The online version of Indian rummy has changed the perception of playing traditional way of rummy cards games. The game which existed inside the family & was played during the festive seasons has broken the boundaries and come out as an open space environment where players can play with other players anytime anywhere.

Image Source - Rummy
Image Source – Rummy

With the availability of online rummy card games, players do not have to worry about the shuffling, holding, sorting and distribution of the cards. With a simple click, everything is accessible and so the online rummy is.

The Online Indian Gaming Industry

Applications providing a mobile pleasing experience to its customer leads to traffic generation, revenue growth and its popularity. Today, a number of users play games on their mobile phones compared to PC & tablets and hence to reach the target audience, the App should be well designed to provide a mobile satisfactory gaming experience. This is largely due to the falling data rates, rise of 4G and increased smart-phone penetration.

  • India is considered as the strong revenue market for the gaming industry and it is estimated that mobile gaming revenues are $150 million across all the revenue models.
  • There is a massive increase in smartphone & tablets users thus giving them the power to compute games with a single click.
  • Most of the people are indulge in playing western games and the idea of online rummy emerged to connect the common man with the Indian traditional games.

As the large part of the user spends their leisure time in playing games, mobile rummy gained its popularity and helped players to enjoy Rummy on the Go! The App have been designed in such a way that the website version of rummy can adapt to any mobile devices irrespective of the screen size. The mobile App works seamlessly and thus provides a world class gaming experience to the users.

Interface, Features & Quality of Mobile Rummy Games

Apart from mobile browser compatibility, the interface design, sound features, user interaction & all the other functions work smoothly without any glitch. Log in to this Amazing website, Ace2Three – The oldest, largest and the most trustworthy online rummy portal in India & feel like playing at home. The platform designed is 100% safe, secure and legal to play.

The desktop rummy and the mobile App have been integrated with the latest software and technology thus eliminating any chance of obstacles while playing 13 card games online. Bringing real players across the country and moulding them towards the perfection of online rummy games is what Ace2Three is designed for. A choice of more than 7 million players who are actively playing their favourite games from the comfort of their home.

2 Players, 6 Players games with a variety of rummy variants and tournaments will give you full session of entertainment and enjoyment.

Summary

Any gaming portal with rich rewards and prizes attracts a number of gamers. Discounts, Deals, and Bonuses act as a lure to bring more players to the website and the engaging features make them visit the site again and again. Gaming portals with lesser number of button, icons, and pop-ups make it more interactive while exploring the website.

The idea of digitizing traditional rummy to online brought the millions of players on a platform where they share a common interest and interact socially.  Few of the benefits of playing rummy games online are

  • Its refreshes your mind with the ultimate fun & thrill
  • Games are available 24*7 online
  • Auto Play option in case of any disconnection
  • Acts as an antidote for the boredom.
  • Exhilarating gaming experience with the real players

 

Isn’t it worth playing the game? So, Why Waiting? Choose Your Game Type, Join a Table & Enjoy To the Fullest!

Note – This is a guest article by Swati Gupta from Ace2Three

JustRide, an emerging player in the self-drive car rental industry has raised fresh capital of USD 3 million from YC Partners and major global investorsThe fresh funds will be used to bolster JustRide’s car sharing platform JustConnect and Yabber, an IoT device for cars which is based on the company’s Smart Vehicle Technology. The company has been to a car sharing economy from an aggregator-based model. JustConnect is a car sharing platform that helps to monetize the cars of the individuals, when not in use.

JustRide, has raised money from major global investors; San Francisco based Susa Ventures, Kima Ventures, Axan Ventures, SCM Holdings from London and IT-Farm from Japan. The company is raising the additional funds from the YC Partners; Justin Kan (Co-founder Jutin.tv & Twitch.tv), Qasar Younis (COO, Y Combinator) and Paul Buccheit (Creator of Gmail) to develop Yabber, a plug and play device that augments the connected car technology and data analytics to analyze the driving skills of the customers. The company, which is mentored by Google’s The Launchpad Accelerator program, was one of the three Indian companies chosen by Y-Combinator this year, which is highest since its commencement in 2005. The company is at the concluding stage to raise a fresh round of equity from major American firms to invest in its in-house Smart Vehicle Technology (SVT).

At this juncture, Ashwarya Singh, CEO & Co -Founder JustRide, explained

Car ownership in India stands at a meagre 20 for every 1,000 individuals; in contrast to the US, which boasts of almost one car for every individual aged above 18. A vast majority in India do not have access to personal transport, presenting an extensive market for car rentals. The challenge is to build a sustainable car-sharing model to cater to the average urban commuters, while keeping in mind the interests of the car owners; who have a depreciating asset that is their car and does not get any return on it.

By leasing their idle car, an average Indian, who earns $500 each month, can increase their income to twofold. Our car- sharing platform has been received with great interest. We have added 220 cars since piloting the concept in March. We are keen on exploring our Smart Vehicle Technology which powers Yabber. The connected car technology complements our business very well and we shall raise a fresh round of capital to build data centers shortly.

Hemant Sah, CTO & Co-Founder, JustRide said

We have launched JustConnect with the vision of creating a car sharing economy. It’s a well-known fact that an average car is seldom driven for more than a couple of hours each day. Many companies have tried to build their business by helping owners rent their vehicles. But, entrusting a stranger with the keys of our car is a dilemma for many. Trust is the key in the sharing economy. This inspired us to expand the scope of our in-house Smart Vehicle Technology (SVT), which was initially used to study the driving behavior of customers and offer incentives. We came up with Yabber, a plug & play on-board diagnostic device which lets cars communicate with external devices. The connected car concept solves the trust concern as it dishes out key inputs on driving behavior of customers. Yabber is also available as a stand-alone product for car owners.

According to Ken Research, the Indian car sharing market is poised to grow at 15% every year till 2018. However, in India most car rental services operate with the traditional model, which restricts their scalability, as they have to purchase every car in their fleet. JustConnect, the new platform introduced by the company helps the car owners to earn by renting their idle vehicle. It integrates the connected car technology with micro leasing of vehicles to build a collaboratively shared fleet of cars accessible to all.

About Just Ride

JustRide is into renting/hiring self driven cars in India. It caters to vendors and peer to peer individuals as well. The concept of self driven car rentals is yet to spread its wings in India. As pioneers in the Indian self drive car rental industry, we believe in the mantra- “Why buy a car, when you can rent one?”

JustRide’s focus lies in redefining the way cars are made, purchased and rented. The company has constructed a Smart Vehicle Technology (SVT) which is crucial for the implementation of a hyper local service model. SVT taps into a vehicle’s electronic system and provides a real-time access to the location and performance parameters of the vehicle, ranging from tire pressure to the current load on the engine to the G-force experienced on each of the individual suspensions. For more information, please visit JustRide

Summary – This article describes the ways to decrypt Zepto virus files and folders in your system. Go through the Zepto ransomware recovery methods so that you are able to access your original files and folders.

Discovering that some or all the files and folders on your system have got a .zepto extension can be quite overwhelming. This shows that the files and folders on your system have been affected by the encrypting virus, or say a ransomware that denies access to the stored data by encrypting your data files and folders until the demanded ransom is paid.

As you cannot compromise with the data, therefore, it becomes the more essential for you to decrypt the files and folders affected by Zepto virus. However, the question that arises is how you can perform the decryption process. Obviously, no one would ever like to decrypt the files and folders encrypted by Zepto virus by paying off the ransom. Well, there are a few effective methods that allow you to do away with the virus and remove encryptions from the infected files and folders. You will be guided through the processes for Zepto virus recovery in the sections further in this blog. But before that, let’s have a look at how the Zepto ransomware infected your system.

How does Zepto virus get inside your PC?

Like Locky, Zepto uses emails and attachments with two types of files – .zip and .docm. The former uses archived java-script files whereas the latter uses macros inside the document that then downloads the main executable. The JavaScript files icons usually look like text files, which makes users click on them readily. It is then that the virus assigns certain ID with you that is used to name those files and to send the decryption key, ultimately making you the victim.

Decrypting and restoring Zepto infected files

There are various ways by which you can decrypt and restore Zepto infected files and folders, i.e. you can perform Zepto data recovery. Some of the methods that you can employ have been enlisted here. They are as follows:

By using Windows Previous VersionsWindows Previous Versions can help you decrypt the Zepto virus-infected files. To use it, follow the steps given below:

  • Right-click on Zepto infected file and select Properties option
  • Next, choose the Previous Versions tab
  • Select specific version of the file and click on the Copy button
  • Thereafter, click on the Restore button so as to restore the chosen file and replace the existing one
  • Lastly, choose alternative method in case there is no item present in the list

 

By using Shadow ExplorerYou can also decrypt the Zepto encrypted file by using Shadows Explorer. To use it, execute the steps mentioned below:

  • Download the Shadow Explorer program
  • Run it and then you will have the list of all the drives and the dates that shadow copy was created, on your screen
  • From all the enlisted drives, select the drive and date that you want to restore the file(s) and folder(s) from. In case there are other dates in the list, choose the alternative method.

Right-click on the folder name and select the Export tab

By using DropBoxYou can also use the DropBox to decrypt the Zeptoencrypted files. Follow the steps below:

  • Open the DropBox website, sign in, and then go to the folder containing encrypted files
  • Right-click on the encrypted file and select Previous Versions
  • Choose the file you need to restore and then click on the Restore button

Note: Windows Previous Versions, Shadow Explorer, and DropBox. These are the three manual ways by which you can decrypt the virus-infected file after the removal of the ransomware.

By using data recovery toolsYou can also make use of any data recovery tool to decrypt the Zepto-infected file and get back all the data. This is because the virus creates a copy of the file, deletes the original, and then encrypt the copies. And, we know that anything deleted from the system can be recovered from it, provided data has not been overwritten. There exist several tools for it that you can use.

By using data file recovery service – Using data file recovery service is another way by which you can remove the ransomware, and decrypt the encrypted file, thereby, making the data file available with intact data. Several data recovery companies including Stellar Data Recovery provide ransomware removal and file decryption service.

The Way Forward – Stellar Data Recovery

Now that you know all the methods to decrypt the files and folders encrypted by the Zepto virus, you should pick the one that meet your requirements. Manual techniques are employed with the built-in tools and online services are also complicated as they require specialized knowledge and expertise which you may be lacking. Also, several third-party tools that are available, do not guarantee the removal and decryption of the encrypted file, infected by ransomware.  Moreover, you will have to execute the steps carefully to be able to successfully restore your complete data. Also, chances are you may encounter another virus while downloading them. Therefore, it is recommended that you opt for data recovery services.

Here, Stellar Data Recovery service center deserves special mention as their team of skilled technicians ensures complete removal of the malware by effectively decrypting the encrypted files and folders in its state-of-the-art Class 100 Clean Room. Also, with a dedicated 24*5 support team, that provides end-to-end support, the process of data recovery becomes easier!

Sugar Maths, a Hyderabad based startup was adjudged as the Best Technology Startup at the TiE-ISB Connect 2016 held in Hyderabad.  Sugar Maths with its innovative approach of using gamification to make Maths appealing, is an Advanced Mental Maths Program for students of classes 1 to 10.

It covers complete maths topics across CBSE, ICSE, State Boards and international curricula like IB/IGCSE. ‘Sugar Maths’ is a platform designed on proprietary Variable Keystone Active Space Technique (vKast). The Sugar Maths Mental Maths Program is based on the latest research in Neuroscience of learning and Psychology of motivation.

Neeraj Jewalkar, Founder of Sugar Maths with the TiE-ISB Connect award for Best Tech Startup
Neeraj Jewalkar, Founder of Sugar Maths with the TiE-ISB Connect award for Best Tech Startup

Commenting on receiving the award Neeraj Jewalkar, Founder of Sugar Maths said

We are delighted to receive this coveted award for best use of technology for Sugar Maths. We have developed a proprietary methodology called Variable Keystone Active Space Technique (vKast) to improve learning. vKast is the synthesis of the latest developments in how various regions of the brain function to help learning and memorisation.

This technique not only leverages the concepts of Crystallised and Fluid Intelligence but also incorporates deep insights based on the psychology of motivation. Sugar Maths aims to make students take more interest in Maths, develop mastery and have an overall positive approach to this very important subject not only in academic life but also for personal growth.

Multi-sensory learning techniques have been incorporated for strong and lasting memory engrams. This ensures that the learning is retained for years without loss. Mnemonic techniques for instant memorization have been used as part of Maths Tricks. This aids quick internalization and recall of important mathematical concepts that provide a strong foundation for advanced Maths skills. All these exceptional features have been woven together in an extremely fun, engaging and addictive game format that has students addicted to this enriching App. Students are expected to stick to this 10 minute daily routine for the very best results.

Sugar Maths app can be downloaded from the Play Store from here

 

Intel Security announced an enhanced unified defense architecture designed to empower organizations to more effectively protect today’s new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cyber-criminals have put us on the defensive. This new second economy, has put us in a world where more than money is at stake and where private and public sectors are fighting against time and working to justify trust.

Intel_Security

Chris Young, Senior vice president and General manager of Intel Security Group says

Cyber-criminals are forcing cyber-security companies to redraft the rules of engagement for defending the civilized world; to effectively counteract them, we have to abandon old security playbooks to become more unpredictable and collaborative and make cyber defense a priority. Our strategic charter is simple, yet disruptive:integrate, automate and orchestrate the threat defense life-cycle to drive better security outcomes-ultimately reducing more risk, faster and with fewer resources.

Built upon the industry’s largest open ecosystem leveraging a proven integration program, Intel Security’s unified defense architecture is enabled by four protection systems-Dynamic Endpoint, Pervasive Data Protection, Data Center & Cloud Defense, and Intelligent Security Operations-that are intelligently integrated to multiply effectiveness.

Dynamic Endpoint – Isolated solutions can be effective against individual assaults, but there are too many examples where isolated solutions can’t keep up with the wide range of sophisticated, emerging threats. Tactical security firefighting needs to be replaced with integrated, dynamic security defenses designed to outsmart attackers.

Intel Security’s Dynamic Endpoint solution uses advanced protection, shared intelligence and unified workflows on a single management console to unify endpoint protection, detection and correction to guard against today’s most pervasive threats. This solution, delivered in McAfee Endpoint Security 10.5 and McAfee Active Response 2.0 software, includes capabilities like:

Patient Zero Protection – Dynamic Application Containment improves protection against patient zero and ransomware threats and isolates the rest of the network from infection by monitoring and intercepting post-malicious process actions based on file reputation.

Advanced, Persistent Threat Protection with Containment and Machine Learning – Intel Security is the first and only vendor to offer machine learning based malware classification using both static pre-execution analysis and dynamic post-execution analysis from the cloud that is designed to help detect zero-day malware in near real time, tracing behavior when deemed suspicious and re-mediating without relying on traditional signatures.

Enhanced Protection with Integrated Web and Endpoint Protection – Only Intel Security seamlessly integrates a connection between its endpoint client and web gateway technology to enable quick-to-deploy, pervasive protection both on and off the corporate network that is designed to prevent zero-day malware from reaching the endpoint.

Real-Time Advanced Threats Protection – McAfee Active Response 2.0 software uses the cloud to accelerate investigations by dynamically tracing process behavior and allowing administrators to access threat context in real time during an investigation.  Quickly hunt and respond using single click correction and then automate responses to address future attacks.

Pervasive Data Protection The rise of Software As A Service (SaaS) applications and a highly mobile workforce has created the need to securely enable cloud-driven business. Organizations are looking for a unified solution that extends security outside the traditional perimeter covering on and off-network users and cloud services. Intel Security’s approach to pervasive data protection is to unify SaaS security across web protection, cloud access security broker, data loss prevention and encryption to provide the industry’s broadest solution across endpoints, networks and cloud-based services all centrally managed.

With a foundation in unified management, along with common rule-sets, policies and encryption, Intel Security will help organizations maximise business efficiency and employee productivity. Organizations are empowered to make sensitive data readily available to the people who need it, while minimising the risk of data leakage and misuse by unauthorised personnel. Components of the integrated solution include:

Increased Productivity with Centralized Data Protection – McAfee DLP for Mobile Email 10.0 software introduces unified policies and incident management for both endpoint and network DLP. It also offers end-user empowerment tools such as end-user manual classification, and end-user initiated DLP scanning and self-remediation. Not only do these capabilities help strengthen the corporate security culture, it also alleviates administrative burden.

Ubiquitous Web Security – McAfee Web Gateway Cloud Service is designed to enable security teams to gain the same benefits of advanced threat protection as on-premises web gateway appliances but without the cost of hardware or the resources used to maintain it. With 3x the data centers of our previous web SaaS solution, better performance and improved up-time our new cloud service has never been more ready for the enterprise.

Cloud Application Governance – McAfee Cloud Data Protection, available as a beta, features Cloud Access Security Broker (CASB) technology, to provide an integrated view of risky endpoint and cloud events, including the ability to perform a real-time endpoint health check, ensuring only trusted devices are able to access sensitive information.

Data Center and Cloud Defence  Organizations are increasingly adopting cloud computing, which introduces unique security requirements that many legacy security solutions cannot address. Consequently, many struggle with weak and inconsistent cloud security controls, slow resolution of security issues and inefficient compute and staffing resource utilisation. Intel Security cloud security products are designed to protect data centers with industry-leading security that detects advanced targeted attacks and manages security efficiently across physical, virtual and cloud infrastructures.

Intel Security’s Data Center and Cloud Defense solution combines server security, network security and threat intelligence sharing to enable a single view of security across data center environments. This solution, delivered through McAfee Server Security Suite 4.5 & McAfee Virtual Network Security Platform (vNSP) 8.3, includes capabilities like:

Cloud Security Visibility – Cloud workload discovery provides deep visibility across public and private clouds for virtual machines, associated workloads, networks and storage, enabling organizations to establish a strong and consistent security posture.

Threat Intelligence Sharing and Unification – Unification of perimeter and virtual machine protection thwarts advanced targeted attacks while ensuring efficient resource utilisation within highly virtualized server environments to allow organizations to detect more threats, faster and with fewer resources. Once a threat has been detected, this knowledge is shared across the data center and corrective actions can be taken.

Integration and Orchestration – Tight integration across McAfee Management for Optimised Virtual Environments Anti-Virus(MOVE AV), McAfee Virtual Network Security Platform (vNSP), McAfee Advanced Threat Defense, and McAfee Threat Intelligence Exchange along with virtualization platforms like VMWare NSX and OpenStack enable orchestration of security efficiently and more easily.

Intelligent Security Operations – Organizations looking for rapid response and remediation need a closed loop threat defense life-cycle framework that makes it easy to integrate, monitor and orchestrate security solutions. New Intel Security capabilities integrate with the above solutions and Security Innovation Alliance partners to enhance & unify visibility, investigation workflows and reporting.

Flexible Advanced Malware Detection – Expanded options include a new cloud-based machine learning-driven malware analysis service, McAfee Cloud Threat Detection, as well as a virtual McAfee Advanced Threat Defense appliance that makes the most of an improved user experience, more Windows OS coverage, and a significant throughput rate increase.

Improved Visibility and Investigation – McAfee Enterprise Security Manager introduces a new HTML 5-based interface with an intuitive, analyst-centric user experience and simpler, faster search results to expedite threat management and incident response.

Expanded Strategy and Incident Response Services – New consulting, deployment, assessment and incident response services enable long-term maturation of an organization’s approach to risk and threat management and improve ROI. Retainer and on-demand based managed security and emergency response augment in-house expertise.

OpenDXL Initiative

The industry has long needed a way to make different technologies work better together, and we paved the way with the most highly adopted technology across major players with the McAfee Data Exchange Layer (DXL). To accelerate that, Intel Security announced its intent to open the McAfee Data Exchange Layer to the industry as a concrete means of disrupting the cyber-attackers’ advantage. Through an open source strategy and the beta release of a new software development kit (SDK) for DXL, white hats (both organizations and technology providers) will gain the ability to attach to a shared real-time communication fabric and exchange security intelligence as well as orchestrate actions for the shortest possible execution of the threat defense life-cycle.

DXL provides a standardized application framework to integrate technologies from different vendors with each other and with in-house developed applications. The OpenDXL initiative will expand access and capabilities of the DXL SDK and the management and community infrastructure that will support it, enabling developers within ISVs, enterprises, colleges and even competitors to gain the many real-time integration and operational benefits of the Data Exchange Layer.

For more information on all new products announced at FOCUS 2016, visit McAfee for Home & Business

T-Hub, India’s fastest growing startup engine catalysing Innovation, Scale and Deal flow, announces the launch of AgriTech Accelerator Program in partnership with ICRISAT (International Crops Research Institute for the Semi-Arid-Tropics), powered by RViP (Riverbridge Ventures Innovations Platform). The program will begin on 15th February, 2017 and is accepting applications from 2nd November, 2016.

During the three-month acceleration period, RViP in association with ICRISAT & T-Hub will engage with start-ups through its unique scaling model and work as a full-time partner for enabling and scaling the efforts of the participating startups.

Jay Krishnan, CEO, T-Hub said

The potential to innovate and scale innovation from startups is what we are trying to achieve through the AgriTech Accelerator. With AgriTech being a specialized vertical at T- Hub, we are sourcing the top startups globally to come up with solutions which will solve the myriad challenges faced by the sector. Through this sector and stage-focused approach, we are banking on providing interventions to the top startups that get selected for the accelerator to allow them to scale and go-to-market with the right methodologies.

This initiative is designed to enable the participating startups to scale their projects through real-time management, full-time engagement and knowledge sharing. The selection process involves up to 3 levels of application screening including manual screening to curate the most relevant applications to finally identifying the top 10 participants of the program.

ICRISAT Director General Dr. David Bergvinson commented

In order to double Indian farmers’ income by 2022, we need to accelerate the development and delivery of demand driven innovation that gives economic agency to farmers. The AgriTech Accelerator program will bring together agriculture, IT and finance entrepreneurs to develop tailored services, technologies and market integration to support sustainable (social, economic, environmental) rural development at scale.

This program will help develop a working model for the AgriTech start-ups/innovative ideas through practical business models and perfected products with market acceptability.

Vishnu Gorantala, Founder, Riverbridge Ventures Innovations Platform said

Scaling platforms need to redefine the conventional accelerator programs through well designed and differentiated engagement to ensure ‘Enable to Scale’. We at RViP intend to address this gap.

Interested startups can register at http://signup.t-hub.co/agritech

About T-Hub

T-Hub is a unique public/private partnership between the government of Telangana, three of India’s premier academic institutes (IIIT-H, ISB and NALSAR) and key private sector leaders. T-Hub aims to forge many such partnerships with governments and corporates across the world to setup T-Bridge centers, strengthening trade relations and attracting investment into the state of Telangana. For more information, please visit T-Hub

About RViP – Riverbridge Ventures Innovations Platform

RViP engages with startups and innovations through partnership mode that helps enable and scale innovations into successful businesses worldwide. This engagement is beyond capital and advisory models and functions like a partnership by sharing equal or more responsibilities than the promoter/entrepreneur himself. RVIP aggregates functionaries to address the job functions while the promoter/ founder focuses on his/her core competencies. For more information, please visit Riverbridge Ventures Innovations Platform

About ICRISAT

The International Crops Research Institute for the Semi-Arid-Tropics (ICRISAT) is a non-profit, non-political organization that conducts agricultural research for development in Asia and sub-Saharan Africa with a wide array of partners throughout the world. ICRISAT innovations help the dryland poor move from poverty to prosperity by harnessing markets while managing risks-a strategy called Inclusive Market-Oriented development (lMOD). ICRISAT, headquartered in Hyderabad, is a member of the CGIAR Consortium. For more information, please visit ICRISAT

DrLive is a healthcare platform to implement telemedicine programs on mobile devices. The highly secure platform which was released recently is very easy to use and has proven its?value in a variety of healthcare specialities and settings for patient follow ups, second opinions and primary healthcare.

DrLive also plays an important role in the supplemental management of chronic conditions. There is widespread acknowledgement of its usefulness to impact routine care for common, uncomplicated, non-emergency medical problems such as sinus problems, respiratory infection, allergies, urinary tract infection, cold and flu symptoms and many other non-emergency illnesses.

The platform enables secure audio-video medical consults with a mission to emerge as a new frontier in telemedicine-one that offers safe, convenient and cost-effective options for users to connect with top doctors from leading hospitals from the comfort of their homes via mobile applications. Patients residing in Tier-II and Tier-III cities are now able to cut down their travel and expenses by 70% with the use of telemedicine. Through the app users can register dependents, book appointments, make cashless payments and manage their health records.

DrLive is the brainchild of Chethan Channakeshava & Pratap Palthady. With its operation headquartered in Bengaluru, DrLive is determined to take telemedicine to the next level in India and has also partnered with leading hospitals, gyms and health spa. With the advance of low-cost smartphones, faster data networks and mobile apps, telemedicine can help lakhs of Indians get superior healthcare services through proper and timely consultations with their doctors.

With this app, users sitting in Rajasthan can get the consultation from a doctor based in Bengaluru or a patient from Kochi can speak to a specialist from Delhi. DrLive has already helped hundreds of patients to get consultations from doctors across various specialists including dietitians and nutritionists!

DrLive has also introduced a dedicated App for Doctors called DrLive-Rounds. Not only does it revolutionize and enable doctors to consult with their patients over video, but it also facilitates them to get their entire practice “on the cloud”. The platform is built keeping the ease of use factor to help doctors take advantage of the highly intuitive user experience to grow their practice.

DrLive App can be downloaded from the Google Playstore or visit DrLive for more information.

Hashtaag, a firm which builds native mobile apps and products driven through technology, today announced that it has been ranked among top app development companies in Bengaluru, by Clutch.co. Hashtaag has been listed in the niche section in The Leaders Matrix, indicating the position it has created for itself among market leaders in just one year.

Being the global leader, Clutch.co is highly regarded for its ranking and lists in various sectors. The acknowledgement of various app development companies is based on many qualitative and quantitative factors. To be in the race of the digital service industry requires enhanced category-based specifications which are evaluated in the domains of client satisfaction, reviews, market presence, experience and quality deliverance.

Jayavardhan B N, CEO & Co-founder, Hashtaag said

It is a big achievement for us to have been listed among the top app developers by Clutch.co, in just one year of starting Hashtaag. It shows the kind of efforts Hashtaag is putting towards delivering the best in the industry and ensuring maximum client satisfaction. We are constantly working to raise the bar for mobile app development in India and globally.

With a focus on quality and superfast delivery, Hashtaag primarily caters to entrepreneurs and startups looking for a cost-effective mobile app development partner, without blowing budgets. From Day 1, the company has been profitable with more than USD 1 million in revenue in less than a year. Recently, Hashtaag secured funding of USD 1 million with more investors already in the pipeline. Hashtaag is the proud mobile app development partner of apps such as Doors, Shouut, Paperboy, FaceChat, Curiocty, and Logoon-all owned by popular celebrity icons and serial entrepreneurs.

India is witnessing immense innovation in every sector and owing to the recent smartphone boom in the country, the mobile app development industry in particular is seeing huge potential and scope. According to a report by Deloitte, India is set to become the largest base of mobile app developers by 2017. Gartner has further predicted that 42% of organizations are expecting to increase spending on mobile app development by an average of 31% in 2016.

About Hashtaag

Let’s talk Apps. The fresh choice in mobile app development, Hashtaag provides premium design and development services for entrepreneurs and startups around the world. Founded in 2015 and held under KGJ Software Technologies, Hashtaag employs 50+ designers, engineers and support staff. Based in Bengaluru, Hashtaag also has offices in Chennai, Mumbai and San Francisco, California. For more information, please visit Hashtaag