Android 1.6 with More Bells and Whistles
The new Android version code-named Donut comes with Kernel 2.6.29, more applications and usability improvements. Developers now have more possibilities with the new hardware capabilities of the software development kit (SDK).
Among the new Donut user features is a battery usage indicator per application to identify and adjust or drop resource-hungry apps. Another feature is a configuration control panel for various VPN types (L2TP, IPSEC, and PPTP). Add to that a quick search framework across multiple sources directly from the home screen. Searches increase in relevance by time, so that the more recently accessed contacts or apps are listed first. The quick search feature should also help developers in making their Android applications "searchable" in response to user queries.
The Android 1.6 SDK, updated for the operating system, also provides a series of new enhancements. The SDK provides its users immediate access to updates and extensions. The development environment itself, for example, has a larger selection of screen sizes and resolutions. Developers can now use the
element to set small, normal, large, any density and resizable screen values. In a similar vein, the
classes now support scaling for different screen densities.
classes provide text-to-speech synthesis, in English, Italian, Spanish, French and German. A GestureBuilder tool allows recognizing and capturing users' on-screen gestures (strokes) and integrating them into Android apps. Android 1.6 also supports code division multiple access (CDMA) for broadband transfer in the telephony stack. Not least of all is inclusion of the Opencore 2 media engine, a product of the PacketVideo firm that integrated a multimedia subsystem into Android and is a founding member of the Open Handset Alliance.
The Android 1.6 SDK is available for Linux, Mac OS X and Windows at the developers download site.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems