2

What engineering leaders need to know from this year’s Google I/O

 1 year ago
source link: https://adavis.info/2022/05/what-engineering-leaders-need-to-know-from-this-years-google-i-o.html?utm_campaign=what-engineering-leaders-need-to-know-from-this-years-google-i-o
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

What engineering leaders need to know from this year’s Google I/O

May 13, 2022 by Annyce Davis 0 Comments

google_io_program_2022-1024x501.png?resize=674%2C329&ssl=1

I didn’t intentionally aim to create a rhyming title, but there you have it. Each year, I look forward to Google I/O like a kid going back to school. This year was no exception. I watched as many videos as I could that were related to App Quality, Firebase Crashlytics, and Jetpack Compose. Here’s what I think engineering leaders should know.

Key takeaways

Positive changes

Grateful for the increased transparency and direction about how your app’s quality impacts its success on Google Play. Over the years, I’ve seen gradual improvements to the data available on the Play Console. However, I struggled with understanding what I should have the team focus on to create meaningful business impact. The recent updates to Android Vitals are ideal for pinpointing specific groups of issues and then making the business case for addressing them.

play_vitals.png?resize=628%2C331&ssl=1

Additionally, the updates to Firebase Crashlytics and Performance Monitoring were exciting to see. Being able to connect your Google Play account to Crashlytics opens up opportunities for being able to fine-tune the crashes that are displayed. This is particularly helpful for finding and diagnosing issues while your app is only released to a subset of users.

google_play_crashlytics-1024x643.png?resize=410%2C257&ssl=1
Firebase Crashlytics with Google Play integration

I connected our Google Play account. I was then able to easily view the issues in the test build before it was released to production. And then promptly harassed the team about what I saw. *wink*

Next, I added an alert on our primary GraphQL API call in the Performance section of the Firebase Console. This was another new feature announced at I/O. Having these alerts will aid us in finding out when backend API changes impact the apps as soon as they happen.

performance_alert.png?resize=522%2C344&ssl=1
Performance alert in the Firebase console

What to look out for

All changes related to the Privacy Sandbox on Android. But first, what is it, and what are the stated goals?

Privacy Sandbox will introduce new technology that operates without cross-app identifiers – including Advertising ID. This helps apps remain free through ads while your data stays protected.

Privacy Sandbox also aims to limit covert tracking and collection of user data, including safer ways for apps to integrate with third-party developers.

Pivacy Sandbox documentation

Ok, that sounds like a good thing. Users’ data stays protected and we get safer ways to integrate with third-party developers. What’s to look out for?

privacy_sandbox_overview.png?resize=629%2C349&ssl=1

Here’s how I see it. The current status is a set of design proposals. After skimming through them I see that it will require significant work from the Ad Network SDKs. What concerns me here is that after working with a programmatic ads partner recently, they aren’t up-to-date with what’s already been released in the Android ecosystem. I worry that the proposed changes will be more than they can reasonably implement in the specified time. Where will this leave businesses that rely on the ad revenue?

Additionally, the proposed changes to attribution reporting and the handling of the advertising id scare me. We’ve heard about how the Apple ad changes will cost Facebook $10 billion in revenue this year. Will the Android changes do something similar? From the wording of the proposals, it appears as if Google is aiming to approach these privacy changes gradually and in collaboration with the ad industry. But we can’t know the potential impact until we see more from them.

notification_prompt.png?resize=464%2C315&ssl=1
Notification prompt example from Google docs

The final thing to look out for is the new Notification runtime permission in Android 13. If a user installs your app on a device that runs Android 13, then your app’s notifications are off by default. You have to request the new permission and the user must grant it before you can send notifications.

It’s not the end of the world. Most businesses should be familiar with this as there’s already a similar requirement on iOS. However, if you rely on notifications to drive key user actions for your Android app. It’s time to consider the implications of this new permission.

Next steps

I’ve already started reading more about a few of the new features. And as I’ve mentioned, I adjusted some configurations in the Firebase Console. So while I’m still excited about all of the goodness I’ve heard from Google I/O, I plan on doing the following:

If you’re an engineering leader at your company, I’d recommend you do the same.

Fin!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK