Conheça a Academia do Google Play
Learn how to succeed on Google Play with free training by Google.
Learn how to succeed on Google Play with free training by Google.
Learn how to succeed on Google Play with free training by Google.
At the heart of every game are the motivations that drive people to engage. This course helps you understand these motivations, how they can evolve over time, and how they can influence your game and monetization design.
Quando os usuários se engajam em um jogo para dispositivos móveis que tem uma economia, eles recebem e consomem recursos, como moeda, por meios pagos e gratuitos. Este curso ensina como mapear e equilibrar essa experiência vinculando o engajamento do...
As players engage with a mobile game with an economy, they gain and consume assets such as currency through paid and unpaid means. This course teaches you how to map and balance this experience by linking engagement to monetization opportunities...
O loop de jogo principal é fundamental para criar uma experiência envolvente e bem projetada em dispositivos móveis e, por fim, conquistar o sucesso. Este curso explica o loop de jogo principal em diferentes gêneros e mostra como desenvolver e...
As part of our continued investment in supporting our developers, we’ve redesigned the Play Console to help you work faster and more efficiently, and ensure it continues to help you grow your business on Google Play for years to come.
Investimos continuamente no suporte aos desenvolvedores e, por isso, apresentamos uma nova versão do Play Console. Ela ajudará você a trabalhar de modo mais eficiente e rápida e apoiará o crescimento dos seus negócios no Google Play pelos próximos anos.
After you have a subscription strategy, it’s time to deploy it in your app. Learn how to add subscriptions to your app and modify settings to optimize your subscription strategy.
Detection and response refers to any tooling and processes you have in place to detect and respond to potential attacks against your organization. Learn how to set clear expectations and how to address risks in security testing by external researchers.