Understand Mobile Deep Linking

deeplink.png

Deep linking has become one of the hottest topics in mobile over the past year as dozens of startups have launched around using, improving and discovering deep links. All of the big platform companies also have projects to own “the deep linking standard” or the search index for mobile. So, what are deep links and where did they come from?
In the most simple interpretation, a deep link is any link that directs a user past the home page of a website or app to content inside of it. e.g. linking directly to a product instead of the home page. In the context of 2015, we’re particularly interested in mobile deep links; links that can be used to open an app to a specific piece of content or action. 

Deep linking has grown up with the Internet

The concept of deep linking has been around for a long time; first appearing commonly in media around 2006 to describe the growing practice of providing Google (and other search engines) with visibility into pages beyond the home page.
At the time, the term was also commonly misused to refer to hot linking, the practice of linking directly to files for download that were hosted by a third, non-participating party. That earned deep linking a public association with the exploding controversy around the online consumption of copyrighted material.

A number of courts in the US issued judgements (and injunctions) on the idea that linking directly to content within a website could be a breach of that party’s copyright, especially when such a deep-linking party was monetizing the content with ads served alongside the content (such as a search listing preview). In 2006, threats against deep linking posed as real a threat to the open and functional Internet as those of net neutrality have in 2014. And just as the web settled, along came mobile apps.

In 2008, Apple released iPhone OS 2 (now iOS) and brought with it the iOS SDK. For the first time, developers could build applications for the iPhone and submit them to the new App Store. Apps, unlike web pages, were not based on the same “document structure” of the web. While, technically, even iOS 2 could handle deep linking, mapping to content and actions inside of the average app was incredibly hard.

App structures, and hooks to key actions or features, were opaque. It also wasn’t an acknowledged problem for developers; the ecosystem was nascent, apps were basic (at best), mobile commerce was non-existent and the perceived usefulness of deep linking was minimal.

The problem that deep linking solved in the early years of iOS was mostly mapping web page items to the same item in an app: If I’m reading an article in Pulse/NYT on the web, how do I open that same article in the app? This meant that the first apps for which deep linking was truly useful were companies with large amounts of content. If an app has three items available, the burden for a user to choose between them is low, but if there are 20,000 options, the efficiency and UX benefit of deep linking a user directly is huge.

By 2013-2014, mobile commerce had begun to explode; people were buying real things on their mobile devices to the tune of billions and with it came a need for better tools to drive users through the conversion funnel. The millions that brands had invested in developing mobile apps were finally paying off. 

Services started popping up to take users from marketing emails and redirect them into apps using deep links. In some cases, they would also prompt users who didn’t have the app to download it from the App Store or Play Store. It also brought to light a serious problem: how to address a specific item, piece of content or action, when there is no standard for how deep links are structured or discovered.

Deep links are simply a way to identify, address and transport users to specific content in apps. While convenient (and necessary), they’re not that revolutionary or exciting. The future value of deep links lies in how we use them, what’s built on top of them, and the new consumer experiences they offer.

This will include novel ways to discover deep links for apps that you have, discovering new apps through deep-linkable relevant content and services, and the transfer of more intelligence across the links themselves. Much like a hyperlink, it’s not the mechanism that will change the world, but the way we use them to connect the web together.
Techcrunch: http://tcrn.ch/1eqTz52

 

« What’s in the New UK Surveillance Bill?
New Snowden Documents Reveal US Spying Has Actually Expanded »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.