Don't suit up: Microsoft drops dress code for Android visitors

It seems Astoria will allow Windows 10 to run unmodified droid binaries

Windows will run Android binaries "unchanged", according to a Microsoft job posting.

"Project Astoria" is one of several ambitious ventures announced at Microsoft's annual developer conference Build 2015, intended to lure iOS, Android, and web developers to Windows 10. All were intended to make porting to Windows easy.

New tools would allow Windows to be added to the developers' list of build targets with as few code changes as possible – and the project covered the Android part of the proposition. Requests for Google services would be cunningly diverted to Microsoft services.

However, it seems to have morphed into something more ambitious: the "suicide note" fans feared back in the spring. According to a job posting for a software developer at Redmond, Astoria will allow Windows 10 to run unmodified Android binaries.

A job posting spotted by a Windows blog for new recruits to the team at Microsoft claims that the Astoria bridge "enables Android developers to publish their unchanged binary to run as they are on the Windows mobile platform."

If that's correct, then it increases the likelihood of Android apps running on Windows, which today lags far behind iOS and Android in terms of the quantity and quality of native applications.

But an apps-at-any-cost tactic has dangers for Microsoft, as developers would have no incentive to develop functionality for Microsoft services such as Cortana or One Drive.

Project Astoria: makes your screen brighter than regular Android
Source: Microsoft

Microsoft would also run into a problem that BlackBerry BB10 users will know: the absence of proprietary Google libraries (GMS, or Google Mobile Services) on the device can cause compatibility issues.

Google devised strict qualification hurdles for ODMs bundling GMS to avoid Android fragmentation. Apps running on platforms that attempt clever emulation tricks can only go so far. And Android developers are being lured ever closer to GMS, with Lollipop adding 5,000 new API calls.

It's conceivable that one day, the platform advantage held by Apple and Google may diminish: Amazon has offered developers app streaming out of the EC2 cloud for some 18 months now.

However, despite the potential and the obvious advantages to developers (write once, and not for multiple platforms), widespread adoption of app streaming is some way off yet. ®

Other stories you might like

  • AI tool finds hundreds of genes related to human motor neuron disease

    Breakthrough could lead to development of drugs to target illness

    A machine-learning algorithm has helped scientists find 690 human genes associated with a higher risk of developing motor neuron disease, according to research published in Cell this week.

    Neuronal cells in the central nervous system and brain break down and die in people with motor neuron disease, like amyotrophic lateral sclerosis (ALS) more commonly known as Lou Gehrig's disease, named after the baseball player who developed it. They lose control over their bodies, and as the disease progresses patients become completely paralyzed. There is no currently no verified cure for ALS.

    Motor neuron disease typically affects people in old age and its causes are unknown. Johnathan Cooper-Knock, a clinical lecturer at the University of Sheffield in England and leader of Project MinE, an ambitious effort to perform whole genome sequencing of ALS, believes that understanding how genes affect cellular function could help scientists develop new drugs to treat the disease.

    Continue reading
  • Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores

    Exploit, vulnerability discussion online can offer useful signals

    Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues.

    Better still is prioritizing the repair of vulnerabilities for which exploit code is available, if that information is known.

    CVSS is a framework for rating the severity of software vulnerabilities (identified using CVE, or Common Vulnerability Enumeration, numbers), on a scale from 1 (least severe) to 10 (most severe). It's overseen by, a US-based, non-profit computer security organization.

    Continue reading
  • Sniff those Ukrainian emails a little more carefully, advises Uncle Sam in wake of Belarusian digital vandalism

    NotPetya started over there, don't forget

    US companies should be on the lookout for security nasties from Ukrainian partners following the digital graffiti and malware attack launched against Ukraine by Belarus, the CISA has warned.

    In a statement issued on Tuesday, the Cybersecurity and Infrastructure Security Agency said it "strongly urges leaders and network defenders to be on alert for malicious cyber activity," having issued a checklist [PDF] of recommended actions to take.

    "If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic," added CISA, which also advised reviewing backups and disaster recovery drills.

    Continue reading

Biting the hand that feeds IT © 1998–2022