Skip to main content

Amazon Underground...??!!


Hi viewers,
We all know the Amazon,the shopping app which provides us all deals which we do expect from a shopping app.....
But Do you gtuys know that there is a app store of Amazon too...
That is Amazon Underground...
The app store which provides all games and applications that too find in Play store and that doesn't get in Play store too..

The most interesting thing in the Amazon Underground app is that it pays the app creators a $0.002 per user minute in the app.
Amazon has listed the following eligibility requirements for participating apps:
  • The app must be available for download from the Google Play or Apple App Store, and be monetized in at least one of the following ways:
  • The app is available to purchase for a fee in all other app stores where it is sold
  • The app contains in-app items that are available for purchase for a fee.
  • The app must not contain any subscription in-app items.
  • The features and gameplay of the Amazon Underground version must be substantially similar to or better than the non-Underground version.
  • When submitted to the Amazon Appstore, the app must be made available on at least one non-Amazon mobile device.

Amazon Underground is a good fit for freemium or premium apps, but Amazon advises against using it for the following apps:
  • Apps that run continuously in the background
  • Apps that are completely free (freely available, no in-app purchases)
  • Apps that are monetized through ads
  • Apps that support streaming, such as radio apps
  • Apps containing subscription services
Here is  screenshot of home page of amazon underground


But the bitter thing is that Amazon announced that it is going to shut the Amazon Underground app down soon .....
But the Amazon is not giving any solid reasons yet...

The present users' need not to get worried as their apps which are installed from this app aren't going to lost and the developers will get their regular payments on terms and conditions for the updates they provide to the present users....

Please be tuned for more updates..

Click here  to download amazon underground

Comments

Popular posts from this blog

Wi-vi the wifi vision

ABSTRACT: A new technology known as  Wi-Vi is bouncing up with a good progress.It is similar Radar and Sonar imaging..it depends on radio signals  of wifi.I monitor movements of people in closed rooms or behind a wall. Wi-Vi was created by Dina Katabi ,a professor  in MIT,and her graduate student Fadel Adib. Wi-Vi technology can detect number of humans in a closed room. Enable communication through a wall without carrying a wireless device.Identify simple gestures from behind a wall. This Wi-Vi signals uses Wi-Fi signals,as Wi-Fi signals can penetrate through walls. Wi-Vi relies on a simple hardware of 2.GHz  Wi-Fi radios small enough to be portably used.Integrated in hand held devices.Low power Wi-Fi signals are used. A Wi-Vi system constitutes-  1.Two transmitting antennas 2.single receiver. This technology is based on principle of Rada and Sonar.Radar and Sonar works on Doppler effect. This technology uses reflected Wi-Fi signals...

Brain chips

Introduction: Thousands of people around the world suffer from paralysis they need to depend on some one for even some basic   tasks brain chips can become  a handy at this case .Brains are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes. It is likely that implantable computer chips acting as sensors, This is like a implantable computer chip in brain. This consists of both biological and electronic term's. A chip in the Braingate system is of 100 hair thin electrodes.It senses electromagnetic signature of Neutrons.The Brain chip provides fast and reliable connection between the brain of a severely disabled person and personal computer. Braingate is a technology is a technology by which the electrical signal is exchanged by neurons within the brains are used to execute body moment .  Hardware of brain chips  It mainly consists of. Four parts ->chips: A Four ...

The truth about hacking

The Process of attempting to gain or successfully    gaining, unauthorized access to computer resources   is called   Hacking. Hacking is been a part of Computer for over 40 year's.The first hacker is from MIT In  the  computer  security  context,  a  hacker  is someone who  seeks  and  exploits  weaknesses  in  a  computer system  or  computer  network.  The programers prefer to refer them as crakers. This are the main reasons for hacker to hack a system. -Just for fun. -Show off. -Notify many people their thought. -Steal important information. -Destroy enemy’s computer network during the war. Hacking is mainly divided into two types - ethical hacking - unethical hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.This is Often done to protect from. Hacking Unethical hacking  is often ...