Abstract:
A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device.
Abstract:
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace.
Abstract:
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace.
Abstract:
A computer-implemented process includes providing a request to access content associated with a website; receiving web page information associated with the website, and data for displaying a notification that indicates availability of a native computer application that is associated with the website; providing a request to access information associated with the native computer application; receiving information associated with the native computer application that describes interactions between a plurality of users of an application marketplace and a component of the application marketplace that provides and receives information related to the native computer application; and displaying the descriptive information for viewing by a user, including displaying information that indicates the interactions between the plurality of users and the component of the application marketplace.
Abstract:
A computer-implemented method includes identifying, with a computer system that has a network interface, one or more primary categories of content from a social networking system that are of primary relevance to a user of a computing device, as compared to one or more secondary categories of content from the social networking system that are of lower importance to the user of the computing device; causing content from the primary categories to be downloaded from the social networking system to the computing device automatically and without user interaction with a social networking application that is arranged to display the downloaded content; and causing content from the secondary categories to be downloaded from the social networking system to the computing device separately from the content from the primary categories, and in response to a defined user interaction with a social networking application that corresponds to the social networking system.
Abstract:
A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device.
Abstract:
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace.
Abstract:
A computer-implemented process includes providing a request to access content associated with a website; receiving web page information associated with the website, and data for displaying a notification that indicates availability of a native computer application that is associated with the website; providing a request to access information associated with the native computer application; receiving information associated with the native computer application that describes interactions between a plurality of users of an application marketplace and a component of the application marketplace that provides and receives information related to the native computer application; and displaying the descriptive information for viewing by a user, including displaying information that indicates the interactions between the plurality of users and the component of the application marketplace.
Abstract:
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for monitoring application program resource consumption. Information that identifies consumption, by multiple computing devices and at requests of a particular application program, of resources that correspond to the computing devices is accessed. Each of the multiple computing devices provided a portion of the information. The accessed information is analyzed by a computing system to determine one or more values that identify consumption of the resources by at least a subset of the computing devices. An indicium that illustrates the one or more values is provided for display on a particular computing device and in cooperation with a display of a network-accessible application program software marketplace. The application program software marketplace provides application program software for execution by the particular computing device and other computing devices.
Abstract:
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace.