accurate—when it has enough data collected on how you use your phone, often it predicts exactly what you do next.

In addition to App Actions, Android Pie also offers Adaptive Battery and Adaptive Brightness. Android teamed up with the AI company DeepMind to create Adaptive Battery, an AI-based program that learns how you use your phone and optimizes usage so that inactive apps and services don’t drain the battery. Adaptive Brightness learns your preferred brightness settings and automatically adjusts them to your liking.

Those concerned with privacy should note that Android has stated that all machine learning is happening on the device rather than in the cloud.

ANDROID ADOPTS GESTURES OVER BUTTONS

Perhaps the biggest UI overhaul is the transition from buttons to gestures. Android P is following the  iPhone X’s lead in using gestures rather than buttons. This means UI is very home-screen button centric. The overhaul may be jarring to some. Luckily, app users can have it both ways as gesture navigation is adjustable in the phone’s settings.

Check out the video breakdown of the differences between Apple iPhone X and Android P gestures below.

THIS PIE’S GONNA HAVE SLICES

Android has announced App Slices in Android Pie, but has yet to unveil them at this time. When you search for an app on Android,  the app icon comes up. With App Slices, Android will not only pull up the icon, but will pull up actual information within apps and allow you to interact with the app directly within the search results. For example, if you search for Uber, it may bring up time & price estimates to go to commonly frequented locations and allow you to set a pick-up without having to open the app directly.

Android Slices present a great opportunity for app developers to create shortcuts to functions in their app. They also constitute the beginnings of Google’s approach to “remote content.” Learn more about Slices below:

APP LIMITS FOR ENCOURAGING HEALTHY USE

Addicted to your phone? Android P not only tracks the amount of time you spend on your phone, it allows users to set time limits for how long an app can be used for a day. App Time Limits prevent you from opening apps when you’ve gone over your limit with no option to ignore—the only way to access them again for the day is to turn the time limit off from the Settings page.

HUNGRY FOR PIE?

As with all Android OS’s, Android Pie will have a staggered release across devices. As of November 2018, it is available on Pixel phones as well as The Essential Phone.

Meanwhile, Android Pie is anticipated to be rolled out on many other phones by December 21st. For a comprehensive, frequently updated breakdown, check out Android Central’s list of the expected roll out dates for each phone manufacturer.

Android Oreo

How to Optimize GPS and Background Processes for Android Oreo

As our past article Android Oreo Serves Up the Sweets will show, Android Oreo lived up to expectations upon release and gave both consumers and app developers plenty of enhancements to enjoy.

However, for app developers, enhancements to the UI aimed to conserve battery life affect GPS services and require changes to the code in order to optimize pre-existing apps for the new OS. Specifically, Android Oreo restricts apps that are running in the background with limited access to background services. Additionally, apps can no longer use their manifests to register for most implicit broadcasts. When an app is in the background, it is given several minutes to create and use services, but at the end of that time slot, the app is considered idle and the OS will stop running background services.

These changes directly affect apps with geolocation functionality. Android Oreo limits how frequently apps can gather location in the background. Background apps can only receive location updates a few times each hour. The APIs affected due to these limits include Fused Location Provider, Geofencing, Location Manager, Wifi Manager, GNSS Measurements and GNSS Navigation Messages.

Apps that currently use location services in previous Android OS’s will require an update to optimize for Android Oreo. Apps that use location services range anywhere from navigational apps like Waze and Google Maps to social media apps like Twitter, and food apps like Yelp and Seamless.

For apps that require frequent location updates, increasing the usage of the app in the foreground will ensure that the app gets frequent access to location information. In order to program this, developers must implement startServiceinForeground() instead of startService() in Activity class.

In Service class in onStartCommand(), developers can use the following code:

Screen Shot 2018-05-07 at 12.46.57 PM

Via StackOverflow

When foreground services running in the background consume high energy, Oreo fires an automatic push notification to the user informing them of the battery-consuming service. With the push notification in place, app users are more likely to uninstall apps that track location without conserving battery life, putting the onus on software developers to deliver battery-efficient apps. One of the biggest issues facing some app developers is ensuring that battery life is not sucked as a result of tracking location in apps. Check out our full rundown of how to build battery-efficient geolocation apps for supplementary reading.

The results of the limits put in place with Android O are increased battery life for the user and the necessity for app owners to consider how their apps interact with location information. Retaining a thorough understanding of how location information will be retrieved and used through out the development process ultimately benefits both software developers and consumers with better UI and more energy efficient processes.

Data Encryption

How to Safely Encrypt Sensitive Data in Your Mobile App

In November 2014, cybercriminals perpetrated one of the biggest cybercrimes of the decade. They hacked into Sony’s computer systems, stole sensitive data, paralyzed the company’s operations, and gradually leaked embarrassing information to the media. The hackers threatened to continue until Sony agreed to pull the controversial comedy The Interview from its theatrical release.

As the headlines will tell you, the encryption of sensitive data is one of the most important investments a company can make. Facebook is currently under heat for data protection practices. The UK National Crime Agency called WannaCry a signal moment for awareness of cyberattacks and their real world impact. With the stakes higher than ever, the encryption of sensitive data in apps has never been more important.

Here are our top tips on how to safely encrypt sensitive data in your mobile app.

TIP #1: Coding and Testing

Writing secure code is fundemental to creating a secure app. Obfuscating and minifying code so that it cannot be reverse engineered is critical to keeping a secure environment. Testing and fixing bugs when they are exposed should be an ongoing investment of resources as it will pay off in the long run.

Tip #2: Scramble Data

Sometimes, the best method of encrypting data is scrambling. Software and web developers often become obsessed with storing every bit of data in databases and logs, assuming it may be useful later, but doing so can create a target for cybercriminals.

Cunning developers will only store a scrambled version of the data, making it unreadable to the outside eye, but still useful for those who know how to query it correctly.

For an in-depth dive into scrambling data, check out this awesome essay on how Amazon does it.

Tip #3: In Transit Vs. At Rest Encryption

There are two types of data to be encrypted: in transit data and at rest data. In transit data is moving data, be it in transit via email, in apps, or through browsers and other web connections. At rest data is stored in databases, the cloud, computer hard drives, or mobile devices. In transit data can be protected through the implementation of robust network security controls and firewalls. At rest data can be protected through systematically categorizing and classifying data with data protection measures in mind.

Tip #4: Secret Vs. Public Key Algorithms

Secret Key Algorithms are algorithms that use the same key for encryption and decryption. Public-key algorithms us two different encryption keys, one for encryption and the other for decryption. The public key is how the data is sent and the private key decodes it. Public-key algorithms are more secure, but require more computer processing power.

Tip #5: Blockchain Cryptography

We’ve covered the Blockchain in our past article on The Revolutionary Mechanics of the Blockchain. Blockchain cryptography has been on the rise because blockchain databases are distributed and thus more resilient in the face of a DOS attack.

Tip #6: Apps that Clean Up after Themselves 

Apps that collect sensitive information don’t necessarily need to store it. It is wise to delete sensitive data from mobile apps when the data is no longer in active use.

Tip #7 Choose the Right Algorithm

There are several popular pre-existing algorithms in existence that can be used to encrypt sensitive data in mobile apps. Check out UpWork’s awesome rundown:

  1. Advanced Encryption Standard (AES)
  2. RSA
  3. IDEA
  4. Signal
  5. Blowfish and Two Fish
  6. Ring Learning With Errors or Ring-LWE

Over the last 10 years, enterprise-wide use of encryption has jumped by 22 percent according to the Ponemon Institute. When building a mobile app, investing in encrypting sensitive data will pay off in the long run and haunt those that short-change it.

Siri-1480x831

Integration with Siri and iMessage: Everything Your App Can Do

The upgrade from iOS 9 to iOS 10 was the biggest upgrade iOS has received in its 11 year history. As we covered in our blog How iOS 10′s Open Functionality Can Take Your App to the Next Level, the biggest upgrade to the operating system was the opening up of Siri and iMessage for third-party extensions.

The ability to integrate applications with iMessage and Siri creates a host of new functional possibilities for software developers. Here’s our rundown of the top ways to improve apps through Siri and iMessage integration:

SIRI INTEGRATION

As Alexa has proved, the voice assistant is burgeoning billion dollar business. With Google and Amazon leading the pack, Apple has taken many steps to improve Siri, including opening Siri up to third party integration.

However, Apple is prioritizing quality over quantity when it comes to Siri integrations.  Limiting the types of apps that can integrate with Siri enables Apple to build out robust integrations that take into account complex verbal applications. With robust integrations, Siri will be able to fulfill actions without forcing the user to alter the colloquial, natural construction of their spoken sentences. In other words: the integration is comprehensive, but it will only work with the following types of apps:

  • VoIP (Voice over IP) Calling
  • Messaging
  • Payments
  • Lists and Notes
  • Visual Codes
  • Photos
  • Workouts
  • Ride Booking
  • Car Commands
  • CarPlay
  • Restaurant Reservations

Siri integrations use “intents”. Apps that fit into the aforementioned categories describe a set of intents, or things the app can do, and Siri categorizes spoken orders by the user into intents to determine the next logical action.

Siri can pull up photos from applications like Vogue Runway and Looklive through voice command. It can send money to friends through Square Cash and Monzo, and can send messages through WhatsApp and LinkedIn. Siri’s vocabulary can process complex requests like “Hey Siri, show me my best photos of idyllic sunsets taken last summer using The Roll.”

iOS 11 opened up a host of new intents. Siri can now lock smartcars and manage notes and to-do lists in productivity apps, as well as complete on-the-spot language translations.

With Siri integration, app developers can make use of one of the most extensive digital vocabularies on the planet to make life easier for users.

IMESSAGE APPS

iOS 10 not only opened iMessage up to developers, it also spawned iMessage apps: apps designed exclusively for the iMessage platform.

iMessage integration allows make it easy to pull up documents, links, and information right from iMessage and send it on the fly. Productivity apps like Evernote can integrate to allow for updates to be both sent and updated through iMessage. Travel apps like AirBNB make it easy to discuss potential travel plans. Games like Words with Friends and GamePidgeon make it easy to simultaneously play games and text. The Starbucks iMessage app allows users to send digital gift cards using Apple Pay. Dropbox and OneDrive make files stored in the cloud easily accessible and shareable.

Unlike Siri, there is no limitation on what types of apps can integrate with iMessage. Due to limited functionality, enthusiasm for developing apps exclusively for the iMessage platform is fading according to Mac Rumors, but integrating with iMessage can greatly enhance the UI of existing apps.

usebitcoin-4096x2253

Should My Business Consider Accepting Cryptocurrencies? An Overview

Recently, Bitcoin has flooded the news cycle, rising in value from about 1,000 per bitcoin on January 1st 2017 to upwards of $16,000 as of December 7th 2017. Square, a prominent payment app, recently announced they will pilot a program that allows for Bitcoin trade. With Bitcoin on the rise, the all-important question becomes: Should your app or website accept cryptocurrencies?

Over the next several weeks, we will endeavor on a series of blogs to answer all of the questions necessary to make that decision, including:

  1. What cryptocurrencies are, how they work, and why they are important.
  2. The pros and cons of accepting cryptocurrencies on your app or website
  3. Choosing your cryptocurrency wallet.
  4. What Blockchain is, how it’s important to cryptocurrencies and its other revolutionary applications.
  5. An exploration of why Bitcoin is the most popular cryptocurrency and of  other prominent cryptocurrencies.

In order to explore cryptocurrencies, we must start at the beginning. The first successful cryptocurrency was Bitcoin, created in 2008 by the still unknown inventor Satoshi Nakamoto. While Nakamoto’s identity is still a mystery, the significance of their invention is not. They initially announced it as a “Peer-to-Peer Electronic Cash System”. Past attempts at creating digital currency involved a decentralized system, however, Nakamoto attempted to decentralize the currency by mimicking the technique of Peer-to-Peer file sharing networks.

In order for a payment network to function, there must be a ledger to prevent fraudulent double spending—forged transactions. In the physical world, banks function as the central entity which keeps records about balances. With Bitcoin, Nakamoto created an alternate system. Since the network is decentralized, every entity on the network must have a list with all transactions to check if future transactions are valid. Not only that, there must be an absolute consensus about the records in order for them to become a part of an immutable record of historical transactions known as the “Blockchain”.

Nakamoto set in place a rule that only “miners” can confirm transactions. Miners take transactions, verify them in exchange for a token of cryptocurrency, validate them, and spread them in the network so that every node adds them to the database and the transaction becomes a part of the blockchain. The only way to create a valid Bitcoin is for a miner to complete this function.

Technically, anyone can be a miner. Since there is no central authority to regulate mining and prevent a ruling party from abusing it, Nakamoto set a rule that miners need to invest some of their computing power to the solving of a cryptographic puzzle using the SHA 256 Hash algorithm, in order to verify transactions. Without getting too technical, the miner must complete a cryptographic puzzle in order to build a block and add it to the blockchain, the reward for which is a specific number of Bitcoins depending on the difficulty of the puzzle. Miners compete to solve these problems and the first to solve it and validate the transaction receives the reward. This is part of the consensus that no peer can break.

While the system is complex, the use of the currency is ultimately quite simple. As outlined in BlockGeeks overview, 5 properties separate Bitcoin transactions from other transactions:

  • Bitcoin transactions are irreversible.
  • They are not tied to real-world identities but to pseudonymous addresses. This is one of the reasons Bitcoins are frequently used on the black market.
  • Transactions are enacted instantly and are global.
  • Cryptocurrencies are secured by a cryptography, making them extremely secure.
  • Without a central authority, cryptocurrencies are permissionless to use.

Cryptocurrencies often limit the supply of tokens, which is true of Bitcoin. The token supply of Bitcoin decreases in time and will reach its final number sometime around 2140. The monetary supply is controlled by a schedule written in code—in other words, purely through mathematics.

Whereas the statement on your bank account represents a debt owed to you by the bank, Bitcoins are not indicative of debts, they are literal currency with inherent value like a diamond. And the value of that currency has skyrocketed in the past year. Only 10 years after its creation, Bitcoin and cryptocurrencies are currently in an inchoate stage, making it all the more important for intelligent citizens to track their progress and global impact.

Next week, we will review the pros and cons of accepting cryptocurrencies through your app or website. Stay tuned!

Artificial

The Real Power of Artificial Intelligence

Technological innovations expand the possibilities of our world, but they can also shake-up society in a disorienting manner. Periods of major technological advancement are often marked by alienation. While our generation has seen the boon of the Internet, the path to a new world may be paved with Artificial Intelligence.

WHAT IS ARTIFICIAL INTELLIGENCE

Artificial intelligence is defined as the development of computer systems to perform tasks that normally require human intelligence, including speech recognition, visual perception, and decision-making. As recently as a decade ago, artificial intelligence evoked the image of robots, but AI is software not hardware. For app developers, the modern-day realization of artificial intelligence takes on a more amorphous form. AI is on all of your favorite platforms, matching the names and faces of your friends. It’s planning the playlist when you hit shuffle on Apple Music. It’s curating the best Twitter content from you based on data-driven logic that is often too complex even for the humans who programmed the AI to decipher.

MACHINE LEARNING

Currently, Machine Learning is the primary means of achieving artificial intelligence. Machine Learning is the ability for a machine to continuously improve its performance without humans having to explain exactly how to accomplish all of the tasks it has been given. Web and Software programmers create algorithms capable of recognizing patterns in data imperceptible to the human eye and alter their behavior based on them.

For example, Google’s autonomous cars view the road through a camera that streams the footage to a database that centralizes the information of all cars. In other words, when one car learns something—like an image or a flaw in the system—then all the cars learn it.

For the past 50 years, computer programming has focused on codifying existing knowledge and procedures and embedding them in machines. Now, computers can learn from examples to generate knowledge. Thus, Artificial Intelligence has already permanently disrupted the standard flow of knowledge from human to computer and vice versa.

PERCEPTION AND COGNITION

Machine learning has enabled the two biggest advances in artificial intelligence:  perception and cognition. Perception is the ability to sense, while cognition is the ability to reason. In a machine’s case, perception refers to the ability to detect objects without being explicitly told and cognition refers to the ability to identify patterns to form new knowledge.

Perception allows machines to understand aspects of the world in which they are situated and lays the groundwork for their ability to interact with the world. Advancements in voice recognition have been some of the most useful. In 2007, despite its incredibly limited functionality, Siri was an anomaly that immediately generated comparisons to HAL, the Artificial Intelligence in 2001: A Space Odyssey. 10 years later, the fact that iOS 11 enables Siri to translate French, German, Italian, Mandarin and Spanish is a passing story in our media lifecycle.

Image recognition has also advanced dramatically. Facebook and iOS both can recognize your friends’ faces and help you tag them appropriately. Vision systems (like the ones used in autonomous cars) formerly made a mistake when identifying a pedestrian once in every 30 frames. Today, the same systems err less than once in 30 million frames.

EXPANSION

AI has already made become a staple of mainstream technology products. Across every industry, decision-making executives are looking to capitalize on what AI can do for their business. No doubt whoever answers those questions first will have a major edge on their competitors.

Next week, we will explore the impact of AI on the Digital Marketing industry in the next installment of our blog series on AI.

Generate Downloads with the Ultimate App Promotion Guide

App PromotionAs app developers, retaining an adept understanding of the marketing side of the business is of the utmost importance. An improperly promoted app, whether it’s good or not, will falter in the 6 million apps in app stores. Some larger companies can afford to outsource this work. Independent developers and companies developing apps for clients must have the knowledge to guide projects from development through release regardless of their expected level of involvement in enacting a release strategy. When developing your app, take into consideration our overview of app promotion strategies and best practices.

APP STORE OPTIMIZATION 

App Store Optimization is the bread and butter of all app marketing efforts. App stores are the largest driver of downloads for the vast majority of apps. When enacted properly, ASO will drive tens, hundreds, or even thousands of daily downloads from app stores depending on the search traffic of the keywords. Experienced developers create ASO strategies before they begin the programming process.

Selecting keywords is the first and most important process of ASO. Searches in the app store are typed out with thumbs rather than a full keyboard, thus thinking of key shorthand terms is vital to improving search rankings. Developers must evaluate the amount of search traffic for each keyword and how competitive that search traffic is. Pursuing high traffic search terms can backfire because apps can falter against the high level of competition. Developers should continually refine their keywords and have a strategy ready for when their apps improve in search rankings. Over time, apps grow stronger in app store search and can eventually rank for more competitive keywords. It’s vital for developers to constantly refine their ASO strategies and build toward more competitive search terms. Many companies create one strategy for when their apps are first entering the store and a separate strategy for when they improve in ASO strength and can compete with higher volume search terms.

ASO does not end with the release. Engagement signals like retention, number times people open the app, and length of usage increase app store rankings. Developers must constantly be working toward improving the UI of their apps, as retention will boost ASO.

PAID ADVERTISING

While paid advertising, specifically social media ads, can be a major driver of app downloads, it’s important to understand where paid advertising factors into the equation. Before enacting paid ads, developers should have established a proven revenue model and overall business model. How much revenue an app generates per download will dictate the paid advertising budget. Without a model for revenue per download, app promotion can quickly become too expensive to maintain and end up in the red.

THE BENEFITS OF A SOFT LAUNCH

A soft launch is when developers make their app available in app stores without any promotional push. The small set of users you acquire through a soft launch can act as an initial beta user group that will inform your understanding of how consumers are using your app.

App developers often come to realize a major disconnect between why they think their app is good versus the opinion of their users. Experienced developers make the most of their analytics and continuously dedicate resources to the iterative process of improving their apps.

THE DANGERS OF CROSS-PROMOTION

While cross-promotion is a popular tactic, it’s also one that can backfire. App developers find partners with relevant but separate audiences and promote traffic to one another’s pages or content. The key to cross-promotion is finding a partner with an audience that is going to give an equivalent amount of exposure. The potential pitfall is that when users redirect out of the app, it reduces retention, ultimately damaging ASO.

Rather than partner with another app or company, some developers elect to develop feeder games and alternate apps which cross-promote to one another, maximizing downloads without detracting from outside marketing efforts.

SEARCH ENGINE OPTIMIZATION

Many app developers promote their apps through their website with Google SEO, social media, content marketing & more. While some apps treat their website as a landing page with a large download button, there is much more that can be done. For example, hosting Youtube content or a blog on your site will draw users in to your brand and retain them on the web page.

Enacting SEO for your app store URL can be even more effective than for your website. App Store URLs can outrank websites in SEO because of the authoritative domain of iTunes and Google Play.

PUBLICITY AND OTHER ENTREPRENEURIAL METHODS

While effective ASO and app promotion can be done on a relatively low budget, app promotion doesn’t have to begin and end on the tech side of things. Many developers make a point of developing their public persona through social media and external publicity in order to foster an audience to whom they can later market their products.

THE ROAD TO SUCCESS

Ultimately, the road to success is not smooth, but bumpy. With the right mix of expert development, continuous maintenance, vigilance and dedication, an app can break through the sea of competition and become a profitable enterprise.

app-promotion-3

App Promotion Strategies and Best Practices

As app developers, retaining an adept understanding of the marketing side of the business is of the utmost importance. An improperly promoted app, whether it’s good or not, will falter in the 6 million apps in app stores. Some larger companies can afford to outsource this work. Independent developers and companies developing apps for clients must have the knowledge to guide projects from development through release regardless of their expected level of involvement in enacting a release strategy. When developing your app, take into consideration our overview of app promotion strategies and best practices.

APP STORE OPTIMIZATION 

App Store Optimization is the bread and butter of all app marketing efforts. App stores are the largest driver of downloads for the vast majority of apps. When enacted properly, ASO will drive tens, hundreds, or even thousands of daily downloads from app stores depending on the search traffic of the keywords. Experienced developers create ASO strategies before they begin the programming process.

Selecting keywords is the first and most important process of ASO. Searches in the app store are typed out with thumbs rather than a full keyboard, thus thinking of key shorthand terms is vital to improving search rankings. Developers must evaluate the amount of search traffic for each keyword and how competitive that search traffic is. Pursuing high traffic search terms can backfire because apps can falter against the high level of competition. Developers should continually refine their keywords and have a strategy ready for when their apps improve in search rankings. Over time, apps grow stronger in app store search and can eventually rank for more competitive keywords. It’s vital for developers to constantly refine their ASO strategies and build toward more competitive search terms. Many companies create one strategy for when their apps are first entering the store and a separate strategy for when they improve in ASO strength and can compete with higher volume search terms.

ASO does not end with the release. Engagement signals like retention, number times people open the app, and length of usage increase app store rankings. Developers must constantly be working toward improving the UI of their apps, as retention will boost ASO.

PAID ADVERTISING

While paid advertising, specifically social media ads, can be a major driver of app downloads, it’s important to understand where paid advertising factors into the equation. Before enacting paid ads, developers should have established a proven revenue model and overall business model. How much revenue an app generates per download will dictate the paid advertising budget. Without a model for revenue per download, app promotion can quickly become too expensive to maintain and end up in the red.

THE BENEFITS OF A SOFT LAUNCH

A soft launch is when developers make their app available in app stores without any promotional push. The small set of users you acquire through a soft launch can act as an initial beta user group that will inform your understanding of how consumers are using your app.

App developers often come to realize a major disconnect between why they think their app is good versus the opinion of their users. Experienced developers make the most of their analytics and continuously dedicate resources to the iterative process of improving their apps.

THE DANGERS OF CROSS-PROMOTION

While cross-promotion is a popular tactic, it’s also one that can backfire. App developers find partners with relevant but separate audiences and promote traffic to one another’s pages or content. The key to cross-promotion is finding a partner with an audience that is going to give an equivalent amount of exposure. The potential pitfall is that when users redirect out of the app, it reduces retention, ultimately damaging ASO.

Rather than partner with another app or company, some developers elect to develop feeder games and alternate apps which cross-promote to one another, maximizing downloads without detracting from outside marketing efforts.

SEARCH ENGINE OPTIMIZATION

Many app developers promote their apps through their website with Google SEO, social media, content marketing & more. While some apps treat their website as a landing page with a large download button, there is much more that can be done. For example, hosting Youtube content or a blog on your site will draw users in to your brand and retain them on the web page.

Enacting SEO for your app store URL can be even more effective than for your website. App Store URLs can outrank websites in SEO because of the authoritative domain of iTunes and Google Play.

PUBLICITY AND OTHER ENTREPRENEURIAL METHODS

While effective ASO and app promotion can be done on a relatively low budget, app promotion doesn’t have to begin and end on the tech side of things. Many developers make a point of developing their public persona through social media and external publicity in order to foster an audience to whom they can later market their products.

THE ROAD TO SUCCESS

Ultimately, the road to success is not smooth, but bumpy. With the right mix of expert development, continuous maintenance, vigilance and dedication, an app can break through the sea of competition and become a profitable enterprise.

Android O: What Google’s Latest OS Offers App Developers

On March 21st, Google unveiled the developer preview for the latest version of the largest OS in the world: Android O. For consumers, it means improved UI, design, battery life, & more. For app developers, it has far deeper implications. With release anticipated in Q3 2017, here is our rundown of the top takeaways about Android O for Android developers:

BATTERY LIFE

The main focus of Android O appears to be to continue Android Nougat’s initiative to reduce battery life. The OS will limit and manage what launched apps can do in the background when multiple apps are open. For example, if a user has a geolocation app open in the background while using another app, location updates will happen less frequently for the background app.

In technical terms, background execution & location limits have been reigned in, allowing the OS to better manage background activity. Background apps are defined by Google as apps showing no visible activity, no foreground service & not connected to a foreground app through its services. Location changes affect the following APIs:

  • Fused Location Provider (FLP): The local system service computes a new location for background apps only a few times each hour, according to the interval defined in the Android O behavior change. Foreground apps will not experience location sampling rates in relation to Android 7.1.1 (API level 25).
  • Geofencing: Background apps can receive geofencing transition events more frequently than from FLP.
  • GNSS Measurements: Callbacks registered to receive outputs from GnssMeasurement and GnssNavigationMessage will stop executing for background apps.
  • Location Manager: Location updates will be provided to background apps only a few times per hour according to the interval defined in the Android O behavior change.

NOTIFICATION CHANNELS

Android OS’s have always thrived in the notification department. Android O allows developers to group notifications into channels. Developers must select a channel for each distinct type of notification they send with the goal of making things easier and more customizable for the user. For example, a user can turn off the “Sports” notification channel from the New York Times app if they are already getting sports notifications from the ESPN app.

Developers can also allow user behavior to dictate notification channels. For example, the developer of a messaging app can create separate notification channels for each of a user’s messaging threads.

WI-FI AWARE

Wi-Fi Aware, or Neighbor Awareness Network (NAN), allows devices to discover and connect directly with each other without any other connectivity between them, like Wi-Fi Access Point or Cellular. Two phones can connect with each other with NAN and share data at high speeds without any additional apps or configuration, opening up tons of possibilities for developers.

Learn more about Wi-Fi Aware:

HI-FI BLUETOOTH AUDIO

Android O supports Hi-Fi Bluetooth audio. While the quality of the audio still depends on the speaker or headphone through which one listens, this is a major improvement for music lovers.

ADAPTIVE ICONS

Android O will introduce adaptive launcher icons. Adaptive icons support visual effects and can display a variety of shapes across different device models. Adaptive icons are a major tool for developers to guide the user’s eye and enhance UX. Check out Android’s developer site to learn more.

RELEASE SCHEDULE

The O Developer preview will run from March 21st to the final Android O public release anticipated in Q3 2017. Android will provide incremental updates in mid-May, June, & July. Until Q3 2017, the onus is on Android developers to prepare their future and existing apps for the latest operating system.