Abstract:
Systems, methods, routines and/or techniques are described to protect users from undesirable content, for example, on an open platform. One or more embodiments may prevent the installation of an application package or warn a user if the application package may be undesirable (e.g., because it may contain malware). In one or more embodiments, a method may include receiving a first request to install an application package, and receiving and/or capturing metadata related to the application package. The method may include communicating a second request (e.g., including the metadata) to a remote server, such that the remote server can determine whether the application package may be undesirable. The method may include receiving a response from the remote server, where the response may indicate whether the application package may be undesirable, and initiating installation of the application package if the application package is determined to be safe and/or acceptable.
Abstract:
An operating system of a computing device can include or operate in conjunction with a data usage service. The data usage service can determine the network data usage of applications and features of the applications and attribute the network data usage to the specific application and features of the specific application responsible for the network data usage. The data usage service can utilize the determined network data usage in order to control and adapt the network behavior of the application and features of the application.
Abstract:
A system and computer-implemented method for providing secondary online content to a user device based on a user interaction with primary online content are provided. The method includes receiving a content request for a primary content item stored in the memory for display on the user device, providing the primary content item for display on the user device, and transmitting a first interaction signal representing a first interaction between the user device and the primary content item, the first interaction signal including a user device identifier and the primary content item identifier. The method further includes accessing at least one concierge rule stored in the memory based on the first interaction signal, retrieving a secondary online content item based at least in part on the at least one concierge rule, and automatically serving the secondary online content item to the user device for display on the user device.
Abstract:
An operating system (OS) of a computing device can include or operate in conjunction with a data usage service. The data usage service can determine the network data usage of applications and features of the applications and attribute the network data usage to the specific application and features of the specific application responsible for the network data usage. The data usage service can utilize the determined network data usage and policies governing network data usage to control and adapt the network data usage of the specific application or the features of the specific application.