How to create multiple activities in android? Example of multiple activities in android.
Thursday, February 23, 2012
What is an Activity in Android?
What are activities in android? How to create activities in android? How to create Hello World activity? How to create multiple activities in an android application? Example of activities in android application.
Wednesday, February 22, 2012
What are Intents in Android?
What are Intents in Android System? Different types of Intents in Android System. Example of how to create different types of Intents.
Implicit Intents in Android System with Example
What are Android Implicit Intent? How to create implicit intents in
android system? Android implicit intents example and explanation.
Sunday, February 19, 2012
Explicit Intent in Android System with Example
What are Explicit Intents in Android? Example of Android Explicit Intent. Explicit Intents in an Android System with an Example.
Explicit Intents in an android application are used to activate specific components of an android application. That means you have to explicitly specify which activity or component you want to activate. So if you wanna activate another activity you use explicit intents to explicitly say “I wanna use that activity.”.
Friday, February 3, 2012
10 THINGS TO KNOW ABOUT GOOGLE ANDROID
- IT'S OPEN FOR
EVERYONE
Android was designed and developed as an open source, fully customizable mobile phone platform; the first of its kind. This means that manufacturers can customize their phones however they want and design any type of applications without many restrictions. -
GOOD SOFTWARE NEEDS
GOOD HARDWARE
Due to its ease of availability, developers have taken to manufacturing handsets and tablets running on Android. However, all devices have different hardware confi gurations and if the hardware cannot match the software, it will not give you the best Android experience. -
IT'S GONE 3D
Android 3.0 (Honeycomb), the latest version of the OS, was recently unveiled by Google. At the offi cial launch of Honeycomb, Google displayed its 3D capabilities with the Google Maps and YouTube apps, assuring users that the company has done quite a bit to ensure 3D works well on the platform. This could usher in big changes in the mobile phone marketplace. -
IT CAN TETHER
Android has taken pairing devices to the next level. Tethering your Android device with your PC means you can use your service provider's Internet plan with your computer. With 3G services hitting the market, tethering your mobile and PC could see a great reduction in Internet service subscriptions. -
MAKE SURE IT'S
THE LATEST VERSION
In the space of one year, Google made four revisions to its OS - Cupcake (1.5), Donut (1.6), Eclair (2.0/2.1), FroYo (2.2) and Honeycomb (3.0). With such rapid updates to the OS, manufacturers are finding it hard to develop hardware and modify the OS to suit their latest handsets.
-
IT CAN RUN
MULTIPLE TASKS
Android is able to run multiple applications at the same time regardless of whether they are system apps or apps from the Android Market. Android users benefit greatly from this discrepancy, as they can receive notifi cations, listen to music, or even record GPS data without keeping the application open.
-
IT'S ALL IN THE
GOOGLE CLOUD
Android phones don't sync with your computer because they don't have to. Your contacts, calendar and mail are all backed up in the great Googleplex. What this means is that any changes or entries you make to your Google-based organizer will automatically appear on your Android phone.
- NOT ALL APPS ARE VERIFIED It's safe to install or buy apps from the Android Market, but a simple change in your phone or tablet's security settings can let you install apps from unverifi ed sites. What this means is that not all the apps you use are verifi ed by Android and could do more harm than good.
-
APP INCOMPATIBILITIES
As mentioned earlier, all phones have different hardware setups. A difference in resolution, processor speed and RAM means that an app that runs perfectly fi ne on one Android device might not work as well on another. Developers need to consider modifying their apps to suit different devices. -
IT CAN REMOTE WIPE
Google has added a remote wipe feature with Android 2.2 (FroYo). This remote wipe feature enables users to program the device to automatically wipe its memory clean in certain conditions. If your phone is lost or stolen, a simple SMS, failed password entry or a change of SIM Card can trigger the wipe. It's up to you.
SAFEGUARDING YOUR INTERESTS
With most people living their personal and professional lives on their smartphones, it's not just the data that has been fed into these devices, but also fi nancial transactions and communication links that can be violated. While Android has not seen too many security scares, the massive number of devices and high number of un-scanned apps that make their way into the Android Market really make you think about how safe your data is. Here are some things that you need to watch out for, and a list of apps that can help you secure your data.
THINGS TO WATCH OUT FOR
There are certain bits of information on your smartphone that can become a target for viruses, worms or other malware. First is your personal data, email, text messages, notes and contacts. Next are your personal and professional account details like email set-up, social networking details, and schedules. Your Wi-Fi network settings and online banking and trading website details are also at risk. Malware is capable of sending text or multimedia messages, making premium phone calls, or utilizing your funds to buy apps.
SECURITY AT THE ROOT
The Android OS does feature solid security architecture at the kernel level. The kernel is programmed to sandbox applications from each other, which means that if an application wants access to details like network access, reading or writing data, and personal contacts, each request is made explicitly and only on granting permission, will they be made available. If you do grant access to a malware app, then the security mechanism is of no use, so you need to exercise more caution and keep a tab on what to download to your phone. You should also be careful when updating an installed app because it is at times as good as installing a new app.
WHAT ARE YOU UP AGAINST?
Android apps can be targeted by a virus that can corrupt the data on your phone, spyware that can read critical data like credit card details and passwords without your knowledge, or apps can act as nuisance-ware or adware that interrupts the normal working of your phone.
SAFE BROWSING
Although you can avail help from antivirus apps, you should also exercise caution when you go on to the Android Market and download an app for your phone. Firstly, make sure that the app comes from a legitimate source. Even though the Market is considered a legitimate source, the apps that go up are not really screened, merely signed by the makers. Read through the comments posted by other users. If it sounds fi shy, it's wise to give it a miss. If you wish to go ahead, the next thing to do is visit the developer's website. Most developers who take their apps seriously would have a dedicated space to promote it. Finally, check the type of permissions the apps require for installation. For example, if a game app is trying to access your contact information, which is ideally not required, it is recommended to avoid it.
PROTECTING YOUR COMMUNICATION ROUTES
One of the easiest techniques to infi ltrate your Android device's security is through the Wi-Fi or VPN (virtual private network) settings. Although it is advisable to use SSL or HTTPS encryption when using an unprotected Wi-Fi hotspot, many email providers don't support encryption. Therefore, it is better to use a VPN network that offers better encryption supported by your mobile phone service provider. Even though you can keep your data traffi c option off when not in use, you can opt for apps like WiTopia or the free Hotspot Shield and services like Free Shield VPN (http://go.chip.in/ qnwbi) that offers increased safety for your VPN.
APPS TO GUIDE YOU
There are apps can help you protect existing data as well as help you safeguard your future downloads. You can secure your Android devices (FroYo and above) with unlocking options, like using a numeric PIN, a password or a graphical pattern. However, a University of Pennsylvania research reveals how smudges on your screen can actually make hacking your graphical password quite a cake walk. You can start off with a free app called Android Protector, which can assign passwords to protect details like your text messages, Gmail accounts, contacts details, schedulers, Internet and Wi-Fi settings, and photos. If you are looking for something a bit more secure, you can pick the Seal app (Rs 122.19), Carrot App Lock Pro (Rs 68.18), or app protector pro (Rs 90.46). These apps also offer lite versions so that you can try before you buy the app. If you wish to have an app that backs up and restores your data, helps you track your missing or stolen phone, and scan an app for malware, the free version of Lookout Mobile Security or MacAfee's recently acquired WaveSecure are very good options. However, WaveSecure does not provide antivirus support, but both applications can help you lock or wipe data off your device remotely. If you are looking for tools that can help you scan the apps for you before downloading them to your device, you can try the beta version of Norton Mobile for Android, or the Free or Pro (Rs 454.10) AVG apps.
THINGS TO WATCH OUT FOR
There are certain bits of information on your smartphone that can become a target for viruses, worms or other malware. First is your personal data, email, text messages, notes and contacts. Next are your personal and professional account details like email set-up, social networking details, and schedules. Your Wi-Fi network settings and online banking and trading website details are also at risk. Malware is capable of sending text or multimedia messages, making premium phone calls, or utilizing your funds to buy apps.
SECURITY AT THE ROOT
The Android OS does feature solid security architecture at the kernel level. The kernel is programmed to sandbox applications from each other, which means that if an application wants access to details like network access, reading or writing data, and personal contacts, each request is made explicitly and only on granting permission, will they be made available. If you do grant access to a malware app, then the security mechanism is of no use, so you need to exercise more caution and keep a tab on what to download to your phone. You should also be careful when updating an installed app because it is at times as good as installing a new app.
WHAT ARE YOU UP AGAINST?
Android apps can be targeted by a virus that can corrupt the data on your phone, spyware that can read critical data like credit card details and passwords without your knowledge, or apps can act as nuisance-ware or adware that interrupts the normal working of your phone.
SAFE BROWSING
Although you can avail help from antivirus apps, you should also exercise caution when you go on to the Android Market and download an app for your phone. Firstly, make sure that the app comes from a legitimate source. Even though the Market is considered a legitimate source, the apps that go up are not really screened, merely signed by the makers. Read through the comments posted by other users. If it sounds fi shy, it's wise to give it a miss. If you wish to go ahead, the next thing to do is visit the developer's website. Most developers who take their apps seriously would have a dedicated space to promote it. Finally, check the type of permissions the apps require for installation. For example, if a game app is trying to access your contact information, which is ideally not required, it is recommended to avoid it.
PROTECTING YOUR COMMUNICATION ROUTES
One of the easiest techniques to infi ltrate your Android device's security is through the Wi-Fi or VPN (virtual private network) settings. Although it is advisable to use SSL or HTTPS encryption when using an unprotected Wi-Fi hotspot, many email providers don't support encryption. Therefore, it is better to use a VPN network that offers better encryption supported by your mobile phone service provider. Even though you can keep your data traffi c option off when not in use, you can opt for apps like WiTopia or the free Hotspot Shield and services like Free Shield VPN (http://go.chip.in/ qnwbi) that offers increased safety for your VPN.
APPS TO GUIDE YOU
There are apps can help you protect existing data as well as help you safeguard your future downloads. You can secure your Android devices (FroYo and above) with unlocking options, like using a numeric PIN, a password or a graphical pattern. However, a University of Pennsylvania research reveals how smudges on your screen can actually make hacking your graphical password quite a cake walk. You can start off with a free app called Android Protector, which can assign passwords to protect details like your text messages, Gmail accounts, contacts details, schedulers, Internet and Wi-Fi settings, and photos. If you are looking for something a bit more secure, you can pick the Seal app (Rs 122.19), Carrot App Lock Pro (Rs 68.18), or app protector pro (Rs 90.46). These apps also offer lite versions so that you can try before you buy the app. If you wish to have an app that backs up and restores your data, helps you track your missing or stolen phone, and scan an app for malware, the free version of Lookout Mobile Security or MacAfee's recently acquired WaveSecure are very good options. However, WaveSecure does not provide antivirus support, but both applications can help you lock or wipe data off your device remotely. If you are looking for tools that can help you scan the apps for you before downloading them to your device, you can try the beta version of Norton Mobile for Android, or the Free or Pro (Rs 454.10) AVG apps.
THE LONG ARM OF ANDROID
In late 2007, there were rumors of Google working on the GPhone, a smartphone design with their own OS, which was supposed to compete with Apple's iPhone and Nokia's new smartphone series. What we got instead was the revelation of the Google Android operating system as an open source platform for developers and the Open Handset Alliance, which then consisted of 34 members, including mobile handset makers, application developers, mobile carriers, and chip makers.
THE OPEN HANDSET ALLIANCE
The Open Handset Alliance, with Android as its flagship software, is a business alliance that now consists of 80 firms that aim to pioneer Android and open standards for mobile devices. What this means is that Android as an open source platform could be modified and tweaked to suit hardware and handsets manufactured by multiple mobile phone manufacturers, thereby exponentially increasing the presence of Android as an operating system in the mobile phone market. The compatibility of the Android platform to run on different chipsets with different hardware is the prime attributer to its flexibility.
FREQUENT UPDATES
Google has set a trend of frequently updating its Android platform, with the four latest versions being released within the span of just over a year. Each update differed slightly from its predecessor, but the hardware requirements remained almost the same, giving manufacturers the ability to provide OS upgrades to handsets with older versions. Initially created for touchscreen smartphones, Google has now moved on to tablets with Android 3.0 Honeycomb being their first tablet-specific operating system with support for high performance hardware.
OPEN SOURCE
By providing the source code of the operating system to manufacturers and also designing a software development kit (SDK) for application developers, Google has sort of outsourced its tasks and still pleased developers by giving them the freedom of personalizing and customizing Android. They have gone a step further by letting users "root" their Android device, which gives them superuser privileges like access to administrative rights, system changes and running scripts that would generally be blocked for the standard user. This allows developers and coders to run their apps even if they require elevated privileges.
THE GOOGLE CLOUD
Along with the ability to customize almost everything, Google has integrated its operating system into the Google cloud. With default apps for Gmail, Google Maps, Google Docs and other Google features, users are able to view and edit their tasks and work on their handset, which then automatically syncs with their Google account. What the end user gets is a simple, easy-to-use interface which accompanies them wherever they go and omits the need to manually transfer files and other data. In addition to these default apps, the Android market has been flooded with apps from developers that can do almost anything. Some of these apps are dependent on the Google cloud as well and others have syncing abilities of their own, making both Android phones and tablets the most sought after devices in today's market.
A LITTLE TOO FLEXIBLE?
While the fl exibility of Android has been its biggest selling point, the openness does bring with it a few drawbacks. Manufacturers have taken advantage of Android's minimal hardware requirements and developed smartphones and tablets with varied hardware performance to suit all budgets. While Android might run smoothly on a cheaper phone, it is hard to tell how some apps with a higher CPU load or power requirement would perform. The Android market limits the installation of certain apps based on the device being used, but third party apps can still be installed without any regulation. There is also the risk of security, which is perfectly exemplifi ed by the Soundminer app. Security researchers developed Soundminer as a working spyware app that is disguised as a voice recorder. Soundminer runs silently in the background and listens for PIN or Credit Card numbers during your phone calls. The application records this information, converts the recording into a number and relays it over the network to the developer. It can even recognize numbers typed on the virtual keyboard and voice-activated IVR systems. Another instance of the gaping hole in the Android Market is the Angry Birds Viral app. A mobile security expert used the popular Angry Birds game to disguise a Trojan virus and had no trouble getting it onto the Android Market. Although it was only developed to demonstrate to Google the gaps in their security, the app brings to light how easy it would be for third party developers to access personal information.
OTHER DEVICES
Along with its widespread presence in smartphones and tablets from manufacturers like Motorola, LG, HTC, Samsung and Sony Ericsson, Android has also been adapted to run on e-readers, netbooks, portable portable media players and even TVs. Barnes & Noble, Entourage, Spring Design and PocketBook have all used Android to power certain aspects of their e-readers such as Wi-Fi or 3G technology. Acer and Toshiba have already manufactured netbooks that are powered by Android and Samsung and Philips have used Android 2.1 on their music players. There is also speculation about Android-powered Internet televisions from Sony and NCPG.
SOMETHING FOR THE FUTURE
The acquisition of a small Californian start-up called Embedded Alley Solutions by Mentor Graphics has raised a few eyebrows. Embedded Alley Solutions specialize in Linux and Android tools and have developed the Embedded Alley Development System for Android-based devices. What this means is that the Android platform could possibly be tweaked to run on home appliances, such as telephones, navigation systems and even Internet refrigerators. Only time will tell how far Google's Android net will eventually spread.
THE OPEN HANDSET ALLIANCE
The Open Handset Alliance, with Android as its flagship software, is a business alliance that now consists of 80 firms that aim to pioneer Android and open standards for mobile devices. What this means is that Android as an open source platform could be modified and tweaked to suit hardware and handsets manufactured by multiple mobile phone manufacturers, thereby exponentially increasing the presence of Android as an operating system in the mobile phone market. The compatibility of the Android platform to run on different chipsets with different hardware is the prime attributer to its flexibility.
FREQUENT UPDATES
Google has set a trend of frequently updating its Android platform, with the four latest versions being released within the span of just over a year. Each update differed slightly from its predecessor, but the hardware requirements remained almost the same, giving manufacturers the ability to provide OS upgrades to handsets with older versions. Initially created for touchscreen smartphones, Google has now moved on to tablets with Android 3.0 Honeycomb being their first tablet-specific operating system with support for high performance hardware.
OPEN SOURCE
By providing the source code of the operating system to manufacturers and also designing a software development kit (SDK) for application developers, Google has sort of outsourced its tasks and still pleased developers by giving them the freedom of personalizing and customizing Android. They have gone a step further by letting users "root" their Android device, which gives them superuser privileges like access to administrative rights, system changes and running scripts that would generally be blocked for the standard user. This allows developers and coders to run their apps even if they require elevated privileges.
THE GOOGLE CLOUD
Along with the ability to customize almost everything, Google has integrated its operating system into the Google cloud. With default apps for Gmail, Google Maps, Google Docs and other Google features, users are able to view and edit their tasks and work on their handset, which then automatically syncs with their Google account. What the end user gets is a simple, easy-to-use interface which accompanies them wherever they go and omits the need to manually transfer files and other data. In addition to these default apps, the Android market has been flooded with apps from developers that can do almost anything. Some of these apps are dependent on the Google cloud as well and others have syncing abilities of their own, making both Android phones and tablets the most sought after devices in today's market.
A LITTLE TOO FLEXIBLE?
While the fl exibility of Android has been its biggest selling point, the openness does bring with it a few drawbacks. Manufacturers have taken advantage of Android's minimal hardware requirements and developed smartphones and tablets with varied hardware performance to suit all budgets. While Android might run smoothly on a cheaper phone, it is hard to tell how some apps with a higher CPU load or power requirement would perform. The Android market limits the installation of certain apps based on the device being used, but third party apps can still be installed without any regulation. There is also the risk of security, which is perfectly exemplifi ed by the Soundminer app. Security researchers developed Soundminer as a working spyware app that is disguised as a voice recorder. Soundminer runs silently in the background and listens for PIN or Credit Card numbers during your phone calls. The application records this information, converts the recording into a number and relays it over the network to the developer. It can even recognize numbers typed on the virtual keyboard and voice-activated IVR systems. Another instance of the gaping hole in the Android Market is the Angry Birds Viral app. A mobile security expert used the popular Angry Birds game to disguise a Trojan virus and had no trouble getting it onto the Android Market. Although it was only developed to demonstrate to Google the gaps in their security, the app brings to light how easy it would be for third party developers to access personal information.
OTHER DEVICES
Along with its widespread presence in smartphones and tablets from manufacturers like Motorola, LG, HTC, Samsung and Sony Ericsson, Android has also been adapted to run on e-readers, netbooks, portable portable media players and even TVs. Barnes & Noble, Entourage, Spring Design and PocketBook have all used Android to power certain aspects of their e-readers such as Wi-Fi or 3G technology. Acer and Toshiba have already manufactured netbooks that are powered by Android and Samsung and Philips have used Android 2.1 on their music players. There is also speculation about Android-powered Internet televisions from Sony and NCPG.
SOMETHING FOR THE FUTURE
The acquisition of a small Californian start-up called Embedded Alley Solutions by Mentor Graphics has raised a few eyebrows. Embedded Alley Solutions specialize in Linux and Android tools and have developed the Embedded Alley Development System for Android-based devices. What this means is that the Android platform could possibly be tweaked to run on home appliances, such as telephones, navigation systems and even Internet refrigerators. Only time will tell how far Google's Android net will eventually spread.
TRACING THE SUCCESS OF ANDROID
With smartphones becoming the fastest growing mobile phone segment and tablet PC market touted to see massive growth this year, the Android platform stands fi rmly in the center of the revolution. Just as the mobile platform space was settling into clear segmentations, Android has made the industry sit up and take note. What is it that makes Android a stronger contender in a space which boasts of big players like Microsoft's Windows Phone 7, Apple's iOS, Symbian and Linux? We look back and trace the route Google took to revolutionize the face of mobile computing.
HUMBLE BEGINNINGS
Way back in 2005, a start-up company named Android, which was developing mobile applications, was acquired by Google. A Linux-based mobile device OS was developed as a fl exible, upgradeable system, and released as the Android platform in 2007. The project has been backed by the Open Handset Alliance, which features over 80 hardware, software, and telecommunications companies to help make the movement interoperable and platform-friendly.
THE CURRENT SCENARIO
Three years later, the technology is all set to give the industry leaders a run for their money. A com-parative analysis from Gartner reveals that in the smartphone segment, Android has seen a sales growth of 888.8 percent from 2009 to 2010. However, the report states that the OS will have to wait until 2014 to take over the current market leader, Symbian, which is down, but not completely out of the scene.
APP'S THE WORD
The greatest advantage of using an Android-powered smartphone is that it isn't "locked" by some service provider or telecomm network. This means that you can download what ever you want, pick a service provider of your choice and opt for an Internet surfi ng data plan that suits your pocket. Moreover, accessing its kernel root (as a superuser, through a process called rooting) and playing around with the fi rmware is completely legitimate (not recommended, unless you know what you are doing). The platform also allows you to legally tether your phone, making it a Wi-Fi hot spot for your laptop or PC to access Internet with ease. If you don't have the desire to do a fi rmware based upgrade, but want to use the features that are available, you can turn to the Android Market. The Market has an app for everything that you can do with your Android device and the availability of apps is not really limited to the Market. There are several resources you can turn to but be sure to
HUMBLE BEGINNINGS
Way back in 2005, a start-up company named Android, which was developing mobile applications, was acquired by Google. A Linux-based mobile device OS was developed as a fl exible, upgradeable system, and released as the Android platform in 2007. The project has been backed by the Open Handset Alliance, which features over 80 hardware, software, and telecommunications companies to help make the movement interoperable and platform-friendly.
THE CURRENT SCENARIO
Three years later, the technology is all set to give the industry leaders a run for their money. A com-parative analysis from Gartner reveals that in the smartphone segment, Android has seen a sales growth of 888.8 percent from 2009 to 2010. However, the report states that the OS will have to wait until 2014 to take over the current market leader, Symbian, which is down, but not completely out of the scene.
APP'S THE WORD
The greatest advantage of using an Android-powered smartphone is that it isn't "locked" by some service provider or telecomm network. This means that you can download what ever you want, pick a service provider of your choice and opt for an Internet surfi ng data plan that suits your pocket. Moreover, accessing its kernel root (as a superuser, through a process called rooting) and playing around with the fi rmware is completely legitimate (not recommended, unless you know what you are doing). The platform also allows you to legally tether your phone, making it a Wi-Fi hot spot for your laptop or PC to access Internet with ease. If you don't have the desire to do a fi rmware based upgrade, but want to use the features that are available, you can turn to the Android Market. The Market has an app for everything that you can do with your Android device and the availability of apps is not really limited to the Market. There are several resources you can turn to but be sure to
Subscribe to:
Posts (Atom)