Operations | Monitoring | ITSM | DevOps | Cloud

Mobile

Bytecode transformations: The Android Gradle Plugin

This is the first part of a blog post series about bytecode transformations on Android. In this part we’ll cover different approaches to bytecode manipulation in Java as well as how to make it work with Android and the Android Gradle plugin. In the next two parts we’ll dive into the actual bytecode, bytecode instructions and how we can modify the bytecode and inject our own instructions, using Room as an example.

Canonical joins Magma Foundation

We at Canonical, the company behind Ubuntu, are pleased to join hands with the Magma Foundation. Magma connects the world to a faster network by providing operators an open, flexible, and extendable mobile core network solution. Its simplicity and low-cost structure empower innovators to build mobile networks that were never imagined before. We decided to support this open source project because of our wider telco efforts.

How to Secure BYO Android Devices

Two-thirds of US white-collar employees are working from home some or all of the time, according to a September 2021 Gallup survey – and of those, 91 percent hope to continue to do so even after the pandemic. In this Everywhere Workplace environment, a “bring your own device” (BYOD) policy is an appealing proposition for employees and IT departments alike, leading to an average annual savings of $350 per employee and a 34 percent increase in productivity.

Splunk Mobile for Private Networks

Are you working in a secure environment and want to take advantage of Splunk Mobile and Connected Experiences? Welcome to Private Spacebridge, a version of Spacebridge that you can deploy and manage in your own Kubernetes cluster. Check out this video where Joe, our SR Spacebridge engineer, explains what Private Spacebridge is all about and how it works to get you securely routing mobile traffic through your environment.

Private 5G and Private LTE For Communication Service Providers

As we progress further into the next phases of the wireless evolution, we find that enterprises and consumers have an insatiable appetite for speed and new services. They are adopting the current 5th Generation (5G) mobile network as quickly as it becomes available. However, they require use cases with unprecedented mobility, security, low-latency and tighter integration between wireless and mission critical applications.

Logging into your Connected Experiences

After checking out the Get Started with Connected Experiences blog, you’ll be an expert on 1) how your Splunk data gets to mobile, (2) how to unlock mobile for your Splunk instance, and (3) how user management works. So, with this blog, I’d say it’s time to talk about the many login methods users can leverage with their Splunk instance on mobile.