You are previewing Enterprise Android: Programming Android Database Applications for the Enterprise.
O'Reilly logo
Enterprise Android: Programming Android Database Applications for the Enterprise

Book Description

The definitive guide to building data-driven Android applications for enterprise systems

Android devices represent a rapidly growing share of the mobile device market. With the release of Android 4, they are moving beyond consumer applications into corporate/enterprise use. Developers who want to start building data-driven Android applications that integrate with enterprise systems will learn how with this book. In the tradition of Wrox Professional guides, it thoroughly covers sharing and displaying data, transmitting data to enterprise applications, and much more.

  • Shows Android developers who are not familiar with database development how to design and build data-driven applications for Android devices and integrate them with existing enterprise systems

  • Explores how to collect and store data using SQLite, share data using content providers, and display data using adapters

  • Covers migrating data using various methods and tools; transmitting data to the enterprise using web services; serializing, securing, and synchronizing data

  • Shows how to take advantage of the built-in capabilities of the Android OS to integrate applications into enterprise class systems

Enterprise Android prepares any Android developer to start creating data-intensive applications that today's businesses demand.

Table of Contents

  1. Cover
  2. Contents
  3. Chapter 1: Developing for Android Tablets and Smartphones
    1. Android Is a Java Operating System
    2. Your Tools and Your First Android App
    3. One Code-Base for All Types of Devices
    4. Components, Views, and Lifecycle
    5. Tying Together Activities, Fragments, and the Action Bar
    6. The Android Task and Process Model
    7. Multiprocessing, Security, and Lifecycle
    8. Declaring Application Properties
    9. Summary
  4. Chapter 2: The Relational Model and SQLite
    1. Databases and the Relational Model
    2. Introduction to SQLite
    3. Summary
  5. Chapter 3: Android Database Support
    1. SQL in Java: The SQLiteDatabase Class
    2. Cursors, Loaders, and Adapters
    3. Summary
  6. Chapter 4: Content Providers
    1. Using a Content Provider
    2. The Contract: URIs and Types
    3. Implementing the Content Provider
    4. Permissions and Registration
    5. Content Providers and Files
    6. Summary
  7. Chapter 5: Rest, Content Providers, Concurrency, Networking, and Sync Adapters
    1. Basic REST
    2. Android Networking
    3. Considering Concurrency and Lifecycles
    4. An Architecture for Robust Networking
    5. Using Sync Adapters
    6. Summary
  8. Chapter 6: Service Development
    1. A Choice for Service Development
    2. Building a RESTful Service for Contacts
    3. Summary
  9. Chapter 7: Mobile and the Cloud
    1. Cloud Performance and Scalability
    2. Design Considerations for Scalable Persistence
    3. Looking at Popular Cloud Providers
    4. Exploring the Code Examples
    5. Summary
  10. Chapter 8: Complex Device-Based Data: Android Contacts
    1. PIM Databases: Fossils from Smartphone Pre-History
    2. Android’s Contacts Provider
    3. The ContactsContract API
    4. A Contacts Provider Explorer
    5. Summary
  11. Chapter 9: Generic Data Synchronization: Project Migrate and the WebData API
    1. Introducing WebData and Project Migrate
    2. Project Migrate in Detail
    3. The WebData Content Provider Android API
    4. Summary
  12. Chapter 10: WebData Applications
    1. The Migrate Client
    2. Creating a Migrate Project
    3. Interfacing with the Migrate REST Proxy
    4. Setting Up a Device
    5. Future Directions: MigrateClinic
    6. Summary
  13. Chapter 11: Building Human Interfaces for Data
    1. Modularity and Flexibility Compared with a “Cookbook” Approach
    2. Direct Manipulation
    3. Navigation
    4. Choosing to Use the Support Package
    5. Summary
  14. Chapter 12: Security
    1. Platform Security
    2. Keeping Handsets Safe
    3. Writing Secure Applications
    4. Summary
  15. Introduction
  16. Advertisement