When will you receive your Apple Store revenue?


You have some applications on App Store for sale. You want to know when you may receive your App Store revenue?


Payments are made no later than 30 days following the end of each month.

To receive payment, you must have provided all required banking and tax information and documentation, as well as meet the minimum payment threshold, ranging from US$0.02 to US$150, depending on your country or region.

If you earned more than the minimum required to trigger a payment during August, 2021, you should see that money in your bank by September, 2021 or sooner.

Source: https://itunespartner.apple.com/books/articles/apple-books-payments-2748

How to avoid losing your Google Play Developer revenue?


You went to Google Play Developer Console, then navigated to Settings > Developer account > Payments settings, then clicked on the View transactions button under the Transactions section.

Then you may have gotten a transaction with the Escheated to U.S. state or territory: DE description.

What happened?
The answer is that Google had given your revenue to U.S. state governments.


What is escheatment?

Google’s answer: Companies in the U.S. are obliged to give assets that they believe are abandoned to U.S. state governments. For U.S. residents it’s the state government of the state where you’ve told us you reside. If you reside outside the U.S., then it’s our state of incorporation (Delaware). We consider an account abandoned if there’s been no activity on that account for 2-5 years (depending on your state of residence). Activity on your account means:
– You signed in to your account, and
– You successfully received a payment from your account.

What should I do?
If your balance has been escheated to the state government, you can apply to your state government unclaimed property office to have the money returned to you. You can find your unclaimed property office by typing the name of your state together with “unclaimed property” into Google Search.

How can I avoid having my account balance escheated?
If you have enough of an account balance, then make sure that you’ve met the conditions to get paid. The most common reasons for not getting a payment are:
– You haven’t set up your form of payment, or
– You haven’t submitted your tax information, or
– You have not reached the payment threshold.

Lessons learned:

Set payment threshold to a small number so that you can get paid at least once. Then change it to any value that you want.

Source: https://support.google.com/adsense/answer/6327445?hl=en

How does ads.txt protect online ad buyers?


Programmatic advertising automates the process of buying ad space through the following technologies:

  • Demand-Side Platforms (DSPs): Platforms that allows you to purchase ad space through an ad exchange, like Google Ad Manager, which features advertising inventory from publishers.
  • Supply-Side Platforms (SSPs): Platforms that allows publishers to manage and offer ad space to advertisers, marketers, and other parties interested in purchasing ad space.
  • Data Management Platforms (DMP): Platforms that allows organizations to collect and manage user data for digital marketing purposes, such as programmatic advertising.

By incorporating these three technologies, as well as artificial intelligence (AI), programmatic advertising automates the process of purchasing and bidding on ad space. It also makes the process smarter, relying on user data to deliver relevant ads in milliseconds.

How does programmatic advertising work?

Let’s start by looking at an overview of the programmatic advertising process:

  • Arrive: Whenever a user arrives on a website involved with programmatic advertising, it triggers the automated advertising process to start. As programmatic advertising happens in milliseconds, users don’t even notice it.
  • Send: In response to a user arriving on a website, the website publisher automatically sends the dimensions of its ad space to an Supply-Side Platform (SSP). One way to think about this step is that the publisher lists their product for advertisers to purchase.
  • Read: After receiving information on the available ad space, the SSP analyzes a user’s cookies. The goal here is to learn as much as possible about the user, from their demographics to their interests, to deliver a relevant ad.
  • Evaluate: Next, the coordinating Demand-Side Platform (DSP) becomes involved. By reviewing the information gathered by the SSP, the DSP can evaluate the user’s worth and assign it a value — or the worth of that user’s impression.
  • Bid: With a value assigned to that user, the DSP submits a bid to the SSP. It’s worth noting that this process happens in real-time, which is why some refer to programmatic advertising as real-time bidding (RTB).
  • Choose: Once the DSP’s bid arrives, the SSP will review it and any other bids. The SSP will then pick its winner, which is often the highest bidder. Depending on the auction, you may pay your highest bid or the price of the second-highest bid, plus a fee.
  • Deliver: With the winner picked, the SSP delivers the ad to the user. As the programmatic advertising process happens so fast, the page will load with the ad displayed — it won’t load and then reload the page to display the ad.


Unauthorized reselling is serious problem in programmatic advertising.

When a brand advertiser buys media programmatically, they rely on the fact that the URLs they purchase were legitimately sold by those publishers. The problem is, there is currently no way for a buyer to confirm who is responsible for selling those impressions across exchanges, and there are many different scenarios when the URL passed may not be an accurate representation of what the impression actually is or who is selling it. While every impression already includes publisher information from the OpenRTB protocol, including the page URL and Publisher.ID, there is no record or information confirming who owns each Publisher.ID, nor any way to confirm the validity of the information sent in the RTB bid request, leaving the door open to counterfeit inventory.

Counterfeit impressions are created when a bad seller replaces the URL of a low-quality site with a premium publisher URL, or a fraudster creates fake impressions and labels them with a high-quality publisher’s URL. Then, the counterfeiters send their fake inventory to auction at multiple exchanges and SSPs, without the knowledge of the publishers they’re impersonating, to trick advertisers into thinking they are buying premium publisher inventory. By hiding in the digital supply chain, counterfeiters are robbing premium publishers of revenue they deserve, and tricking advertisers into buying mislabeled and potentially unsafe inventory.


Ads.txt works by creating a publicly accessible record of authorized digital sellers for publisher inventory that programmatic buyers can index and reference if they wish to purchase inventory from authorized sellers. First, participating publishers must post their list of authorized sellers to their domain. Programmatic buyers can then crawl the web for publisher ads.txt files to create a list of authorized sellers for each participating publisher. Then programmatic buyers can create a filter to match their ads.txt list against the data provided in the OpenRTB bid request.

Example: Example.com publishes ads.txt on their web server listing three exchanges as authorized to sell their inventory, including Example.com’s seller account IDs within each of those exchanges.


  #< SSP/Exchange Domain >, < SellerAccountID >, < PaymentsType >, < TAGID >
  greenadexchange.com, 12345, DIRECT, AEC242
  blueadexchange.com, 4536, DIRECT
  silverssp.com, 9675, RESELLER

Note: The seller’s Publisher.ID will be specified in the “SellerAccountID” field in the ads.txt.

A buyer receiving a bid request claiming to be example.com can verify if the exchange and SellerAccountID matches the authorized sellers listed in example.com/ads.txt file.

Why should publishers implement ads.txt?

Advertisers looking to execute efficient, brand-safe programmatic campaigns should start demanding that their campaigns run only on authorised inventory, as defined by publishers’ ads.txt files, or work directly with their preferred publisher brands. If they’re not buying authorised inventory, they risk having their ads appear on counterfeit, low-quality websites, when they think they’re appearing somewhere else.


NEW Gold Miner

NEW Gold Miner 01

Enjoy the NEW gold miner game.
Release your stress by digging more gold.
Enjoy your waiting time by digging more gold.
Let your kids dig more gold while you relax.
This game is fun and totally free with unlimited levels.

NEW Gold Miner 02

Click below link to install it for an Android device.


Video game copyright basics

So you’ve created a video game. Naturally, you’re proud of the result after months of all-nighters spent programming and debugging the source code. Your game includes ideas, puzzles, game concepts, and user interfaces that no game has ever had. You’ve created artwork and graphics that are sure to enthrall even the most skeptical of gamers. Your game is most assuredly destined to be Game of the Year!

Too bad someone stole it and published it before you did. All your “guaranteed” profits gone in a flash. But that’s ok, because software is or at least should be free to copy, right? By becoming a software developer you have automatically bought into the notion that software should be open source, right? Who needs to be fairly compensated for their efforts when ramen noodles are 3 for $0.99?

You disagree? Ok, if you are actually upset that someone would copy your work, and want to know how to stop them from such illicit behavior in the future, read on. This article discusses the basic types of intellectual property – patents, copyrights, trademarks and trade secrets – and how to use them effectively to protect your video game. With a little advanced planning and basic knowledge of intellectual property, your video game will be protected … at least from a legal perspective.

Patents, copyrights, trademarks and trade secrets each serve to motivate innovators to create new and exciting games by providing various protections for their efforts. For example, the patent system encourages innovation by promising inventors a short period of exclusivity if they come forward with their inventions.

Without copyright protection, there is little incentive for authors and artists to create new creative works, because they naturally would be hesitant to create works that others could copy willy nilly without compensation to the artist (those ramen noodles sure are tasty, huh?).

Trademarks help ensure that the name you’ve made for yourself stays yours. And finally, trade secret law helps those who decide to keep their technology secret, like the famously secret formula for Coca-Cola®. The discussion below is a short walk through these forms of intellectual property.


Trademarks protect the goodwill and reputation associated with your company or video game as a brand. A trademark – any name or symbol indicative of a source of origin of a product or service – is arguably your most valuable business asset, and is perhaps also the most recognizable form of intellectual property. You can hardly drive down a major road without encountering a sign for a McDonalds® restaurant, a Coca-Cola® soda, or Nike® shoes. Many consumers purchase goods and services based on name recognition alone, e.g., EA or MADDEN.

There are two ways to protect your trademark from being copied. The first is through state trademark laws. Each state offers trademark protection based on the use of the trademark in that state. The second more common (and more effective) way is to register the trademark with the U.S. Patent and Trademark Office (USPTO), which provides protection throughout the United States.

Registered trademarks offer advantages over non-registered trademarks, and allow you to use the ® symbol. Once a trademark is registered, no other entity can use any name or mark that is identical to or is likely to cause confusion with your registered trademark anywhere in the U.S.

An exception arises where the other entity proves that it was using its trade name or mark prior to your trademark registration, in which case the other entity might have limited rights to use their name or mark in their geographic location.

How does this affect your video game? Your trademark serves as a source of origin for your game. It is your reputation, your lifeblood. You want gamers to hear your name and know that the game is going to be phenomenal. Without trademark protection, someone else can adopt the same name as you to produce games.

However, you have no quality control over their games, and they could ruin your public reputation and the goodwill you have worked so hard to create. Trademark registration is relatively inexpensive (current registration fee is no more than $375 per class of goods and services), and is typically the first form of intellectual property protection any venture formally secures.


Copyrights are the second form of intellectual property, and protect the expression of an idea (but not the idea itself). Take Pac-Man, for example. Copyright protection protects the actual artwork and sounds in the game as an audiovisual work, and the underlying source code as a literary work. No one can copy the actual images and sounds used during the game, illustrated in Fig. 1, or the underlying program.

pacmanHowever, copyright does not protect the idea of a player controlled character eating dots in a maze-like game board while being chased by differently colored evil characters such as the caterpillar game shown in Fig. 2.

caterpillar Copyright protection exists the moment an author fixes an expression in a tangible medium. This means the moment you save your source code to disk, or you sketch out the artwork for your game character or level art, you automatically have copyright protection without doing anything further.

An author can also choose to register the copyright with the U.S. Copyright Office (current registration fee is $45), which provides certain additional benefits, such as the right to statutory damages for copyright infringement. Copyrights were historically regarded of as the only form of “substantive” intellectual property protection for computer software, but that couldn’t be farther from the truth.


Patents – the third and most diverse form of intellectual property – protect inventions from being copied. An invention is any new and useful process (e.g., game play methods, graphics techniques, user interface communications), machine (e.g., a computer programmed with computer software), article of manufacture (e.g., a disk or storage media on which software is distributed), or composition of matter, and also includes new ornamental designs (e.g., icons, user interface artwork, characters, etc.).1 Patents can be thought of as protecting ideas, whereas a copyright only protects a particular expression of an idea.

All patents include a description of the invention as well as one or more “claims” that define the legal metes and bounds of your invention (similar to physical boundaries of real estate that a trespasser must stay out of).

Determining these bounds accurately is important, because a patent provides a limited but powerful monopoly on what is claimed, and prevents for a limited time anyone other than the patent owner from making, using, selling, or importing an item, or performing a process, that is encompassed by the claims of the patent (such an act would be considered patent infringement).

A claim drafted too broadly may be invalid for attempting to encompass what is old or obvious, while a claim that is too narrow may be ineffective against competitors making minor modifications to your invention.

Once a patent issues, the patent owner may negotiate a license with competitors who are practicing the invention, or sue for an injunction and/or monetary damages. Because claims are generally drafted to encompass something broader than a specific commercial product, patents can provide broad protection against competitors who copy your idea but make minor changes in an effort to avoid the patent.

As an illustration of the scope of patent protection versus copyright protection, Incredible Technologies, Inc., the developer of Golden Tee Golf, sued Virtual Technologies, Inc., for copyright infringement based on Virtual’s game PGA Tour Golf, which was specifically created so that players of Golden Tee could switch to PGA Tour Golf with little difficulty.2

Golden Tee GolfPGA Tour GolfPGA Tour Golf essentially copied, with some stylistic changes, the layout of buttons and instructions found on the Golden Tee control panel. However, Virtual had been careful not to copy the artwork, image, or sounds from Golden Tee. In finding no copyright infringement, the court stated:

an item may be entirely original, but if the novel elements are functional, the item cannot be copyrighted: although it might be eligible for patent protection.

* * *

The trackball system of operating the game is not subject to copyright protection. Functional features, such as the trackball system, might, at least potentially might, be eligible for patent protection.

Had Incredible Technologies sought patent protection for the method by which a player uses a trackball to swing a golf club in Golden Tee, or for a machine programmed to provide Golden Tee’s specific interactive style, the outcome might have been different. However, patents can be expensive to obtain, often costing tens of thousands of dollars by the time the patent gets issued.

Trade Secrets

The fourth form of intellectual property is perhaps the easiest to protect. A trade secret is basically all its name suggests – a piece of information that you keep secret. Each state has its own trade secret law, usually as part of its laws against unfair competition, but the requirements are generally the same: a trade secret is information that has business value, that is kept secret, and which was taken without permission.

The most common form of trade secret misappropriation occurs when former employees of one company go to work for a different company, and take with them information (e.g., customer lists of registered game players in a virtual world, manufacturing techniques or tools such as unreleased in-house software used to create game levels, etc.) that the first company tried to keep secret.

For your part, if you have developed in-house information that is of value to you, and you want to protect it as a trade secret, all you have to do is take reasonable precautions to keep it a secret (e.g., controlling access to the information, having employees agree to keep secrets, well, secret).


Each form of intellectual property has its advantages and disadvantages. Patents provide the strongest protection, but are the hardest to get (and most expensive), and remain in force the shortest amount of time (usually about 16-18 years). Copyrights are easier to obtain (and less expensive), and last a long time (at least 70 years), but have the narrowest scope of protection (only your specific expression is covered).

Trademarks last as long as you keep using the mark, but do not prevent anyone from copying your games, and trade secrets last as long as you can keep a secret. The strongest approach is certainly to pursue all four as appropriate, but don’t overlook the benefits of even one or two forms of intellectual property protection when budgets are tight, because intellectual property is often the lynchpin of a company’s success.

1 A third type of patents, which protect asexually reproducing man-made plants, are not discussed in this article.

2 Techs., Inc. v. Virtual Techs., Inc., 400 F.3d 1007 (7th Cir. 2005). That will be the only case cite in this article, we promise.

Source: http://www.gamasutra.com