Understand Mobile Deep Linking

deeplink.png

Deep linking has become one of the hottest topics in mobile over the past year as dozens of startups have launched around using, improving and discovering deep links. All of the big platform companies also have projects to own “the deep linking standard” or the search index for mobile. So, what are deep links and where did they come from?
In the most simple interpretation, a deep link is any link that directs a user past the home page of a website or app to content inside of it. e.g. linking directly to a product instead of the home page. In the context of 2015, we’re particularly interested in mobile deep links; links that can be used to open an app to a specific piece of content or action. 

Deep linking has grown up with the Internet

The concept of deep linking has been around for a long time; first appearing commonly in media around 2006 to describe the growing practice of providing Google (and other search engines) with visibility into pages beyond the home page.
At the time, the term was also commonly misused to refer to hot linking, the practice of linking directly to files for download that were hosted by a third, non-participating party. That earned deep linking a public association with the exploding controversy around the online consumption of copyrighted material.

A number of courts in the US issued judgements (and injunctions) on the idea that linking directly to content within a website could be a breach of that party’s copyright, especially when such a deep-linking party was monetizing the content with ads served alongside the content (such as a search listing preview). In 2006, threats against deep linking posed as real a threat to the open and functional Internet as those of net neutrality have in 2014. And just as the web settled, along came mobile apps.

In 2008, Apple released iPhone OS 2 (now iOS) and brought with it the iOS SDK. For the first time, developers could build applications for the iPhone and submit them to the new App Store. Apps, unlike web pages, were not based on the same “document structure” of the web. While, technically, even iOS 2 could handle deep linking, mapping to content and actions inside of the average app was incredibly hard.

App structures, and hooks to key actions or features, were opaque. It also wasn’t an acknowledged problem for developers; the ecosystem was nascent, apps were basic (at best), mobile commerce was non-existent and the perceived usefulness of deep linking was minimal.

The problem that deep linking solved in the early years of iOS was mostly mapping web page items to the same item in an app: If I’m reading an article in Pulse/NYT on the web, how do I open that same article in the app? This meant that the first apps for which deep linking was truly useful were companies with large amounts of content. If an app has three items available, the burden for a user to choose between them is low, but if there are 20,000 options, the efficiency and UX benefit of deep linking a user directly is huge.

By 2013-2014, mobile commerce had begun to explode; people were buying real things on their mobile devices to the tune of billions and with it came a need for better tools to drive users through the conversion funnel. The millions that brands had invested in developing mobile apps were finally paying off. 

Services started popping up to take users from marketing emails and redirect them into apps using deep links. In some cases, they would also prompt users who didn’t have the app to download it from the App Store or Play Store. It also brought to light a serious problem: how to address a specific item, piece of content or action, when there is no standard for how deep links are structured or discovered.

Deep links are simply a way to identify, address and transport users to specific content in apps. While convenient (and necessary), they’re not that revolutionary or exciting. The future value of deep links lies in how we use them, what’s built on top of them, and the new consumer experiences they offer.

This will include novel ways to discover deep links for apps that you have, discovering new apps through deep-linkable relevant content and services, and the transfer of more intelligence across the links themselves. Much like a hyperlink, it’s not the mechanism that will change the world, but the way we use them to connect the web together.
Techcrunch: http://tcrn.ch/1eqTz52

 

« What’s in the New UK Surveillance Bill?
New Snowden Documents Reveal US Spying Has Actually Expanded »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.