Browse Definitions :
Definition

Android Things

Contributor(s): Matthew Haughn

Android Things is an embedded operating system made by Google for Android-based IoT devices.

Android Things spares resources and streamlines the OS for the company’s devices and other select Google-approved hardware kits. The OS offers an integrated update system in response to difficulties associated with individual manufacturers being responsible for updating their own phone OSs.

The IoT attack surface involves huge numbers of interconnected devices and all their connections. Security-conscious critics have expressed concerns about who will be responsible for updating the multitudes of low-cost IoT devices to protect a sea of vulnerable points. Google will provide free updates for Android-supporting IoT devices for three years through the OS’s update system. Costs will be covered by Google ads, where deliverable, and by tying into many paid cloud services Google plans to offer for IoT devices.

The OS supports low energy BlueTooth and Wi-Fi for connectivity. Because of its memory requirement of 32MB of RAM, which is substantially lower than memory requirements of standard Android at 512MB of RAM, Google’s IoT OS is still not for lower-end devices. Manufacturers of low-memory devices may have to look elsewhere or create their own options such as Huawei’s LiteOS which weighs in at a feather-weight 10KB.

Android Things is the commercial name for the project formerly codenamed Brillo.

This was last updated in June 2018

Continue Reading About Android Things

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close