Understand Mobile Deep Linking

deeplink.png

Deep linking has become one of the hottest topics in mobile over the past year as dozens of startups have launched around using, improving and discovering deep links. All of the big platform companies also have projects to own “the deep linking standard” or the search index for mobile. So, what are deep links and where did they come from?
In the most simple interpretation, a deep link is any link that directs a user past the home page of a website or app to content inside of it. e.g. linking directly to a product instead of the home page. In the context of 2015, we’re particularly interested in mobile deep links; links that can be used to open an app to a specific piece of content or action. 

Deep linking has grown up with the Internet

The concept of deep linking has been around for a long time; first appearing commonly in media around 2006 to describe the growing practice of providing Google (and other search engines) with visibility into pages beyond the home page.
At the time, the term was also commonly misused to refer to hot linking, the practice of linking directly to files for download that were hosted by a third, non-participating party. That earned deep linking a public association with the exploding controversy around the online consumption of copyrighted material.

A number of courts in the US issued judgements (and injunctions) on the idea that linking directly to content within a website could be a breach of that party’s copyright, especially when such a deep-linking party was monetizing the content with ads served alongside the content (such as a search listing preview). In 2006, threats against deep linking posed as real a threat to the open and functional Internet as those of net neutrality have in 2014. And just as the web settled, along came mobile apps.

In 2008, Apple released iPhone OS 2 (now iOS) and brought with it the iOS SDK. For the first time, developers could build applications for the iPhone and submit them to the new App Store. Apps, unlike web pages, were not based on the same “document structure” of the web. While, technically, even iOS 2 could handle deep linking, mapping to content and actions inside of the average app was incredibly hard.

App structures, and hooks to key actions or features, were opaque. It also wasn’t an acknowledged problem for developers; the ecosystem was nascent, apps were basic (at best), mobile commerce was non-existent and the perceived usefulness of deep linking was minimal.

The problem that deep linking solved in the early years of iOS was mostly mapping web page items to the same item in an app: If I’m reading an article in Pulse/NYT on the web, how do I open that same article in the app? This meant that the first apps for which deep linking was truly useful were companies with large amounts of content. If an app has three items available, the burden for a user to choose between them is low, but if there are 20,000 options, the efficiency and UX benefit of deep linking a user directly is huge.

By 2013-2014, mobile commerce had begun to explode; people were buying real things on their mobile devices to the tune of billions and with it came a need for better tools to drive users through the conversion funnel. The millions that brands had invested in developing mobile apps were finally paying off. 

Services started popping up to take users from marketing emails and redirect them into apps using deep links. In some cases, they would also prompt users who didn’t have the app to download it from the App Store or Play Store. It also brought to light a serious problem: how to address a specific item, piece of content or action, when there is no standard for how deep links are structured or discovered.

Deep links are simply a way to identify, address and transport users to specific content in apps. While convenient (and necessary), they’re not that revolutionary or exciting. The future value of deep links lies in how we use them, what’s built on top of them, and the new consumer experiences they offer.

This will include novel ways to discover deep links for apps that you have, discovering new apps through deep-linkable relevant content and services, and the transfer of more intelligence across the links themselves. Much like a hyperlink, it’s not the mechanism that will change the world, but the way we use them to connect the web together.
Techcrunch: http://tcrn.ch/1eqTz52

 

« What’s in the New UK Surveillance Bill?
New Snowden Documents Reveal US Spying Has Actually Expanded »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.