6 Applications for push content...................................................................................................................................................
Types of push applications.............................................................................................................................................................
Types of push requests...................................................................................................................................................................
Multilanguage support...................................................................................................................................................................
Files required for localization........................................................................................................................................................
Java APIs with controlled access...................................................................................................................................................
Register to use controlled APIs.....................................................................................................................................................
Restrictions on code signatures....................................................................................................................................................
Request a code signature...............................................................................................................................................................
Using keys to protect APIs and data............................................................................................................................................
74
74
74
76
76
76
78
78
78
79
81
81
81
82
82
83
83
84
84
84
85
85
86
87
87
87
87
88
88
88
90
90