Tutorial
-
Leakcanary: Let the memory leak no hiding
Some objects have a limited life cycle. When these objects are done, we expect them to be recycled. But if there is a series of references to this object, it will not be recycled when we expect it to be retracted at the end of the object's life cycle. It also consumes memory, which creates a memory leak. Continuous accumulation, memory is quickly exhausted.
-
Mobile-size Basics (@ mu net)
Initial mobile design and development students, basically will be in the size of the problem for a while to feel the clue. It took me a long time to figure it out, and it felt necessary to write an easy-to-read tutorial to help you. From the principle, clarify all the details about the dimensions. Because it is for beginners, so don't think I'm wordy.
-
Notrxjava Special Guide for Lazy people (@ Development technology front)
If you're an Android developer, you may have heard or seen some propaganda about RxJava flying these days. RxJava is a library that lets you get rid of writing complex, cumbersome code to handle asynchronous events. Once you start to use it in your project, you'll love it. The
-
Mimics Butterknife's viewbinder mechanism (@ Web Android Learning Group)
Butterknife's use greatly facilitates the development of Android programmers, in fact, We can imitate the implementation ourselves. The first is to understand the use of Java annotations. We first declare a @interface, the annotation class: @interface is used for custom annotations, the declaration of a method defined in it cannot have parameters, cannot throw an exception, and the return value of the method is limited to simple type, String, class, Emnus, @ interface, and arrays of these types.
-
Android app dynamic debugging technology (@DroidSec Android safe Chinese station)
With the popularity of smartphones, mobile apps have penetrated all areas of people's lives. More and more people even have to rely on these apps, including Mobile QQ, games, navigation maps, Weibo, mobile phone payments, and so on, especially during the 2015 Spring Festival, the major manufacturers launched the Red Envelope campaign, a moment to make mobile payment applications become unusually hot. Then the mobile security problem is connected to irresolute, which is mainly divided into mobile network security and client application security.
Code & Open Source Library
Leakcanary
Library of Android and Java memory leak detection tools. Leakcanary instructions for use in Chinese
Bookends
You can add headers and footers libraries to recyclerview.
Androidgradlescript
Android Batch Pack script that continues to match the latest version of Android Studio.
Trigger (@ Handyman's machine cat)
Event triggers, class Jobscheduler.
Elasticdownload
An awesome download progress bar.
Tools
Androidtool-mac (@ Li Jin)
A Swift-written Android tool that can be used on your MAC to support one-click Screenshots, video recording, APK installation and more.
Tips
Android WebView in 4.4 pit (@hi Big Head Ghost hi)
4.4 The following webview will be in the URL of the backslash \ Cast to Slash/, is also drunk, the solution is to escape the following, Java and then use Uri.decode to get the original URL. can refer to @hi Big Head ghost Hi in StackOverflow answer.
Android Development Technology Weekly ISSUE#31