Browse Definitions :
Definition

micro app

A micro app is a small, mobile application that is designed to perform one, simple task. Micro apps are similar to desktop utility programs. In a microapp architecture, the user interacts with application functionality that runs inside an application container. Each app can function by itself or be combined with other micro apps to create a more complex program. When the complex program invokes a micro-app, it will carry out its specific task.

Focusing on the workflow and encapsulating the workflow into a reusable component promotes reuse during runtimes and ensuresthe end user experiences a consistent workflow between sessions. Because the workflow for a micro app focuses on a specific, self-contained event, the architecture helps address many common technical issues found in larger, monolithic mobile apps -- including improving performance and reducing power consumption and storage.

Beneficial features of micro apps include:

Low cost: Because micro apps have lean functionality, they take less time to build, use very little development resources and require less money for improvements and upkeep.

Independent: Micro apps are designed with a microservice architecture. Each app can function independently and is typically supported by a dedicated database.

Compact and customized: Micro apps are modular, flexible and minimal. The tasks they perform are tailored to improve user experience.

Cross-functional: The simplicity of micro apps makes it possible to deploy them on all types of devices and platforms without the need for separate coding, features or versions.

HTML/HTML5 compliant: Micro apps can be embedded into existing applications or websites.

Supportive of larger apps: Major social media sites have also begun implementing micro apps to perform certain tasks outside of the main platform. Examples of this would be Facebook Messenger or Google Hangouts.

This was last updated in May 2019

Continue Reading About micro app

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close