Mobile Application Development

CDIT's mobile capabilities span mobile application development for multiple devices; mobilization of enterprise applications; and implementation of mobility management solutions for centrally managing, securing, and deploying mobile data, applications, and devices.


Our platform expertise encompasses iOS for iPhone and iPad, Android, BlackBerry, Symbian OS, Windows Mobile and Windows Phone 7, LiMo mobile Linux, JavaME, WAC mobile widgets and HTML5, Windows desktop 2000/XP/Vista, Mac OS X, and Linux.


We have extensive experience with mobile web, Bluetooth, location-based services, mobile broadband, Near Field Communications (NFC), IUID, RFID, predictive text, OTA connectivity, and VoIP.


We have solid experience in the full spectrum of mobile device languages including C++, Java, C#, Objective C, JavaScript, AJAX, server-side PHP, Python, Perl, and ARM assembler.


User Experience


At CDIT, we possess valuable insights into the dynamic UI expectations of mobile device users. We understand how business applications, forms, and workflows render differently on different devices. Our User Experience expertise starts with creating communication and application usage scenarios that enable people to work and collaborate effectively from wherever they are using whichever device(s) they have available. We develop mobile solution user experiences that enhance productivity regardless of the device being used.


Secure Solutions


One of the key risks involved in enterprise mobility is the unauthorized access of confidential information by taking advantage of security loopholes in wireless networks and devices. Our solutions are designed with security as the underlying component. Our Security solutions are designed to help devices and networks prevent intrusions and effectively control user access. We are committed to ensuring security of the network and device by supporting current and evolving privacy and authentication standards, including Light Extensible Authorization Protocol (LEAP), Protected Extensible Authorization Protocol (PEAP), Lightweight Directory Access Protocol (LDAP), Active Directory Kerberos, 802.1x, and commonly used variants of secure shell (SSH) encryption.