Ubuntu Application Lifecycle

Slides:



Advertisements
Similar presentations
Android Application Development A Tutorial Driven Course.
Advertisements

Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Ubuntu/ Linux Mobile Phone operating systems My Cole Eldridge.
DeVry University Donelle Vance. GRAB - The Cross Platform iPhone, iPad & Android Phone Sharing Application August 2011.
Cyber Bullying BEAT BULLYING.
Introduction to Android Platform Overview
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Case study 2 Android – Mobile OS.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Mobile Application Development with ANDROID Tejas Lagvankar UMBC 29 April 2009.
About me Yichuan Wang Android Basics Credit goes to Google and UMBC.
In association with Technion and Qualcomm. Project supervisor: Tatyana Finkel. Technion Israel Institute of Technology.
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 21 – LOCATION-BASED SERVICES SEAN J. TAYLOR.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Google Cloud Messaging for Android (GCM) is a free service that helps developers send data from servers to their Android.
01. Introduction to Android Prof. Oum Saokosal Master of Engineering in Information Systems, South Korea
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
CS378 - Mobile Computing Intents.
#gsa2012 Android Basics By: Amr Mohsen
10/10/2015 E.R.Edwards 10/10/2015 Staffordshire University School of Computing Introduction to Android Overview of Android System Android Components Component.
Class 02 – 03 Feb 2014 Setup Where do we begin? Know your content Discovering your target user.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
FCM Workflow using GCM.
Mobile web vs apps compared. Pro's of mobile web Accessible through any browser Doesn't require app download Load page by page Good for SEO Will have.
Class Presentation Pete Bohman, Adam Kunk, Erik Shaw (ONL)
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (1) The Operating System.
Android operating system N. Sravani M. Tech(CSE) (09251D5804)
System Software (1) The Operating System
The world’s open source learning platform Moodle Mobile SCORM 1.2 player Juan Leyva & Daniel
Best Practices for Mobile Business Intelligence. So you’re thinking about going Mobile….  Who am I’m going to be providing the information too?  What.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Private Secure Messaging Unity 4.0(5)
Google Apps for your business.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Gosbecks E-Safety Guide
Communication was never so easy!
Facebook privacy policy
Android Mobile Application Development
Android Application -Architecture.
Contract Lifecycle Management In the Disruptive Age
Mobile Applications (Android Programming)
Understanding Android Security
The world’s most advanced mobile platform
Ubuntu Application Confinement
Android System Security
WUR Reconnection Usage Model
Mechanism: Limited Direct Execution
Ubuntu Touch Internals
COMP Mobile Data Networking
Ubuntu Application Lifecycle
Modularity and Memory Clearly, programs must have access to memory
What Mobile Ads Know About Mobile Users
Call for Skype Help Password Recovery Skype Support.
Introduction to Soonr by ….
Quicken capital one download error
Windows Phone multitasking
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Application Development A Tutorial Driven Course
Be an Upstander! It’s Cool to Be Kind
Online Multilevel Media Sharing
Work from anywhere Sync your files to the cloud with OneDrive
05 | Desktop Applications
Korea Software HRD Center
Understanding Android Security
STOP – Save this file with a new name before editing
IST346: Operating Systems / Command Line Interfaces
Mobile Programming Dr. Mohsin Ali Memon.
Android Development Tools
Lecture 6 Introduction to Process Management
Perspective on Web Game Tech from the Instant Games team
Presentation transcript:

Ubuntu Application Lifecycle Or: How I learned to stop worrying and trust application developers Ted Gould ted@canonical.com @tedjgould FOSSETCON 20 Nov 2015

“I'm more worried about Murphy than I am Machievilli” — Michi Henning

Ideal Cracker

Diminished User Experience

Dead Battery © Andy Armstrong — CC-BY-SA — https://www.flickr.com/photos/andyarmstrong/190078748/

Data Protection © Josh Hallett — CC-BY — https://www.flickr.com/photos/hyku/368912557/

Physical Destruction © Antti T. Nissinen — CC-BY — https://www.flickr.com/photos/54177777@N00/373864777/

Phone Usage http://hbr.org/2013/01/how-people-really-use-mobile/

App App

Application Switcher

Presentation Application Switcher

Infinite App Illusion Technical User How many apps can I run? 1 GB RAM 1 GHz Quad Core

User Interaction Only!!!

Linux Kernel OOM Killer (want to include graphics resources in the future)

What happens: App is asked to save state Graphic buffers grabbed for screenshot Timeout, then all processes are sent SIGSTOP

What happens: NOTHING!

Positive: Ask to save state nicely via life cycle Stop using processing when not asked Negative: SIGSTOP apps SIGKILL apps on OOM killer

Trusted Helpers Download Manager — Downloads content to the device while the application isn't focused. Push Messages — Background process that collects JSON messages targeted at app/user Location Service — Uses GPS and other sources to establish location continually. Content Hub — Shares files between application contexts securely. Media Hub — Plays audio files and play lists.

Simple Sync

Request permission at time of use

Review Ubuntu Applications are: Confined — By default the applications are restricted from using a lot of functionality that might be expected from a traditional Linux user session. Managed — The application lifecycle works to keep the user in control of what is draining the battery and using resources. Have Friends — Trusted helpers provide ways to implement the functionality you need and work with confinement.

Additional Info http://www.ubuntu.com/phone https://developer.ubuntu.com https://wiki.ubuntu.com/Security/AppArmor https://wiki.ubuntu.com/Mir

© Stéfan — CC-BY-SA — https://www.flickr.com/photos/st3f4n/143623934