Context and future of Progressive Web Applications (PWAs)

Wesley Campbell

Wesley Campbell

At Google's 2015 world conference, a new capability was announced that developer Alex Russel and designer Frances Berriman called progressive web applications —PWAs —that promoted a number of advantages, which in their words, "will become a radical shift in the understanding and use of tools to build better experiences across multiple devices and contexts in a single code base.

But the pioneer who initially spoke about this approach was actually Steve Jobs who, in June 2007, announced a new form of mobile development. This new form at the time would allow developers to leverage the entire Safari engine to build reliable and secure applications that would run on a server and would be rendered on devices without SDKs (Software Development Kits). 

What Jobs posed at the time was diverted from months later, resulting with the launch of the Apple SDK and the subsequent monetization of the Apple application store—Appstore—which ended up being a multi-billion dollar business.

Today, 5 years after Google's announcement regarding PWAs, it is evident that the adoption rate has not been as high as expected. Which makes one think: PWAs need more time to count on the necessary advances that enterprises need to make, in order to take advantage of this model. 

The advantages of PWAs are, above all, attractive for their ability to spread the development experience over the traditional model of building mobile, hybrid and web applications by creating applications that can be kept in one place, without open tabs that lead to different places. PWAs ensure ubiquity and interaction from a single place. Despite all that, it's true that this is a gamble that Google is making as a new paradigm of building web applications.

That being said, to date, several organizations have adopted PWA with great results, suggesting that the balance will tip in the mid term, especially due to the benefits that we will review in a moment. 

Let's analyze some cases of companies that have been adopting this approach to also review some of the results they've generated:

Recent blog posts

How to Build Security Resilience and Protect Your Data
Security
Alexander Rodriguez

Alexander Rodriguez

How to Build Security Resilience and Protect Your Data

Financial institutions are prime targets for cyberattacks due to valuable data. An ISMS protects data confidentiality, availability, and integrity. Learn how to choose, implement, and maintain an ISMS to safeguard your organization's sensitive information

The CX Crucible: How Digital Factories Forge Innovation
Digital Transformation
Wesley Campbell

Wesley Campbell

The CX Crucible: How Digital Factories Forge Innovation

Digital factories are reshaping customer experiences in the financial sector, offering a transformative approach to building and delivering exceptional customer experiences in ways that traditional development struggles to deliver.

The Hidden Influencer: How Internal UX Shapes Customer Experience
UX Design
Andy Bermúdez

Andy Bermúdez

The Hidden Influencer: How Internal UX Shapes Customer Experience

Have you considered just how important internal-facing user experiences are not only for the day-to-day performance of your organization, but also for maintaining good customer experiences and satisfaction?

A 4-Phase Approach to Creating Data-Driven Customer Experiences
Digital Experience
Mariano González

Mariano González

A 4-Phase Approach to Creating Data-Driven Customer Experiences

Data-driven decisions when designing your customer experiences are critical to the success of your digital products. One in three customers will leave a brand they love after just one bad experience.

The Value of Fostering Cyber Protection Across Ecosystems
Security
Alexander Rodriguez

Alexander Rodriguez

The Value of Fostering Cyber Protection Across Ecosystems

Understanding risks for large organizations is vital. Their unique context, markets, and emerging threats demand constant monitoring and improvement for robust protection strategies.