What Phones support ‘view in your space’ for Google 3D animals


Two key parts make up the life-sized creatures that appear in Google Search. The first lets you see animals in 3D, while the second — and most delightful — is viewing them in your current space with the ability to take pictures. Here’s what iOS and Android devices support Google 3D animals.

Most modern Android and iOS devices support viewing 3D animals in Google Search. This is the simple ability to “meet a life-sized tiger up close.” Your creature of choice will be displayed against a white background, and move naturally with sounds. You can fully rotate and zoom-in as they roar or eat a bamboo stalk in the case of giant pandas.

However, what makes augmented reality really immersive is the “sense of scale and detail” gained by seeing an animal in your environment. This is done with the “View in your space” button at the bottom of the screen. Unlike the first gallery feature, there are a few technical requirements for AR and seeing a creature next to the couch or in your backyard.

How it works

Behind-the-scenes, these augmented 3D animal experiences require the support of Google’s ARCore technology. Phones and tablets have to pass a certification process to ensure that the “sensitive motion tracking” — achieved by combining a camera image and the motion sensor — works well. Also required is a “powerful enough CPU” that can run “effective real-time calculations.”

We are constantly working with manufacturers to make sure their hardware and designs meet these requirements. At the same time, we are working internally to make sure ARCore integrates well with every model we certify to provide good experiences for users.

Meanwhile, an even more advanced AR capability involves ARCore phones detecting depth. A circular button in the top-right corner lets you turn on/off “object blending” so that a 3D animal can appear behind a piece of furniture instead of just physically standing in front of the scene. Google is recognizing that the background is three-dimensional with depth and not just a flat surface.

The full list — as of 3/29 — of ARCore devices, but a good shortcut to know whether your phone or tablet will support the full Google 3D animal experience is seeing whether the Google Play Services for AR app is installed on your phone. Visit the Play Store listing to check and make sure it’s up-to-date (currently version 1.16).

Supported ARCore devices

Brand Device
Apple iPhone 11
Apple iPhone 11 Pro
Apple iPhone 11 Pro Max
Apple iPhone XR
Apple iPhone XS and XS Max
Apple iPhone X
Apple iPhone 8 and 8 Plus
Apple iPhone 7 and 7 Plus
Apple iPhone 6S and 6S Plus
Apple iPhone SE
Apple iPad Air 3rd Generation
Apple iPad mini 5th Generation
12.9-in. iPad Pro (1st Generation)
12.9-in. iPad Pro (2nd Generation)
12.9-in. iPad Pro (3rd Generation)
Apple 11-in. iPad Pro
Apple 10.5-in. iPad Pro
Apple 9.7-in. iPad Pro
Apple iPad (7th Generation)
Apple iPad (6th Generation)
Apple iPad (5th Generation)
Apple iPod touch (7th Generation)
Asus ROG Phone
Asus ROG Phone II
Asus Zenfone 6
Asus Zenfone AR
Asus Zenfone ARES
General Mobile GM 9 Plus
Google Nexus 5X
Google Nexus 6P
Google Pixel
Google Pixel XL
Google Pixel 2
Google Pixel 2 XL
Google Pixel 3
Google Pixel 3 XL
Google Pixel 3a
Google Pixel 3a XL
Google Pixel 4
Google Pixel 4 XL
HMD Global Nokia 6 (2018)
HMD Global Nokia 6.1 Plus
HMD Global Nokia 7 Plus
HMD Global Nokia 7.1
HMD Global Nokia 8
HMD Global Nokia 8 Sirocco
HMD Global Nokia 8.1
Huawei Honor 8X
Huawei Honor 10
Huawei Honor View 10 Lite
Huawei Honor V20
Huawei Mate 20 Lite
Huawei Mate 20
Huawei Mate 20 Pro
Huawei Mate 20 X
Huawei Nova 3
Huawei Nova 3i
Huawei Nova 4
Huawei P20
Huawei P20 Pro
Huawei P30
Huawei P30 Pro
Huawei Porsche Design Mate RS
Huawei Porsche Design Mate 20 RS
Huawei Y9 2019
Infinix Mobile Note 6
Kyocera Torque G04
LG G7 Fit
LG G7 One
LG G7 ThinQ
LG G8 ThinQ
LG G8S ThinQ
LG G8X ThinQ
LG G Pad 5 10.1 FHD
LG Q70
LG style2
LG Stylo 5
LG V30
LG V30+
LG LG Signature Edition 2017
LG V35 ThinQ
LG LG Signature Edition 2018
LG V40 ThinQ
LG V50 ThinQ
LG V60 ThinQ 5G
Motorola moto g⁵ˢ plus
Motorola moto g⁶
Motorola moto g⁶ plus
Motorola moto g⁷
Motorola moto g⁷ play
Motorola moto g⁷ plus
Motorola moto g⁷ power
Motorola moto g⁷ play
Motorola moto g⁸ play
Motorola moto g⁸ plus
Motorola moto g⁸ power
Motorola moto g stylus
Motorola motorola one
Motorola motorola one action
Motorola motorola one hyper
Motorola motorola one macro
Motorola motorola one power
Motorola motorola one vision
Motorola motorola one zoom
Motorola moto x⁴
Motorola moto z² force
Motorola moto z³
Motorola moto z³ play
Motorola moto z⁴
OnePlus OnePlus 3T
OnePlus OnePlus 5
OnePlus OnePlus 5T
OnePlus OnePlus 6
OnePlus OnePlus 6T
OnePlus OnePlus 7
OnePlus OnePlus 7 Pro
OnePlus OnePlus 7 Pro 5G
OnePlus OnePlus 7T
OnePlus OnePlus 7T Pro
Oppo F11 Pro
Oppo K3
Oppo K5
Oppo R17 Pro
Oppo realme 5
Oppo realme 5 Pro
Oppo realme Q
Oppo realme X
Oppo realme X Lite
Oppo realme XT
Oppo realme X2
Oppo realme X2 Pro
Oppo Reno
Oppo Reno2
Oppo Reno2 F
Oppo Reno2 Z
Oppo Reno 10x Zoom
Oppo Reno A
Oppo Reno Z
Samsung Galaxy A3 (2017)
Samsung Galaxy A5 (2017)
Samsung Galaxy A6 (2018)
Samsung Galaxy A7 (2017)
Samsung Galaxy A7 (2018)
Samsung Galaxy A8
Samsung Galaxy A8+ (2018)
Samsung Galaxy A30
Samsung Galaxy A40
Samsung Galaxy A50
Samsung Galaxy A50s
Samsung Galaxy A60
Samsung Galaxy A70
Samsung Galaxy A70s
Samsung Galaxy A71
Samsung Galaxy A80
Samsung Galaxy A90 5G
Samsung Galaxy Fold
Samsung Galaxy J5 (2017)
Samsung Galaxy J5 Pro
Samsung Galaxy J7 (2017)
Samsung Galaxy J7 Pro
Samsung Galaxy M30s
Samsung Galaxy Note8
Samsung Galaxy Note9
Samsung Galaxy Note10
Samsung Galaxy Note10 5G
Samsung Galaxy Note10+
Samsung Galaxy Note10+ 5G
Samsung Galaxy Note10 Lite
Samsung Galaxy S7
Samsung Galaxy S7 edge
Samsung Galaxy S8
Samsung Galaxy S8+
Samsung Galaxy S9 Exynos
Samsung Galaxy S9 Qualcomm
Samsung Galaxy S9+ Exynos
Samsung Galaxy S9+ Qualcomm
Samsung Galaxy S10e Exynos
Samsung Galaxy S10e Qualcomm
Samsung Galaxy S10 Exynos
Samsung Galaxy S10 Qualcomm
Samsung Galaxy S10+ Exynos
Samsung Galaxy S10+ Qualcomm
Samsung Galaxy S10 5G
Samsung Galaxy S10 Lite
Samsung Galaxy Tab Active Pro
Samsung Galaxy Tab S3
Samsung Galaxy Tab S4
Samsung Galaxy Tab S5e
Samsung Galaxy Tab S6
Samsung Galaxy XCover Pro
Samsung Galaxy Z Flip
Sharp AQUOS R3
Sharp AQUOS sense3
Sharp AQUOS sense3 plus
Sharp AQUOS zero2
Sony Xperia XZ Premium
Sony Xperia XZ1
Sony Xperia XZ1 Compact
Sony Xperia XZ2
Sony Xperia XZ2 Compact
Sony Xperia XZ2 Premium
Sony Xperia XZ3
Sony Xperia 1
Sony Xperia 1 Professional Edition
Sony Xperia 5
Tecno Camon 12 Pro
Tecno Phantom 9
Vivo Nex 3
Vivo Nex 3 5G
Vivo NEX S
Vivo NEX Dual Display Edition
Wiko View 3 Pro
Xiaomi Mi 8
Xiaomi Mi 8 SE
Xiaomi Mi 9
Xiaomi Mi 9 SE
Xiaomi Mi A3
Xiaomi Mi Mix 2S
Xiaomi Mi Mix 3
Xiaomi Pocophone F1
Xiaomi Redmi K20
Xiaomi Redmi K20 Pro
Xiaomi Redmi Note 7
Xiaomi Redmi Note 7 Pro
Zebra TC52 WLAN Touch Computer
TC57 WWAN Touch Computer
Zebra TC72 WLAN Touch Computer
TC77 WWAN Touch Computer


Posted in Google | Tagged , , , | Leave a comment

What is 3-2-1 backup?


If you’re looking into backup and recovery solutions you’re probably going to hear the phrase “3-2-1 backup” come up a lot. You’ll hear it from most IT consultants and IT pros as well as many backup vendors, who will speak about their products in terms of 3-2-1 compliance.

The 3-2-1 rule is a best practice for backup and recovery. It means that when you build out your backup and recovery strategy you should:

1. Keep at least three copies of your data
That includes the original copy and at least two backups.

2. Keep the backed-up data on two different storage types
The chances of having two failures of the same storage type are much better than for two completely different types of storage. Therefore, if you have data stored on an internal hard drive, make sure you have a secondary storage type, such as external or removable storage, or the cloud.

3. Keep at least one copy of the data offsite
Even if you have two copies on two separate storage types but both are stored onsite, a local disaster could wipe out both of them. Keep a third copy in an offsite location, like the cloud.

The 3-2-1 backup rule is a best practice because it ensures that you’ll have a copy of your data no matter what happens. Multiple copies prevent you from losing the only copy of your data. Multiple locations ensure that there is no single point of failure and that your data is safe from disasters such as fires and floods.

We recommend whenever speaking to a backup vendor to make sure that you ask them how their backup solution fits with 3-2-1 compliance.

Posted in Backup, Windows | Tagged , , , , , , , , | Leave a comment

Make Every Day World Backup Day


This April Fool’s Eve, on March 31, the organizers of World Backup Day are asking businesses and home computer users alike not to play the joker by taking a simple pledge:

“I solemnly swear to back up my important documents and precious memories on March 31st.”

Now, World Backup Day may seem like a holiday made up by—I don’t know—a company that sells backup and recovery solutions? But that’s not the case! No, while we think it’s an excellent idea, we can’t take the credit.

According to WorldBackupDay.org, the holiday was organized by concerned internet users asking the question, “What would you do if you lost everything?”

We think that it’s a great idea and a sound reminder of the potential consequences of a lost, stolen or failed device. So, are you ready to take the pledge?

Here are a few tips for celebrating World Backup Day the right way.

  1. Recognize data loss is a when, not an if.

As more and more of our lives migrate online, ways to lose our data are proliferating. While there was once a time when we could limit our concern to hard disk failure or device theft, today’s users know it could also be corrupted by malware or held for ransom by ransomware delivered any of a number of ways.

And whether by extortion or sale on the dark web, cybercriminals are smart to the fact that personal and business data holds tremendous value. It increasingly looks like data loss—at least for a time—is inevitable.

But for those willing to take a little initiative, there are reasons for optimism. Backup and recovery solutions today are simple to manage, affordable and non-intrusive. Like the old saw “a stitch in time saves nine,” a little effort on World Backup Day could end up saving precious photographs and essential business data.

  1. Adhere to the 3-2-1 rule.

Businesses especially should remember the golden rule of data protection when securing essential data: the 3-2-1 rule of backup.

This rule stipulates that all backups should account for three instances of your data (an original copy and two backups); include two local copies on different types of backup media (such as a flash drive and on the cloud); and one off-site storage solution in case of a natural disaster or other device-destroying catastrophe (i.e., securely encrypted in the cloud).

Put another way, this best practice recommends businesses and home users:

  1. Keep at 3 three copies of their data
  2. Maintain 2 local copies on different media
  3. Have at least 1 backup solution hosted off-site
  1. Make every day world backup day.

The importance of backup is often eclipsed by the latest security scare or large attack making headlines. The details of the latest ransomware variant or astronomic ransomware demands are simply sexier than devising a plan to keep you safe from such an attack. Yet keeping your data safe is more important than ever in today’s risky online environment.

If your business or home media collection isn’t protected with a backup and recovery plan of action, we encourage you to use World Backup Day as a deadline to act. The success and proliferation of phishing and ransomware as a one-two combo mean the risk of data compromise is high. And, whether you own a business or just a scrapbook collection on your home computer, take a moment to consider all you have to lose.

If you do have a backup solution in its place, World Backup Day can serve as a periodic reminder to make sure it’s appropriately configured and working correctly. It’s no time to let your guard down. Maybe you’ve invested in a solution but failed to notice it’s stopped periodically updating. Take a moment to make sure.

  1. Strive for comprehensive cyber resilience.

Backup is one of the core pillars of cyber resilience, but it’s only a single pillar. Achieving true cyber resilience means developing a comprehensive strategy for safeguarding your digital life. That entails integrated defensive and recovery measures to give your family or organization the very best chance of weathering the storm of a cyber event.

If all else fails in a cyber resilience strategy, it is critical that solid backups are in place to arrest the fall. Backups that can be restored to a precise point in time and will allow you to continue in business without failing to achieve your objectives.

Join Us in Celebrating This World Backup Day

This year, we’d like to invite everyone to join us in taking the pledge for World Backup Day. It’ll only take a few minutes of your time and is surely better than the alternative.

And, of course, we’d be happy to help.

Posted in Backup, Backup & Sync, Google, Windows | Tagged , , , | Leave a comment

6 critical mistakes you must avoid during Work from Home


In this COVID 19 pandemic, work from home has become the new norm for the country’s IT workforce. Some might find work from home convenient and comfortable but the responsibility of employees increases as they now have to follow more discipline and learn new work etiquette. One silly mistake of yours can leave your organisation or at least your team in jeopardy, especially because everyone is working from home and damage control has become tough. Given below are a few technical mistakes that work from home employees must avoid.

1. Using insecure internet connection
Hackers are now targeting home networks and you might have critical information that must not be leaked at any cost. This should be your first priority to work on a secure network. If you can arrange for a VPN, that is the best; otherwise try to install a firewall or use good antivirus software with firewall to avoid any potential cyber attack while you are working from home.

2. Saving official work on personal Google Drive or email accounts
There is a saying, “keep your work away from home”. Well, that doesn’t set completely true in the current scenario but at least do not save your official work on your personal Google Drive or email account. This can accidentally leak the data and lead to dangerous consequences in future.

3. Surfing the internet for personal stuff on the same browser you use for work
It is important that you use another browser or private browsing mode for personal internet surfing. The IT team in most organisations keeps tab on the information relieved and received from an official system. This may create embarrassing situations for you.

4. Keeping personal data on office laptop
For the same good reason stated above, it is highly advisable that you do not store your personal stuff on a work computer. Additionally, there are chances that you need to submit that laptop to the IT department and get a new one any day you join the office. If utmost necessary, then keep your personal data in a separate folder and mark it with personal stuff tag.

5. Keeping your computer unattended and unlocked
If you have kids at home, you would not want your kids to send random emails or turning on a video chat or typing garbage in a presentation you have been working for hours, This could be the biggest mistake of your life to keep your work computer unattended and unlocked.

6. Sharing office laptop with other family members
Be it your spouse, your sibling, you kid, or other family member, do not share your office laptop with anyone for whatever reason. There are important files and stuff that should be discrete to you only and the traces of the other persons work can get your system compromised. In most cases, you can get penalised for this when you are back in the office.

Stay Home, Stay Informed, Stay Safe, Save Lives!

Posted in COVID-19, Tips & Trick | Tagged , , , , , , , | Leave a comment

Working from home: Cybersecurity tips for remote workers

Lock Down Completely NowSwitching to remote working because of the coronavirus can create cybersecurity problems for employers and employees.

One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for many organisations means encouraging –  or instructing – staff to work from home.

But moving at short notice from a trusted office environment to working remotely can create security risks. On top of this, nasty opportunist crooks are already using the coronavirus as subject matter for their phishing scams, hoping that the unwary will click through and hand over passwords or other data.

With the rapid increase in remote working in mind, European cybersecurity agency ENISA has set out a series of recommendations for companies moving to teleworking as a result of COVID-19.

ENISA said it had already seen an increase in coronavirus-related phishing attacks. The agency recommends, as far as possible, that workers try to not mix work and leisure activities on the same device and be particularly careful with any mails referencing the coronavirus. “Attackers are exploiting the situation, so look out for phishing emails and scams,” ENISA said.

The agency also warned remote workers to be suspicious of any emails asking them to check or renew their passwords and login credentials, even if they seem to come from a trusted source.

Please try to verify the authenticity of the request through other means, do not click on suspicious links or open any suspicious attachments,” it said.

ENISA also warned workers to be suspicious of emails from people you don’t know — especially if they ask to connect to links or open files. Phishing messages try to create an impression of urgency in order to panic you into clicking on a link, it said. Emails sent from people you know, but asking for unusual things are also suspect, the agency said — so double check by phone if possible. The UK’s National Cyber Security Centre (NCSC) has also issued a similar warning about coronavirus-themed phishing attacks.

ENISA’s other security advice for home working for employees also includes:

  • Ensure your Wi-Fi connection is secure. While most Wi-Fi is correctly secured, some older installations might not be, which means people in the near vicinity can snoop your traffic.
  • Ensure anti-virus is in place and fully updated.
  • Check all security software is up to date: Privacy tools, add-ons for browsers and other patches need to be checked regularly.
  • Have a back-up strategy and remember to do it: All important files should be backed up regularly. In a worst case scenario, staff could fall foul of ransomware for instance. Then all is lost without a backup.
  • Lock your screen if you work in a shared space: ENISA said workers should really avoid co-working or shared spaces at this moment and that social distancing is extremely important to slow down the spread of the virus.
  • Make sure you are using a secure connection to your work environment.
  • Check if you have encryption tools installed.

ENISA said employers should:

  • Provide initial and then regular feedback to staff on how to react in case of problems. That means info on who to call, hours of service and emergency procedures.
  • Give suitable priority to the support of remote access solutions. Employers should provide at least authentication and secure session capabilities (essentially encryption).
  • Provide virtual solutions. For example, the use of electronic signatures and virtual approval workflows to ensure continuous functionality.
  • Ensure adequate support in case of problems. This may require setting up special rotas for staff.
  • Define a clear procedure to follow in case of a security incident.
  • Consider restricting access to sensitive systems where it makes sense.

Stay Home Stay Safe!

Posted in Coronavirus, COVID19, Cyber Security, Remote Workers | Tagged , , , , , , , , , , | Leave a comment

Microsoft takes down global botnet network

necurs-botnet-shut-down-by-microsoft-and-partners_enMicrosoft organised 35 nations on Tuesday to take down one of the world’s largest botnets — malware that secretly seizes control of millions of computers around the globe. It was an unusual takedown of an criminal group, because it was carried out by a firm, not a government.

Necurs’ botnet, which affected 9 million computers, is one of the largest networks in the spam email threat ecosystem, with victims in nearly every country.


The action, eight years in the making, was aimed at a criminal group called Necurs, believed to be based in Russia. Microsoft employees had tracked the group as it infected 9 million computers around the world, hijacking them to send spam emails intended to defraud unsuspecting victims. The group also spread ransomware, which locks up a computer until the owner pays a fee. “It’s a highway that is used only by criminals,” Amy Hogan-Burney, the general manager of Microsoft’s digital crimes unit (DCU) and a former FBI lawyer, said. “We have to dismantle the infrastructure.”

The Microsoft team struck on Tuesday. After cleansing DCU’s command centre to eliminate any live viruses, a team of Microsoft workers switched on their laptops and began coordinating action against the botnet. They began calls with authorities and network providers around the world to strike Necurs at once, cutting off its connections to computers around the globe. Rapidly, they took over or froze 6 million domain names that Necurs was using or had inventoried for future attacks.

Necurs is not believed to be a state-sponsored Russian group. But officials say it is tolerated by the Russian state. By Tuesday’s end, Microsoft had taken down a digital criminal operation for the 18th time in 10 years. But it was unclear whether anyone would be indicted, or, if indicted, whether they would face trial.

be Safe!

Posted in MicroSoft, Ransomware | Tagged , , , , , , , , | Leave a comment


Let’s start

How to set up an auto-reply feature for WhatsApp.

In this post, we’ll help you understand the nitty-gritty of WhatsApp Chatbots. To start off with, let’s talk about how Auto-Reply for WhatsApp works.

There are two ways to set up auto-replies for your business – Using WhatsApp’s Business  and Using WhatsApp Business API’s.


WhatsApp Business is a platform meant for small and medium businesses. It allows you to set up “away messages” for when you’re not available or online.

In this article, we’ll talk about the process of deploying auto-reply away messages for your business.


Setting automated messages on WhatsApp

Most businesses work 8-12 hour days. So while you may only be available from nine-to-five, your customers will interact with businesses based on their convenience.

These customers are lost revenue-generating opportunities. A business that only interacts with its customers eight hours a day loses more than 2/3rds of its potential revenue.

An away message allows you to tell your customers that you’re away and encourages them to move within the funnel with more ease.


Using WhatsApp Business, you can set automated replies and schedule them as per your desired timings.

The first step to doing this is to decide who gets what away message. You can decide if a single away message is sent to all your customers or if it’s just being sent to specific customers.

The second step is to schedule the away message to function at a specific time. The recommended trigger time is during the hours that your business is closed.

If a customer reaches out to you during these “away” hours, messages will be sent out based on your preferences.

  1. Tap on the three vertical dots on the top right of your WhatsApp application. From there, click on Settings, followed by Business Settings and lastly on Away message.
  2. Now, turn on the “Send away message” toggle button.
  3. Next, enter the “away” message or tap on it to edit the message which will be sent to your customers accordingly.
  4. After you edit your message, select the type of schedule for understanding when to program your messages to be deployed.
  5. Next, select the recipients to whom you want to send the message.
  • Always schedule – Select this when you’re out of town and can’t talk to your customers for days on end.
  • Custom schedule: This is to be selected when you want to send the away messages only during a particular duration. Set a time duration and if a customer texts you in this timeframe, you’ll trigger an away message.
  • Outside of business hours: This feature is based on what you’ve specified as your business hours on your profile. Once set, away messages will be automatically sent if any reply is received outside the business hours.

Setting up an away message for WhatsApp

  • Everyone: Single template for all customers.
  • Everyone excluding a few:  All customers, except for a few.
  • A few out of the contacts: Only a few customers are sent the away message

It’s important to note two things.

  1. Save all of your changes.
  2. Keep in mind that your away messages will only be sent when you have an active internet connection.

There are certain disadvantages to using WhatsApp Business for Auto-Replying.

  1. WhatsApp Business is meant for small businesses.
  2. It cannot help you generate leads or provide support.
  3. WhatsApp Business can’t use different templates.
  4. It always needs an active internet connection.
  5. WhatsApp Business is not customizable.
  6. WhatsApp Business doesn’t give you a Verified Business tag.
  7. Only works during predefined off-hours.

For a more powerful Auto-reply for WhatsApp solution, you can use WhatsApp’s Business API’s.

This is a WhatsApp Chatbot. WhatsApp’s Business API’s power WhatsApp Chatbots by Verloop.


A chatbot is an automated conversation platform. They replicate human interaction but use software instead of teeth and bones. They can help you support and sell to your customers, in real-time, around the clock.

Customers can visit your website, app or Facebook page at any time and talk to your chatbot, which can replicate your best salesperson.

WhatsApp Business can only tell an inquisitive customer that you’re not available at the moment. But using WhatsApp Business API’s you can answer that customer’s question.

For example, a customer texts you on WhatsApp telling you he’d like to buy a shirt but has questions about size. Using WhatsApp’s Business’ auto-reply, you can text him that your store is closed, but she can drop you a message in the morning.

But with a WhatsApp Chatbot powered by WhatsApp’s Business API’s, your customer can have a full conversation with a customer; answering queries and completing sales.

The Chatbot can handle a variety of low-level FAQs. In the event where you are available and the bot can’t handle a question, the chat can be transferred to a human agent.

A WhatsApp Chatbot allows customers in any corner of the world to communicate with your company, regardless of time-zone or availability. It is the ultimate auto-reply for WhatsApp.




The first step to build a WhatsApp bot is to reach out to a company that can help you. Verloop and lots of other companies are providing CHATBOTS solutions. Try the Best!

Enjoy! Happy Customer! Happy BUSINESS!

Posted in Business Tools, How To, WhatsApp | Tagged , , , , , , , , , | Leave a comment