AndroidTO Video Roundup: Logins, Superpowers, and Black Hat Hacking

INTERSECT helps businesses create and deliver exceptional digital products that marry business objectives and user needs. Learn more.

At the beginning of November, we proudly teamed up with the Toronto Chapter of the Google Developers Group to host the 9th annual AndroidTO conference. We were joined by a great community of developers who wanted to gather insights from one another and gain knowledge from some great speakers who work for some of the world’s most recognized brands, such as Facebook, Patreon, Slack, Shopify, Google, and more.

If you weren’t able to join us in person for the conference or if you just want to relive the day and watch your favourite talks again, we have some good news for you. We have curated all of the talks from AndroidTO 2018 and published them on YouTube for your viewing pleasure.

Over the next few weeks, we will be highlighting some of the insights shared at this year’s AndroidTO right here on the Intersect blog. But if you can’t wait for them, you can also view all of the sessions right now (and in the order they were presented in) in this YouTube playlist.

Allow us to introduce the first three sessions;

Building A Delightful (Enterprise Grade) Login Experience – Sam Wolfand from Slack

What’s it like to build an app that millions of users need to log into for work every day? And how can it be as easy as possible for them to do so, while still ensuring that their corporate security does not get compromised? Sam Wolfand might have the answer, through his experience building the login experience for one of the most widely-used instant messengers for business in the world, Slack. How does he make that experience the best it can be? Watch and find out:

Auditing Your APKs Like A Black Hat Hacker – Kristina Balaam from Lookout

In the current climate of digital culture, everyone is worried about being vulnerable. Whether you’re a company or an individual user you are likely concerned that a program you’re using, or worse, one you’ve built, has openings that could let nefarious people get access to your personal information. Protecting your users, and in turn, your company from exploitations should be a top priority. But how can you find out if your programs have vulnerabilities? You think like a black hat hacker when performing audits. Not sure how to do that? Let Kristina Balaam from Lookout explain how in her AndroidTO talk:

How The Command-Line Can Give You Superpowers – Eric Fung from Shopify

When was the last time that you sat down to create an app and headed straight for the command-line? If you answered “never” then don’t worry, because you’re not alone. Most developers haven’t looked at a command-line since the days of freeware games and the DOS prompt. But for Eric Fung from Shopify, using the command-line has lead him to discover that you can use it for some pretty amazing things. So amazing, that he feels like it gives him superpowers. Want to know how you can harness some of these powers for yourself? Check out Eric’s talk: