Contact Us

cancel
Showing results for 
Search instead for 
Did you mean: 

Blogs - Page 2

Moderator
Moderator

Receipt of SMS messages from a previously unknown or unexpected long code is no different than receiving a message from a previously unknown or expected email address. At best, it may be recognized; however, at worst, it could be a phishing attack. There is no legitimacy. With SMS Short codes, you have some measure of confidence that the message is legitimate as the sender is likely recognized. In fact, if an organization is sending important, time sensitive messages such as 2FA codes, then we would recommend that the originating address of the SMS messages should be an easy-to-remember and recognize short code.

Read more...

Read more
Jim_Brooks
Frequent Visitor

When we talk about the consumer we really mean the shopper and shopping is now no longer just the moment of purchase. Brands and their Advertising agencies must look further to track and understand the changes in shopping behaviors.

Read more...

Read more
SAP Digital Interconnect Employee

“Last mile connectivity” is always taken for granted and used by everyone in everyday life. We could not live without it. Is such importance of the last mile also reflected appropriately in the vendor evaluation?

Read more...

Read more
Moderator
Moderator

Have you ever forgotten a password?  I know that I have.  I do all the time, in fact, although over the last year or two, I’ve gotten better at managing my password schemes (yes, I have schemes that I’ve memorized to generate new passwords).  But forgotten password recovery is a “popular” mechanism in which bad guys can gain access to your account. So, we must incorporate a number of checks to disrupt and prevent attempts to gain access to accounts.

Read more...

Read more
Moderator
Moderator

In the past few years, the incidents of major data breaches as well as hacking into personal accounts for not only public people, but also not-so-public people, seem to be on the increase. 

Read more...

Read more
Moderator
Moderator

Why is it important that SMS messages are routed correctly? The global SMS ecosystem consists of separate, logical Application-to-Person (or A2P) connectivity network – one where mobile network operators (MNOs) have approved, and in many cases, monetized, this type of mostly commercial and non-human generated traffic. Traditionally, the A2P network uses separate connectivity from the general conversational or Person-to-Person (or P2P) connections. The reasons for this are numerous; however a significant reason is that it helps to control spam andgrey route traffic over the P2P networks.

 

Read more...

Read more
Moderator
Moderator

At the 2016 Facebook’s F8 Developer’s conference, a new no-password login solution was announced called Account Kit.  Account Kit is designed to be an alternative login facility for people who either don’t want to use a social login such as Facebook or a non-password login. Users are given a choice between either email or their mobile phone number as their “identity.”  After providing one or the other, a one-time code is sent via email or SMS to their mobile device.  Access to the account is then granted.

Read more...

Read more
Frequent Contributor

Have you heard about the reporting tool for SAP SMS 365 and its features?

 

 

Read more...

Read more
Moderator
Moderator

April 24th, 2015 ushers in a new era of the Apple Watch. As many others did, I watched with anticipation, the March 9th Spring-forward Apple announcement that included information about the Apple Watch. Apart from the availability and pricing, little new information was provided that we really didn’t already know. As I review a large number of tweets, opinions, and articles, the first results indicate a very mixed set of views (from extremely positive to extremely negative [“the iFlop”]).

Read more...

Read more
SAP Digital Interconnect Employee

Newer is not always better. SMS is rapidly approaching its 25th birthday, a date that many other modern technologies will struggle to reach. In recent years a new pretender to the throne has been push notifications.

Read more...

Read more