Android Emulator: Tips and Tweaks
Following on from my recent post on AVD performance issues, it seemed a good time to share one or two other practical tips and tricks about working with the AVD. When testing, I really do not want to...
View ArticleThe Android Virtual Device: Performance Issues
One of the best things about the Android development platform is the superb emulator or Android Virtual Device (AVD). One of the worst things about the Android development platform is… Yes, you...
View ArticleProperty Animation
What a very clever idea! Android API V11 (Honeycomb) introduced a new technique for animation which (until now) I had pretty much ignored. The new mechanism based on android.animation.Animator allows...
View ArticleAndroid Content of Providers
Android provides a neat way of sharing data between applications: Content Providers. System data sources such as the address book, the SMS database and calendar are all exposed via Content of Providers...
View ArticleNFC a Security Risk?
Ever since NFC appeared, I been waiting for it to be used as the basis of an attack. I’m not particularly delighted to report that my concerns have been vindicated: Security researchers at the...
View ArticlePatent Wars
Every time I read or hear something about the ongoing battle between Apple and the various manufacturers of Android devices, I get the desire to scream. Will you please stop! For obvious reasons, I...
View ArticleWeb Sites for Mobile Devices
Whilst the main theme of this blog is native mobile applications, I thought I’d digress a little and look at building Web sites which work with mobile devices. I’ve built a few mobile Web sites...
View ArticleIdentifying Android Security Vulnerabilities with the Mercury Assessment...
In a recent post (http://mobileappdev.learningtree.com/2012/11/08/nfc-a-security-risk/) I mentioned the Mercury assessment framework which is a great tool for analyzing the security of Android devices....
View ArticleDeveloping an Mobile Device Security Reference Architecture – Your Help Needed
Several times in recent months, I have been asked to recommend some sort of mobile device security reference architecture. My initial reaction was sure, let’s have a look and see what Google brings up...
View ArticleIdentifying Content Provider Security Flaws
One of the most common security vulnerabilities in Android is unprotected content providers. Content providers are an elegant method by which Android makes data available to applications. Android it’s...
View ArticleLearning Tree Opens 34 NEW AnyWare Learning Centers across North America
We have some exciting news to share! Learning Tree has officially opened 34 New AnyWare Learning Centers across North America. You can eliminate travel costs and commuting time and take our IT and...
View ArticleGet 50% OFF Select Learning Tree Courses by Joining the New My Learning Tree...
We have some more exciting news to share! Instantly receive 50% OFF select Learning Tree courses when you join the new My Learning Tree Community. Free membership includes: weekly updates of our 50%...
View ArticleCheck Out Federal News Radio’s “Ask the CIO” Segment Sponsored by Learning Tree!
Learning Tree is proud to announce its sponsorship of Federal News Radio’s “Ask the CIO Segment!” Every Thursday morning at 10:30am, host Jason Miller interviews federal agency CIO’s about the latest...
View Article
More Pages to Explore .....