Skip navigation
2017

One of the most common requests from developers is how to get started with Android development for Zebra devices. This post is designed to point people in the right direction.

 

Google has created several great resources for those that are brand new to Android development:

 

Zebra has similarly made a resource library to teach Android Developers how to build apps for Zebra mobile computers

Summary

The purpose of this utility is to display the Electronic Serial Number (ESN) of a Zebra Android device in the title bar of EHS. This allows the user to identify the device for the purposes of problem reporting etc. The utility works by patching the existing enterprisehomescreen.xml file with the ESN , replacing the Title Bar text (which by default is ‘Enterprise Home Screen’) with the ESN. The utility can be autorun by EHS during initial load so that the ESN is visible immediately the device boots up to the EHS launcher as shown in the screenshot below:

 

ehs1.png

 

Usage

To demonstrate this in action, the attached StageNow centralised profile (rem_ehs2dot6_esn.pdf , original exported profile also attached) will download and install EHS together with the utility on any Zebra Android device with a pre-configured internet connection.

 

To install the utility manually, follow these steps:

  1. 1.      Download and install the attached GetESN.apk utility
  2. 2.       Edit your EHS config file enterprisehomescreen.xml (which needs to be located in /enterprise/usr) file to include the following in the auto launch section:

<auto_launch>

                <application delay="500" package="com.ih.getesn" activity="com.ih.getesn.main"/>

  </auto_launch>

  1. 3.       Install EHS – utility should run during initial start of EHS and show the ESN in the title bar.

 

Please note that this is an unofficial utility and therefore unsupported i.e. use at your own risk .

The latest versions

As I'm writing the latest Zebra's EMDK for Android is v6.6, supporting KitKat, Lollipop and Marshmallow devices. All the documentation is available on TechDocs, and from there you can find all the samples and their source code on GitHub, under the Zebra organization.

Here you can find the latest version of the samples:

The older sample

Sample for older version of Zebra's EMDK for Android are still available on github but under a different organization: Developer Zebra.

Here you can find:

Plus you can find the ADT version of the sample:

A note on the sample

All these sample repositories are build in the same way. The master branch contains only a README file and there's a branch for every sample, PLUS a branch with all the sample that is the one that I usually clone using the command:

git clone -b AllSamples <Repository to clone>

 

 

edit for layout and typos.

BlueBorne is an attack vector that exploits Bluetooth connections to target and control devices.

Zebra takes security seriously and recommends that customers update to the latest BSP and accept monthly patches to minimize security risk.

BlueBorne may affect computers, mobile phones, and other IoT devices running both Android and Windows operating systems. (WinCE and Windows Embedded Hand Held devices are not affected.)

Patches for BlueBorne are available today.  Please check the bulletin and the Zebra.com site for specific device availability.

In response to the September Android Security Bulletin Zebra has addressed security vulnerabilities affecting eleven Zebra Android devices running Kit Kat (K), Lollipop (L), and Marshmallow (M) through patches as part of the Zebra LifeGuard™ for Android™ program.

 

According the the Android Security Bulletin:

The most severe of these issues is a critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

We have had no reports of active customer exploitation or abuse of these newly reported issues. Refer to the Android and Google Play Protect mitigations section for details on the Android security platform protections and Google Play Protect, which improve the security of the Android platform.

Impacted devices include ET50 L, ET55 L, MC18L, MC32 L, TC51 M, TC56 M, TC70 KK and L, TC70x M, TC75 KK and L, TC75x M, TC8000 KK.

 

Device updates are an important way to keep your Android devices secure and running at their full potential. All customers are encouraged to accept these updates to their devices.

 

Read more about the issues addressed or download the updates at Zebra.com

In response to the August Android Security Bulletin Zebra has addressed security vulnerabilities affecting eleven Zebra Android devices running Kit Kat, Lollipop, and Marshmallow through patches as part of the Zebra LifeGuard™ for Android™ program.

 

The highest severity update is a critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

Impacted devices include ET50 L, ET55 L, MC67 KK, MC92 KK, TC51 M, TC56 M, TC70 L, TC70x M, TC75 L, TC75x M, TC8000 L.

 

Read more about the issues addressed or download the updates at Zebra.com

Filter Blog

By date:
By tag: