LightBlog

jeudi 9 juillet 2020

Samsung’s bean-shaped Galaxy Buds Live TWS earbuds leak in three colors

Samsung has been in the truly wireless (TWS) earbuds segment for a few years now. The Galaxy Buds+ was also one of Samsung’s better-received products in this segment, winning over as a product that can be easily recommended to most consumers and improving upon its predecessor in just the right ways. That makes us excited for what Samsung has in store for the successor, the bean-shaped Samsung Galaxy Buds Live. We already have a fairly good idea of what the Buds Live will look like thanks to early renders, and now we get to take a look at some more color options.

Samsung Galaxy Buds+ Review: The Meaningful Increment

The bean shape of the Samsung Galaxy Buds Live is no real secret by now. In the picture above, shared by Evan ‘evleaks’ Blass on his Patreon, we see the Buds Live’s outward-facing shell and the two microphone holes, along with another grilled opening that we are unable to properly explain yet. The earbuds are expected to come with Active Noise Cancellation, so these could be for enabling an Ambient Sound mode. Unlike the previous iterations, the compact design of the upcoming earbuds will sit more flush in the user’s ears and won’t protrude out as much. The earbuds are expected to measure in at just 2.8cm, making them a bit more comfortable and easier to use, especially for people will small ears. However, the new design might have some adverse effects on sound isolation as the earbuds don’t have any silicone components to ensure a proper seal.

Next, we get our first look at the earbuds inside their case. Unlike the pill-shaped case that Samsung used for the Buds and Buds+, the Samsung Galaxy Buds Live has a more squared case. The lid also gets a rubber strip. Other than the shape, there aren’t any major changes in the design.

The Samsung Galaxy Buds Live are expected to be unveiled at Samsung Unpacked on August 5, 2020, alongside the Galaxy Z Flip 5GGalaxy Note 20Galaxy Z Fold 2Galaxy Tab S7, and the Galaxy Watch 3.


Source: Evan Blass’ Patreon

The post Samsung’s bean-shaped Galaxy Buds Live TWS earbuds leak in three colors appeared first on xda-developers.



from xda-developers https://ift.tt/3efxu7J
via IFTTT

Download: Xiaomi Redmi Note 7 and Redmi Note 7S receive stable beta Android 10 update with MIUI 11

Launched back in 2019, Xiaomi’s Redmi Note 7 brought 48MP camera to the masses. The company decided to use a different camera sensor on the Indian variant, but they quickly phased out the initial model in favor of the Redmi Note 7S with a 48 MP primary rear camera. There is virtually no difference between the regular Redmi Note 7 and the Note 7S except the camera. Both models share a common code-name (“lavender”), thus their firmware packages are identical as well.

Redmi Note 7/7S XDA Forums

The factory-installed operating system on the phone duo was MIUI 10 on top of Android 9 Pie. The MIUI 11 update kept the underlying Android layer intact for them, but the phones have received a taste of Android 10 via MIUI 12-based closed beta builds. Xiaomi is now rolling out the Android 10 update for the Redmi Note 7/7S through the stable channel of MIUI, but there are a few stumbling blocks you should be aware of.

First of all, the stable build is still based on MIUI 11, not MIUI 12. Moreover, the company treats the current update as a “stable beta”, which means an authorized Mi Account might be required to sideload the ZIP file. Once Xiaomi marks it to be stable enough, they are going to flip a server-side switch that will eventually remove the need for such authorization before flashing. Alternatively, they could also release new builds with additional bug fixes.

The software version of the new build is V11.0.2.0.QFGxxXM, and it bumps the Android security patch level (SPL) to June 2020. The OTA is rolling out in China and India as of now, while other regional variants should get their updates soon. In case the bootloader of your Redmi Note 7/7S is unlocked and you want to install the updated build right now, either pick the appropriate Recovery ROM from the following table and flash using TWRP or straightaway choose the Fastboot ROM to bypass the Mi Account authorization requirement.

Device, Device Codename Build Number and Region Recovery ROM Fastboot ROM
Redmi Note 7/7S (lavender) V11.0.2.0.QFGCNXM (China) Download Link Download Link
V11.0.2.0.QFGINXM (India) Download Link

Thanks to XDA Recognized Developer yshalsager for providing the download links!

The post Download: Xiaomi Redmi Note 7 and Redmi Note 7S receive stable beta Android 10 update with MIUI 11 appeared first on xda-developers.



from xda-developers https://ift.tt/3iQcojC
via IFTTT

Android 11 AMA Summary: No scrolling screenshots, New OEM restrictions, Faster app launches, and more

Yesterday, Google released Android 11 Beta 2, bringing the finalized SDK, NDK, app-facing surfaces, platform behaviors, and restrictions on non-SDK interfaces for developers. Today, Google is answering questions related to Android 11 over on Reddit’s /r/AndroidDev community after fielding questions last week. Here’s a summary of everything we learned from Google’s AMA (Ask Me Anything).

No Scrolling Screenshots

One of Android 11’s most anticipated features won’t be available when the OS exits beta on September 8th: Scrolling screenshots. Initially planned for launch in Android 11, Google has now confirmed that the feature “didn’t make the cut for R.” Android 11 Developer Preview 1 and all subsequent DP and Beta releases have a placeholder button for taking a scrolling screenshot that can be manually surfaced with a hidden developer command, but tapping the button simply shows a toast message stating that the feature is “not implemented.”

Android 11 scrolling screenshot

Android 11’s unimplemented scrolling screenshot button.

We were hoping the feature would make its way into a beta or even just the stable release, but it looks like that just won’t happen.

This news will understandably be upsetting to some users. After all, many OEMs have had this feature in their own software for years, so what’s taking Google so long to add it to Pixel phones? As explained by Dan Sandler from Google’s System UI team, the problem is that Google wants to do it right. Some scrolling screenshot implementations out there simply emulate a scroll and then stitch together multiple screenshots as the screen moves. If you’ve ever dealt with UI automation on Android, you’ll know that this doesn’t always work since, as Mr. Sandler mentions, apps can use “a bog-standard RecyclerView or have implemented their own OpenGL-accelerated scrolling engine.” Since Google plans to implement this feature for not just Pixel smartphones but for the entire Android ecosystem as part of AOSP, they need to make sure it’ll work on all apps and not just “one or two hand-picked apps on a particular device.”

Because the team had to “focus [their] limited resources,” especially due to the challenges brought about by COVID-19, the team decided to put scrolling screenshots on the backburner for a future Android release.

New CDD requirement to inform users of background restrictions

It’s no secret that many Android OEMs, especially Chinese ones, have aggressive restrictions on apps running in the background. Some developers were so frustrated with their apps being killed in the background that they banded together to make a website called “Don’t Kill My App” to rank OEMs based on how poorly they handle background app processes. Those same developers even recently made a benchmark so users can test how aggressively their device kills apps in the background. The reason why many OEMs love to kill background app processes is complicated, but I think it’s best explained in this comment by Redditor /u/possiblyquestionable. The comment outlines the complicated status of Android app development in China, how Chinese tech companies are involved in further complicating things, and how a lack of Google services contributes to the ongoing mess.

Regardless, many app developers are understandably frustrated by these tweaks to Android platform behavior, which has resulted in developers pushing a comment asking Google what they’re doing about it to the top of the Reddit AMA. Here’s Google’s response:

There are a few things to take away from this response. First, Google wants OEMs to be more transparent with users about the background app restrictions they’re applying. I checked the (unreleased) Android 11 Compatibility Definition Document (CDD) and found the following proposed addition to Section 3.5 – API Behavioral Compatibility:

If device implementations implement proprietary mechanism to restrict apps and that mechanism is more restrictive than “Rare” standby bucket on AOSP, they:

[C-1-5] MUST inform users if app restrictions are applied to an app automatically. (NEW) Such information MUST not be provided earlier than 24 hours before such restrictions are applied.

(Note)Force Stop is considered to be more restrictive than “Rare” and MUST comply all requirements under 3.5.1, including new 3.5.1/C-1-5

Basically, Google isn’t much to stop OEMs from implementing their own restrictive app-killing features. They’re only requiring that OEMs inform users if their app restrictions are being automatically applied. An OEM could show a dialog that they’re going to stop battery-sucking background apps from running in the background, and the user could consent without realizing the apps they really want to run in the background are also affected! Google is placing the onus on developers to deal with cases when their app is killed unexpectedly in the background. Indeed, the Reddit comment goes on to highlight the new “app process exit reasons” API that can tell developers whether their app was killed by the user, the OS, or if it simply crashed.

On the other hand, Google is finally addressing the unfair practice of OEMs allowing certain privileged applications to bypass their background app restrictions. This Medium post by developer Timothy Asiimwe goes into detail about apps like WhatsApp, Facebook, and other apps are automatically exempt from the harsh background restrictions of some OEM software. Google says they “require that device manufacturers don’t create allow lists for top apps.” We don’t know how this will be enforced, but it’s good to know that OEMs will finally be forced to treat third-party developers on equal footing—no matter how big or small their apps are.

Finally, Google also mentions how Android 11 has “added extra measures to prevent abusive behavior by misbehaving apps,” making it less enticing for OEMs to aggressively kill background processes. The company did not elaborate on what these “extra measures” entail, however.

Improved Device-to-Device Backups

Last month, we spotted a change to Android 11’s documentation that hinted at support for better local data backups. In Android 11, the system will disregard the allowBackup Manifest attribute for any app that targets API level 30 when the user initiates a “device-to-device” migration of app files. Googler Eliot Stock says that this feature is intended to make it “much easier for phone manufacturers to build device to device migration tools” such as “Samsung’s excellent Smart Switch product” to help “ensure apps more reliably transfer between devices from a user perspective.” Sadly, this doesn’t apply to cloud-based backups, as Google wants to “give software developers control around what happens with their app data.” As such, Android 11 will still respect the allowBackup attribute for any cloud-based backup and restore, such as through Google Play Service’s built-in Google Drive backup. Lastly, Google acknowledges that the 25MB-per-app backup ceiling may not be enough for some developers, so they’re looking into ways to solve that. Local backups to a PC aren’t under consideration, though, and Google reiterates their plan to phase out adb backup in a future Android release.


Developers are encouraged to implement frictionless data migration methods. The new Block Store library, which is part of the Google Identity Services Library, is designed to make it easier to sign into apps restored from the cloud on new devices, but it’s up to developers to choose whether or not they want to implement this library.

Google Block Store Android 11 library

Faster App Startup Speeds with I/O Read Ahead Process (IORap)

Google is always experimenting with ways to improve performance in Android. One of the little known features they added in Android 10 is called the Unspecialized App Process Pool (USAP). This feature eliminates forking Zygote during the app startup process, saving approximately ~5ms in average app startup speeds on a Pixel 2 device. The feature is currently disabled by default in AOSP, and Google explains that its added memory use still needs testing. What’s more interesting, though, is a new feature coming to Android 11 called I/O Read Ahead Process (IORap). According to Google, this feature will lead to “more than 5% faster cold startups with hero cases reaching 20% faster.” This feature “will prefetch applications artifacts (like code and resources) during the startup process” to boost app launch speeds.

Google has also “made improvements to the profiles used to optimize the boot class path and system image” which will improve app performance and reduce the memory and storage cost associated with system artifacts. These changes will mostly benefit devices with higher amounts of RAM, though Google has not said what the cutoff is for where we’ll see the most benefits.

Android 11’s Scoped Storage changes – Why is access to /Downloads restricted?

Apps that target Android 11 and use the ACTION_OPEN_DOCUMENT_TREE intent to request access to specific directories on the external storage will no longer be able to ask users for access to the root directory of the external storage (/data/media/{user}), the Download directory (/data/media{user}/Download), or any of the app-specific data directories on the external storage (/Android/data or /Android/obb). Why is access to the Download directory restricted? According to Google Roxanna Aliabadi, it’s because the download folder “is the most at risk of having private information.” As an example, users who download their tax returns or banking statements shouldn’t have to worry about the possibility of apps abusing their continuous read access to the directory. Google says that the document picker will have “updated text…to indicate that Android has restricted certain folders to be selected.” This will hopefully reduce confusion about why they can’t grant apps access to certain directories anymore.

 

For more information on the upcoming Scoped Storage and Play policy changes, refer to this article.

Miscellaneous Topics

  • Google’s stance on rooting/modding
    • Jeff Bailey from Google’s AOSP team reiterates the company’s stance on supporting choice. Google will “continue to ensure that modding/rooting of the Pixel line of devices is possible,” but will also “support the choice of OEMs to not permit their devices to be rooted.” Furthermore, Google is giving software developers the choice “to not allow their software to run on rooted devices,” in reference to recent changes in software tampering detection of the SafetyNet Attestation API.
  • What happened to “open and set to default”?
  • Using the Vulkan Graphics API to render the UI?
  • Missing CallScreeningService on many devices
    • Android apps can implement the CallScreeningService API to intercept new incoming and outgoing calls, allowing them to identify the caller and either accept or reject the call. Although this is an officially documented API, there are apparently many OEMs that don’t properly implement it, according to developer /u/_zeromod_. Google confirms that this API is validated by the Compatibility Test Suite (CTS), an automated test suite that all devices must pass to be considered Android compatible. For whatever reason, this API returns null when called on devices from OEMs like Huawei, Vivo, Xiaomi, or Samsung, so it’s likely these OEMs have a bug in their software.
  • No plans for an audio plugin framework
    • A developer asked Google if they plan to implement an audio plugin framework like Apple’s Audio Units, but the answer is that it’s unlikely to happen in the near future.

You can read all of the answers from the Android engineering team here. The team talks a bit about Java, Kotlin, the Android build system, the CameraX API, and other topics in a few comments. There are also several comments about Wear OS, Android TV, and Android Auto, but Google mostly reiterates their existing work on these platforms and tells developers to stay tuned for more information during the “Android Beyond Phones” week starting August 10th.

The post Android 11 AMA Summary: No scrolling screenshots, New OEM restrictions, Faster app launches, and more appeared first on xda-developers.



from xda-developers https://ift.tt/3faN8T4
via IFTTT

The LG Velvet’s new UI is coming to 6 other LG smartphones

The LG Velvet is one of the company’s most exciting devices in a while, and that largely revolves around the brand new design. While the hardware shows the most drastic change, LG has also refreshed its software for the Velvet. The company has now announced that 6 older smartphones will be getting the updated UI as well.

LG Velvet Forums

Admittedly, the LG Velvet’s UI is not a super drastic change from LG UXs of the past. They’re now calling it “Velvet UI,” and what’s changed includes a few new things like notification bar color customization, volume adjustment settings, and a new pop-up window during a call. This new UI will be brought to 6 of LG’s latest premium devices in Korea:

Unfortunately, LG did not share any plans to bring Velvet UI to older LG phones outside of Korea. The list of devices does include some from as far back as 2018, which is a positive sign for LG’s commitment to older devices. The company hasn’t had the best track record when it comes to supporting old devices with software updates. If you want a taste of the Velvet’s UI aesthetics right now, check out the nice wallpapers we have for you.


Source: LG Korea

The post The LG Velvet’s new UI is coming to 6 other LG smartphones appeared first on xda-developers.



from xda-developers https://ift.tt/3iIsZGl
via IFTTT

OnePlus 7T series gets a new OxygenOS beta with new Clock and Game Space features

It’s time for another OxygenOS Open Beta update for the OnePlus 7T series. The last beta update rolled out in early June with some nice additions. This latest update has a pretty nice list of quality of life improvements. The headliners are an optimized adaptive brightness curve, new Clock features, and some Game Space additions. The full changelog is below:

OnePlus 7T XDA Forums ||| OnePlus 7T Pro XDA Forums

System

  • Optimized adaptive brightness curve. The backlight brightness softer, improving user experience
  • Fixed the issue that double tap could not wake up the screen in some settings
  • Fixed the automatic pull-down issue with unlock screen in ambient display
  • Updated Android security patch to 2020.07

Clock

  • Newly added “Lap time” and “Split time” title for Stopwatch, the interface looking more clear-cut

Game Space

  • Newly added Moments to store gaming snapshots and screen recordings, please go to three-dot menu at upper right corner>Moments>Recent/Games to find them

Messages

  • Fixed the bug of unable to receive wireless alarm notifications within a short time despite repetitious trials

Launcher

  • Fixed the abnormal color display at the top area and button of Notes

OnePlus previously tinkered with the adaptive brightness algorithm in March, so hopefully, this update will continue to improve it for the OnePlus 7T series. The company has also been adding features to Game Space, making OnePlus phones feel more like gaming devices. We’ve got the download links for OxygenOS Open Beta 6 for you below. The empty sections will be filled in as we get the download links.


OnePlus 7T

OnePlus 7T Pro

The post OnePlus 7T series gets a new OxygenOS beta with new Clock and Game Space features appeared first on xda-developers.



from xda-developers https://ift.tt/3fgpeWq
via IFTTT

Google Play July 2020 Policy Update introduces extended timeline for compliance, detailed violation emails, and other changes

The Google Play Store is the primary app distribution platform for the Android OS. Considering Android’s reach in the smartphone market and other segments, the Google Play Store occupies a very special, dominant position where even the smallest of changes can have a huge impact. So it’s important to document the changes that do happen to Google Play’s policy as they impact thousands of developers and millions of users. In a YouTube video, Mr. Joe Davis, Outreach and Policy Education Lead at Google, explains the July 2020 Policy Updates for Google Play. Notably, he talks about extended enforcement grace periods, policy violation outreach, and more.

Here are the topics covered in the video:

  • Updated Policy Center
    • New platform
    • Cleaner language
    • More examples
  • Updated enforcement practices
    • Extended time for new apps
    • Specific enforcement dates named
    • More detailed policy enforcement email
  • July 2020 Policy Updates
  • Play Console Beta
    • Policy-centric enhancements

Updated Policy Center

Google has migrated its Policy Center to a new Help Center Platform hosted within the Play Console Help Center. This move presented Google with an opportunity to simplify its policy language. The language is now supposed to be clearer and includes more examples and screenshots to aid in understanding the actual policy, instead of confusing developers with legalese and unclear language. The Policy Center can be found at play.google.com/policy with a redirect taking you to the updated pages.

Updated Enforcement Practices

Google will be announcing all Policy Updates on the Updates Preview page. When the changes announced in the Policy Update do go into effect, the Updates Preview page will be updated to reflect the current active policy. A new change over here is that all new apps and games, as well as older, existing apps and games, will have 30 days from the announcement of a Policy Change to ensure that their applications comply with the latest notified changes. Google also recognizes that some policy updates may take longer to adapt to, so those will come with a longer grace period as needed.

Google will also be including the specific date for the changes to come into effect, which will ensure that the message is clear and there is no room for confusion.

Further, Google has actually taken feedback from developers. A long-standing complaint from developers is the fact that its communications are rather vague and opaque. If an app is taken down, developers are left scratching their heads on the policy violation they have committed that led to the app’s removal. Apple actually showed off its move towards app-developer-friendliness at WWDC when it announced that developers could actually challenge policies. While Google isn’t allowing that just yet, it’s taking at least some step forward by being a bit more informative and transparent on the actual policy violation that an application has committed. This means that developers will now receive more details, like a screenshot of a violation or a text excerpt from the Play Store listing, or more details to make the violation clearer.

Further, guidance to correct the issue will also be attached, which should be helpful for amateur developers who may not be as well versed with the complex Play regulations. Nonetheless, transparency will be much appreciated by veterans and amateurs alike.

July 2020 Policy Updates

“News” app Policy

Google has added a new Policy section for apps that market themselves as News apps on the Play Store.

Notably, News apps must:

  • provide adequate information about the news publisher and its contributors including clear ownership, and
  • have a website or in-app page that provides valid contact information for the news publisher.

On the flip side, News apps must not:

  • contain significant spelling & grammar errors,
  • contain only static content, and
  • have affiliate marketing or ad revenue as its primary purpose.

News apps that require a membership must provide a content preview for users prior to purchase. For news aggregator apps, these must be transparent about the publishing source of the content in the app, and each of the sources must also meet the News policy requirements. Apps that mark themselves as “News” app and come clean on these guidelines will be permitted to be displayed on the Play Store’s News app sections.

AR Location Anchoring

Apps that rely on User-Generated Content (UGC) and feature Augmented Reality (AR) functionality placed upon such UGC must implement moderation systems that can be used to report objectionable images and images which anchor the AR object on top of a sensitive location.

Google Play Developer Console July 2020 policy update ar anchoring

Families Ads Policies

Google has clarified some ad practices that are prohibited on apps that target children. For instance, ads that interfere with normal app use or gameplay and are not closeable after 5 seconds are not allowed. But ads that do not interfere with normal app use or gameplay are allowed to persist for more than 5 seconds, provided they display a timer.

“All Files Access” Permission update

Apps targeting Android 11 (API level 30) that need to request broad access to device storage were said to require special permission from Google to keep their app on the Play Store. Google is permitting apps targeting Android 11 from a few categories, including file management, backup and restore apps, anti-virus apps, and document management apps, to have broader file access permissions. Apps falling in these categories will be permitted to use the new permission, though Google will also provide a temporary exception for apps that need broad file access as part of their core functionality and that can’t replicate the core functionality using the existing alternative APIs. Google wanted developers to submit a Declaration Form in the Play Console to be granted access to broad file management permissions in Android 11, but now, developers will have to wait a bit longer.

Because of COVID-19 and the workforce challenges the pandemic has brought along, Google is deferring allowing apps to be uploaded to Google Play with this permission until an unspecified date in early 2021. So, apps that target Android 11 (API level 30) and request All Files Access (the new “MANAGE_EXTERNAL_STORAGE” permission) cannot be uploaded to Google Play until the yet-undecided date in early 2021. This temporary uploading restriction affects new apps as well as updates to existing apps but is restricted to apps that both target Android 11 and request the MANAGE_EXTERNAL_STORAGE permission.

Google recommends that if your app needs the All Files Access permission, you should not update your target SDK level to Android 11 just yet. If your app targets Android 10 (API level 29) and has not yet been adapted for Scoped Storage, you are recommended to use the requestLegacyExternalStorage flag. If your app targets Android 10 and has been adapted for Scoped Storage, then simply have the user grant access to the directory or directories you need by calling the ACTION_OPEN_DOCUMENT_TREE intent. Keep in mind that once your app targets Android 11, you can no longer use this intent to gain access to the root directory of the external storage (/sdcard), the Download directory, the /Android/data directory, or the /Android/obb directory.

Google is ending the July 2020 update announcement with a recap on the timelines put together. In addition, here’s a slide from one of Google’s earlier videos that summarizes the situation with scoped storage:

For more details on this policy change, refer to this support page.

Google Play Console Beta — Policy Centric Enhancements

Google Play Console is also getting a few Policy-centric enhancements in the Beta release track. For instance, the Beta release track will soon get an Inbox feature that will feature pertinent policy updates. The beta will also include a new Policy compliance section that will display the current status for any policy violations in your app, and it will make it easier to provide information to prove compliance.

Google Play Developer Console July 2020 policy update console beta

Google mentions that these sections will be enhanced over time to ensure that they are helpful to developers and reduce their worries.

The post Google Play July 2020 Policy Update introduces extended timeline for compliance, detailed violation emails, and other changes appeared first on xda-developers.



from xda-developers https://ift.tt/3fa8xMd
via IFTTT

Google Chrome may get audio controls similar to Android 11

One of the most noticeable features in Android 11 is the new Media Controls. With the release of Android 11 Beta 2, the new controls became enabled by default. Besides looking nice and having their own dedicated spot in the Quick Controls panel, they have a button to switch media output between connected devices. Google Chrome may get this feature as well.

Google Chrome has had its own similar-looking media controls for a little while now. We previously wrote about the media controls gaining the ability to pop-out into a floating overlay. Recently, a new flag for Chrome’s media controls was discovered that allows for the selection of an audio output device. It’s very similar to the new Android 11 media controls feature.

The Chrome flag is called “Seamless Transfer” and the idea is basically the same as what we’re seeing in Android 11. Connected devices appear in Chrome’s media controls and users can easily switch the output between them. Screenshots show the media controls with buttons for connected headphones and Chrome itself. It’s not clear at this time if this will support casting devices as well.

It’s not super surprising to see Android features make their way over to Chrome OS/Chrome browser. Over the last couple of years, Google has brought many Android-like features over to the platform. For Google to have a cohesive ecosystem of products, it’s important that everything works well together and has a clear vision. Currently, the Seamless Transfer feature is present in the Canary build of Chrome.


Source: Chrome Story

The post Google Chrome may get audio controls similar to Android 11 appeared first on xda-developers.



from xda-developers https://ift.tt/3gDfUMk
via IFTTT