Abstract:
In general, this disclosure describes techniques for generating customized versions of mobile applications for computing devices according to user's preferences and/or device information for downloading onto a user's computing device. A web application executing on a first computing device (e.g., back end system or server) associated with the service provider associated with the mobile application may receive user information specifying one or more preferences associated with the mobile application. A compiler of the first computing device may generate a user-specific version of the mobile application based on the received user information. The generated user-specific version of the mobile application may then be communicated to a mobile computing device that is capable of executing the mobile application.
Abstract:
In general, this disclosure describes techniques for generating customized versions of mobile applications for computing devices according to user's preferences and/or device information for downloading onto a user's computing device. A web application executing on a first computing device (e.g., back end system or server) associated with the service provider associated with the mobile application may receive user information specifying one or more preferences associated with the mobile application. A compiler of the first computing device may generate a user-specific version of the mobile application based on the received user information. The generated user-specific version of the mobile application may then be communicated to a mobile computing device that is capable of executing the mobile application.
Abstract:
In general, this disclosure describes techniques for providing users of computing devices the ability to connect to a network using a computer-generated image. A subscriber to a network with access to the network through a network device can generate a computer-generated image that encodes network configuration information corresponding to the network device. These techniques allow a user with a computing device to scan the computer-generated image, launching a reader application to decode the encoded network configuration information. The network configuration information may be automatically used to configure a network interface on the computing device to connect to the network. The network connection may be initiated and configured without requiring user input other than capturing the computer-generated image.
Abstract:
Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a second computing device on which the user is already authenticated. For example, the techniques of this disclosure provide a user with the ability to securely log into a remotely provided service or application (such as e-mail, cloud computing service, etc.) on a first computing device (e.g., a desktop computer, laptop, tablet, etc.) using a second computing device (e.g., mobile phone) on which the user is already logged into the service or application, without requiring manual entry of authentication information on the first computing device.
Abstract:
In general, this disclosure describes techniques for providing users of computing devices the ability to connect to a network using a computer-generated image. A subscriber to a network with access to the network through a network device can generate a computer-generated image that encodes network configuration information corresponding to the network device. These techniques allow a user with a computing device to scan the computer-generated image, launching a reader application to decode the encoded network configuration information. The network configuration information may be automatically used to configure a network interface on the computing device to connect to the network. The network connection may be initiated and configured without requiring user input other than capturing the computer-generated image.