Phone Repair Customer Testimonial: Pooja Arora

A testimonial from our iphone repair customer, Pooja Arora

Such a fantastic service experience. Cracked my iPhone screen. Called the guys at FYND, and someone came home within 3...

Posted by Pooja Arora on Monday, September 14, 2015
“Such a fantastic service experience. Cracked my iPhone screen. Called the guys at FYND, and someone came home within 3 hours and changed my screen in 30 mins. Very very delighted. I guess you guys have one more loyal customer now smile emoticon”
— Pooja Arora

Share This

Comments

Phone Repair Customer Testimonial: Juliana Johari

Taken from: https://www.facebook.com/getfynd/posts/1632461003701138

Just changed my cracked screen! Under 20 min!!!! 
Friendly, fast and reliable service from Vicky! Thank you Vicky and thank you Fynd! No hassle ! At the convenience of my home!



Share This

Comments

How To Keep Your Beloved Mobile Device Safe

This article first appear in Mashable

Most iPhone owners know the heart-sinking feeling of watching their beloved device fall to the ground, seemingly in slow motion, as they sit by powerless to prevent a dent, broken screen or — worst of all — a plunge in the toilet bowl.

A brand new iPhone in particular seems to be a magnet for everything from minor scratches and scuffs to more serious damages, such as a dreaded cracked screen.

Luckily, there are measures you can take to prevent such tragedies. Below, we've spoken to tech experts and iPhone owners about the inventive ways they keep their devices safe, secure and scratch-free.

Optimize your settings and come up with a maintenance routine

A large percentage of increasing the longevity of your iPhone comes from taking preventative measures, such as keeping up with software upgrades consistently and optimizing your settings to ensure that you aren't inadvertently draining battery or harming your device.

"There are three major areas [of your phone] to protect," says Jeff Clemmensen, the MiPhone Doctor of Fresno and an expert on iPhone maintenance and repairs. The first of these areas is battery life, followed by ports and screens, he says.

For preserving battery life, Clemmensen suggests reducing the amount of time you keep your phone plugged in and charging. "How often and when you charge your phone affects the battery life. [Many users think they can] charge their phones whenever without a downside. But what we see now is that when you're constantly charging your phone, the battery never gets a chance to rest. In extreme cases, this can cause the battery acids to produce gases that expand the battery and reduce its life. It can also place pressure on the back of the screen assembly and make it more susceptible to breaking," he says.

There are also some measures you can take to optimize your phone's battery life, such as not using the device while it's charging, letting the battery drain down to 5% before plugging it in and reducing the use of "battery killer" apps and functions, including GPS or video streaming.

In addition to preserving battery life, below are a few suggestions for how to most effectively maintain your iPhone.

One of the first things you should do after purchasing a new device is affix a screen protector. Follow the directions for adhering the protector so that no bubbles form and so that it is securely applied. A new, sturdy case is also a must, particularly when purchasing a new device.

If you're prone to keeping your phone on hard surfaces, turn off any sort of vibrating notifications. If your phone is precariously perched on a table or railing, the vibrations could cause it to fall off.

Protect your ports by gently cleaning them every once in a while. "An old toothbrush and a little rubbing alcohol go a long way. Use a small amount of alcohol on the brush and then lightly brush grime away from the openings," suggests Clemmensen. "Do not pour alcohol into the device," he adds.

Clean your phone daily with a dedicated screen-cleaning solution and a soft microfiber cloth that won't scratch the surface. Not only does this help keep your phone looking shiny and new, it's a good idea from a hygiene perspective (many smartphones house more germs than a toilet).

Avoid high-risk situations

Sometimes, keeping your phone screen intact and the exterior scratch-free comes down to simple common sense. Don't keep your phone in your back pocket, for example — nearly one in five smartphone users drop their phones in the toilet at some point, in case you wondered about the statistics — or precariously balance your phone on a balcony ledge when you're trying to set up the perfect city-scape Instagram. If you live an active lifestyle or have your phone consistently on your person, take proper measures to protect it with a case, screen protector, etc.

If you're outside and in direct sunlight often, or leave your phone in a hot purse or car, you're risking overheating your device — which can be harmful for your phone in both the long and short-term. Luckily, your iPhone will warn you if it's becoming overheated. "Remember, if your phone feels hot on the outside, it's hot on the inside," says Clemmensen. Make sure your phone is protected by some kind of shield from the sun if you're hanging out outside or sitting in a hot car.

Another high-risk place for your iPhone is inside a purse or bag that doesn't have a dedicated smartphone pocket. "If you put your phone in the same pocket or purse compartment that you keep coins or keys in, you're asking for a scratched screen," says Jeremy Irons, a design engineer at Creative Engineering, a product development firm in New York. "To best protect your screen from scratches, the main thing you can do is keep it away from metal, or anything that is harder than glass."

It's also a good idea to avoid distracting situations in which you're more likely to fumble or drop your phone. For example, if you're a multitasker who consistently finds yourself balancing your phone between your shoulder and ear while on a call, while simultaneously washing dishes, walking the dog or getting in a workout, consider purchasing a hands-free device or putting your call on speaker.

Use protection

There are many products on the market that adequately protect your devices without detracting from the sleek aesthetic appeal that Jony Ive and Steve Jobs worked so hard to create. The type of case you choose for your phone will depend on personal preferences, but make sure that some key areas are covered and protected.

"When your screen cracks after dropping your phone, notice how the cracks usually spider out from one of the four corners," says Irons. "This is because the corners are the points that will always hit the ground first because they stick out farther than the flat sides." He suggests that iPhone owners choose a phone covering that is equipped to adequately protect these sensitive areas.

In addition to protecting your phone's exterior, consider purchasing an armband for running or your daily commute, especially if you're consistently pulling your phone out of your pocket to check emails or browse through apps. Look for a model that will allow you enough room to keep your phone's protective screen cover or case on while exercising for added security.

"For screen protection, the best defense is a great offense. Keep it off the ground," says Clemmensen. "However, if it's too hard to hold onto all the time, we insist on a case and screen protector."

It's easy to forget that our phones are $600 devices — that is, until you're walking into the Apple store to shell out a hefty sum for repairs. Your phone is an investment; treat it as such. Taking simple precautions and performing regular maintenance can help you squeeze extra weeks or even months out of your device.

How do you protect your iPhone? Tell us in the comments.

Share This

Comments

Phone Repair Customer Testimonial: Ang Kian Wee

Very impress with the service! By far, the most epic good service provider! Price is competitive, technican (Sky) is super competent. Thumbs up!! WIll reco my friends if they need such service!

Posted by Ang Kian Wee on Wednesday, July 8, 2015

A testimonial from Ang Kian Wee, a happy customer who repaired his Samsung Note 2 phone:

Very impress with the service! By far, the most epic good service provider! Price is competitive, technican (Sky) is super competent. Thumbs up!! WIll reco my friends if they need such service!

Share This

Comments

Customer Testimonial: Joanna Chia

PMed and messaged Fynd, very impressed by the fast response on my queries... Fixed an appt online and received a call to...

Posted by Joanna Chia on Wednesday, September 2, 2015

PMed and messaged Fynd, very impressed by the fast response on my queries... Fixed an appt online and received a call to confirm a date and time... The technician James arranged on time, chatted and asked ant other mobile repair queries while he fixed my boss' cracked iPhone 6+ screen fat and efficient... The payment link was rather slow though, came via sms but convenient as payment was thru PayPal and received the e-invoice the next day... Thumbs up for the great service and will fix an appt to replace my iPhone/iPad batteries soon... Thanks again to Fynd and James...

Share This

Comments

Customer Testimonial: Vivian Yow

Testimonial from our Customer Vivian Yow, Manager at Renergy Engineering LLP

Fynd provide door-to-door service it save my time,and i want to thank you Vicky, she is a nice lady very professional....

Posted by Vivian Yow on Friday, August 28, 2015

Fynd provide door-to-door service it save my time,and i want to thank you Vicky, she is a nice lady very professional. My iPhone 6+ have very bad screen cracked and others problem and Vicky explain to me and it solve my problem they service quick and they charge are fair and i satisfied with they service. Thank You Fynd & Vicky, thumb up for you and please always keep the services standard like what your have .

 

Share This

Comments

Customer Testimonial: Isabelle Tan

f you are CLUMSY and BUSY like me, and happened to land yourself with a shattered iPhone screen whilst jogging, do check the screen fixing service out Fynd. 

Benefits:

-You pick a timing and place at your own convenience

-They come to you to fix your phone! GENIUS

-Reasonable pricing as compared to the rest. ($132)

-Vicky (the lady who fixed my phone) did the job in less than 20 min, professional service and friendly. She probably could have done it way faster if I didn't ask her so many questions.

Yay to no more shattered screen!! 
#fynd

Share This

Comments

How to Keep Anyone from Snooping Around Your Data in the Cloud

Cloud computing is on the rise, as it has become a virtual storage pace for millions of users around the globe. The number of cloud users increases every year and is expected to rise even further in the coming years. The cloud has become a place where all our data is stored so that it can be accessed from anywhere in the world. Now even our office documents, personal pictures, IDs and confidential papers are stored on the cloud over the internet. Since the information is stored virtually, security is a major concern for many users.

Even though there are many laws all over the world, none of them can be held legally binding over information that is virtual. Since information is stored over servers of one country and accessed elsewhere, no one can be sure what law to apply to this cross border flow of communication. However, there are some ways that cloud data can be protected by the users themselves.

  • The simplest way to avoid sensitive data theft over the internet is to simply keep it off the internet. Users should avoid storing crucial documents and confidential data over the cloud unless it is absolutely necessary.
  • Users should be very sure about the cloud service they choose. The user agreements should be read in detail to see what cloud service works best. The user agreements are mostly neglected by users as they tend to be boring, but chances are that they contain important information which may be crucial for cloud security later on.
  • The passwords need to be very sound while storing data over the internet. Many people keep the same password for their emails, cloud, smartphones and other devices. This is a grave mistake as 90 percent of the passwords can be hacked within seconds. Users should not keep easy to create passwords and instead should opt for tricky and lengthy combination of numbers and words.
  • Data should always be encrypted before storing it over the cloud. There are many products like Truecrypt and Privacydrive that allow users to encrypt their data. Users, before uploading their files on the cloud, can encrypt the files by using these software to create a password. The password protected files cannot be viewed without it. It is best to choose a provider that provides encryption and stores files in an encrypted manner so that they are not visible. Truecrypt is a software that takes time and is difficult to use but provides a much higher level of encryption and reliability to users. There is a choice of multiple algorithms in Truecrypt software.
  • Users should avail encrypted cloud services, which provide built in encryption and decryption facility. Such services take care that files are encrypted on the user’s computer as well as on the cloud. This allows for minimum external access and greater protection of files.

To keep the data secure on the cloud and prevent it from easy access, users need to decide how confidential the information is and then choose a method of privacy. Paying for cloud protection is the most trusted way to keep it safe from access. However, any of the above mentioned methods can be used to keep cloud data safe.

Share This

Comments

A Look into Cybercrime

What is Cybercrime?

Computer crime is any criminal activity that involves computers. In such crimes, the computer is used as a means to carry out the crime. Net-crime is abusing the internet for criminal means. Cybercrime is a combination of both, and is generally defined as immoral acts, which target an individual or a group of individuals with a criminal intention to destroy the individual’s reputation, inflict mental turmoil or cause physical harm. This may be achieved directly or indirectly with the help of modern communication methods including email, chat rooms, social media networks and mobile phone communication.

To simplify the definition, cybercrime includes any unlawful activity, which makes the use of a computer as the means to perpetrate it. The U.S. Department of Justice has amended the definition to include any unlawful activity that employs a computer for storing evidence. Cybercrimes refers to unlawful use of data, copyright infringement, unauthorized access, fraud, cyber-stalking and child pornography. The term cybercrime covers an expanse of attacks made against individuals and organizations alike. These crimes may be meant to attack a person’s financial standing, emotional state or even a country’s national security.

Cybercrime and Society

Cybercrime can be classified into two sub-categories based on the definition. The first one includes crimes where the computer is the target, malware, viruses or denying service attacks. The other category is crimes that use computer devices or networks as a means of facilitation. Examples are cyber-stalking, identity-theft, fraud, phishing, extortion and stealing classified information.

The scale of cybercrime all over the world is alarming. Norton compiled a report on cybercrime, which revealed that 431 million men and women were the target of cybercrime in 2011. Computer-related crime is increasing at a worrying rate. Norton also reported that financial cost incurred by global cybercrime was $338 billion. This surpasses the financial cost of marijuana, cocaine and heroin combined, which is estimated to be $288 million. If cybercrime continues to grow at the current rate, then it will soon exceed the entire international market of drug trafficking which generates $411 billion per annum.  

Battling Cybercrime

Cybercrime now includes activities whose repercussions ripple across international borders, and which can be described as a global epidemic. The international legal system has laws to protect victims of cybercrime and hold the criminals accountable in the International Criminal Court. Law enforcement authorities face many challenges and unnecessary complications when trying to uncover the face behind the anonymous username. They have trouble collecting evidence, dealing with separate judiciaries and undoing the damage done by false reporting.

In most cases, the victims of cybercrimes are reluctant to seek help and report the illegal activity to the relevant authorities. Sometimes the victim does not even realize they are being targeted by a cyber-criminal. There have been major improvements made in the facilities that cater to cybercrime reports yet victims continue to hold back because they are embarrassed.

The importance of international cooperation cannot be stressed enough for finding a solution and effectively responding to global cybercrime. Every nation cannot stand alone in this fight. Most computer-related crimes are started “off-shore” which complicates the problem as the territory does not lie within a nation. Agencies from all over the world should band together to draw up a plan to locate and follow the criminal eventually leading to an arrest and prosecution. 

Share This

Comments

Customer Testimonial: Edwin Kheng

Testimony from Edwin Kheng, Senior Associate Group Director of OrangeTee.com Pte Ltd

Taken from: https://www.facebook.com/edwin.kheng/posts/10205396965856576

Before Before After After

All within one day! Cracked my iPhone at 11am. Repairman came to my house to repair at 9pm. Voila. Done! I highly recommend them! You only pay via paypal after the repair, which comes with a one month warranty. Go to getfynd.com/phone if you ever drop your mobile phone and crack your screen. They also do other handphone/laptop repairs.

Share This

Comments

Customer Testimonial: Mr Louis Ng

Testimonial from Mr Louis Ng, Founder & Chief Executive of Animal Concerns Research and Education Society (Acres)

Taken from: https://www.facebook.com/LouisNgKokKwang/posts/1181994191827722:0

Dropped my phone today and the screen cracked! But along came my saviour Vicky (from www.getfynd.com) who repaired it!

Full SALUTE to Vicky who is a single mum and who learnt how to repair phones by watching youtube videos. Enjoyed talking to her and her cheefulness is infectious!

Im glad that the government is re-looking the policies with regard to single parents and seeing how we can improve on this front.

And thank you everyone for helping to suggest places I can repair my phone at!

Share This

Comments

Why Your Business Needs a Mobile App

Mobile phone applications are not just for big businesses and organizations like Walmart; more and more mid-level and small businesses are now investing in this trend, as it is more effective than having a mobile-friendly website. Every company is prepared to take this step to up their marketing game and now coffee shops as well as beauty salons have an application dedicated to their customers. Here are some of the benefits of getting a mobile app for your business:

A Constant Reminder

On average, Americans spend more than two hours every day on their mobile devices. Even though they may only use some of the apps during this time, they still have to unlock their phone and scroll through the screens or scan the page for their favorite app. While browsing, the user’s mind can unconsciously register your app if its logo is eye-catching. This way your business is always in the back of the user’s mind.

Direct Marketing

Your business’ application has many functions; it can provide general information, relay the prices, and allow users to search for a product, interact with others and get news alerts. With a mobile app, you can make sure your customers receive news of every important sale and promotion. This can be achieved by sending push notification through the app or creating a live news feed. Any important information and reminders that you would like to give your customer can be sent through this channel as well.

Loyalty Program

The mobile application can improve the loyalty program by making it digital. This is a step up from the old point-collection system as now the rewards are collected in the app and users can view their points or avail rewards any time they want. It is more convenient, as it removes the need to visit the company office to receive the reward. In addition, more customers will download the application and return to you because of the additional value being provided.

Brand Recognition

To increase general awareness regarding your business, a mobile app is the way to go. The app is like an advertisement for the business. It can be modified and reformed to make it exactly how you want it to be perceived: cool, fun, stylish or helpful. The most important thing is to create an app loaded with features that will be appreciated by your customers as well as making sure it is beautifully designed and promotes the brand. 
The app needs to be designed in such a way that it involves the users as often as possible. This will increase their inclination towards buying your product. This strategy is referred to as “effective frequency” which basically states that your brand needs to be seen or heard around 20 times before it will actually get noticed by a potential customer.

Customer Care

Every business, whether it is a flower shop or a bakery, needs a medium through which their customers can communicate with them. The mobile app for your business can incorporate a messaging service or help feature in it to improve customer care and aid communication. More people prefer to communicate through text rather than call, which is why an app will appeal to them as they can lodge their complaints or send their queries by messaging. 

Share This

Comments

Use Cloud Computing to Boost Learning

Cloud computing is essentially a practice through which data can be hosted, stored, managed and processed on a network of remote servers as opposed to on a local server or a personal laptop or computer. This practice allows applications to be operated by use of the Internet, allowing an individual to access any data he or she saves on that remote network of servers, or ‘the cloud,’ from anywhere as long as one has an internet connection.

Some common household names in regard to cloud services available to the general public include Google Drive, Dropbox, Box, Microsoft OneDrive, and Amazon’s Web Services. Each has various offerings with packages starting from a basic free service to a monthly paid service offering additional storage options. Some taut their accessibility with various products types, while others use highly encrypted security feathers to set themselves apart from the competition.

As more and more individuals and businesses are working remotely in today’s internet-enabled globalized economy, businesses and users have greatly benefited from the use of cloud computing to facilitate collaboration, productivity, and efficiency. With the advancement of tablets and smartphones, it will be even more beneficial. The Cloud has recently been leveraged to boost the overall learning process both from an individual’s perspective as well as that of companies looking to deliver learning and development tools over the cloud.

 Imagine that you are working in a group setting for a class project. There are different individuals that are keeping their own different notes. That no longer is the case. You can have a single document share over the cloud that all the members of your group can access and update simultaneously with their input. This level of collaboration over the cloud has allowed for huge gains in productivity, allowing for updates by users from anywhere in the world at anytime reducing the need for face-to-face meetings or other forms of set timelines to collaborate for updates.

Let’s take another specific example, one where the individual has to do research with large amounts of data. Historically students may only be able to conduct such forms of data analysis via college servers requiring a lot of computing power. However, of late they can utilize various cloud companies’ server space basically over then net run their computation analysis using the cloud’s server space and computing power to crunch that data and simply have the results of their experiment or thesis delivered to a professor by simply providing a web link as opposed to a thick stack of papers to review. 

What about a layman? Someone who is not in school collaborating on a book report or doing any extensive data mining research? One can be reading something and see something very useful worth make a note of. What would he or she use? A notepad? Maybe save it on one’s desktop? What if it’s the office desktop and that person wants to refer back to it when back home, or vice versa? What if it’s something he or she read on a smartphone but wanted to share it with someone else? An individual can easily clip that information and paste into a document saved on the cloud and give sharing rights to others to view it. There are specific cloud applications built to do just that.

As time goes on, the internet has become much cheaper and accessible for individuals with better speeds. Similarly, tools on which to use the internet have become a lot more ubiquitous, e.g. smartphones and tablets. This has ushered a new wave of accessing any type of information to boost learning at anytime from anywhere.

Share This

Comments

The Pros and Cons of Wireless Networks

Whether you own a small business or a big one, you need to be able to access your work files and records conveniently. In order to assess whether wireless networks are the right choice for your business, consider the following pros and cons:

Pros

Wi-Fi is easy to install- you can even do it yourself. However, to ensure that there is proper wireless coverage in your area as well as tight security settings, it is recommended that you have it installed from a professional. Wi-Fi is actually the preferred option over Ethernet by businesses and individuals alike.

The cost for purchasing the equipment for wireless networks is low, as there is a large variety to choose from as well as their easy availability. Depending on the usage in your workplace, especially if it is to be used by more than a few people, it is recommended to opt for commercial routers, which are slightly more expensive but worth the investment. You should also have signal amplifiers installed for better speed.

The biggest advantage of a wireless network is that you can access your files anywhere and are not bound by place and device. You can access the data through your phone, tablet or laptop from anywhere at all.

Cons

The hard truth is that Ethernet beats wireless every time! There are no ifs, ands, or buts about it. The best that can happen is the margin by which Ethernet beats wireless. Although speed levels via Ethernet will depend on the quality of the Ethernet cable but a Cat-6 cable is capable of delivering speeds of up to 10 GB/s. For Wi-Fi on the other hand, this has improved by leaps and bounds over the last few years; the speed you receive may not depend so much on your internet connection but your Wi-Fi router. We have gone from the 50-something MB/s speeds of the 802.11g standard of Wi-Fi to the speeds of almost 1 GB/s via the 802.11ac standard. The bottleneck of course, is not the Wi-Fi standard but the routers used to deliver the Wi-Fi, which are capped at about 150-300 MB/s, unless you use the most up to date 802.11ac compatible devices available on the market.

There is also the issue of latency between Wi-Fi and a wired connection, which basically is point the points between which the internet signal has to bounce, also known as the number of ‘pings,’ between the router to your device. Wi-Fi has higher latency compared to Ethernet, thus Ethernet will be faster even if they both have equivalent data transfer infrastructure as a result of latency.

Another drawback is wireless inference which Ethernet is not subject to but you Wi-Fi connection will be due to the many issues such as other devices used in your Wi-Fi network, other individuals using the Wi-Fi spectrum in your neighborhood, etc.

Wireless networks have become very popular, especially for their mobility. This is why you may find several other networks in your place of business or work to be well in range. Wireless setup is considered a basic operating need due to its continuous rise with among businesses and homes. Furthermore, newer technologies are being developed increasing the overall bandwidth which serve Wi-Fi at speeds demanded by consumers and required for businesses.

Share This

Comments

Recovering Files From A Hard Disk

Hard drive of a computer is considered the brain of the machine. It stores all files and information processed on your PC so that they may be accessed later if needed. Recovering files from a hard disk that is not functioning properly can sometimes be tricky and time consuming, but all effort does no go in vain as it is possible to recover data in most cases.

Often times there is simply a boot failure of the hard drive. In such cases, one can take the hard drive and use it as a secondary drive for another PC. This can be done through a USB universal drive adapter. On a Mac, this process is simpler and can be done in a different way. For Mac computers, a working one and a non-working can be connected using a Firewire cable. The next step is to “target boot” the non-working Mac machine by holding the T button. By doing this, the failed hard drive files will appear on the working Mac. However, this is only the case where hard drive is not corrupted.

Two reasons why drives usually crash is because of logical and mechanical failure. Logical failure happens when the hard drive is physically sound, but accidental formatting or corrupt files prevent it from seeking its own data. In this case, the files do exist on the drive and are recoverable.

In mechanical failure, there is some sort of physical damage to the hard drive and it makes sounds. In such cases, the data can be recovered but only with the help of experts who charge a lot of money. Data recovery charges vary from around $150 to $2500, depending on the severity of the case.

When a file is deleted from your desktop and cannot be found in the recycle bin, it can still be recovered using software. Recuva, restoration, disk drill, undeleted plus, free undelete and photorec are some software that can help one in recovering important data. These data/files can only be restored if they are not overwritten. Several programs have been created by companies to recover lost data.

Sometimes the hard drive head gets stuck. If it is being recognized as a USB device but needs initiating and starting, it is a sign the head is stuck and this matter can be resolved by giving it a hard nudge near the cable corrector. However, this method is not recommended always and can result in data loss instead of recovery.

EaseUS Data recovery wizard is a method that can help recover files from a corrupted hard disk. The first step is to launch the wizard and select the files that need to be recovered. Next, scan the hard disk to find all the targeted files. Once all the files are visible, the “recover” button can be pressed to bring the files back. The files can then be backed up onto another disk for future reference.

There are many data recovery companies that can assist in recovering deleted data and files from your computers. However, they are very expensive and charge a lot. The best method is to try to recover files on your own before calling in the experts. 

Share This

Comments

Cordova Android App with Meteor

Our technical co-founder, Albert Tirtohadi, shared on Meteor Meetup Singapore group on how to create an Android cordova based mobile app and package it into a production APK.

The source code is available at Git Hub: https://github.com/tirtohadi/demomobile

The slide deck can be downloaded here

Here is a simple run through:

If you have started the Getting started with Meteor, you will probably are familiar with the following steps. Create a new meteor project and make it into a meteor app.

It will create the basic app meteor app with a button and a counter that will increment whenever you click the button. You will be able to run it on an android emulator on your development machine

Let's make things a little bit more interesting by adding a button that will access the camera and are able to take a photo and display it to the screen. The code for the camera feature is shamelessly borrowed from this tutorial

First of all, we need to add the mdg:camera package to our project, and then create a template that will activate HTML5 camera function. This is done through calling MeteorCamera.getPicture method from the package. After taking a picture, we will store the image into a session variable, and reactively display the session variable through a template helper.

Next, we want to be able to generate a APK that can be installed into a real android device. It will be a lot more fun to take photos using a real device instead of in an emulator. A lot of the documentation out there for generating APK is using the Android Studio for native app. As a meteor developer, I personally prefer not to install Android Studio just to create an APK. Another option is to build the APK using command line tools.

There are a few steps that you need to do. First of all you need to generate a keystore file to store your private key. You only need to do it once. Afterwards you build your meteor app and an unaligned apk will be generated. You will need to sign the apk with your private key and verify it. Last step is to zipalign the apk so that it is memory efficient. Then your APK can be installed into an android device. A more detailed documentation is taken from here, just go to the bottom section, which says Signing Your App Manually.

That's it you are done! A point to note is that you can specify your app information, icons, splash screens and preferences in a file called mobile-config.js, you can place it at the root folder of your project.


Share This

Comments

Slow Smartphone? It May be Due to Whatsapp

You have a slow and laggy iPhone or Android? It can be very irritating. One common reason is due to Whatsapp. Well, it is not the Whatsapp app itself, but rather the photos and videos that is accumulating and eating up your phone storage. We are constantly sending pictures and videos among friends and family members, especially during festive seasons and special occasions. Your phone will be buzzing with incoming pictures and videos. These pictures and videos are automatically downloaded to your phone and eating up space. Before long, your device will run out of space and starts to lag.

One long-term solution to stop this to disallow Whatsapp from automatically download images and videos sent to you. You can control which image and videos you would like to download.

Here are the steps for iPhone:

  1. Open Whatsapp
  2. Tap on Settings
  3. Tap on Chat Settings
  4. Tap on Media Auto Download
  5. You will see option of Images, Audio & Video
  6. Set all three to Never (Means that Whatsapp will never auto download them)
Taken from igeeksblog.com Taken from igeeksblog.com

While on Android the steps are just slightly different

  1. Open Whatsapp
  2. Open Settings
  3. Open Chat Settings
  4. Select Media auto-download
  5. You will be presented with 3 option, when on mobile data, while on Wifi and while roaming
  6. Tap on each one of them and deselct Images, Video and Audio check boxes
Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk Taken from pcadvisor.co.uk

You can choose, which media you want to download as you receive them, and you will be able to save more space on your phone.

Share This

Comments

Happy Birthday Singapore

Happy Birthday Singapore! We LOVE you!

Share This

Comments

Benefits of a Hosted Desktop

Cloud desktop or an online desktop, as some would like to call it, takes all the business apps that are essential for operating a business and moves them into hosted apps. Hosted apps are found in data centers online. Thus, all business apps can now be accessed online from anywhere in the world. Hosted desktops make it possible for a business to access its company data over the internet through a safe and secure connection to a cloud desktop.

Hosted desktops have greatly revolutionized the way businesses operate as now all companies need to do is provide laptops , tablets and an internet connection to the entire team. The need for buying servers and installing software has been eliminated by this new technology. With more and more companies adopting this method, businesses cannot ignore the up rise of cloud computing anymore. There are many reasons why a hosted desktop is beneficial for a business:

  • Mobility:  The prime benefit of a hosted desktop is that companies and businesses can now log onto the internet and access all their business files from any location around the world. This data is not device specific and any device can be used to access this information. This is also beneficial for people who travel a lot and need to access important company information. Now this can be done in a very secure way.
  • Reduced Expenditure: With more and more companies trying to look for savings and spending less on needless expenditures, a hosted desktop provides them with the benefit of paying only for what they use. With low monthly rates, businesses now do not need to spend on physical servers. This results in a better cash flow.
  • Scalability: With the aid of hosted desktops, organizations gain more flexibility in terms of usage and storing. Now companies can add or remove employees, applications and storage facilities to improve their businesses and grow and expand. In addition, since companies are only paying for what they use, the flexibility increases.
  • Cloud computing has helped increase productivity all over the world by 20 percent. Employees now have the ease and flexibility to gain access to information anywhere in the world. The productivity level increases when employees feel trusted with important company data and with managing their own time.
  • Financial Savings:  Business can now cut down on their IT costs and save 30 to 40 percent of their budget. Energy bills are greatly reduced with the advent of a hosted desktop and now there is no need for expenditure on capital equipment costs. Business can also save on expenditures, as there is no need to buy expensive software for data storage.
  • Greater Security:  With cloud computing, data is secure as it is backed up daily and stored over data centers in UK where backup power generators, fire alarm systems and 24-hour security protect the data more than an in house system would.
  • Green Technology:  Businesses can save energy and reduce their company’s carbon footprint.

A hosted desktop thus provides major benefits to business and is becoming a need in today’s world. Employees benefit from greater access to data and greater sharing and collaboration with anyone globally. Businesses save up on expenditures and benefit from increased employee satisfaction and the convenience of operating business online, from any location.

Share This

Comments

New Zero-Day Exploit Can Completely Brick Your Mac

This article first appear in TechCrunch

Image courtesy of TechCrunch Image courtesy of TechCrunch

t’s Black Hat season, meaning that we are getting a new batch of zero-day exploits showing how insecure our gadgets are. Xeno Kovah and Trammell Hudson found a serious zero-day vulnerability in OS X letting malware creators completely brick your Mac without any way to reset it to its factory status. Apple told The Guardian that it is working on a fix for both Yosemite and El Capitan.

This zero-day exploit dubbed Thunderstrike 2 targets your Mac’s firmware thanks to an attached Thunderbolt accessory, such as an Ethernet adaptor or an external hard drive. After receiving the code via a phishing email or a malicious web site, malware code could look for connected Thunderbolt accessories and flash their option ROMs.

If you reboot your Mac with this infected Thunderbolt accessory plugged in, the EFI will execute the option ROM before booting OS X. As this option ROM has been infected, it will execute malicious code infecting the EFI itself. For example, it could simply make your Mac’s firmware refuse to boot OS X, turning your Mac into a useless machine. And if your firmware is compromised, there is no way to boot OS X, update the firmware and remove the malicious code.

The best part of this zero-day vulnerability is that your Thunderbolt accessory remains infected. If you plug your Ethernet adaptor into a new Mac, this Mac will get infected as well when it reboots. It’s not as harmful as malware that spreads through the Internet, but it could make some serious damage in an office environment for example.

Stefan Esser found another exploit last month dubbed DYLD. This time it lets malicious developers gain root privilege. It could be used to format your hard drive, but also for more lucrative exploits.

Malwarebytes already spotted an adware creator who uses this zero-day vulnerability to get root permission and then execute a script to install a bunch of applications — the VSearch adware, the Genieo adware and the MacKeeper junkware. It also makes the Mac App Store unusable at it will endlessly prompt you to install Download Shuttle.

Apple already fixed DYLD in El Capitan’s beta but not in the current Yosemite version. It has also added applications using these exploits to its malware blacklist, but it’s just a temporary cat-and-mouse fix. The company will issue security patches for both OS X Yosemite and OS X El Capitan beta. In the mean time, be careful when you download something and unplug all your Thunderbolt devices before rebooting your Mac — just in case.

Share This

Comments