#Android Mobile App
Explore tagged Tumblr posts
joselyonn · 11 months ago
Text
Key Factors to Consider When Hiring an Android Mobile App Development Agency
Tumblr media
In today's digital world, having a mobile app for your business is no longer just a luxury but a necessity. With the increasing demand for Android apps, choosing the right app development agency is crucial for the success of your project. Here are some key factors to consider when hiring an Android mobile app development Company:
1. Experience and Expertise
Before hiring an Android app development agency, it's essential to check their experience and expertise in developing Android apps. Look for agencies that have a proven track record of successfully delivering high-quality Android apps.
2. Portfolio and Case Studies
Review the agency's portfolio and case studies to get an idea of the types of Android apps they have developed in the past. This will help you assess their skills and expertise in developing apps similar to what you have in mind.
3. Client Reviews and Testimonials
Client reviews and testimonials can provide valuable insights into the agency's reputation and the quality of their work. Look for agencies with positive reviews and testimonials from satisfied clients.
4. Technical Proficiency
Ensure that the agency has a team of skilled and experienced Android app developers who are proficient in the latest technologies and tools used for Android app development.
5. Communication and Support
Effective communication is crucial for the success of any project. Choose an agency that maintains transparent communication throughout the development process and provides timely support and updates.
6. Cost and Budget
While cost should not be the only factor, it is important to consider your budget when hiring an Android app development agency. Look for agencies that offer competitive pricing without compromising on quality.
7. Post-Launch Support
After the app is launched, you will need ongoing support and maintenance. Ensure that the agency offers post-launch support to address any issues or updates that may arise.
8. Timeline and Delivery
Discuss the timeline for your project with the agency and ensure that they can deliver the app within the specified timeframe. Delays in delivery can impact your business plans and budget.
9. Scalability and Future Updates
Consider the scalability of the app and whether the agency can accommodate future updates and enhancements as your business grows.
10. Legal and Security Compliance
Ensure that the agency follows all legal and security compliance standards for Android app development to protect your app and user data.
In conclusion, hiring the right Android mobile app development agency is crucial for the success of your app. By considering these key factors, you can choose an agency that meets your requirements and delivers a high-quality Android app that meets your business goals.
0 notes
elicitdigital · 1 year ago
Text
https://www.elicit.digital/android-app-development
Android App Development Company in India
As a renowned Android app development company in India, we provide robust Android app development services for startups and small size of businesses. We bring your vision and deliver innovative designs and seamless functionality in mobile apps. To know more details, visit www.elicit.digital
0 notes
valshaped · 2 years ago
Text
HEY THEY MIGHT HAVE FIXED DOUBLE TAP TO ZOOM
1 note · View note
mostlysignssomeportents · 1 year ago
Text
Subprime gadgets
Tumblr media
I'm on tour with my new, nationally bestselling novel The Bezzle! Catch me THIS SUNDAY in ANAHEIM at WONDERCON: YA Fantasy, Room 207, 10 a.m.; Signing, 11 a.m.; Teaching Writing, 2 p.m., Room 213CD.
Tumblr media
The promise of feudal security: "Surrender control over your digital life so that we, the wise, giant corporation, can ensure that you aren't tricked into catastrophic blunders that expose you to harm":
https://locusmag.com/2021/01/cory-doctorow-neofeudalism-and-the-digital-manor/
The tech giant is a feudal warlord whose platform is a fortress; move into the fortress and the warlord will defend you against the bandits roaming the lawless land beyond its walls.
That's the promise, here's the failure: What happens when the warlord decides to attack you? If a tech giant decides to do something that harms you, the fortress becomes a prison and the thick walls keep you in.
Apple does this all the time: "click this box and we will use our control over our platform to stop Facebook from spying on you" (Ios as fortress). "No matter what box you click, we will spy on you and because we control which apps you can install, we can stop you from blocking our spying" (Ios as prison):
https://pluralistic.net/2022/11/14/luxury-surveillance/#liar-liar
But it's not just Apple – any corporation that arrogates to itself the right to override your own choices about your technology will eventually yield to temptation, using that veto to help itself at your expense:
https://pluralistic.net/2023/07/28/microincentives-and-enshittification/
Once the corporation puts the gun on the mantelpiece in Act One, they're begging their KPI-obsessed managers to take it down and shoot you in the head with it in anticipation of of their annual Act Three performance review:
https://pluralistic.net/2023/12/08/playstationed/#tyler-james-hill
One particularly pernicious form of control is "trusted computing" and its handmaiden, "remote attestation." Broadly, this is when a device is designed to gather information about how it is configured and to send verifiable testaments about that configuration to third parties, even if you want to lie to those people:
https://www.eff.org/deeplinks/2023/08/your-computer-should-say-what-you-tell-it-say-1
New HP printers are designed to continuously monitor how you use them – and data-mine the documents you print for marketing data. You have to hand over a credit-card in order to use them, and HP reserves the right to fine you if your printer is unreachable, which would frustrate their ability to spy on you and charge you rent:
https://arstechnica.com/gadgets/2024/02/hp-wants-you-to-pay-up-to-36-month-to-rent-a-printer-that-it-monitors/
Under normal circumstances, this technological attack would prompt a defense, like an aftermarket mod that prevents your printer's computer from monitoring you. This is "adversarial interoperability," a once-common technological move:
https://www.eff.org/deeplinks/2019/10/adversarial-interoperability
An adversarial interoperator seeking to protect HP printer users from HP could gin up fake telemetry to send to HP, so they wouldn't be able to tell that you'd seized the means of computation, triggering fines charged to your credit card.
Enter remote attestation: if HP can create a sealed "trusted platform module" or a (less reliable) "secure enclave" that gathers and cryptographically signs information about which software your printer is running, HP can detect when you have modified it. They can force your printer to rat you out – to spill your secrets to your enemy.
Remote attestation is already a reliable feature of mobile platforms, allowing agencies and corporations whose services you use to make sure that you're perfectly defenseless – not blocking ads or tracking, or doing anything else that shifts power from them to you – before they agree to communicate with your device.
What's more, these "trusted computing" systems aren't just technological impediments to your digital wellbeing – they also carry the force of law. Under Section 1201 of the Digital Millennium Copyright Act, these snitch-chips are "an effective means of access control" which means that anyone who helps you bypass them faces a $500,000 fine and a five-year prison sentence for a first offense.
Feudal security builds fortresses out of trusted computing and remote attestation and promises to use them to defend you from marauders. Remote attestation lets them determine whether your device has been compromised by someone seeking to harm you – it gives them a reliable testament about your device's configuration even if your device has been poisoned by bandits:
https://pluralistic.net/2020/12/05/trusting-trust/#thompsons-devil
The fact that you can't override your computer's remote attestations means that you can't be tricked into doing so. That's a part of your computer that belongs to the manufacturer, not you, and it only takes orders from its owner. So long as the benevolent dictator remains benevolent, this is a protective against your own lapses, follies and missteps. But if the corporate warlord turns bandit, this makes you powerless to stop them from devouring you whole.
With that out of the way, let's talk about debt.
Debt is a normal feature of any economy, but today's debt plays a different role from the normal debt that characterized life before wages stagnated and inequality skyrocketed. 40 years ago, neoliberalism – with its assaults on unions and regulations – kicked off a multigenerational process of taking wealth away from working people to make the rich richer.
Have you ever watched a genius pickpocket like Apollo Robbins work? When Robins lifts your wristwatch, he curls his fingers around your wrist, expertly adding pressure to simulate the effect of a watchband, even as he takes away your watch. Then, he gradually releases his grip, so slowly that you don't even notice:
https://www.reddit.com/r/nextfuckinglevel/comments/ppqjya/apollo_robbins_a_master_pickpocket_effortlessly/
For the wealthy to successfully impoverish the rest of us, they had to provide something that made us feel like we were still doing OK, even as they stole our wages, our savings, and our futures. So, even as they shipped our jobs overseas in search of weak environmental laws and weaker labor protection, they shared some of the savings with us, letting us buy more with less. But if your wages keep stagnating, it doesn't matter how cheap a big-screen TV gets, because you're tapped out.
So in tandem with cheap goods from overseas sweatshops, we got easy credit: access to debt. As wages fell, debt rose up to fill the gap. For a while, it's felt OK. Your wages might be falling off, the cost of health care and university might be skyrocketing, but everything was getting cheaper, it was so easy to borrow, and your principal asset – your family home – was going up in value, too.
This period was a "bezzle," John Kenneth Galbraith's name for "The magic interval when a confidence trickster knows he has the money he has appropriated but the victim does not yet understand that he has lost it." It's the moment after Apollo Robbins has your watch but before you notice it's gone. In that moment, both you and Robbins feel like you have a watch – the world's supply of watch-derived happiness actually goes up for a moment.
There's a natural limit to debt-fueled consumption: as Michael Hudson says, "debts that can't be paid, won't be paid." Once the debtor owes more than they can pay back – or even service – creditors become less willing to advance credit to them. Worse, they start to demand the right to liquidate the debtor's assets. That can trigger some pretty intense political instability, especially when the only substantial asset most debtors own is the roof over their heads:
https://pluralistic.net/2022/11/06/the-end-of-the-road-to-serfdom/
"Debts that can't be paid, won't be paid," but that doesn't stop creditors from trying to get blood from our stones. As more of us became bankrupt, the bankruptcy system was gutted, turned into a punitive measure designed to terrorize people into continuing to pay down their debts long past the point where they can reasonably do so:
https://pluralistic.net/2022/10/09/bankruptcy-protects-fake-people-brutalizes-real-ones/
Enter "subprime" – loans advanced to people who stand no meaningful chance of every paying them back. We all remember the subprime housing bubble, in which complex and deceptive mortgages were extended to borrowers on the promise that they could either flip or remortgage their house before the subprime mortgages detonated when their "teaser rates" expired and the price of staying in your home doubled or tripled.
Subprime housing loans were extended on the belief that people would meekly render themselves homeless once the music stopped, forfeiting all the money they'd plowed into their homes because the contract said they had to. For a brief minute there, it looked like there would be a rebellion against mass foreclosure, but then Obama and Timothy Geithner decreed that millions of Americans would have to lose their homes to "foam the runways" for the banks:
https://wallstreetonparade.com/2012/08/how-treasury-secretary-geithner-foamed-the-runways-with-childrens-shattered-lives/
That's one way to run a subprime shop: offer predatory loans to people who can't afford them and then confiscate their assets when they – inevitably – fail to pay their debts off.
But there's another form of subprime, familiar to loan sharks through the ages: lend money at punitive interest rates, such that the borrower can never repay the debt, and then terrorize the borrower into making payments for as long as possible. Do this right and the borrower will pay you several times the value of the loan, and still owe you a bundle. If the borrower ever earns anything, you'll have a claim on it. Think of Americans who borrowed $79,000 to go to university, paid back $190,000 and still owe $236,000:
https://pluralistic.net/2020/12/04/kawaski-trawick/#strike-debt
This kind of loan-sharking is profitable, but labor-intensive. It requires that the debtor make payments they fundamentally can't afford. The usurer needs to get their straw right down into the very bottom of the borrower's milkshake and suck up every drop. You need to convince the debtor to sell their wedding ring, then dip into their kid's college fund, then steal their father's coin collection, and, then break into cars to steal the stereos. It takes a lot of person-to-person work to keep your sucker sufficiently motivated to do all that.
This is where digital meets subprime. There's $1T worth of subprime car-loans in America. These are pure predation: the lender sells a beater to a mark, offering a low down-payment loan with a low initial interest rate. The borrower makes payments at that rate for a couple of months, but then the rate blows up to more than they can afford.
Trusted computing makes this marginal racket into a serious industry. First, there's the ability of the car to narc you out to the repo man by reporting on its location. Tesla does one better: if you get behind in your payments, your Tesla immobilizes itself and phones home, waits for the repo man to come to the parking lot, then it backs itself out of the spot while honking its horn and flashing its lights:
https://tiremeetsroad.com/2021/03/18/tesla-allegedly-remotely-unlocks-model-3-owners-car-uses-smart-summon-to-help-repo-agent/
That immobilization trick shows how a canny subprime car-lender can combine the two kinds of subprime: they can secure the loan against an asset (the car), but also coerce borrowers into prioritizing repayment over other necessities of life. After your car immobilizes itself, you just might decide to call the dealership and put down your credit card, even if that means not being able to afford groceries or child support or rent.
One thing we can say about digital tools: they're flexible. Any sadistic motivational technique a lender can dream up, a computerized device can execute. The subprime car market relies on a spectrum of coercive tactics: cars that immobilize themselves, sure, but how about cars that turn on their speakers to max and blare a continuous recording telling you that you're a deadbeat and demanding payment?
https://archive.nytimes.com/dealbook.nytimes.com/2014/09/24/miss-a-payment-good-luck-moving-that-car/
The more a subprime lender can rely on a gadget to torment you on their behalf, the more loans they can issue. Here, at last, is a form of automation-driven mass unemployment: normally, an economy that has been fully captured by wealthy oligarchs needs squadrons of cruel arm-breakers to convince the plebs to prioritize debt service over survival. The infinitely flexible, tireless digital arm-breakers enabled by trusted computing have deprived all of those skilled torturers of their rightful employment:
https://pluralistic.net/2021/04/02/innovation-unlocks-markets/#digital-arm-breakers
The world leader in trusted computing isn't cars, though – it's phones. Long before anyone figured out how to make a car take orders from its manufacturer over the objections of its driver, Apple and Google were inventing "curating computing" whose app stores determined which software you could run and how you could run it.
Back in 2021, Indian subprime lenders hit on the strategy of securing their loans by loading borrowers' phones up with digital arm-breaking software:
https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/
The software would gather statistics on your app usage. When you missed a payment, the phone would block you from accessing your most frequently used app. If that didn't motivate you to pay, you'd lose your second-most favorite app, then your third, fourth, etc.
This kind of digital arm-breaking is only possible if your phone is designed to prioritize remote instructions – from the manufacturer and its app makers – over your own. It also only works if the digital arm-breaking company can confirm that you haven't jailbroken your phone, which might allow you to send fake data back saying that your apps have been disabled, while you continue to use those apps. In other words, this kind of digital sadism only works if you've got trusted computing and remote attestation.
Enter "Device Lock Controller," an app that comes pre-installed on some Google Pixel phones. To quote from the app's description: "Device Lock Controller enables device management for credit providers. Your provider can remotely restrict access to your device if you don't make payments":
https://lemmy.world/post/13359866
Google's pitch to Android users is that their "walled garden" is a fortress that keeps people who want to do bad things to you from reaching you. But they're pre-installing software that turns the fortress into a prison that you can't escape if they decide to let someone come after you.
There's a certain kind of economist who looks at these forms of automated, fine-grained punishments and sees nothing but a tool for producing an "efficient market" in debt. For them, the ability to automate arm-breaking results in loans being offered to good, hardworking people who would otherwise be deprived of credit, because lenders will judge that these borrowers can be "incentivized" into continuing payments even to the point of total destitution.
This is classic efficient market hypothesis brain worms, the kind of cognitive dead-end that you arrive at when you conceive of people in purely economic terms, without considering the power relationships between them. It's a dead end you navigate to if you only think about things as they are today – vast numbers of indebted people who command fewer assets and lower wages than at any time since WWII – and treat this as a "natural" state: "how can these poors expect to be offered more debt unless they agree to have their all-important pocket computers booby-trapped?"
Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/03/29/boobytrap/#device-lock-controller
Tumblr media
Image: Oatsy (modified) https://www.flickr.com/photos/oatsy40/21647688003
CC BY 2.0 https://creativecommons.org/licenses/by/2.0/
230 notes · View notes
laurelnose · 4 months ago
Text
Tumblr media
oh yeah also here’s a kujen I was noodling at while I was trying to figure out how the fuck drawing on a phone works. ref here. zhang linghe isn’t one of my usual face models but the values in this shoot were soooo good
32 notes · View notes
friendlyfishes · 3 months ago
Text
Tumblr media Tumblr media Tumblr media
tamagotchi monster mobile app (2006) ! the devilgotchi (デビルっちのたまごっち, 1998) was a limited release in japan, but a digital english version was created in the form of a mobile game on android devices
14 notes · View notes
trickybonmot · 3 months ago
Text
TFW when you reported a Tumblr bug and now it's fixed 🤌
11 notes · View notes
weedgay · 1 year ago
Text
[infomercial voice] do you like OMORI? do you like trauma narratives and horror elements? do you like FREE SHIT?
Tumblr media
play END ROLL today !!!!
42 notes · View notes
superbellsubways · 2 months ago
Text
going to bed but it was really cool finding out my phone carrier randomly forced my phone to have malware on it thats impossible to get rid of and is probably the reason for why it crashes sometimes. Awesome
15 notes · View notes
tsreviews · 1 year ago
Video
youtube
(via Unveiling Appz Review: Create Unlimited Apps)
1 note · View note
attibar · 13 days ago
Text
Progress update: stuff
I've been pretty quiet lately because I've been slowly working on an android app of my own outside of work. Still a long way to go before it's finished, but baby steps.
It's an app where you can make custom beading patterns easily with mobile UI in mind. The only other one I've seen on the android store was this really old one with only two stars because they hide 90% of the features behind a paywall while calling it a free app.
While I like using the Beadographer website it has its limits and is designed for computers in mind rather than touch screens. Trying to use it on a phone can be a bit annoying.
Right now I have a basic grid set up for square stitch and loom stitch with the ability to select colors, color/clear beads on tap, add rows/columns, and pan/zoom in using two finger touch. I plan on adding more features including the following:
Drag your finger over several beads to color them at once rather than have to tap them individually.
Templates for several styles including peyote, brick, herringbone, right angle weave, different circular peyote stitches, and others.
Auto save patterns in progress.
Can store multiple patterns.
Create and save custom colors to use between projects.
Tools like undo/redo, rotate the canvas, select and drag, color picker, image import, and mirror.
Export patterns as png files.
Available different kinds of beads (toho, miyuki, etc)
I know this isn't most peoples' cup of tea but I'm really excited to try and complete this, and maybe even get it on the app store :D
My biggest worry is how I'm going to handle the circular peyote patterns since they don't conform to grids as easily as other styles would due to increases. The rest seems easy enough albeit long and tedious to develop and test for everything.
6 notes · View notes
captain-acab · 2 years ago
Note
I saw the post about using blokada to block tumblr live on Android, and then you mentioned blocking domains. How do I block domains?
When you install Blokada 5 and launch it, there should be four tabs at the bottom of the screen. The 2nd-left tab has a symbol of three vertical bars, and when you tap on it, says Activity. From here you can view all the domains your phone is trying to connect to. Any domain that you see in green, you can tap on to add it to the Blocked list.
If you launch Tumblr then go back to the Blokada Activity tab, you should see all the domains it's trying to connect to, including ones like "auth.gateway.tumblr-live.com" (yes, your phone connects to this whenever you launch Tumblr, even if you never open the Tumblr Live page). Tap those suckers and block them! (and if they scroll out of view too quickly, use the search 🔍 at the top of the screen to filter for "tumblr" and you should see them all again.)
98 notes · View notes
nightmare-from-heaven · 18 days ago
Text
how do I turn off the number bubbles that invaded my mobile app tumblr feed/home icon THEY ARE MAKING ME CRAZY BC I CANT EVER FINISH THE TASK OF CHECKING MY FEED
and also they stay there until I scroll all the way back up to the top and refresh, which completely harshes my scrolling mellow. which is an unacceptable zone to harsh. i've been dramatically long-suffering about the other recent changes but this one will actually drive me from the android mobile app.
please send help.
6 notes · View notes
neververy4 · 7 months ago
Text
I play a video game called Vintage Story, been playing it since 2020. Absolutly love it. It's a 3D open world voxel game, like Minecraft, but that's about where the similitaries end. Anyways, on my current world, I have a 3x3x3 bunker room with some clay in it, I call it the Clay Hole. Whenever the storm that spawns monsters pass through, I bunker down in the clay hole and work on my pottery whilst the storm rolls on.
I'm telling you this to give context for this conversation I had with a friend who recently got the game
Tumblr media
My friend's message, "I love (clay) hole", is the last thing my phone saw before it bricked itself. My phone's screen went VERY bright when that message went through (I always keep my screen on the dimmest it can go), before powering down, and entering a boot loop.
Connecting it to iTunes, it failed both a restore, and a factory reset, going through the whole process, finishing, and still having a boot loop. Error code 4013, which is everything from Face ID to the motherboard to the USB cable/port.
): IDK what to do. I don't want to buy a new phone right now. I'm trying to save for a new laptop. I've had this iPhone 11 for 4 years now, and it's been such a great phone. Maybe buy a used 11? Assuming I can find a trustworthy reseller . .. Going with a same model phone will allow my old phone to be kept as parts for the new one, so there is that. I could also just get the latest, a basic 16 model, and use that phone for another 4 years. IDK, all I know is that I'm upset over losing 4 years of photos, from having to do the factory reset.
Anyways, take some humor out of my misfortune. The Clay Hole was too powerful and killed my phone.
14 notes · View notes
fashion-foxy · 6 months ago
Text
Yk at this point it's probably easier to just rebuild eah from scratch (doesn't mean I'm going to it though)
12 notes · View notes
poisonousdeath · 11 months ago
Text
How to Install games that are not on the Play Store / How to Play JJK (Jujutsu Kaisen) Phantom Parade game on Android using a VPN and how to translate the game from Japanese to English / How to Play JUMP Assemble
youtube
14 notes · View notes