Nexmo presentation at TADHack
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Nexmo presentation at TADHack

  • 826 views
Uploaded on

Nex

Nex

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
826
On Slideshare
480
From Embeds
346
Number of Embeds
3

Actions

Shares
Downloads
10
Comments
0
Likes
1

Embeds 346

http://blog.tadhack.com 344
https://www.linkedin.com 1
http://www.slideee.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. H a c k i n g t h e N e x m o A P I Telecom Application Developer Hackathon Madrid, June 6th and 7th 2014
  • 2. Part 1: Live Coding
  • 3. Useful documentation Nexmo documentation:https://docs.nexmo.com/index.php/voice-api Nexmo SMS API: https://docs.nexmo.com/index.php/sms-api Nexmo Voice API: https://docs.nexmo.com/index.php/voice-api Nexmo Labs: https://labs.nexmo.com/
  • 4. Part 2: Sample Use Cases
  • 5. 1.0 Sending Alerts & Invites Alerts 1. Suspect activity takes place 2. Alert sent to users phone Social Invites 1.  Sarah Installs your app 2.  Selects contacts to invite 3.  Effectively and selectively send invites
  • 6. 2.0 Verify Identity During Sign Up/Sign In Client Side 1.  Jack signs onto your site 2.  He receives a one time code on his mobile 3.  Provides the code he was sent to verify his identity with the server Server Side 1.  Login configured for 2FA 2.  Code generated, stored, and sent via SMS 3.  Server verifies Jack’s identity by checking the code entered with the stored code
  • 7. 3.0 Proxy SMS for Privacy User 1: Bob 1.  Bob wants to message Alice anonymously 2.  He is given a proxied number 3.  Sends a message Server 1.  Checks sender to find that its Bob 2.  Queries for Bob’s conversation 3.  Sends Bob’s message to Alice User 2: Alice 1.  Receives the message from the proxied number 2.  Replies to Bob 3.  Process repeats
  • 8. 4.0 Pipeline Data: Using SMS as a channel Device monitoring data inputs 1.  An event outside of normal parameters occurs where wireless internet connection is unavailable 2.  The device sends an SMS immediately upon being triggered, or on a schedule 3.  The SMS becomes an HTTP request to a server 4.  Data is accessible and near real-time
  • 9. 5.0 Virtualize Numbers Provide SMS without a phone 1.  Sarah needs to send and receive without a phone 2.  She’s provided a virtual number 3.  She sends a new message from the application 4.  Outbound messages are relayed via SMS 5.  Tom sends Sarah’s virtual number a message via SMS 6.  The message is relayed to the application where Sarah receives it Use Case 1
  • 10. 5.1 Virtualize Numbers Send SMS from a different number e.g. work vs home 1.  Sarah needs to send and receive without using her personal number 2.  She’s provided a virtual number, and can reply, or load her contacts 3.  Tom sends her virtual number an SMS Use Case 2
  • 11. 5.2 Virtualize Numbers Have two way SMS conversations virtually 1.  Sarah needs to send and receive without using her personal number 2.  She’s provided a virtual number, and can reply, or load her contacts 3.  Tom is assigned a virtual number 4.  He sends an SMS 5.  Inbound SMS is relayed using Tom’s virtual number Use Case 3
  • 12. 6.0 Request Feedback Allow users to send in feedback through SMS 1.  Jerry gives a speech 2.  He needs a way to gather feedback 3.  He provides a number that users can respond to via SMS 4.  Feedback is stored in application for analysis
  • 13. Nexmo connects the whole world Through very simple cloud API
  • 14. Call to action 2 way communication Healthcare • Appointment management • Patient follow-up • Medication reminders Retail • Customer authentication • Customer service • Promotions Social Media • User authentication • P2P messaging • Social invites Travel/Hospitality • Reservation confirmation • Check-in & -out • Travel alerts Finance • 2 factor authentication • Transaction alert • Balance alerts Just to give you some ideas… User 2 factor authentication Marketing communications Notifications, alerts and promotions Virtual numbers Payment confirmation Booking & delivery confirmation