Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet application, those devices would be a mobile phone and a point-of-sale device at a checkout counter.
And NFC does so much more on Androids. A program called Trigger, which is available in Google Play, allows you to create customized automation tasks for numerous everyday things we do.
Bored of putting your phone on silent every time you get into the office? Tired of turning off Bluetooth to conserve battery every time juice gets low? This app interacts with your surroundings to configure settings on your phone automatically. Combine triggers and actions to create tasks, then activate the tasks that you create with conditions that you set!
Here are examples of what you can do:
In your car: Use Bluetooth as a trigger to open GPS and launch your favorite music app.
On your nightstand: Program an NFC tag to set your ringer to vibrate, dim your display and set an alarm.
In your home: Configure mobile data to turn off when your phone detects your own WiFi signal.
The current triggers are as follows:
- Battery level
- Time triggers
And here are a few examples of the actions that you can perform:
- Change WiFi, Bluetooth, mobile hotspot, airplane mode, auto-sync, GPS (root users) and mobile data settings.
- Change your volume or notification tones.
- Change your display brightness, timeout, auto-rotation or notification light settings.
- Check in on social media like Foursquare or Google Places.
- Send messages using Twitter, SMS, email or Glympse.
- Start or stop applications (root required for stopping applications), dock modes, open URLs, speak text or navigate to an address.
- Set alarms or create calendar events.
There’s even more, but suffice to say this app allows you to easily program your device to do the actions you manually do regularly.
So go ahead and create your own combinations to automate your life. The only limit is what you can come up with!
Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- What are the Risks from Mobile Eavesdropping?
Ever heard of mobile snoopware? For those affected, it’s unnerving and creates a sense of paranoia. I’ve worked with families that found spyware on their phones designed to watch their every move. The hacker, they say, turned their mobiles on and off, used the phone’s camera to take pictures, and use the speakerphone as a
- Time to tighten up Google Privacy Settings
There is good news for the tech-unsavvy out there: Google has made their privacy settings easier to work with. This day has not come a moment too soon. “My Account” is Google’s new dashboard. When you use any Google account, the giant company collects information on you. The new dashboard will reveal what information this is.
- 5 Ways to Limit Mobile WiFi Risks
WiFi is everywhere, and some connections are more secure than others. There are five ways to ensure more secure use of a mobile WiFi connection: Turn off WiFi. The most secure WiFi is one that is turned off. Disabling the WiFi signal on your device prevents anyone from seeing your device. If WiFi is turned off,
- Beware of iOS app vulnerabilities when on WiFi
We know WiFi is insecure. When logging onto any open (often public and free) unencrypted WiFi, your data is there for all the snoopy snoopers to see and download for their own personal gain. But now researchers have found a whole new hack for you to protect yourself from. When iPhone users launch an application, the
- Mobile, wearable and now…implantable technology?
It began with the laptop. The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it up to developers and allowed the creation of applications that made the smartphone what it is today. Apple did it again