Introduction
Yannick et Benjamin reçoivent à nouveau Pierre-Yves Ricau, aka Piwai, pour parler de Leak Canary 2 car la version 2 est toujours bien meilleure que la version 1, non ?!
Téléchargement direct
Show notes
1:09″ – Square : https://squareup.com/us/en 1:23″ – Androidx : https://developer.android.com/jetpack/androidx 2:15″ – Retrofit : https://github.com/square/retrofit/ 2:25″ – Volley : https://github.com/google/volley 3:32″ – Android Dev Summit (ADS) : https://developer.android.com/dev-summit 10:03″ – OutOfMemoryError : https://docs.oracle.com/javase/8/docs/technotes/guides/troubleshoot/memleaks002.html 10:15″ – Heap Dump : https://www.baeldung.com/java-heap-dump-capture 10:21″ – Memory Analysis Tool (MAT) : https://www.eclipse.org/mat/ 10:45″ – Activity LifeCycle Callback : https://developer.android.com/reference/android/app/Application.ActivityLifecycleCallbacks 10:51″ – WeakReference : https://developer.android.com/reference/java/lang/ref/WeakReference 10:55″ – Garbage collection : https://fr.wikipedia.org/wiki/Ramasse-miettes_(informatique) 12:07″ – Dagger 2 : https://github.com/google/dagger 12:08″ – Dagger 1 : https://github.com/square/dagger 12:58″ – Headless Android Heap Aanalyzer (HAHA) : https://github.com/square/haha 13:14″ – Perflib : https://android.googlesource.com/platform/tools/base/+/studio-master-dev/perflib 20:44″ – Shark CLI (Smart Heap Analysis Reports for Kotlin) : https://square.github.io/leakcanary/shark/ 22:38″ – Tag LeakCanary sur StackOverflow : https://stackoverflow.com/questions/tagged/leakcanary 28:25″ – Android P Leak : https://github.com/square/leakcanary/issues/1081 32:23″ – Serializable : https://docs.oracle.com/javase/7/docs/api/java/io/Serializable.html 32:35″ – SQLite : https://fr.wikipedia.org/wiki/SQLite 32:59″ – Fragments : https://developer.android.com/guide/components/fragments 33:04″ – ListView : https://developer.android.com/reference/android/widget/ListView 33:33″ – Fragnums : https://github.com/pyricau/fragnums 34:07″ – Flow : https://github.com/square/flow 45:40″ – Artéfact No-op de Leak Canary : https://square.github.io/leakcanary/upgrading-to-leakcanary-2.0/#worth-noting 45:58″ – RefWatcher : https://square.github.io/leakcanary/upgrading-to-leakcanary-2.0/#retrieve-the-refwatcher 48:54″ – Artefact ObjectWatcher Android : https://square.github.io/leakcanary/upgrading-to-leakcanary-2.0/#option-1-add-object-watcher-android-to-release-builds 53:16″ – ViewModel : https://androidleakspodcast.com/2018/07/01/episode-40-le-poireau-architecte/ 53:30″ – ViewModel.onCleared() : https://developer.android.com/reference/android/arch/lifecycle/ViewModel#oncleared 53:58″ – ViewModelProvider : https://developer.android.com/reference/android/arch/lifecycle/ViewModelProvider 56:39″ – Continuous Integration (CI) : https://fr.wikipedia.org/wiki/Intégration_continue 58:38″ – Blog de Firebase sur la technique des ContentProviders : https://firebase.googleblog.com/2016/12/how-does-firebase-initialize-on-android.html 58:58″ – ContentProvider : https://developer.android.com/guide/topics/providers/content-provider-basics 1:00:41″ – Androidx lifecycle : https://developer.android.com/jetpack/androidx/releases/lifecycle 1:0’3:58″ – Maven Central : https://search.maven.org/ 1:04:33″ – npm : https://www.npmjs.com/ 1:04:33″ – Un paquet compromis dans NPM : https://www.trendmicro.com/vinfo/dk/security/news/cybercrime-and-digital-threats/hacker-infects-node-js-package-to-steal-from-bitcoin-wallets 1:04:37″ – JCenter : https://bintray.com/bintray/jcenter 1:04:37″ – L’incident avec JCenter : https://blog.autsoft.hu/a-confusing-dependency/ 1:05:14″ – includeGroup et excludeGroup sur des répository : https://medium.com/@StefMa/matching-repositories-to-dependencies-in-gradle-3fd5ae2e5f60 1:05:26″ – JitPack : https://jitpack.io/ 1:10:28″ – Data class en Kotlin : https://kotlinlang.org/docs/reference/data-classes.html 1:12:12″ – Sealed classes : https://kotlinlang.org/docs/reference/sealed-classes.html 1:15:49″ – BugSnag : https://www.bugsnag.com/ 1:23:40″ – Android Makers : https://androidmakers.fr 1:28:11″ – Tweet de Piwai sur un leak d’Android : https://twitter.com/Piwai/status/1217548962296549377 1:29:12″ – Handler : https://developer.android.com/reference/android/os/Handler 1:32:50″ – Compatibility Test Suite (CTS) : https://source.android.com/compatibility/cts 1:35:18″ – Process Phoenix : https://github.com/JakeWharton/ProcessPhoenix 1:35:58″ – Github Leak Canary : https://github.com/square/leakcanary/ 1:36:02″ – Site static de Leak Canary : https://square.github.io/leakcanary/ 1:38:44″ – The Witcher : https://www.netflix.com/title/80189685 1:38:52″ – Audible : https://www.audible.fr/ 1:40:00″ – Stadia : https://stadia.google.com/ 1:40:19″ – Oculus Quest : https://www.oculus.com/quest/?locale=fr_FR
Contact
@Piwai
@Xzan
@TheYann |