Programming & IT Tricks . Theme images by MichaelJay. Powered by Blogger.

Copyright

Facebook

Post Top Ad

Search This Blog

Post Top Ad

Responsive Ads Here

Archive

Post Top Ad

Contact


Editors Picks

Follow us

Post Top Ad

Fashion

Music

News

Sports

Food

Technology

Featured

Videos

Fashion

Technology

Fashion

Label

Translate

About

Translate

Sponsor

test

Weekly

Comments

Recent

Connect With us

Over 600,000+ Readers Get fresh content from FastBlog

About

Techno Disc Web solutions You've probably noticed

We Love What We Do.

About Us


Expertise

Web Designing, Digital Marketing,Web support,Graphics Design.

Our Serives

Awesome features, Responsive Design, Modern design, Mail ready, Fast support

Efficiency

In computer and information-technology (IT) practice, support has two distinct meanings. Support can mean functionality between or among products.

Contact

contact@hardikgandhi.in www.hardikgandhi.in

Do you like our work so far?
Let's talk about your project !

GET IN TOUCH

Portfolio


Main Blog
Our Recent Posts

Thursday, January 10, 2019

Huawei Y9 (2019) Launched in India with Affordable Camera and Features, Price Affordable to Your Pocket


Chinese smartphone maker Huawei has launched the Huawei Y9 (2019) smartphone in India. This phone has been launched at an event organized in Delhi. The price of this smartphone, priced at Rs 15,990 with a dual selfie camera. It has been launched in two color variants Midnight Black and Safer Blue.
This phone is being sold exclusively on Amazon. Apart from this, the phone buyer will get the Rokkersports Bluetooth headphone free of $ 2,990.
Huawei Y9 (2019) specification
Huawei Y9 (2019) features a 6.5 inch full view display. This phone is equipped with a 3D Wrinkle design. The phone uses the Kirin 710 processor which comes with 7.0 with AI power. Talking about the camera, it has a dual-rear camera setup, with primary sensor 12 megapixels and second to 2 megapixels. Apart from this, a dual camera is also provided in the front, in which there is a sensor of 2 megapikles. Apart from this, the dual cameras are also available in the front, in which one sensor is 16 megapixels and the other is 2 megapixels. It is said that both cameras are equipped with AI.
The phone has been launched with 3GB and 4GB RAM variants and has 64GB of inbuilt storage, which can be increased to 256 GB by memory card. Apart from this, it has a battery of 4000mAh for power.

In Huawei Y9 (2019) you will also find a fingerprint sensor equipped with 4.0 identification technology and it is claimed that this smartphone can be unlocked in 0.3 seconds. There is also fingerprint navigation in upgraded fingerprint technology. Which allows the user to manage all the notifications using one key.

Monday, October 15, 2018

Building your own Design Pattern


Hybrid MVC + MVVM


Ever so often, developers face the dilemma of choosing from multiple design patterns for their code. Yes, there are deadlines to adhere to, there are changing needs of the product, the code needs to be testable and what not! But as a developer, you always want to write code that’s scalable, modular and easy to debug for any issues, if not bug-free now — not an easy task by any means! You have to be very smart in locking down the foundation for your code. After all, it’s only on a strong foundation, that you can build a scalable structure.

What you’ll learn in this post:

  • What MVC, MVVM etc. are all about and some of their shortcomings
  • Why design patterns are an important part of development lifecycle
  • How you can alter some of the aspects of these patterns to come up with your own version, as per your use case
  • How we design high quality, stable features at Hike using our Hybrid design pattern

MVC

The standard MVC pattern has three major components:
Model — The Model is usually the data source of the system. It interacts with the controller to provide the current state of your database. Data can reside locally in your system, or fetched from the servers. In any case, the model provides you with the relevant information.
View — View is what you see on your screen. All the UI components together constitute the view. In standard MVC implementations, views are usually pretty dumb with no business logic to them. They get directions from the controller and populate themselves accordingly. Similarly, any actions that the user takes on the UI are passed on to the controller to handle.
Controller — This is where all the action happens! The Controller takes care of multiple things. Firstly, it instantiates both the Model and the View components. All business logic in response to user actions, asking the model to update itself, and listening to any changes in the model that might need refreshing the view happens in the controller!
A typical MVC interaction system

Few details of MVC:

  • The Model and the View only interact with the controller, and NEVER talk to each other directly. All communication happens via the Controller only.
  • As a result, the Controller usually becomes one massive class, handling multiple responsibilities.
  • All components are tightly coupled with each other. This makes reusability of these components difficult, replacing any of them later on, or making changes to them is a tough ask!
  • Writing tests and debugging intricate bugs in one massive controller class can be tricky.

MVVM

The following components form the main aspect of this pattern:
Model — The Model in MVVM works similar to MVC. It gives you the data you need, which can be present locally, or fetched from servers behind the scenes, just like in MVC.
View — Implemented as a View/View Controller subclass, the view here talks to the view model to gather all information, that is needed to display all UI components.
View Model — This is the major differentiating component from a MVC. The view model acts as the intermediate between the view and the model. Unlike MVC, the model is owned by View Model.
MVVM interaction system
Few details of MVVM:
  • The view here is a UIKit independent implementation. The view controller itself can be treated as the view component.
  • There’s complete isolation of the Model and the View, which makes them loosely coupled with one another.
  • The View Model invokes all changes to the model and listens to any changes that the Model makes behind the scenes.
  • The View and View Model interact via bindings, so any change in the Model notifies the View Model, which in turn updates the View.
  • This clearly helps break the massive controller of MVC, with the View and View Model now sharing responsibilities of updating UI and the coordination between components, respectively.

Discussion:

As we saw earlier, while MVC works for small contained components, it fails to meet the requirements of an evolving and growing product. Adding new code to an MVC system is difficult without breaking existing parts. Debugging issues in an MVC system can be time consuming, and sometimes can lead you clueless, as your controller is taking care of a million things at the same time.
While MVVM was great in taking care of some of those concerns, we thought there was still scope for some more modularity, some more scalability. We could do better! We could break these components into further subcomponents. The idea was to evolve the architecture in such a way that more and more components became reusable. It should be easier to replace one component without affecting the whole system.
So we went through these and a few more design patterns like VIPER, RIBs, evaluated their advantages/disadvantages, and compared them with our use case. We went through the common limiting factors encountered while scaling our systems. The final pattern we came up with was a hybrid version of the MVC and MVVM patterns.

Hybrid MVC and MVVM pattern

The following diagram shows the various components and their interaction within this pattern:
Let’s go over the functionalities of each of these:
  • Data Source — The Data Source is responsible for providing data to the entire system. This can be any generic class conforming to a protocol that is used by the Controller to ask for data. The data can be stored internally in any way. All that detail is internal to the implementation of Data Source. Conforming to a protocol ensures that we can replace the data source implementation without affecting any other component. All we need is for the new class to conform to the data source protocol, and we won’t have to change any other aspect. Given the Controller owns the Data Source, any changes in the underlying data are conveyed to the Controller that can then initiate appropriate action for it.
  • Controller — The controller is at the centre of it all though much of its responsibility is to coordinate other items to enable them to function together. Usually this is a View Controller subclass, which is initialised with a Data Source object. Suppose we have to implement a chat screen, which shows all messages and has ability to send messages. The main chat view controller will act as the Controller. The table view to show all messages would be a part of the chat view controller. The initialisation would look something like this:
Controller Initialisation
  • View — The independent UI components can be separated out in a separate View layer. The Controller instantiates and holds references to them.The View is passed as a View Model object that the View uses to populate itself. In case of our example, the cells of the table View can be initiated with this pattern, where we pass them a View model object to populate with:
View Initialisation
  • View Model — The View Model is instantiated by the Controller for the independent View components that need not be part of the Controller class. Identifying such View-View Model components can help keep your Controller light and code modular. The View Model is initialised with a Model object that contains all information needed by the view to populate itself. The other important aspect to it is that we don’t expose class names anywhere, we only expose id<some_protocol> type of objects. This makes it easier to replace these components without affecting any other components:
View Model Initialisation
  • Action Handler — The view reports all user actions taken on it back to the Controller. In order to keep the Controller independent of the business logic behind all such user actions, we place all this logic in a separate component called Action Handler. This component gets the information regarding the type of action (say single touch, long press etc.) from the Controller, and applies all business logic to handle that event:
Action Handler
It is important here to note that while the Action Handler has all the logic to execute in response to any user action, it doesn’t actually perform any UI operations itself. Any UI operation, be it adding/removing a subview, or pushing/presenting any other View Controller should only be done by the Controller. As we can see in the above snippet, the Action Handler returns a Response Model object. This object contains all information about the kind of UI task that needs to be performed:
Response Model
Based on the value of the action type, the Controller picks the appropriate UIView or UIViewController from the Response Model object and performs necessary operations on it. Thus, there is a clear separation of responsibility between the Controller and the Action Handler.

Conclusion:

This hybrid design pattern offers us multiple advantages over other patterns. When we applied it in app
  • Our Controller classes have become very light weight, with its only responsibility being that of connecting all other components together. This has improved the testability of this component
  • The Data Source kept the implementation of how data is stored abstracted, and this could be changed at any later point of time without affecting other components
  • The Views/ View Model become reusable as they were only identified by adhering to a protocol
  • Unit Testing becomes easier and could be done only for classes with a business logic in them.
  • Most if-else checks in the code were minimised by using factory pattern to link different components.
  • The readability of the code increased, helping other developers understand what’s going on in your features :)
Impact at Hike:
  • The architecture helped us improve the overall app stability. We started implementing it at one place at a time. We began with chat, and this helped us make chat more robust and easy to work upon. For instance, here’s how our app stability grew over time:
  • We were able to experiment internally with different versions of chat, as it was easy to just plug and play different components. This helped us make decisions faster.

Key takeaways:

  • The decision of choosing a design pattern will go a long way with you. Make sure you give enough thought to it
  • There are enough patterns out there, but you don’t have to necessarily choose from them. Feel free to come up with your own version based on your requirements

Thursday, October 11, 2018

Samsung Galaxy A9 (2018), the world's first smartphone with 4-inch rear camera launched


Samsung has launched the world's first-ever 4-rear camera smartphone Samsung Galaxy A9 (2018). The phone was launched at an event held in Malaysia's Kuala Lumpur on Thursday. The biggest feature of the Samsung Galaxy A9 (2018) is the launch of the Samsung Galaxy A9 (2018) 4 rear camera and has become the world's first smartphone with 4-rear camera. Let's tell you that the Galaxy A7 was launched with three rear cameras.
Samsung Galaxy A9 (2018) specification

This phone has the Android Orio 8.1 and 6.3-inch Full HD Plus Super Amoled display with dual SIM support. Apart from this, the phone will have Qualcomm Snapdragon 660 processor, up to 8 GB of RAM and 128 GB of storage.

Samsung Galaxy A9 is a 4-rear camera in 2019 with a 24-megapixel main lens, the second lens is a 10-megapixel telephoto with 2x optical zoom. The third lens is a 8-megapixel ultra wide angle lens and a fourth 5-megapixel lens. The four cameras are from the top down from the same line. The front has a 24-megapixel camera.

Samsung Galaxy A9 (2018) has a 3800 mAh battery that supports fast charging. There will be a fingerprint sensor in the phone's power button.
Price of Samsung Galaxy A9 (2018)

The price of Samsung Galaxy A9 (2018) is 599 euros, which is approximately Rs 51,300. However, there is still no explanation about how much Samsung Galaxy A9 (2018) will be worth in India. This phone will be available in Bubblegum Pink, Caver Black and Lemonade Blue Color Variants.

Thursday, September 13, 2018

iPhone XS v/s iPhone X: Is it worth an upgrade?


Apple iPhone XS v/s iPhone X: The differences
As the successor to last year's tenth-anniversary edition iPhone X, Apple has launched the iPhone XS.
The new iPhone retains the edge-to-edge design of its predecessor but comes with an improved display and under the hood upgrades.
And given the iPhone XS is priced at $999, the same as iPhone X, the question is if it is worth the upgrade.
Here's a specifications-wise comparison.
In context: Apple iPhone XS v/s iPhone X: The differences

13 Sep 2018iPhone XS v/s iPhone X: Is it worth an upgrade?

As the successor to last year's tenth-anniversary edition iPhone X, Apple has launched the iPhone XS.
The new iPhone retains the edge-to-edge design of its predecessor but comes with an improved display and under the hood upgrades.
And given the iPhone XS is priced at $999, the same as iPhone X, the question is if it is worth the upgrade.
Here's a specifications-wise comparison.


Design At a glance


In terms of design, there's nothing new on the iPhone XS. So, you still have an edge-to-edge display with a notch that houses the front camera and Face ID module.

On the back, there's a dual camera setup and glass panel that enables wireless charging.

However, iPhone XS is now IP68 rated (iPhone X is IP67 rated) and is covered in a tougher glass.
All about the screen
DisplayAll about the screen

The iPhone XS has same 5.8-inch OLED Super Retina display with 458ppi of pixel density and 2,436x1,125 resolution.

However, Apple says the new display now offers 60% greater dynamic range of colors than its predecessor.

Further, the iPhone XS display also gets support for HDR 10, Dolby Vision, 120Hz touch sensitive, and the less-talked-about 3D Touch which debuted with the iPhone 6S.




Camera

For the shutterbugs and selfie lovers

In terms of camera, like the iPhone X, its successor sports a 12MP (f/1.8) wide-angle camera with OIS, 1.4-micron pixels, paired with a 12MP (f/2.4) telephoto lens with OIS and 2x optical zoom.

However, Apple has offered a faster sensor, a new image processing chipset that offers Smart HDR.

Up front, iPhone XS has the same 7MP TruDepth RGB camera with f/2.2 aperture.




Internals

All the important stuff

The most important upgrade is the new 7nm A12 Bionic chip which has a 6-core CPU, and a 4-core GPU.

The chipset comes paired with a new Apple-designed Neural Engine which can perform 5 trillion operations per second (600 billion operations on the older iteration).

Further, the new processor is 15% percent faster and 40% more power-efficient than the A11 chipset on iPhone X.






Sensors & Software

Lifeblood of your smartphone

In terms of software, there's the standard set of sensors you expect on a flagship smartphone.

Further, Apple's Face ID which debuted with the iPhone X, has now improved, thanks to the new Neutral Engine.

In terms of software, the iPhone XS will run iOS 12 out-of-the-box while iPhone X will get it as an OTA, starting September 17.

Battery & Connectivity

Staying connected

In terms of battery, Apple has said the iPhone XS will last half an hour more than iPhone X which packs a 2,716mAh battery.

Further, all connectivity options remain the same as seen on the iPhone X except for two major changes - Gigabit LTE that offers up to 1Gbps speed on 4G and support for dual SIMs (eSIM+Physical SIM).
]





    There's also a taller 6.5-inch iPhone XS Max
    Alongside the iPhone XS, Apple has also introduced a new 6.5-inch iPhone XS Max. The bigger iPhone packs the exact same specs as the iPhone XS but comes with a higher 2688x1242 resolution, and is claimed to last 60 minutes more than its smaller sibling.



Our result

How things stack up!

The iPhone XS is surely the most advanced iPhone yet. There's a new A12 chipset that will offer improved performance, better image processing, and graphical rendering.

However, starting at $999, like its predecessor, the new iPhone isn't much of an upgrade over the iPhone X.

That said, if you're on an iPhone 8 or older, the leap to iPhone XS will be worth it.




    Pricing and Availability
    The iPhone XS and iPhone XS Max will be offered in 64GB/256GB/512GB storage configurations with prices starting at $999 and $1099, respectively. These iPhones will become available starting September 28 in India.

Source



 

Wednesday, September 5, 2018

10 devices under Rs 2,000 that make your regular home a ‘smart’ home


​10 devices under Rs 2,000 that make your regular home a ‘smart’ home​
1 / 11

​10 devices under Rs 2,000 that make your regular home a ‘smart’ home​

As more customers in India get tech-savvy and depend on several gadgets to get the job done, it is natural that they are not just limited to smartphones but also to other connected gadgets to make their lives easier. Home automation is a segment that is still niche -- at least for now -- in India and has a potential market here. Not everyone has tried it. Most of the customers are not sure how to get started and what devices to buy. For those first timers, here is a short list of what they would have to buy to get their home appliances and tech accessories work in sync, all under Rs 2,000.
Cacazi LED smart doorbell - Rs 1,503.99
2 / 11

Cacazi LED smart doorbell - Rs 1,503.99

This smart doorbell is waterproof and is lightweight. The device has a range of up to 300m and has dedicated buttons to control the volume. You can choose from 36 chimes and plug it in a socket, saving all the time and effort to connect traditional wired doorbells.
Sonoff smart Wi-Fi switch - Rs 498
3 / 11

Sonoff smart Wi-Fi switch - Rs 498

You can turn on/off this smart switch from your Android or iOS app and even schedule its time of turning on/off. It also supports Amazon Alexa and Google Assistant.
Anycast wireless smart streaming devices - Rs 999
4 / 11

Anycast wireless smart streaming devices - Rs 999

You can use Anycast streaming dongle to view content via Apple Airplay, Miracast, DLNA and others. It can even mirror your smart device’s screen on large screen appliances like TV.
Global Tech Wi-Fi-enabled LED strip - Rs 1,380
5 / 11

Global Tech Wi-Fi-enabled LED strip - Rs 1,380

You can control the lights and the colours of this Wi-Fi LED strip using your smartphone or even voice commands via Amazon Alexa and Google Assistant.
Syska smart bulb - Rs 1,706
6 / 11

Syska smart bulb - Rs 1,706

The smart bulb can be controlled not only by your smartphone but via Amazon Alexa voice assistant as well. It supports 3 million colour options and supports both Android and iOS.
Philips Hue smart bulb - Rs 1,915
7 / 11

Philips Hue smart bulb - Rs 1,915

This smart bulb works with Amazon Echo, Apple Homekit and Google Home and provides all colours from 3000K (Warm White) to 6500K (Cool Day Light).
Eufy Genie smart speaker - approx. Rs 2,000
8 / 11

Eufy Genie smart speaker - approx. Rs 2,000

This smart speaker is an Amazon Alexa-enabled one and has access to 10000+ skills and services. It supports 2.4GHz Wi-Fi and has 2W speakers.
Phenovo motion sensor lamp - Rs 520
9 / 11

Phenovo motion sensor lamp - Rs 520

This motion sensor lamp weighs 45 grams and doesn’t require a battery to operate. It automatically detects the moving subject and turns on/off based on their movement within the range.
Xiaomi Wi-Fi power strip - Rs 1794.48
10 / 11

Xiaomi Wi-Fi power strip - Rs 1794.48

This smart wi-fi power strip can be controlled remotely and helps in saving power as well. You would simply have to download the Mi Home app to control the power strip. It is also possible to set a timer until when the strip stays activated.
IBS Wi-Fi camera - Rs 1,999
11 / 11

IBS Wi-Fi camera - Rs 1,999

This table-mounted camera is compatible with Android, iOS, Windows and other popular platforms. The Wi-Fi based camera has a 5MP sensor and supports motion sensor recording.

Monday, August 27, 2018

How Safe Is Healthcare Technology ?

How Safe Is Healthcare Technology From Hackers?

Source: Mass Device
Healthcare technology is evolving more and more each day, with blockchain, telemedicine and 3D printers being used by medical professionals around the country. But one question still remains to be answered: Can this technology be hacked into? If so, that could mean dangerous consequences for medical records, and sensitive information could be compromised. Throughout this article, we’ll examine how security can potentially be threatened by this technology and give tips on how organizations can ensure their information is secure.

Can 3D Printers Be Hacked?

While 3D printing can sometimes take several hours and be extremely difficult when designing products, this hasn’t stopped industries from utilizing it to the best of its abilities. Several companies such as Adidas and GE are using 3D printing to advance production and manufacturing. Using digital files, 3D printers can produce a plethora of three-dimensional solid objects.
Hospitals are taking advantage of this technology to make historic strides in the healthcare industry. 3D printing is creating innovations in the field of radiology, a science helping to diagnose and treat diseases using medical imaging technology. According to the University of Cincinnati, “3D printing is just now come into style across the radiology realm, as professionals can leverage it for educational, research and other purposes.
But are 3D printers completely safe from hackers? As Harvard Business Review points out, closed systems have dominated the 3D printing industry within the last 10 years. This means 3D printers can only be accessed with the manufacturer’s resin and software. But several companies are shifting to a more open system, which allows for many advantages but also threatens security. “Once introduced into an open environment, a virus can spread faster through multiple parties and flows of information than in a closed system,” Harvard Business Review said.
Hackers often target individuals through shutting down servers, corrupting data and breaking into computer databases, but 3D printing takes the possibilities of hacking to new and frightening levels. By corrupting a 3D printer file, hackers can cause product failures and trigger injuries, product recalls and litigations. Researchers across the country are now figuring out ways to combat these cyberattacks and one method of prevention could be as simple as listening to what sounds the 3D printer makes.

Can Blockchain Be Hacked?

Blockchain, which helps keep track of transactions within machines, is already being used by a variety of different industries in groundbreaking ways. From insurance agencies to record companies, blockchain technology is revolutionizing the way industries store and track data. Medical professionals are able to manage data and conduct research more effectively by using blockchain technology. There is even blockchain technology with the ability to track the degree of cleanliness in hospitals by monitoring hand hygiene.
With blockchain networks being used by so many different organizations around the world, do we know whether or not it’s safe from hackers? Blockchain technology is indeed vulnerable to hackers, and there are many avenues within these systems where hackers can strike. Users of blockchain networks are given private keys, which are used to sign account transactions, and if hackers receive access to it, they could potentially steal information and corrupt data. The security of a blockchain platform can be compromised through software errors as well, which occur during the development of software implementation.
Blockchain technology is as susceptible to hackers as any other systems and users need to have the skills necessary to protect themselves from cyber-attacks. There are several apps that can help prevent cyber-attacks in blockchain networks such as Civic, which prevents identities from being stolen, and Biometrics.io, which uses face recognition technology to identify users. Using these tools, companies can keep their networks secure and ensure their data is safe against hackers.

Can Telemedicine Be Hacked?

Telemedicine is becoming more and more prevalent in the medical field, and it’s benefiting citizens from rural communities greatly. There are now even at-home diagnostic tools available such as electrocardiogram ECG devices, which can keep track of heart health and detect when a heart attack is taking place. There are several smartphone apps helping to advance the possibilities of telemedicine such as the recently announced MinuteClinic service by CVS, which allows users to be diagnosed and treated by doctors through a video conversation on their smartphone.
Even though this technology is helping more communities find medical care and providing an easier form of treatment and diagnosis, is it really as safe from hackers as we may think? While telemedicine is considered safer than many other forms of healthcare technology, hackers can still use several types of ransomware to keep the operation of a medical device hostage and steal data.
Ransomware is a technique used by hackers to extract payment or information, in which a target’s computer is locked until the hacker’s demands are met. Ransomware is usually performed through encryption tactics, and hackers typically order to be paid in a form of online currency such as bitcoin. These type of cyberattacks are at an all-time high, and it’s important to know what to do when you’re targeted.
To avoid privacy and security issues, telemedicine networks are required to comply with the HIPAA, which stands for the Health Insurance Portability and Accountability Act. This act helped to make medical records private and keep health information from getting in the hands of hackers. Telemedicine technology is required to abide by HIPAA’s guidelines, which include implementing a system of secure communication, allowing only authorized users to receive access to services and putting safeguards in place to prevent accidental or malicious breaches. By following these rules, telemedicine technology is more secure and fewer cyber-attacks occur.
Source : hackernoon

Saturday, July 7, 2018

рк╕ાрк╡ркзાрки! ркИркпрк░рклોркиркеી ркдркоркиે ркеркЗ рк╢ркХે ркЫે ркЕркиેркХ ркиુркХрк╕ાрки…….




ркЖрккркгે рк▓ોркХો ркмркзી ркЬркЧ્ркпાркП ркЗркпрк░рклોркиркиો ркпુркЭ ркХрк░ીркП ркЫીркП. ркмрк╕ркоાં ркХે ркЯ્рк░ેркиркоાં ркЕркбркзાркеી рк╡ркзુ рк╡િркж્ркпાрк░્ркеીркУ ркЬાркЧркдા рк╣ોркп ркЕркерк╡ા рк╕ૂркИ ркЧркпા рк╣ોркп, рккркг ркоોркмાркЗрк▓ркоાંркеી ркЧીркдો рк╕ંркнાрк│ркдા рк╣ોркЗркП ркЫીркП.
рккркг рк╢ુ ркдркоે ркЬાркгો ркХે, рк╡ркзુ рккркбркдા ркЗркпрк░рклોрки рк▓ркЧાрк╡ી рк░ાркЦрк╡ાркеી ркПркХрк╕ાркеે ркШркгી ркдркХрк▓ીрклોркиો рк╕ાркоркиો ркХрк░рк╡ો рккркбркдો рк╣ોркп ркЫે. ркоુрк╕ાрклрк░ી ркжрк░рко્ркпાрки ркдો ркЗркпрк░рклોрки ркХોркИ ркоુрк╢્ркХેрк▓ી ркиркеી ркХрк░ркдા, рккркг ркП рккркЫી ркЗркпрк░рклોрки рк▓ркЧાрк╡ી рк░рк╕્ркдા ркХ્рк░ોрк╕ ркХрк░рк╡ાркоાં ркХે, рк░рк╕્ркдા рккрк░ ркЪાрк▓рк╡ાркеી ркЕркХрк╕્ркоાркдркиી ркШркгી рк╢ркХ્ркпркдા рк░рк╣ે ркЫે.
ркПркХ рк╕ંрк╢ોркзркиркиા ркХрк╣ેрк╡ા ркоુркЬркм ркдркоે ркЬ્ркпાрк░ે ркЗркпрк░рклોрки рк▓ркЧાрк╡ી ркЪાрк▓ркдા рк╣ો ркд્ркпાрк░ે ркдркоાрк░ી ркЖંркЦ ркнрк▓ે ркмркзું ркЬોркдી рк╣ોркп, рккркг ркдркоાрк░ું ркоркЧркЬ ркЧીркдркоાં ркПркЯрк▓ું рккрк░ોрк╡ાркпેрк▓ું рк╣ોркп ркЫે ркХે, ркЖંркЦ ркЕркиે ркоркЧркЬ рк╡ркЪ્ркЪેркиો рк╕ંркжેрк╢ાрк╡્ркпрк╡рк╣ાрк░ рк▓ркЧркнркЧ рк╢ુрки્ркп ркеркИ ркЬાркп ркЫે.
ркЖ ркЙрккрк░ાંркд рк╣ોрк░્рки ркХે, рк╡ાрк╣ркиркиો ркЕрк╡ાркЬ ркдркоркиે рк╕ાркнрк│ркдા ркиркеી. ркЖ ркХાрк░ркгે ркЬ ркХ્ркпાрк░ેркХ ркЧંркнીрк░ ркЕркХрк╕્ркоાркд рк╕рк░્ркЬાркИ рк╢ркХે ркЫે. ркШркгા ркЖрк╡ા ркХિрк╕્рк╕ા ркЕркд્ркпાрк░ рк╕ુркзીркоાં ркЬોрк╡ા ркорк│્ркпા рк╣рк╢ે.
рк╕рк░ેрк░ાрк╢ ркЫркеી ркЖрка ркХрк▓ાркХ рк╕ુркзી ркпુрк╡ાркиો ркХાркиркоાં ркЗркпрк░рклોрки рк▓ркЧાрк╡ркдા рк╣ોркп ркЫે. ркЬોркХે ркПркиે ркХાрк░ркгે рк╕ાંркнрк│рк╡ાркиી ркдркХрк▓ીркл ркЕркиે ркХાркиркоાં ркжુркЦાрк╡ો ркерк╡ાркиી рк╕ંркнાрк╡ркиા рк╡ркзી ркЬાркп ркЫે.
ркЗркпрк░рклોркиркиા ркЙрккркпોркЧ ркХрк░ркиાрк░ાркиે ркбોркХ્ркЯрк░ો ркжૂрк░ рк░рк╣ેрк╡ાркиું рк╕ૂркЪрки ркХрк░ркдા рк╣ોркп ркЫે. ркЬોркХે ркШркгા ркпુрк╡ાркиો ркЖркЬે ркХોрк▓ рк╕ેрки્ркЯрк░ ркЕркиે рк╕ેрк▓્рк╕ркоાં ркЖркЙркЯрк╕ોрк░્рк╕િંркЧ ркХрк░ркдી ркХંрккркиીркУркоાં ркХાрко ркХрк░ે ркЫે ркЕркиે ркдેркоркиે ркиાркЫૂркЯркХે рк▓ાંркмા рк╕ркоркп рк╕ુркзી ркХાркиркоાં рк╣ેркбрклોрки ркнрк░ાрк╡ીркиે ркХાрко ркХрк░рк╡ું рккркбркдું рк╣ોркп ркЫે.
ркХોркИ ркЙрккાркп ркиркеી ркХે, ркЬેркиે ркЕрккркиાрк╡рк╡ાркеી ркоુрк╢્ркХેрк▓ીркУ ркУркЫી ркеркИ рк╢ркХે. ркЬોркХે ркиોркХрк░ીркоાં рк▓ાંркмા ркм્рк░ેркХ рк▓ેрк╡ા ркХрк░ркдા ркиાркиા-ркиાркиા рк╡ркзુ ркм્рк░ેркХ рк▓ેрк╡ાркиું рк╕ૂркЪрки ркЖ ркпુрк╡ાркиોркиે ркЖрккрк╡ાркоાં ркЖрк╡ркдું рк╣ોркп ркЫે.

***********

Our Famous Clients

Our Services


Branding
Perfect thumbnails matter

Meganto quality templates can make your website load faster Peut rendre la charge de votre.

Starting at $400 Get in touch
Design
Enhance your website

Meganto quality templates can make your website load faster Peut rendre la charge de votre.

Starting at $60 / hour Get in touch
Installation
We'll manage the rest

Meganto quality templates can make your website load faster Peut rendre la charge de votre.

Starting at $50 / hour Get in touch
Customization
We will customize it

Meganto quality templates can make your website load faster Peut rendre la charge de votre.

Starting at $90 / hour Get in touch

Contact Us


TECHNO DISC
Ahmedabad
India

Available on Request
contact@hardikgandhi.in

Interested for our works and services?
Get more of our update !