December 19, 2016
by Bernadette Magcawas
0 comments

Google’s New IoT Platform: Android Things

Google reported Android Things, its new comprehensive IoT stage for building smart devices on top of Android APIs and Google’s own administrations. Android Things is currently accessible as an engineer review. Basically, this is Android for IoT. It joins Google’s … Continue reading

October 26, 2016
by Bernadette Magcawas
0 comments

Video Calls for Android Exclusive from WhatsApp

WhatsApp’s new beta versions for Android now incorporate video calling. The report expressed that clients can open a contact in the application and tap the call catch – which exhibits a Video Call alternative if the beneficiary likewise has the … Continue reading

March 18, 2016
by Bernadette Magcawas
0 comments

Keeping Up With Apple – Newest Flavour of Android Announced by Google

Historically, Google delivers a taste of its latest Android software package in May possibly at its developer conference, then unfurls the complete thing at a hardware launch in the fall. This 12 months, it’s shaking that up. Android N, the … Continue reading

February 15, 2016
by Bernadette Magcawas
0 comments

Microsoft to Continue Developing Android and iOS Applications

Microsoft might convey SwiftKey’s console to its Windows networks as well. Microsoft is purchasing SwiftKey, the designer of a mainstream programming console for Android and iOS telephones—despite the fact that it as of now has its own particular programming console, … Continue reading

January 29, 2016
by Bernadette Magcawas
0 comments

Making Game Log-ins Easier by Google

Google has changed the way Android is operating system handles consents for game players so it turns into a considerable measure less demanding to sign players up for dealings. The organization (which is changing its formal name to Alphabet) said … Continue reading

December 23, 2015
by Bernadette Magcawas
0 comments

Security Check-up Tool for Android: Facebook

With regards to security of applications on your mobile phones, not all applications were made equivalent. A few applications may accompany truly tight security and presents insurance like two-variable verification, while others may essentially incline toward a more basic and … Continue reading