Most people familiar with the Nexus program know that each new Android update usually brings with it a new set of driver "blobs" for each supported phone and tablet in the product line. Even though these proprietary binaries are usually the latest versions when they come out, Google still occasionally receives updates to the drivers even when it's not a good time to issue an OTA. As we've just witnessed from the long lead time on the 4.4.3 release, it can take quite a while before an update is rolled out.
Holy crap, that was fast. According to a flood of tips we just received, at least some owners of Google Play Edition devices are now seeing updates to over-the-air Android 4.4.3. The latest incremental update to KitKat was just published yesterday - some Nexus devices don't even have it. At the time of writing (Tuesday afternoon US) we've been told that the Google Play Editions of the HTC One M7 (2013 model) and the Galaxy S4 are receiving over-the-air updates.
Google has just announced the official Project Tango tablet development kit, an insanely powerful slate powered by NVIDIA's Tegra K1 processor. This thing is beastly - 7" display (unknown type / resolution), 4GB of RAM, 128GB of storage, Tegra K1 quad-core processor (not the dual-core 64-bit Denver), motion-tracking cameras, integrated depth sensing, Android KitKat, and LTE. The big catch? It's only for developers, and it will cost $1024. Yikes. Granted, this is a high-tech, cutting-edge experimental product designed as a reference and development tool, not something to check your Gmail on while browsing Reddit.
Last month's Android platform distribution numbers showed a continuing steady rise of Android 4.4 in handsets worldwide, but this month's numbers mark a major jump - KitKat is up to 13.6% of all devices, from a mere 8.5% a month ago today. Updates to handsets likely explain some of the rise, though consumers replacing aging devices with updated phone like the HTC One M8 and Galaxy S5 are probably more likely candidates for such a rapid and significant rise in adoption.
Ask anybody that spends time in the security circles and they'll tell you that every large software project is bound to have a few long-standing vulnerabilities in the code. Fortunately, there are usually a few people who are paid to close up those holes so you, the customer, don't find yourself the victim of nefarious evildoers someday. Like so many before it, the latest update to Android came with a boatload of changes, at least one of which fixes a potentially dangerous vulnerability that can be used for numerous attacks, including a way to acquire root.
As just announced on Motorola's official blog, the company will begin rolling out Android 4.4.3 KitKat to unlocked Mot X, G, and E owners this week. Motorola has made a point of rapid updates since it was acquired and subsequently sold by Google, with Punit Soni acting as the public face of Motorola's software update team.
This update will be rolling out to unlocked (T-Mobile) Moto X owners, the unlocked Moto G (including the new and old 3G variants, as well as LTE the version), and the Moto E.
An alleged system dump from LG's upcoming Android Wear-powered G Watch has been leaked on Twitter by an account known as upleaks, along with a bootloader animation hosted on YouTube pulled from said dump. Take a look:
This is our first look at the bootloader animation for Android Wear, though obviously there's not much substantive information we can gather from it. It looks nice, so there's that. We haven't delved into the dump ourselves, but feel free to download it from the Mega link in tweet below or in the source links at the bottom of this article.
Unless you blacked out all of the news from yesterday to avoid a deluge of stories about what has been happening in Cupertino, you probably caught wind that there's a brand new update to Android. Whether you're manually installing the latest OTA or going all out with the factory images, you might be interested to know what is actually different. Thanks to Al Sutton, we've got a brand new changelog compiled from the list of code commits submitted to the Android Open Source Project (AOSP).