Droidcon

Android OS

Android OS is an operating system for mobile phones and other devices. It is Linux-based and written mainly in Java to power stereos, watches, cell phones, and more.

Overview and Applications

Android OS is based on different Java core libraries and applications and has a number of new features, upgrades, and updates. New releases are named Eclair, Donut, Cupcake, etc. to emphasize the fact that Android-based devices make our lives better, i.e, sweeter. The Android Software Development kit is used to develop different applications and includes tools such as tutorials, sample code, documentation, emulator, software libraries, and a lot more.

Jobs and Careers

There are different jobs and careers to look into, including remote and freelance jobs. Examples include software developer intern, software engineer, project and technical support manager, mobile apps developer, and many others. Mobile developers, for example, are tasked with app maintenance and support, unit testing, app design, and development of new systems and applications. Mobile developers usually have experience with different SDK tools, including layouts, intents, fragments, and others as well as experience with REST/JSON/XML services, algorithm design, data structures, object-oriented design, and complexity analysis. Companies hiring mobile app and software engineers usually require a Bachelor's degree and experience with secure control management systems, Android SDK, Android Studio, and more. Some companies also require extensive experience with debugging asynchronous codes, Dagger for Dependency Injection, and SDK for dynamic links, crash reporting, and analytics.

Android Applications Used in the Classroom

There are different Android-based tools and applications that can be used in schools. They can help engage students in learning and make it easier for educators and teachers to plan activities, develop lesson plans, and enhance the process of learning. Some teacher apps, for example, allow parents, teachers, and students to interact and communicate with ease in virtual environments. There are apps that allow students and teachers to upload videos, photos, and files as well. Some Android-based applications help track progress and allow students to turn in and post assignments. In fact, some applications can be used as a virtual classroom where teachers post and discuss assignments, allow students to create presentations and worksheets, and a lot more.

Conferences and Other Events

A number of conferences, workshops, summits, and other events are held throughout the year, including conferences with a focus on app development and design. Conferences are organized across the world in cities such as London, Krakow, Toronto, Berlin, Washington, Barcelona, and many others. AndroidTO 2017, for example, was organized in Toronto, Canada and featured guest speakers from companies such as Adobe, 500px, Facebook, Tumblr, Google, and many others. Presentations focused on instant apps, Android security, Android integration, Workspace IoT, and other themes, topics, and issues. GDG DevFest is an annual developer conference to be held in Sudbury, Canada in 2018. Key topics and themes include design of web applications, application state management, good design vs. best practices, and more. The conference features guest speakers from Fuel Multimedia, the Laurentian University, the Brookfield Institute for Innovation, Science North, and others. GDG DevFest conferences will be held in other places as well, including Crans-Montana, Switzerland, Sydney, Australia, Ohio, USA, Belo Horizonte, Brazil, and elsewhere. Guest speakers and presenters include software engineers, Android experts, Google developer experts, and lead developers working for major companies across the world.

Recognizing and Avoiding Phishing (Scam) Emails

Phishing or scam emails are used to steal money and so are phone calls and phony websites. This is done through malicious attachments or links that extract login, personal, credit card, bank, and account information.

How They Work

Con artists make use of different methods to steal money, including text messages, social networks, and email messages. They often use networks such as Twitter and Facebook to access personal information such as leisure time, hobbies, work history, employment, and so on. This is also done to collect email addresses and phone numbers. Cyber-criminals send Phishing emails on behalf of banks, institutions, organizations, large and recognized brands, and known contacts. The goal is to convince the victim that this is an authentic message and click on a fake website or open a file attachment. The attachment usually contains malicious software which is installed on the victim's laptop, computer, or another device. Malicious software is used to steal personal information such as credit card numbers, usernames, account IDs, and other personal and financial information.

How to Recognize and Avoid Phishing Emails

Phishing emails and text messages are usually poorly written and use vague language. Beware of messages with poor grammar and spelling mistakes. Large organizations and institutions have editors to correct grammar and spelling mistakes, whether it is emails or other correspondence. Furthermore, if the email is addressed "Your account information", "Valued customer", "Confirm account", or something like that, this can be a spoofing or Phishing email. A subject line that reads "unauthorized login" or "suspended account" also looks suspicious. Another tactic that cyber-criminals use is threatening language to make victims fearful and act promptly. They also use urgent language to this end. A message about "unusual activity" linked to the victim's bank or credit card account is one example.

Never click on links in emails. You can type the link in your browser instead. Alternatively, you can hover your mouse over the link to check whether it matches the link you have in the text message. Some links also open .exe files that contain malicious software. Other links take users to pop-up windows and phony websites that ask visitors to enter personal or financial information. The link usually contains the name of an established and well-known brand or institution. However, the name is slightly altered, which is easy to miss. Beware of emails and links even if they look remotely suspicious.

What Else to Do

If you receive a Phishing email, you may want to contact the Canadian Anti-fraud Centre. The agency is tasked with collecting intelligence and information on scams and other types of fraudulent activity, including online fraud, West African emails, telemarketing fraud, etc. The agency publishes information on recent fraudulent activities such as counterfeit merchandise, romance scams, fraud targeting senior citizens, and others. Victims are welcome to report scam and other fraudulent activity. They are asked to send information such as text messages, emails, receipts, and other documents. It is also important to contact and inform the local police department.

There are two ways to contact the Canadian Anti-fraud Centre - through the online reporting system and by phone. There are two ways to sign in and access the reporting system, one is through a GC Key and the other is through a sign-in partner such as TD Bank Group, RBC Royal Bank, National Bank of Canada, BMO Financial Group, etc. This is how you gain access to and report fraud using the Royal Canadian Mounted Police service.

Other Types of Scam

There are other types of scam to watch for, including phone calls, psychic and astrology scams, Nigerian-type messages, advanced fee scams, lotteries and prizes, and pyramid schemes. Some types use threatening language while others attempt to convince users that they have won a contest, competition, or prize. Whatever the form or type, the ultimate goal is to rob victims of their money.