Fresh news from Droid zone
Hello, you're reading Infinum Android Sweets, bringing you the latest Android related news straight to your inbox every week.
One Biometric API Over all Android
With the launch of Android 10 (API level 29), developers can now use the Biometric API, part of the AndroidX Biometric Library, for all their on-device user authentication needs.
Read More
Articles
No, that’s not a typo! While the optimizations in this series so far have been done by R8 during whole-program optimization, D8 can also perform some simple optimizations.
When it’s it appropriate to comment code? I follow a simple set of rules: If the code is confusing – I try to refactor the code so that it’s not confusing anymore. If a refactoring is not possible, I document the “why”, not the “how”. The “how” is already documented: that’s the code.

Writing a test is easy, ensuring your project is tested, is hard. This post is here to advocate for end-to-end testing, to make controversy mainstream and hopefully convince you to join the cause. At the Android Summit, Donn Felker shared his views on ‘testing for success in the real world’

Moshi 1.9 is here! It's been in the oven for a year and excited to have it out there. This post takes a closer look at its changes.

Libraries and useful resources
An MVI framework for Kotlin and Android.
A lightweight Android material bottom navigation bar library
Videos/Podcasts
In this episode of Fragmented, Kaush breaks down how he begins creating and writing technical talks, using a talk he’s about to give at the Mobilization Conference.
As Android developers, you know that your app is insulated from other apps in the device by the Android Application Sandboxing model. But the reality is that this sandbox only protects your data. Your APK is completely exposed to other apps, including resources, assets, and code.
Amongst the many talks and announcements at the Android Dev Summit 2019 was a hidden gem: the first ever live episode of this podcast!
Class of the week
This class specifies a secret key in a provider-independent fashion. It can be used to construct a SecretKey from a byte array, without having to go through a (provider-based) SecretKeyFactory.
Beyond Android
We have the largest collection of algorithm examples across many programming languages. From sorting algorithms like bubble sort to image processing...