Wednesday, July 8, 2020

Technology Listing related to Android (Jul 2020, Week 1)



1. Secure copy

Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. "SCP" commonly refers to both the Secure Copy Protocol and the program itself. According to OpenSSH developers in April 2019 the scp protocol is outdated, inflexible and not readily fixed; they recommend the use of more modern protocols like sftp and rsync for file transfer. Written in C Operating system Cross-platform Secure Copy Protocol The SCP is a network protocol, based on the BSD RCP protocol, which supports file transfers between hosts on a network. SCP uses Secure Shell (SSH) for data transfer and uses the same mechanisms for authentication, thereby ensuring the authenticity and confidentiality of the data in transit. A client can send (upload) files to a server, optionally including their basic attributes (permissions, timestamps). Clients can also request files or directories from a server (download). SCP runs over TCP port 22 by default. Like RCP, there is no RFC that defines the specifics of the protocol. Function Normally, a client initiates an SSH connection to the remote host, and requests an SCP process to be started on the remote server. The remote SCP process can operate in one of two modes: % source mode, which reads files (usually from disk) and sends them back to the client, or % sink mode, which accepts the files sent by the client and writes them (usually to disk) on the remote host. For most SCP clients, source mode is generally triggered with the -f flag (from), while sink mode is triggered with -t (to). These flags are used internally and are not documented outside the SCP source code. Secure Copy (remote file copy program) The SCP program is a software tool implementing the SCP protocol as a service daemon or client. It is a program to perform secure copying. Perhaps the most widely used SCP program is the OpenSSH command line scp program, which is provided in most SSH implementations. The scp program is the secure analog of the rcp command. The scp program must be part of all SSH servers that want to provide SCP service, as scp functions as SCP server too. Some SSH implementations provide the scp2 program, which uses the SFTP protocol instead of SCP, but provides the very same command line interface as scp. scp is then typically a symbolic link to scp2. Syntax: Typically, a syntax of scp program is like the syntax of cp (copy): Copying file to host: scp SourceFile user@host:directory/TargetFile Copying file from host and copying folder from host (with -r switch): scp user@host:directory/SourceFile TargetFile scp -r user@host:directory/SourceFolder TargetFolder Note that if the remote host uses a port other than the default of 22, it can be specified in the command. For example, copying a file from host: scp -P 2222 user@host:directory/SourceFile TargetFile Ref: Secure Copy

2. SSH File Transfer Protocol

Not to be confused with Simple File Transfer Protocol, FTP over SSH, or FTPS. In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities. The IETF Internet Draft states that, even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol. Capabilities Compared to the SCP protocol, which only allows file transfers, the SFTP protocol allows for a range of operations on remote files which make it more like a remote file system protocol. An SFTP client's extra capabilities include resuming interrupted transfers, directory listings, and remote file removal. SFTP attempts to be more platform-independent than SCP; with SCP, for instance, the expansion of wildcards specified by the client is up to the server, whereas SFTP's design avoids this problem. While SCP is most frequently implemented on Unix platforms, SFTP servers are commonly available on most platforms. The file transfer is fast in SCP when compared to the SFTP protocol due to the back and forth nature of SFTP protocol. In SFTP, the file transfer can be easily terminated without terminating a session like other mechanisms do. SFTP is not FTP run over SSH, but rather a new protocol designed from the ground up by the IETF SECSH working group. It is sometimes confused with Simple File Transfer Protocol. The protocol itself does not provide authentication and security; it expects the underlying protocol to secure this. SFTP is most often used as subsystem of SSH protocol version 2 implementations, having been designed by the same working group. It is possible, however, to run it over SSH-1 (and some implementations support this) or other data streams. Running an SFTP server over SSH-1 is not platform-independent as SSH-1 does not support the concept of subsystems. An SFTP client willing to connect to an SSH-1 server needs to know the path to the SFTP server binary on the server side. Uploaded files may be associated with their basic attributes, such as time stamps. This is an advantage over the common FTP protocol. Ref: SSH File Transfer Protocol

3. PuTTY

PuTTY (/ˈpʌti/) is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name "PuTTY" has no official meaning. PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and macOS, and unofficial ports have been contributed to platforms such as Symbian, Windows Mobile and Windows Phone. PuTTY was written and is maintained primarily by Simon Tatham, a British programmer. Features PuTTY supports many variations on the secure remote terminal, and provides user control over the SSH encryption key and protocol version, alternate ciphers such as AES, 3DES, RC4, Blowfish, DES, and Public-key authentication. PuTTY supports SSO through GSSAPI, including user provided GSSAPI DLLs. It also can emulate control sequences from xterm, VT220, VT102 or ECMA-48 terminal emulation, and allows local, remote, or dynamic port forwarding with SSH (including X11 forwarding). The network communication layer supports IPv6, and the SSH protocol supports the zlib@openssh.com delayed compression scheme. It can also be used with local serial port connections. PuTTY comes bundled with command-line SCP and SFTP clients, called "pscp" and "psftp" respectively, and plink, a command-line connection tool, used for non-interactive sessions. PuTTY does not support session tabs directly, but many wrappers are available that do. Ref: PuTTY

4. WinSCP

WinSCP (Windows Secure Copy) is a free and open-source SFTP, FTP, WebDAV, Amazon S3 and SCP client for Microsoft Windows. Its main function is secure file transfer between a local and a remote computer. Beyond this, WinSCP offers basic file manager and file synchronization functionality. For secure transfers, it uses Secure Shell (SSH) and supports the SCP protocol in addition to SFTP. Development of WinSCP started around March 2000 and continues. Originally it was hosted by the University of Economics in Prague, where its author worked at the time. Since July 16, 2003, it is licensed under the GNU GPL and hosted on SourceForge.net. WinSCP is based on the implementation of the SSH protocol from PuTTY and FTP protocol from FileZilla. It is also available as a plugin for Altap Salamander file manager, and there exists a third-party plugin for the FAR file manager. Features % Graphical user interface % Translated into several languages % Integration with Windows (Drag-and-drop, URL, shortcut icons) % All common operations with files % Support for SFTP and SCP protocols over SSH-1 and SSH-2, FTP protocol, WebDAV protocol and Amazon S3 protocol. % Batch file scripting, command-line interface and .NET wrapper % Directory synchronization in several semi or fully automatic ways % Integrated text editor % Support for SSH password, keyboard-interactive, public key and Kerberos (GSS) authentication % Integrates with Pageant (PuTTY authentication agent) for full support of public key authentication with SSH % Choice of Windows Explorer-like or Norton Commander-like interfaces % Optionally stores session information % Optionally import session information from PuTTY sessions in the registry % Able to upload files and retain associated original date/timestamps, unlike FTP clients Ref: WinSCP

5. Termux

Termux is a terminal emulator for Android. It can be considered to be more like a Linux distribution than just a terminal application due to a large number of available packages such as clang, FFmpeg, OpenSSH, Python, Vim. Termux is not an OS or hardware emulator. It shares the same environment as other parts of the Android OS. Termux is an Android terminal emulator and Linux environment application that works directly with no rooting or setup required. A minimal base system is installed automatically, additional packages are available using the package manager. Ref: wiki.termux.com

6. Package manager

A package manager or package-management system is a collection of software tools that automates the process of installing, upgrading, configuring, and removing computer programs for a computer's operating system in a consistent manner. A package manager deals with packages, distributions of software and data in archive files. Packages contain metadata, such as the software's name, description of its purpose, version number, vendor, checksum (preferably a cryptographic hash function), and a list of dependencies necessary for the software to run properly. Upon installation, metadata is stored in a local package database. Package managers typically maintain a database of software dependencies and version information to prevent software mismatches and missing prerequisites. They work closely with software repositories, binary repository managers, and app stores. Package managers are designed to eliminate the need for manual installs and updates. This can be particularly useful for large enterprises whose operating systems are typically consisting of hundreds or even tens of thousands of distinct software packages. Functions A software package is an archive file containing a computer program as well as necessary metadata for its deployment. The computer program can be in source code that has to be compiled and built first. Package metadata include package description, package version, and dependencies (other packages that need to be installed beforehand). Package managers are charged with the task of finding, installing, maintaining or uninstalling software packages upon the user's command. Typical functions of a package management system include: % Working with file archivers to extract package archives % Ensuring the integrity and authenticity of the package by verifying their checksums and digital certificates, respectively % Looking up, downloading, installing, or updating existing software from a software repository or app store % Grouping packages by function to reduce user confusion % Managing dependencies to ensure a package is installed with all packages it requires, thus avoiding "dependency hell" Ref: Package manager

7. Brython

A Python 3 implementation for client-side web programming Without a doubt, you've seen a clock like this in demos of HTML5 However, right click and view the source of this page... It is not Javascript code! Instead, you will find Python code in a script of type "text/python". Brython is designed to replace Javascript as the scripting language for the Web. As such, it is a Python 3 implementation (you can take it for a test drive through a web console), adapted to the HTML5 environment, that is to say with an interface to the DOM objects and events. Speed of execution is similar to CPython for most operations. The gallery highlights a few of the possibilities, from creating simple document elements to drag and drop and 3D navigation. A wiki lists some applications using Brython. You can also take a look at presentations made in various conferences. Ref: Brython

8. LineageOS

LineageOS is an operating system for smartphones, tablet computers, and set-top boxes, based on Android with mostly free and open-source software. It is the successor to the custom ROM CyanogenMod, from which it was forked in December 2016 when Cyanogen Inc. announced it was discontinuing development and shut down the infrastructure behind the project. Since Cyanogen Inc. retained the rights to the Cyanogen name, the project rebranded its fork as LineageOS. LineageOS was officially launched on 24 December 2016, with the source code available on both GitHub and GitLab. As with all versions of Android, operating system releases are specific to a single model. Since its launch, LineageOS development builds are available for 109 phone models with over 1.7 million active installs, having doubled its user base in the months February–March 2017. Background CyanogenMod (often abbreviated "CM") was a popular open-source operating system for smartphones and tablet computers, based on the Android mobile platform. Although only a subset of total CyanogenMod users elected to report their use of the firmware, as of 23 March 2015, some reports indicated over 50 million people running CyanogenMod on their phones. It was also frequently used as a starting point by developers of other ROMs.[citation needed] In 2013, the founder, Steve Kondik, obtained venture funding under the name Cyanogen Inc. to allow commercialization of the project. In his view, the company did not capitalize on the project's success and in 2016 he either left or was forced out as part of a corporate restructure which involved a change of CEO, closure of offices and projects, and cessation of services. The code itself, being both open source and popular, was quickly forked under the new name LineageOS and efforts began to resume development as a community project. CyanogenMod offered a number of features and options not available in the official firmware distributed by most mobile device vendors. Features supported by CyanogenMod included native theme support, FLAC audio codec support, a large Access Point Name list, Privacy Guard (per-application permission management application), support for tethering over common interfaces, CPU overclocking and other performance enhancements, root access, soft buttons and other "tablet tweaks," toggles in the notification pull-down (such as Wi-Fi, Bluetooth and satellite navigation), and other interface enhancements. Many of the features from CyanogenMod were later integrated into the official Android code base. CyanogenMod's developers said that it did not contain spyware or bloatware. CyanogenMod was also said to perform better and be more reliable than official firmware releases. Ref: LineageOS

9. XDA Developers

XDA Developers (also known simply as XDA; often stylized as xda-developers) is a mobile software development community launched on 20 December 2002. Although discussion primarily revolves around Android, members also talk about many other operating systems and mobile development topics. Many software and hardware hacks, rooting methods, and other phone and tablet specific tweaks originate from the members of the XDA Forum. XDA Developers also hosts the XDA Portal, a source for Android and mobile phone development news, as well as XDA Labs, an Android app and repository that acts as a third-party application provider. They were launched in 2010 and 2016, respectively. Joshua Solan manages and owns XDA Developers via his company KC Online Media, LLC. Ref: XDA Developers

10. Android Recovery Mode

Android devices have a feature called Android Recovery Mode, which allows users to fix some problems in their phones or tablets. ... Technically, Recovery Mode Android refers to a special bootable partition, which contains a recovery application installed in it. Ref: Android Recovery Mode

11. Bootloader (Android) and Rooting

In simple terms, a bootloader is the code that runs on a device (be it a phone or computer) before the operating system starts up. Almost all operating systems have bootloaders of some sort. ... Every time your phone starts up, that bootloader code is telling your device what to do in order to get you to the home screen. Ref: Tested.com: Bootloader (Android) Rooting is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control (known as root access) over various Android subsystems. As Android uses the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS. Rooting is often performed with the goal of overcoming limitations that carriers and hardware manufacturers put on some devices. Thus, rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On Android, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system. Root access is sometimes compared to jailbreaking devices running the Apple iOS operating system. However, these are different concepts: Jailbreaking is the bypass of several types of Apple prohibitions for the end user, including modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting). Many vendors such as HTC, Sony, LG, Asus and Google explicitly provide the ability to unlock devices, and even replace the operating system entirely. Similarly, the ability to sideload applications is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking (giving users administrative privileges) that most directly correlates to Android rooting. Ref: Rooting

12. JTAG

JTAG (named after the Joint Test Action Group which codified it) is an industry standard for verifying designs and testing printed circuit boards after manufacture. JTAG implements standards for on-chip instrumentation in electronic design automation (EDA) as a complementary tool to digital simulation. It specifies the use of a dedicated debug port implementing a serial communications interface for low-overhead access without requiring direct external access to the system address and data buses. The interface connects to an on-chip Test Access Port (TAP) that implements a stateful protocol to access a set of test registers that present chip logic levels and device capabilities of various parts. The Joint Test Action Group formed in 1985 to develop a method of verifying designs and testing printed circuit boards after manufacture. In 1990 the Institute of Electrical and Electronics Engineers codified the results of the effort in IEEE Standard 1149.1-1990, entitled Standard Test Access Port and Boundary-Scan Architecture. The JTAG standards have been extended by many semiconductor chip manufacturers with specialized variants to provide vendor-specific features. Debugging Although JTAG's early applications targeted board level testing, here the JTAG standard was designed to assist with device, board, and system testing, diagnosis, and fault isolation. Today JTAG is used as the primary means of accessing sub-blocks of integrated circuits, making it an essential mechanism for debugging embedded systems which might not have any other debug-capable communications channel.[citation needed] On most systems, JTAG-based debugging is available from the very first instruction after CPU reset, letting it assist with development of early boot software which runs before anything is set up. An in-circuit emulator (or, more correctly, a "JTAG adapter") uses JTAG as the transport mechanism to access on-chip debug modules inside the target CPU. Those modules let software developers debug the software of an embedded system directly at the machine instruction level when needed, or (more typically) in terms of high level language source code. System software debug support is for many software developers the main reason to be interested in JTAG. Many silicon architectures such as PowerPC, MIPS, ARM, x86 built an entire software debug, instruction tracing, and data tracing infrastructure around the basic JTAG protocol. Frequently individual silicon vendors however only implement parts of these extensions. Some examples are ARM CoreSight and Nexus as well as Intel's BTS (Branch Trace Storage), LBR (Last Branch Record), and IPT (Intel Processor Trace) implementations. There are many other such silicon vendor-specific extensions that may not be documented except under NDA. The adoption of the JTAG standard helped move JTAG-centric debugging environments away from early processor-specific designs. Processors can normally be halted, single stepped, or let run freely. One can set code breakpoints, both for code in RAM (often using a special machine instruction) and in ROM/flash. Data breakpoints are often available, as is bulk data download to RAM. Most designs have "halt mode debugging", but some allow debuggers to access registers and data buses without needing to halt the core being debugged. Some toolchains can use ARM Embedded Trace Macrocell (ETM) modules, or equivalent implementations in other architectures to trigger debugger (or tracing) activity on complex hardware events, like a logic analyzer programmed to ignore the first seven accesses to a register from one particular subroutine. Sometimes FPGA developers also use JTAG to develop debugging tools. The same JTAG techniques used to debug software running inside a CPU can help debug other digital design blocks inside an FPGA. For example, custom JTAG instructions can be provided to allow reading registers built from arbitrary sets of signals inside the FPGA, providing visibility for behaviors which are invisible to boundary scan operations. Similarly, writing such registers could provide controllability which is not otherwise available. Ref: JTAG

13. Android Beam

Android Beam was a feature of the Android mobile operating system that allowed data to be transferred via near field communication (NFC). It allowed the rapid short-range exchange of web bookmarks, contact info, directions, YouTube videos, and other data. Android Beam was introduced in 2011 with Android Ice Cream Sandwich. This was improved after Google acquired Bump!. By 2017, ComputerWorld included Android Beam in a list of "once-trumpeted features that quietly faded away", observing that "despite the admirable marketing effort, Beam never quite worked particularly well, and numerous other systems for sharing stuff proved to be simpler and more reliable." Android Beam was deprecated starting with Android Q in January 2019. Google is working on an unannounced Android Beam replacement and AirDrop competitor originally called Fast Share and subsequently renamed Nearby Sharing. Ref: Android Beam

14. AirDroid

% AirDroid enables you to transfer files across devices, control mobile devices remotely, receive and reply to messages on computer. % Remote control mobile devices directly by phone % Transfer files, photos, documents, music or APKs, all without a cable. You can even transfer folders and manage files remotely. Folder transfer is for Premium accounts only % No matter it's local or remote network, you can use Remote Control to take complete control of your Android devices. Screen Mirroring allows you to present your device screen, doing game live streaming and demonstrating apps, etc. You can also use the remote keyboard to type on device using your computer keyboard. % The desktop notification feature allows you to mirror notifications of SMS, emails, app notifications (like WhatsApp, Kik, Line, etc.) to your computer and quickly reply them. No more need to check your phone, and never miss an important message. % Start device camera remotely, monitor the environment around the device in real-time. Remote connection is for Premium accounts only. % Web app - Manage files on device via a web browser: No need to install any client, no restriction to any system, you just need a web browser to enjoy all the AirDroid features to manage your devices. The best solution during travel or for managing devices on computer without the desktop client installed. Ref: AirDroid

15. ES File Explorer

ES File Explorer is a file manager/explorer designed by ES Global, a subsidiary of DO Global, for Android devices. It includes features like cloud storage integration, file transfer from Android to Windows via FTP or LAN, and a root browser. It was removed from the Google Play Store for committing advertisement fraud. History Around May 2016, ES File Explorer began incorporating DU Charge Booster into the app, hijacking the user's lockscreen. Several news and blog websites such as AndroidPIT, which had once recommended the app, encouraged users to uninstall it. It was removed later after much criticism and many bad reviews. ES File Explorer was accidentally removed from the Fire TV App Store in August 2016. A popular software blog, The Windows Club, posted a tutorial on how to use the FTP feature of ES File Explorer in March 2019. Though ES File Explorer had originally been a free program, the app began charging a monthly $9.99 fee in order to use its more advanced features, towards the end of 2019. Ref: ES File Explorer

16. Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. SSH provides a secure channel over an unsecured network by using a client–server architecture, connecting an SSH client application with an SSH server. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2. The standard TCP port for SSH is 22. SSH is generally used to access Unix-like operating systems, but it can also be used on Microsoft Windows. Windows 10 uses OpenSSH as its default SSH client and SSH server. Despite popular misconception, SSH is not an implementation of Telnet with cryptography provided by the Secure Sockets Layer (SSL). SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rsh and the related rlogin and rexec protocols. Those protocols send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH, allowing them to read, modify and selectively suppress the contents of SSH sessions. SSH can also be run using SCTP rather than TCP as the connection oriented transport layer protocol. Definition SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on. Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. In this scenario, anyone can produce a matching pair of different keys (public and private). The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is based on the private key, the key itself is never transferred through the network during authentication. SSH only verifies whether the same person offering the public key also owns the matching private key. In all versions of SSH it is important to verify unknown public keys, i.e. associate the public keys with identities, before accepting them as valid. Accepting an attacker's public key without validation will authorize an unauthorized attacker as a valid user. Ref: Secure Shell

17. Telnet

Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in RFC 855, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. The name stands for "teletype network". Historically, Telnet provided access to a command-line interface on a remote host. However, because of serious security concerns when using Telnet over an open network such as the Internet, its use for this purpose has waned significantly in favor of SSH. The term telnet is also used to refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all computer platforms. Telnet is also used as a verb. To telnet means to establish a connection using the Telnet protocol, either with a command line client or with a graphical interface. For example, a common directive might be: "To change your password, telnet into the server, log in and run the passwd command." In most cases, a user would be telnetting into a Unix-like server system or a network device (such as a router). Ref: Telnet

18. Ansible

Ansible is an open-source software provisioning, configuration management, and application-deployment tool enabling infrastructure as code. It runs on many Unix-like systems, and can configure both Unix-like systems as well as Microsoft Windows. It includes its own declarative language to describe system configuration. Ansible was written by Michael DeHaan and acquired by Red Hat in 2015. Ansible is agentless, temporarily connecting remotely via SSH or Windows Remote Management (allowing remote PowerShell execution) to do its tasks. Ref: Ansible (software)

19. Nexus

Google Nexus was a line of consumer electronic devices that ran the Android operating system. Google managed the design, development, marketing, and support of these devices, but some development and all manufacturing were carried out by partnering with original equipment manufacturers (OEMs). The line also included tablets and streaming media players, though neither type of device are currently available. The most recent tablet was the Nexus 9 (made with HTC), and the most recent streaming media player the Nexus Player (made with Asus). Devices in the Nexus line were considered Google's flagship Android products. They contained little to no manufacturer or wireless carrier modifications to Android (such as custom user interfaces), although devices sold through carriers may be SIM locked and had some extra branding. The Verizon Galaxy Nexus featured a Verizon logo on the back and received software updates at a slower pace than the unlocked variant, though it featured different hardware to accommodate Verizon's CDMA network. All Nexus devices featured an unlockable bootloader to allow further development and end-user modification. Nexus devices are often among the first Android devices to receive updates to the operating system. With the expansion of the Google Pixel product line in late 2016, Google stated that they "don't want to close a door completely, but there is no plan right now to do more Nexus devices." In 2017, Google partnered with HMD Global in making new Nokia phones, which have been considered by some as a revival of Nexus. Ref: Google Nexus

20. Google Pixel

Google Pixel is a brand of consumer electronic devices developed by Google that run either Chrome OS or the Android operating system. The Pixel brand was introduced in February 2013 with the first-generation Chromebook Pixel. The Pixel line includes laptops, tablets, and smartphones, as well as several accessories. Pixel 4 Google announced the Pixel 4 and Pixel 4 XL at an event on October 15, 2019, alongside several other products. Display: Pixel 4 5.7" OLED, 2280×1080 {19:9} pixel resolution; Pixel 4 XL 6.3" OLED, 3040×1440 {19:9} pixel resolution; both displays have Corning Gorilla Glass 5. Processor: Qualcomm Snapdragon 855 Storage: 64 GB or 128 GB RAM: 6 GB LPDDR4X Cameras: 12.2 MP sensor with f/1.8 lens & 16 MP telephoto sensor with f/2.4 lens, IR laser-assisted autofocus, optical and electronic image stabilization; 8 MP front camera with f/2.0 lens and 90° lens Battery: 2800 mAh (Pixel 4); 3700 mAh (Pixel 4 XL); both are non-removable and have fast charging and wireless charging Materials: Aluminum frame, matte or glossy glass back, IP68 water and dust resistance Colors: Just Black, Clearly White, and Oh So Orange Operating system: Android 10, upgradable to Android 11 Beta In 2019, Google offered a bug bounty of up to $1.5 million for the Pixel 4.[1 Pixelbook Go On October 15, 2019, Google announced the second generation of the Pixelbook, named the Pixelbook Go, at its Made by Google 2019 event. Display: 13.3" display with 1920×1080 pixel resolution (166 ppi) or "Molecular Display" 3840×2160 pixel resolution (331 ppi) Processor: 8th generation (Kaby Lake) Intel Core m3, i5 or i7 processor Storage: 64, 128, or 256 GB internal storage RAM: 8 or 16 GB Battery: 47 Wh, 56 Wh (Molecular Display) Ref: Google Pixel

No comments:

Post a Comment