Abstract:
A program orchestration method includes displaying at least one atomic service icon on a touchscreen of an electronic device, where the atomic service provides a service capability in an API manner. The method further includes displaying an orchestration area, where the orchestration area is used for accommodating atomic service icons. The method further includes detecting a first touch event for a first atomic service icon, displaying the first atomic service icon in the orchestration area, detecting a second touch event for a second atomic service icon, displaying the second atomic service icon in the orchestration area, detecting a third touch event, and orchestrating the first atomic service icon and the second atomic service icon that are in the orchestration area, to generate a first program.
Abstract:
A resource statistics collection method and apparatus, and a terminal are provided. The method includes: recording a process running on a terminal at each of at least two time points; for each of the time points, obtaining at least one hardware resource invoked by the process running at the time point; obtaining a process set including processes running at the at least two time points; and obtaining, according to the hardware resource invoked by the process in the process set, information about the at least one hardware resource occupied by an application associated with the process in the process set. In embodiments of the present invention, statistics collection is performed per process, so that information about the hardware resource occupied by each application of the terminal can be obtained, and a statistical granularity is relatively fine.
Abstract:
A method and an apparatus for clearing a malicious power-consuming application, and a user terminal are provided. An application whose background working power consumption is not less than a power consumption threshold is determined as a malicious power-consuming application; and a wakelock occupying time of each application if a screen is turned off is periodically calculated, and if a background working application's wakelock occupying time is not less than a set time threshold, the application is determined as a malicious power-consuming application.