1. Startseite

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Webseiten News

News vom: 07.09.2018 um 04:56 Uhr

Hallo Liebe Gemeinde,

habe das Caching deaktiviert damit die Webseite sich schneller aktuallisiert,

Weitere News Beiträge ansehen: Webseiten News (31)

Startseite und alle Kategorien


Suchen

Google is Giving up Some Control of the AMP Format

IT Security Nachrichten vom 18.09.2018 um 22:10 Uhr | Quelle tech.slashdot.org
Accelerated Mobile Pages, or AMP, has been a controversial project since its debut. Critics say AMP is a Google-specific project and it is creating a walled-garden, which would only serve Google's best interests. On its part, Google has insisted that AMP's mission is to benefit the open web, and that many who contribute to AMP are non-Googlers. On Tuesday, Google announced that it would be giving up some control of how the code behind AMP is managed. A report adds: It plans to move the AMP Project to a "new governance model," which is to say that decisions about the code will be made by a committee that includes non-Googlers. Until now, final decisions about AMP's code have been made by Malte Ubl, the tech lead for the AMP Project at Google. A model with a single person in charge is not actually all that rare in open source. That person is often cheekily referred to as the BDFL, or "benevolent dictator for life." Ubl's been that person for AMP, but, he writes, "we've found that it doesn't scale to the size of the AMP Project today. Instead, we want to move to a model that explicitly gives a voice to all constituents of the community, including those who cannot contribute code themselves, such as end-users." [...] Google has already signed up non-Google people for the Advisory Committee, which will include representatives from The Washington Post, AliExpress, eBay, Cloudflare, and Automattic (which makes WordPress). Ubl says that it will also include "advocates for an open web," including "Leonie Watson of The Paciello Group, Nicole Sullivan of Google / Chrome, and Terence Eden." Of course, as anybody who's taken part in a committee knows, it's neither a fun solution nor a guarantee that a single company or person won't dominate it. But it's a step in the right direction, and Google is encouraging people to comment on the plan at the AMP Contributor Summit on September 25th.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Alternative for TimeMachine/Cornopete like file/doc GUI Backup Tool

Linux Tipps vom 18.09.2018 um 22:06 Uhr | Quelle reddit.com

I have been looking for backup tool with nice GUI for TimeMachine (Mac OX) or Cornopete for my Fedora. I have lot of projects like BackInTime is fairly inactive.

Only other choice seem to be CMD only such rsnapshot.

submitted by /u/unseengundam101
[link] [comments]
Newsbewertung

Weiterlesen

Remote access bug turns Western Digital My Cloud into Everyone's Cloud

IT Security Nachrichten vom 18.09.2018 um 22:02 Uhr | Quelle go.theregister.com

NAS boxes vulnerable to admin EoP via HTTPS packets

An elevation of privilege flaw in the Western Digital My Cloud platform allows attackers to gain admin-level access to the device via an HTTP request.…


Newsbewertung

Weiterlesen

NSO mobile Pegasus Spyware used in operations in 45 countries

Hacking vom 18.09.2018 um 21:58 Uhr | Quelle securityaffairs.co

A new report published by Citizen Lab revealed that the NSO Pegasus spyware was used against targets across 45 countries worldwide. A new investigation of the Citizen Lab revealed that the powerful Pegasus mobile spyware was used against targets across 45 countries around the world over the last two years. Pegasus is a surveillance malware developed by the Israeli surveillance NSO Group that […]

The post NSO mobile Pegasus Spyware used in operations in 45 countries appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Fidelis Cybersecurity Raises $25 Million

IT Security Nachrichten vom 18.09.2018 um 21:55 Uhr | Quelle feedproxy.google.com

Fidelis Cybersecurity, a Bethesda, MD-based company that provides automated threat detection and response solutions, on Tuesday announced that it secured a $25 million growth capital investment.

read more


Newsbewertung

Weiterlesen

Download WhatsApp Plus apk for Android & iOS Devices

IT Security Nachrichten vom 18.09.2018 um 21:55 Uhr | Quelle pingzic.net

It is an obvious fact that WhatsApp is one of the most demanded social platforms the users want to keep with them always. What if you want to add some new and unique emoticons in the chat box or if you want to use attractive themes? Well! In the official version of WhatsApp, you are […]

The post Download WhatsApp Plus apk for Android & iOS Devices appeared first on PingZic.


Newsbewertung

Weiterlesen

Altaba To Settle Lawsuits Relating To Yahoo Data Breach For $47 Million – Victory For Yahoo Legal Team

IT Security Nachrichten vom 18.09.2018 um 21:51 Uhr | Quelle informationsecuritybuzz.com

Following the news about the Yahoo data breach for $47 million, Ilia Kolochenko, CEO of web security company at High-Tech Bridge commented below. Ilia Kolochenko, CEO at High-Tech Bridge: “Class actions are known to provide their members with very modest compensation compared to individual lawsuits. The settlement (subject to approval by court) makes slightly above …

The ISBuzz Post: This Post Altaba To Settle Lawsuits Relating To Yahoo Data Breach For $47 Million – Victory For Yahoo Legal Team appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Mobile Security For The Modern Workplace: How To Boost Remote Productivity While Remaining Secure

IT Security Nachrichten vom 18.09.2018 um 21:46 Uhr | Quelle informationsecuritybuzz.com

The state of workplace mobility The continued white-hot proliferation of personal devices has led to businesses adopting cultures where employees can contribute remotely, using whatever device is accessible. For many, this has led to Bring Your Own Device (BYOD) initiatives, where businesses formally embrace the use of personal devices and enable remote access to corporate …

The ISBuzz Post: This Post Mobile Security For The Modern Workplace: How To Boost Remote Productivity While Remaining Secure appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

ThreatList: Malware Samples Targeting IoT More Than Double in 2018

IT Security Nachrichten vom 18.09.2018 um 21:40 Uhr | Quelle threatpost.com
A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices – from Mikrotik routers to dishwashers.
Newsbewertung

Weiterlesen

Are FreeBSD or OpenBSD viable options compared to Linux?

Linux Tipps vom 18.09.2018 um 21:38 Uhr | Quelle reddit.com

Well , from now on i have a feel about things will go down hill on Linux kernel side.

submitted by /u/Leopard1907
[link] [comments]
Newsbewertung

Weiterlesen

Codes & Languages - Secure Digital Life #80

IT Security Video vom 18.09.2018 um 21:35 Uhr | Quelle youtube.com

Newsbewertung

Weiterlesen

Chrome OS 69 Finally Brings Linux Apps to Some Chromebooks, Night Light Feature

IT Security Nachrichten vom 18.09.2018 um 21:35 Uhr | Quelle news.softpedia.com
Google released today the Chrome OS 69 operating system for Chromebook devices, a major release that follows in the footsteps of the Chrome 69 release, which arrived earlier this week with a new look on all supported platforms and major feature updates. Chrome OS 69 is the first release of the Linux-based operating system that enables support for running Linux apps on Chromebooks. However, the Linux app support is still in development and it's presented to users in a beta form, available only on select devices due to hardware restrains. A complete list with the Chromebooks supporting Linux apps is available here. "While we would like to be able to bring this work to all Chromebooks, the required kernel and hardware features limit where w...
Newsbewertung

Weiterlesen

Rice University Says Middle-Class And Low-Income Students Won't Have To Pay Tuition

IT Security Nachrichten vom 18.09.2018 um 21:30 Uhr | Quelle news.slashdot.org
Rice University is "dramatically expanding" its financial aid offerings, promising full scholarships to undergrads whose families have income under $130,000. NPR reports: The school says it wants to reduce student debt -- and make it easier for students from low-income families to attend. "Talent deserves opportunity," Rice President David Leebron said while announcing the plan on Tuesday. The full scholarships are earmarked for students whose families have income between $65,000 and $130,000. Below that level, the university will not only cover tuition but also provide grants to cover students' room and board, along with any other fees. Another part of the program will help students whose family income surpasses the maximum: If their family's income is between $130,000 and $200,000, they can still get grants covering at least half of their tuition.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Spotify prüft Familien-Accounts strenger: Standortabfragen per GPS

IT Security Nachrichten vom 18.09.2018 um 21:30 Uhr | Quelle winfuture.de
Spotify, Musik-Streaming, Streamingportal Der Musik-Streaming-Pionier Spotify soll dabei sein Vorbereitungen zu treffen, Nutzern von Familien-Accounts künftig stärker und vor allem strenger zu überprüfen. Denn für Spotify muss eine Familie auch unter einem Dach zusammen wohnen, sonst gibt es Ärger. (Weiter lesen)
Newsbewertung

Weiterlesen

Millions of documents have been stolen from top uk universities and are being sold over whatsapp for as little as £2.

IT Security Nachrichten vom 18.09.2018 um 21:21 Uhr | Quelle reddit.com
Millions of documents have been stolen from top uk universities and are being sold over whatsapp for as little as £2. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Drone Assassins, Security Shaming, and Zero-Day - Hack Naked News #189

IT Security Video vom 18.09.2018 um 21:17 Uhr | Quelle youtube.com

Newsbewertung

Weiterlesen

Intel releases firmware update for ME flaw

IT Security Nachrichten vom 18.09.2018 um 21:13 Uhr | Quelle nakedsecurity.sophos.com
It’s only September and yet 2018 is well on its way to being remembered as the year of fixing flaws we didn’t realise were possible in hardware we’d never heard of.
Newsbewertung

Weiterlesen

MSI PS42 - Kurztest zum schlanken Business- und Lifestyle-Notebook

IT Security Nachrichten vom 18.09.2018 um 21:10 Uhr | Quelle winfuture.de
Notebook, Test, NewGadgets, Johannes Knapp, Msi, MSI PS42, PS42 Im Sommer hatte MSI auf der Computex unter anderem das Business- und Lifestyle-Notebook PS42 vorgestellt. Dieses ist unterdessen auch in Deutschland erhältlich, unser Kollege Johannes Knapp hat sich das Notebook aus diesem Grund noch einmal ein wenig genauer angeschaut. In seinem Kurztest zeigt er, was das kompakte Gerät alles kann, außerdem hat er es einem Benchmark-Test unterzogen. (Weiter lesen)
Newsbewertung

Weiterlesen

World of Warships: Wargamings Seeschlachten-MMO soll U-Boote erhalten

Nachrichten vom 18.09.2018 um 21:04 Uhr | Quelle computerbase.de

Haben die Entwickler aus Sankt Petersburg Unterseeboote in World of Warships bisweilen konsequent dementiert, überraschen sie nun doch mit einer vorläufigen Implementierung im Rahmen des diesjährigen Halloween-Events. Sollten die U-Boote zu gefallen wissen, würden sie 2019 vollständig in das MMO integriert, so Wargaming.


Newsbewertung

Weiterlesen

PSA: If you update Firefox using apt when its open it will force you to restart before you can browse again

Linux Tipps vom 18.09.2018 um 20:54 Uhr | Quelle reddit.com
submitted by /u/solpaadjustmadisar
[link] [comments]
Newsbewertung

Weiterlesen

Emmys: Broadcast TV Airs Its Own Funeral As Netflix, HBO, Amazon and FX Dominate

IT Security Nachrichten vom 18.09.2018 um 20:52 Uhr | Quelle entertainment.slashdot.org
At the 70th Emmy Awards, broadcast TV was almost shut out as Netflix and HBO battled each other. The Hollywood Reporter: This year, longtime Emmy nominations leader HBO was out-nominated by Netflix. Netflix then won the most Emmys on the main telecast, with seven noms to HBO's six. But earlier, HBO won one more award than Netflix at the Creative Arts Awards ceremonies, 17 to 16. So by the time the curtain came down on the 70th Emmy Awards, technically -- and sort of poetically -- Netflix and HBO had fought to a draw. Almost all of the major content providers left with several wins to celebrate. [...] All in all, it was a terrible night for broadcast networks -- even as NBC aired the show and two stars of the network, Saturday Night Live's Michael Che and Colin Jost, hosted. SNL won the variety sketch award for the second year in a row, and ABC's The Oscars won for best direction of a variety show (that award's winner, Glenn Weiss, stole the night with his on-stage marriage proposal), but other than that, CBS, NBC, ABC, Fox and PBS had nothing -- nothing -- to show for their work of the past year. The times have certainly changed.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Towards a Better Software Code of Conduct

Linux Tipps vom 18.09.2018 um 20:43 Uhr | Quelle reddit.com

So instead of complaining about the new Linux Code of Conduct, I think it might be a good idea for us as a community to work together on a better code of conduct for open source projects in general.

This is my first attempt at it, and I am using an edited and amended version of the new code of conduct. Please feel free to critique it, and I will add changes/critiques that seem popular and sensible:

 

KEY:

  • removed from Linux Code of Conduct

  • Added content

 

 


Contributor Covenant Software Development Code of Conduct

Our Pledge

In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, sex characteristics, gender identity and expression, level of experience, education, socio-economic status, nationality, personal appearance, race, religion, or sexual identity and orientation. where all that matters is the quality of the code they contribute. Personal details of contributors are irrelevant. Contributor's opinions and comments on topics not directly related to the project being contributed to are also irrelevant. Our goal is to make the best, most robust, software possible; not to police thought or speech of individuals.

While seeking to be welcoming, it is important to recall that some amount of conflict is both unavoidable and healthy. Thus to attempt to avoid all conflict is both destructive and futile. Instead the goal is to encourage critique and criticism of code that is both respectful, and civil with the express aim of improving the overall quality of the codebase, and to prevent low quality contributions from being accepted into the codebase. Critique and criticism of a contributor's overall history of code quality in that individual's contributions to the project must be allowed in a respectful and civil manner.

Our Standards

Examples of behavior that contributes to creating a positive environment include:

  • Using welcoming and inclusive language
  • Being respectful of differing viewpoints and experiences
  • Gracefully accepting constructive criticism
  • Focusing on what is best for the community project as whole
  • Showing empathy towards other community members

Examples of unacceptable behavior by participants include:

  • The use of sexualized language or imagery and unwelcome sexual attention or advances
  • Trolling, insulting/derogatory comments, and personal or political attacks
  • Public or private harassment
  • Publishing others’ private information, such as a physical or electronic address, without explicit permission
  • Other conduct which could reasonably be considered inappropriate in a professional setting
  • Contributors making a point of mentioning their own irrelevant personal details and opinions
  • Not respecting the irrelevance of a contributor's personal details and opinions outside the scope of the project

Our Responsibilities

Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate, consistent, and fair corrective action in response to any instances of unacceptable behavior.

Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.

Scope

This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.

Enforcement

Instances of abusive, harassing, or otherwise unacceptable behavior Suspected violations of the code of conduct such as harassment may be reported by contacting the project team at [INSERT EMAIL ADDRESS]. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. to be as transparent as possible in this matter including publicly stating: who made the claim, when, why, who decided the claim, and the reasoning used to decide on any leveled punishments. Further details of specific enforcement policies may be posted separately.

Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project’s leadership.

 


 

The changes I am suggesting have several concepts in mind. I recognize that it may not implement these concepts perfectly (or even well), but it is only a first draft and wide open to critique and criticism.

  • First, ideologues, extremists, and bad actors from all sides will attempt to abuse the code of conduct to force people to do what they want; thus the code of conduct must be constructed to attempt to thwart or at least greatly minimize this.
  • Next, free exchange of ideas is the best way to think and work out problems, and this by its very nature involves conflict; as a result conflict should be regulated to be civil and respectful, instead of suppressed.
  • The only goal of a software project should be to create the best product for its users, and at a distant second its developers ("we don't break user space"); thus the code of conduct should encourage this goal, and discourage any other goal.
  • Software projects should have no opinion on issues outside the scope of the project; thus the project should never be drawn into external controversy.

What do you guys think? Let the conflict begin :P

edits:

  • 1,2,3,4: Typos
submitted by /u/8-bit_mess
[link] [comments]
Newsbewertung

Weiterlesen

The real loss is for the people invested in the project that have a different political viewpoint. They now have to chose between expressing themselves publicly and working on Linux.

Linux Tipps vom 18.09.2018 um 20:33 Uhr | Quelle reddit.com
submitted by /u/_D_I_S_T_R_E_S_S_
[link] [comments]
Newsbewertung

Weiterlesen

Neue Vorschau für das Windows 10 Oktober Update - Geduld ist gefragt

IT Security Nachrichten vom 18.09.2018 um 20:32 Uhr | Quelle winfuture.de
Microsoft, Windows 10, Redstone 5, Windows 10 Version 1809, 1809 Vom Windows-Insider-Team gibt es schon wieder eine neue Preview für das im kommenden Monat erwartete Redstone 5-Update aka Windows 10 Version 1809 "Oktober Update". Da es jetzt so Schlag auf Schlag geht, dürften die Entwickler vor dem Abschluss stehen. (Weiter lesen)
Newsbewertung

Weiterlesen

Neue Vorschau für das Windows 10 Oktober Update - Geduld ist gefragt

Nachrichten vom 18.09.2018 um 20:32 Uhr | Quelle winfuture.de
Microsoft, Windows 10, Redstone 5, Windows 10 Version 1809, 1809Vom Windows-Insider-Team gibt es schon wieder eine neue Preview für das im kommenden Monat erwartete Redstone 5-Update aka Windows 10 Version 1809 "Oktober Update". Da es jetzt so Schlag auf Schlag geht, dürften die Entwickler vor dem Abschluss stehen. (Weiter lesen)
Newsbewertung

Weiterlesen

Schalke gegen Porto: So seht ihr das Spiel im Live-Stream und TV

Nachrichten vom 18.09.2018 um 20:30 Uhr | Quelle feedproxy.google.com
Schalke 04 empfängt am 1. Spieltag der Champions League 2018/19 den FC Porto. Kann die Mannschaft von Domenico Tedesco nach dem Fehlstart in der Liga auf internationaler Bühne überzeugen? Netzwelt verrät euch, wie ihr das Spiel ab 21 Uhr im Live-Stream und TV verfolgen könnt. Dieser Artikel wurde einsortiert unter Sky, Bundesliga-Live-Stream: Fußball im Internet schauen, Sky Ticket, DAZN.

Newsbewertung

Weiterlesen

tty_driver

Linux Tipps vom 18.09.2018 um 20:28 Uhr | Quelle reddit.com

What is the difference between tty_driver and gpu_driver? Is there a relationship between these drivers? If yes, how is it? Can I dispense about this tty_driver in Linux? I am a beginner. I do not know this question frequently, but I did not find any answer.

submitted by /u/steve-ddit
[link] [comments]
Newsbewertung

Weiterlesen

Why do so many tell every one to turnoff selinux and Firewalld

Linux Tipps vom 18.09.2018 um 20:22 Uhr | Quelle reddit.com

Hello. I have seen many times when I installing different server on centos 7. I have seen guides that tell me to turn off SElinux and Firewalld. Why not just show in the guides how to open ports for just that service. I have seen Digital oceans guide with centos 7 they tell you how to setup up a service but theirs centos installation doesn't come preinstall with firewalld. This have been a big concern for me lately.

So my question to you.

Do you disable firewalld and SElinux?
If you do. Why?

submitted by /u/firesonic
[link] [comments]
Newsbewertung

Weiterlesen

The department has convened a task force to examine the breach.

IT Security Nachrichten vom 18.09.2018 um 20:21 Uhr | Quelle reddit.com
The department has convened a task force to examine the breach. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

A $1, Linux-Capable, Hand-Solderable Processor

IT Security Nachrichten vom 18.09.2018 um 20:12 Uhr | Quelle hardware.slashdot.org
An anonymous reader shares a report: Over on the EEVblog, someone noticed an interesting chip that's been apparently flying under our radar for a while. This is an ARM processor capable of running Linux. It's hand-solderable in a TQFP package, has a built-in Mali GPU, support for a touch panel, and has support for 512MB of DDR3. If you do it right, this will get you into the territory of a BeagleBone or a Raspberry Pi Zero, on a board that's whatever form factor you can imagine. Here's the best part: you can get this part for $1 USD in large-ish quantities. A cursory glance at the usual online retailers tells me you can get this part in quantity one for under $3. This is interesting, to say the least. The chip in question, the Allwinner A13, is a 1GHz ARM Cortex-A8 processor. While it's not much, it is a chip that can run Linux in a hand-solderable package. There is no HDMI support, you'll need to add some more chips (that are probably in a BGA package), but, hey, it's only a dollar. If you'd like to prototype with this chip, the best options right now are a few boards from Olimex, and a System on Module from the same company. That SoM is an interesting bit of kit, allowing anyone to connect a power supply, load an SD card, and get this chip doing something. Currently, there aren't really any good solutions for a cheap Linux system you can build at home, with hand-solderable chips.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

How To Enable Focus Assist For Gaming On Windows 10

Betriebssysteme vom 18.09.2018 um 20:02 Uhr | Quelle feedproxy.google.com

Focus Assist is the Windows 10 take on Do Not Disturb. Like the feature of the same name that you can find on mobile operating systems, and some desktop operating systems, you can schedule Focus Assist to turn on automatically at a given time. For example, if you know you’re going to be in a […]

Read How To Enable Focus Assist For Gaming On Windows 10 by Fatima Wahab on AddictiveTips - Tech tips to make you smarter


Newsbewertung

Weiterlesen

How To Enable Focus Assist For Gaming On Windows 10

Windows Tipps vom 18.09.2018 um 20:02 Uhr | Quelle addictivetips.com

Focus Assist is the Windows 10 take on Do Not Disturb. Like the feature of the same name that you can find on mobile operating systems, and some desktop operating systems, you can schedule Focus Assist to turn on automatically at a given time. For example, if you know you’re going to be in a […]

Read How To Enable Focus Assist For Gaming On Windows 10 by Fatima Wahab on AddictiveTips - Tech tips to make you smarter


Newsbewertung

Weiterlesen

BVB gegen Brügge: So seht ihr das Spiel im Live-Stream und TV

Nachrichten vom 18.09.2018 um 20:00 Uhr | Quelle feedproxy.google.com
Borussia Dortmund will in dieser Saison nicht nur in der Bundesliga, sondern auch wieder international für Furore sorgen. Zum Champions League-Auftakt geht es nach Brügge. Netzwelt verrät euch, wie ihr die Partie BVB gegen Club Brügge im Live-Stream und TV sehen könnt. Dieser Artikel wurde einsortiert unter Sky, Bundesliga-Live-Stream: Fußball im Internet schauen, Sky Go, Sky Ticket.

Newsbewertung

Weiterlesen

Google Whitepaper Explains Cloud Data Deletion Process

Nachrichten vom 18.09.2018 um 19:56 Uhr | Quelle eweek.com
DAILY VIDEO: Google releases details on its cloud data deletion process, and mobile carriers join together for the Project Verify authentication effort.
Newsbewertung

Weiterlesen

Notifying your users with FCM

Android Tipps vom 18.09.2018 um 19:50 Uhr | Quelle feedproxy.google.com

Posted by Jingyu Shi, Developer Advocate, Partner Devrel

This is the second in a series of blog posts in which outline strategies and guidance in Android with regard to power.

Notifications are a powerful channel you can use to keep your app's users connected and updated. Android provides Notification APIs to create and post notifications on the device, but quite often these notifications are triggered by external events and sent to your app from your app server.

In this blog post, we'll explain when and how to generate these remote notifications to provide timely updates to users and minimize battery drain.

Use FCM for remote notifications

We recommend using Firebase Cloud Messaging (FCM) to send remote notifications to Android devices. FCM is a free, cross-platform messaging solution that reliably delivers hundreds of billions of messages per day. It is primarily used to send remote notifications and to notify client applications that data is available to sync. If you still use Google Cloud Messaging (GCM) or the C2DM library , both of which are deprecated, it's time to upgrade to FCM!

There are two types of FCM messages you can choose from:

  • Notification Messages, which simplify notification handling and are high priority by default.
  • Data Messages, for when you want to handle the FCM messages within the client app.

You can set the priority to either high or normal on the data messages. You can find out more about FCM messages and message handling in this blog post on Firebase Blog.

FCM is optimized to work with Android power management features. Using the appropriate message priority and type helps you reach your users in a timely manner, and also helps save their battery. Learn more about power management features in this blog post: "Moar Power in P and the future".

To notify or not?

All of the notifications that you send should be well-structured and actionable, as well as provide timely and relevant information to your users. We recommend that you follow these notification guidelines, and avoid spamming your users. No one wants to be distracted by irrelevant or poorly-structured notifications. If your app behaves like this, your users may block the notifications or even uninstall your app.

The When not to use a notification section of the Material Design documentation for notifications highlights cases where you should not send your user a notification. For example, a common use case for a normal priority FCM Data Message is to tell the app when there's content ready for sync, which requires no user interaction. The sync should happen quietly in the background, with no need for a notification, and you can use the WorkManager1 or JobScheduler API to schedule the sync.

Post a notification first

If you are sending remote notifications, you should always post the notification as soon as possible upon receiving the FCM message. Adding any additional network requests before posting a notification will lead to delayed notifications for some of your users. When not handled properly, the notifications might not be seen at all, see the "avoid background service" section below.


⚠️ Avoid adding any additional network requests before posting a notification

Also keep in mind that, depending on the state of the device, user actions, and app behavior, one or many power saving features could be restricting your app's background work. As a result, your app's jobs and alarms might be delayed, and its ability to access the network might be restricted.

For all of these reasons, to ensure timely delivery of the notification, you should always show the notification promptly when the FCM message is received, before any other work like network fetch or scheduling jobs.

FCM message payload is your friend

To post a notification upon the receipt of an FCM message, you should include all the data needed for the notification in the FCM message payload.

The same applies to data sync--we recommend that your app send as much data as possible in the FCM payload and, if needed, load the remainder of the data when the app opens. On a well-performing network, there's a good chance that the data will be synced by the time the user opens the app so the spinner won't be shown to the user. If network connectivity is not good, a notification will be sent to the user with the content in the FCM payload to inform the user in a timely manner. The user can then open the app to load all the data.

You can also encrypt FCM messages end-to-end using libraries like Capillary. The image below shows a general flow of how to handle FCM messages.

Need more data?

As convenient as FCM message payload is, it comes with a 4KB maximum limit. If you need to send a rich notification with an image attachment, or you want to improve your user experience by keeping your app in sync with media content, you may need more than the 4KB payload limit. For this, we recommend using FCM messages in combination with the WorkManager 1 or JobScheduler API.

If you need to post a rich notification, we recommend posting the notification first, with some of the content in the FCM message. Then schedule a job to fetch the remainder of the content. Once the job is finished, update the notification if it is still active. For example, you can include a thumbnail or preview of the content in the FCM payload and post it in the notification first. Then schedule a job to fetch the rest of the media files. Be aware that if you've scheduled jobs from the FCM message handler, it is possible that when the user launches the app, the scheduled job won't have finished yet. You should handle this case gracefully.

In short, use the data in the FCM message payload to post a notification and keep your app content updated first. If you still need more data, then schedule jobs with APIs like WorkManager 1 or JobScheduler API.

Avoid background services

One common pitfall is using a background service to fetch data in the FCM message handler, since background service will be stopped by the system per recent changes to Google Play Policy (Starting late 2018, Google Play will require a minimum target API level ).

Android 9 Pie will also impose background execution limits when battery saver is on. Starting a background service will lead to IllegalStateException from a normal priority FCM message. High priority messages do grant you a short whitelist window that allows you to start a background service. However, starting a background service with a network call will put the service at risk of getting terminated by the system, because the short execution window is only intended to be used for posting a notification.

You should avoid using background services but use WorkManager 1 or JobScheduler API instead to perform operations in the background.

Power & message priority

Android 6 Marshmallow introduced Doze. FCM is optimized to work with Doze, and you can use high priority FCM messages to notify your users immediately. In Doze mode, normal priority messages are deferred to a maintenance window. This enables the system to save battery when a device is idle, but still ensure users receive time-critical notifications. Consider an instant messaging app that sends users messages from friends or incoming phone calls or a home monitoring app sends users alarm notifications. These are some of the acceptable examples where you can use high priority FCM messages.

In addition, Android 9 Pie introduced App Standby Buckets and App Restrictions.

The table below shows how various power-management features affect message delivery behaviors.

High priority message delivery Normal priority message delivery
App in Foreground Immediate, unless app is restricted (see below) Immediate, unless app is restricted (see below)
App in Background
Device in Doze (M+) and Doze "on the go" (N+) Immediate Deferred until maintenance window
App Standby Buckets (P+) May be restricted No restriction
App Restrictions (P+) All messages dropped (see below) All messages dropped (see below)
Battery Saver No restriction No restriction


★ Note: Starting January 2019, App Restrictions (in Battery Setting) will include restrictions on FCM messages. You can find out if your app is in the restricted state with the isBackgroundRestricted API. Once your app is in the restricted state, no FCM messages will be delivered to the app at all. This will apply to both high and normal priority FCM messages and when app is in either foreground or background.

App Standby Buckets impose different levels of restrictions based on the app's standby bucket. Based on which bucket your app belongs to, there might be a cap for the number of high priority messages you are allowed to send per day. Once you reach the cap, any subsequent high priority messages will be downgraded to normal priority. See more details in the power management restrictions.

High priority FCM messages are designed to send remote notifications or trigger actions that involve user interactions. As long as you always use high priority messages for these purposes, your high priority messages will be delivered immediately and remote notifications will be displayed without delay. In addition, when a notification from a high priority message causes a user to open your app, the app gets promoted to the active bucket, which exempts it from FCM caps. The example below shows an instant messaging app moving to the active bucket after the user taps on a notification triggered by a high priority FCM message.

However, if you use high priority messages to send notifications to the blocked notification channels or tasks which do not involve user interactions, you will run the risk of wasting the high priority messages allocated in your app's bucket. Once reaching the cap, you won't be able to send urgent notifications anymore.

In summary, you should only use high priority FCM messages to deliver immediate, time-critical notifications to users. Doing so will ensure these messages and subsequent high priority messages reach your users without getting downgraded. You should use normal priority messages to trigger events that do not require immediate execution, such as a notification that is not time-sensitive or a data sync in the background.

Test with Android 9!

We highly recommend that you test your apps under all of the power management features mentioned above. To learn more about handling FCM messages on Android in your code, visit the Firebase blog.

Thank you for helping move the ecosystem forward, making better Android apps, and saving users' batteries!

Acknowledgements: This blog posts is in joint collaboration with FCM and Android teams.

1 WorkManager is the recommended solution for background processing once it's stable.


Newsbewertung

Weiterlesen

Seitennavigation

Seite 1 von 10.692 Seiten (Bei Beitrag 1 - 35)
374.200x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite
[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]

Folge uns auf Twitter um einen Echtzeit-Stream zu erhalten. Updates alle 5 Minuten!

Die Webseite benutzt einen Cache von 10-15 Minuten