Watch this slideshare to learn how SMS is an incredible tool that can take your business to new heights and to learn about common SMS problems like latency, deliverability and carrier compliance. Get the answers you need to your questions in order to be successful in the world of SMS.
Watch this slideshare to learn about:
- Problems inherent in the SMS infrastructure
- Essential components of a business-class SMS solution
- Steps to achieve a high-quality SMS experience for your customers
In the US, all messages generated by an application must be sent over a Short Code. The process to procure a Short Code can take you anywhere from 8-12 weeks and cost you thousands of dollars before your first message is ever sent.
Learn how to avoid potential pitfalls in your application process and even begin sending Short Codes messages in under a week with Nexmo’s Preapproved Short Codes.
Gain insight into the process of going global and connecting with carriers as well as the type of regulations you might encounter along the way.
Watch this slideshare to learn about:
- Country and carrier regulations that you’ll need to comply with
- Factors that will affect your operational costs
- How to achieve truly global reach
Missed calls-OTP for various platforms- cognalys.comCognalys
Cognalys introduces a powerful and cheap two factor authentication for all platforms. Instead of Traditional SMS cognalys is using missed calls method to generate OTP.
Cognalys provides a powerful robust RESTful API for its users to generate missed call OTPs and that OTPs can be used in a veriety of platforms. Cognalys supports international OTP service for more than 200 countries. Cognalys users get powered with an elegent dashboard, RESTful API and REALtime API.
Ghosted presentation from TADHack session at Enterprise Connect 2018Alan Quayle
Steffen, Bruno, Vikki, and Nicolas used VoIP Innovations, Flowroute, Avaya / Zang, and Telenyx to create their hack Ghosted. Their platform touches on a current issue facing many adults today, dating. Most people want to find love and meet their soulmate, but sometimes, you find some undesirable people who become too attached. Most dating apps have one pitfall, being able to directly communicate with a user with anonymity. Our app, “Ghosted”, brings forth anonymity to protect users, but allows a full scale system to communicate via SMS, MMS, and voice calls, without letting the other user know their phone numbers. They won $200 from VoIP Innovations, $500 from Flowroute, and $500 from Avaya / Zang
In the US, all messages generated by an application must be sent over a Short Code. The process to procure a Short Code can take you anywhere from 8-12 weeks and cost you thousands of dollars before your first message is ever sent.
Learn how to avoid potential pitfalls in your application process and even begin sending Short Codes messages in under a week with Nexmo’s Preapproved Short Codes.
Gain insight into the process of going global and connecting with carriers as well as the type of regulations you might encounter along the way.
Watch this slideshare to learn about:
- Country and carrier regulations that you’ll need to comply with
- Factors that will affect your operational costs
- How to achieve truly global reach
Missed calls-OTP for various platforms- cognalys.comCognalys
Cognalys introduces a powerful and cheap two factor authentication for all platforms. Instead of Traditional SMS cognalys is using missed calls method to generate OTP.
Cognalys provides a powerful robust RESTful API for its users to generate missed call OTPs and that OTPs can be used in a veriety of platforms. Cognalys supports international OTP service for more than 200 countries. Cognalys users get powered with an elegent dashboard, RESTful API and REALtime API.
Ghosted presentation from TADHack session at Enterprise Connect 2018Alan Quayle
Steffen, Bruno, Vikki, and Nicolas used VoIP Innovations, Flowroute, Avaya / Zang, and Telenyx to create their hack Ghosted. Their platform touches on a current issue facing many adults today, dating. Most people want to find love and meet their soulmate, but sometimes, you find some undesirable people who become too attached. Most dating apps have one pitfall, being able to directly communicate with a user with anonymity. Our app, “Ghosted”, brings forth anonymity to protect users, but allows a full scale system to communicate via SMS, MMS, and voice calls, without letting the other user know their phone numbers. They won $200 from VoIP Innovations, $500 from Flowroute, and $500 from Avaya / Zang
We offer training in social media
There has to be a better way.
For about the same costs to send one employee to a social media conference, this company could have hired SPECK Media to speak directly to its social media team.
Christopher Martin, Senior Manager, Bosch - It’s Complicated: Why making a gr...How to Web
What's next in the internet of things era? What should we look forward to and what does creating an internet connected product imply?
More details on: http://2013.howtoweb.co/
Cómo exprimir Google Analytics, por Oriol Farré (La Salle Campus Barcelona)La Salle BCN
Google Analytics es la herramienta de analítica web más usada en el mundo. Una herramienta que no deja de evolucionar, y que cada vez nos ofrece más y más información.
Pero, ¿cómo podemos hacer para ver rápidamente la información que realmente es relevante para nuestro negocio?¿Qué recursos nos ofrece Google Analytics para comunicarnos gráficamente dicha información y no tener que invertir tiempo en leer tablas de datos?
En esta presentación veremos cómo sacar el máximo rendimiento a las funcionalidades gráficas de Google Analytics para poder obtener las respuestas que necesitamos, en el menor tiempo posible.
9th International Conference on Social Science and Humanities (ICSSH)Global R & D Services
Conference Name: 9th International Conference on Social Science and Humanities (ICSSH), 26-27 Dec 2016, Bangkok, Thailand
Conference Dates: 26-27 Dec, 2016
Conference Venue: Asian Institute of Technology (AIT), Conference Center, Bangkok, Thailand
Deadline for Abstract/Paper Submissions: Dec 23, 2016
Contact E-Mail ID: info@gahssr.org
Conference Convener: Dr. Dorothy C
Languages: English, Chinese, Arabic, Thai, Persian
http://gahssr.org/9th-international-conference-on-social-science-and-humanities-icssh-26-27-dec-2016-bangkok-thailand-about-17
We offer training in social media
There has to be a better way.
For about the same costs to send one employee to a social media conference, this company could have hired SPECK Media to speak directly to its social media team.
Christopher Martin, Senior Manager, Bosch - It’s Complicated: Why making a gr...How to Web
What's next in the internet of things era? What should we look forward to and what does creating an internet connected product imply?
More details on: http://2013.howtoweb.co/
Cómo exprimir Google Analytics, por Oriol Farré (La Salle Campus Barcelona)La Salle BCN
Google Analytics es la herramienta de analítica web más usada en el mundo. Una herramienta que no deja de evolucionar, y que cada vez nos ofrece más y más información.
Pero, ¿cómo podemos hacer para ver rápidamente la información que realmente es relevante para nuestro negocio?¿Qué recursos nos ofrece Google Analytics para comunicarnos gráficamente dicha información y no tener que invertir tiempo en leer tablas de datos?
En esta presentación veremos cómo sacar el máximo rendimiento a las funcionalidades gráficas de Google Analytics para poder obtener las respuestas que necesitamos, en el menor tiempo posible.
9th International Conference on Social Science and Humanities (ICSSH)Global R & D Services
Conference Name: 9th International Conference on Social Science and Humanities (ICSSH), 26-27 Dec 2016, Bangkok, Thailand
Conference Dates: 26-27 Dec, 2016
Conference Venue: Asian Institute of Technology (AIT), Conference Center, Bangkok, Thailand
Deadline for Abstract/Paper Submissions: Dec 23, 2016
Contact E-Mail ID: info@gahssr.org
Conference Convener: Dr. Dorothy C
Languages: English, Chinese, Arabic, Thai, Persian
http://gahssr.org/9th-international-conference-on-social-science-and-humanities-icssh-26-27-dec-2016-bangkok-thailand-about-17
Network traffic management & Intelligence Alan Percy
Congestion, dropped calls and other anomalies are hidden costs that hurt profitability and damage customer satisfaction. Large enterprises, service providers and others that manage significant voice calling traffic benefit significantly from real-time analysis of the performance metrics of down-stream service providers.
During this session, we'll share some techniques to monitor and improve voice network performace, introducing attendees to Khomp Insight! - a new TelcoBridges Alliance Partner software package that provides intelligent network monitoring and management. Ideal for hosted or enterprise applications, Insight! gives in-depth visibility into network performance, providing for more efficient resource utilization and greater reliability.
Topics covered in this session:
> Challenges of managing network traffic
> Methods used to measure performance and manage traffic
> Introduction to Network Traffic through Intelligence
> A demonstration of Khomp Insight!
> Your Questions
Congestion, dropped calls and other anomalies are hidden costs that hurt profitability and damage customer satisfaction. Large enterprises, service providers and others that manage significant voice calling traffic benefit significantly from real-time analysis of the performance metrics of down-stream service providers.
During this session, we'll share some techniques to monitor and improve voice network performace, introducing attendees to Khomp Insight! - a new TelcoBridges Alliance Partner software package that provides intelligent network monitoring and management. Ideal for hosted or enterprise applications, Insight! gives in-depth visibility into network performance, providing for more efficient resource utilization and greater reliability.
Topics covered in this session:
> Challenges of managing network traffic
> Methods used to measure performance and manage traffic
> Introduction to Network Traffic through Intelligence
> A demonstration of Khomp Insight!
> Your Questions
Integrat relies on RabbitMQ to ensure revenue-generating, mission critical messages are delivered with speed, scale and development flexibility. RabbitMQ provides a key part of Integrat’s infrastructure, and provides a cloud-centric messaging layer to help the business achieve its goals in the future.
To learn more, visit pivotal.io/products/pivotal-rabbitmq.
M2M Optimizations in Public Mobile Networks
M2M Over a Telecommunications Network
Network Optimizations for M2M
The Role of IP in M2M
IPv6 for M2M
6LoWPAN
Routing Protocol for Low-Power and Lossy Networks (RPL) CoRE
M2M Security
Trust Relationships in the M2M Ecosystem
Security Requirements
Which Types of Solutions are Suitable?
Standardization Efforts on Securing M2M and MTC Communications
M2M Terminals and Modules
M2M Module Categorization
Hardware Interfaces
Temperature and Durability Services
Software Interface
Cellular Certification
Connected world speaker presentation kore kenconnorkore june2013KORE_andre
The world's largest M2M global network provider [850+customers]
Award winning M2M platform: PrismPro; 600+devices certified;
24/7/365 tech support; Single source multiple technologies; 7 consecutive years of profitable growth
Empowering Connectivity: Exploring the World of SMPP ServicesTheSMSPoint
Embark on a journey into the heart of connectivity with our exploration of SMPP Services. Discover the power of Short Message Peer-to-Peer protocol in enabling seamless communication. Uncover real-time messaging, enhanced security, and the future of connectivity. Join us in empowering your communication landscape. Explore SMPP Services today at : https://thesmspoint.com/channel/smpp-connectivity
Universal Messaging: Transforming How Businesses CommunicateSoftware AG
Innovation World 2013 presentation.
The value of data depends on its speed. Universal Messaging ensures all devices communicate instantaneously, delivering information and insight in real-time. Hear about the history of Universal Messaging firsts and how it has supported the demanding capital markets segment.
Speaker:
Eddie McDaid
MD - Universal Messaging, Terracotta
Whether you are using our API or our hosted Conversations application, this FAQ session will shed light on topics that typically confuse even the most seasoned customers and will help your organization's messaging programs succeed.
There is currently no accepted standard for the measurement or monitoring of RCS Services, even though we believe that this is vital to assure the quality and reliability of such services -and to establish a framework for reliable comparison across implementations.
To this end Ascom has defined a formal definition and implementation strategy to help the Operations team solve a range of challenges, including issues related to EPC, IMS and the Application Server.
We will describe this solution in a number of short articles. This article describes the 1-to-1 Chat test case.
TCS world class Cloud Messaging platform is able to deliver messages over 2G, 3G, and LTE networks and supports a wide range of applications and functionalities.
www.cloudmessagingcenter.com
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
2. So You Want To Use SMS For
Business Critical
Communications?
2
3. SMS Has The Reach Businesses Want
3
6 billion
people reached
6B
92% engagement rate
92%
95% read rate
95%
SMS is read within 90
seconds of delivery
90sec.
5. The SMS Infrastructure Is Prone To Delays
DEPARTURE
CONNECTION
IT’S A BIT LIKE TRAVELING INTERNATIONALLY. There are two basic models: hub and spoke and
direct. Regardless of which one you pick, your concern is arriving on-time. Just like getting to your intended
destination, sending SMS messages globally can be a volatile process where the risk grows with every
connection.
Connecting Flights
Delays
Customs
X
LUGGAGE
✓
ARRIVAL
6. Industry Fragmentation Drives Complexity And
Lowers Quality Of Service
6
• Latency
• Security
• Deliverability
• Filtering
Infrastructure IssuesLegacy Telco Services
SMS
CARRIER
4
AGGREGATOR
3
AGGREGATOR
2
AGGREGATOR
1
AGGREGATOR
SMS
• Legal Compliance
• Carrier Compliance
• Character set
limitations
Content Issues
• Status
• Credit
• Roaming
• Port
Handset Issues
• Network performance
• Deliverability
• Troubleshooting
Visibility Constraints
App
7. Latency Is A Byproduct Of The Legacy Telco Model
Delayed
Message Delivery
=
Legacy Telco Services
Lowest cost routing
+
+
+
Multi-hub transmission
Message queuing
A2P vs P2P Infrastructure
SMS
CARRIER
4
AGGREGATOR
3
AGGREGATOR
2
AGGREGATOR
1
AGGREGATOR
App
SMS SMS SMS SMS SMS
8. Store-and-forward Model Increases Security Risks
8
The more hops, the more
copies of your business
critical communication
The more copies of your
communications, the
higher the chances that
someone might view them
Legacy Telco Services
SMS
CARRIER
4
AGGREGATOR
3
AGGREGATOR
2
AGGREGATOR
1
AGGREGATOR
App
SMS SMS SMS SMS SMS
Security Risk
SMS SMS SMS SMS SMS SMS
10. Carriers May Filter Messages Indiscriminately
10
Legacy Telco Services
They can also send false
delivery confirmations back
to the sender
With aggregators, your
messages might be filtered
out and you'll think they
were delivered
Carriers have the ability
to arbitrarily filter messages
and prevent delivery
SMS
CARRIER
4
AGGREGATOR
3
AGGREGATOR
2
AGGREGATOR
1
AGGREGATOR
SMS
App
11. Compliance Issues Exist At Multiple Levels
11
• Encoding languages
• Carrier policy
• Block specific words,
phrases
Country Specific Compliance Carrier Specific Compliance
• Privacy
• Send hours
• Illegal content
• Identity issues
12. Legacy Telco Structures Do Not Provide Actionable
Insights
12
Legacy Telco Services
Did the message get delivered?
With legacy telco structures, you don’t
know what you don’t know
If it got delayed, why?
If it didn’t get delivered, why?
Did it get delivered on time?
SMS
CARRIER
4
AGGREGATOR
3
AGGREGATOR
2
AGGREGATOR
1
AGGREGATOR
SMS
App
?
13. Quality Is Challenging With Traditional Infrastructure
13
Messages are sent through multi-hub routes that can significantly impact
the delivery time of a message
1
Business sensitive material is copied at each hub and can be viewed by
anyone who has access to those copies
2
You might not know that the content you are sending is illegal in
some countries
4
Each hop your message takes creates a potential point-of-failure and could
prevent your message from being delivered
3
Customer care is next to impossible because you have limited visibility that
is often inaccurate or fake
5
Latency
Security
Compliance
Deliverability
Visibility
15. Direct-to-Carrier Connections Dramatically Increase
Deliverability
15
• Decreased latency
due to fewer hops
• Increased security
due to lack of
intermediaries
• Increased
deliverability due to
multiple routing
options
Specific Value
Direct-to-Carrier Connectivity - One Hop Max / Typically Zero Hops
SMS
3
CARRIER
HOP
1
CARRIER
HOP
2
CARRIER
HOP
API
App
16. Real-Time Analytics Enable Real-Time Troubleshooting
16
Specific Value
• Increased ability to
identify issues and
improve performance
• Continual monitoring
of key metrics
Real-Time Analytics – Record 500 million Data Points Per Month
SMS
API
3
CARRIER
2
CARRIER
1
CARRIER
App
17. Adaptive Routing Facilitates Proactive Management
of Quality
17
Specific Value
• Decreased latency
and increased
deliverability due
optimized route
selection
• Intelligent selection
of routes
Adaptive Routing - Predict Failure and Automatically Reroute
API
✓
1
CARRIER
2
CARRIER
X
✓
SMS
App
18. Nexmo’s API Enables Business Critical Experiences
Ubiquitous, multi-channel reach
Right info, right time
End-to-end, integrate and simple Data driven, actionable
Global reach, local specificities
Secure and private
Nexmo Provides
19. Case Study: Making Get-Togethers Easier
over all Social Networks
THE SOLUTION
THE RESULTS
THE CHALLENGE
• WePopp relies on SMS for its
users to communicate with
people who don’t have the app
or social networks
• High message deliverability is
critical
• Nexmo’s direct-to-carrier
approach and adaptive
routing ensure maximum
deliverability
• With Nexmo, WePopp SMS delivery success
increased from 80% to 95% globally
• In France, where WePopp is based, deliverability
improved from 95% to 99%
“We tested many different SMS implementations.
Not only does Nexmo provide high delivery rates,
but it also provides excellent tools to measure
success.”
— Julien Hobeika, CEO WePopp
20. Case Study: When Quality of Service
Really Matters
THE SOLUTION
THE RESULTS
THE CHALLENGE
• Validate new user devices
without delay, anywhere in the
world
• Provide a high quality user
experience during registration
• Nexmo provides rapid, highly
reliable message delivery
anywhere in the world
• The Nexmo dashboard
enables Fring to see
deliverability, network
bottlenecks, and more
• A confidence-building user experience
from the start
• Elimination of fraudulent device use
• Improved conversions and service sign-up
“What’s the main reason we chose Nexmo? It has
an excellent conversion rate. That’s critical for
us.”
— Omer Cohen, Operations Manager, fring
Hello, my name is...
Thanks for taking the time to discuss your needs related to SMS and Nexmo’s capabilities. We are really excited about the possibly of helping you raise the bar of your SMS based business critical communications.
<Click>
Most of you here know how effective SMS is as a business communication tool.
<Click>
It has the broadest reach – 6 billion people can be reached with SMS. It has the highest read rate at 95%. SMS is read within 90 seconds of delivery making it the fastest channel for customer interactions. Most importantly, its engagement rate of 92% is three times the engagement rate of email.
That being said, when we work with enterprises from all over the world, they ask us some critical questions that are difficult to answer:
What is your current SMS deliverability rate?
What is the end-to-end latency? How long does it take for messages to be delivered?
How many intermediaries can view my messages before they reach the subscribers’ handsets?
And finally they ask us for data. Do we have actionable analytics that we can provide them to control and monitor their business critical messages?
As we have realized in the last four years in this industry, the main reason why these questions are difficult to answer is inherently linked to why SMS was invented in the first place and how the messaging value chain has been designed. So let’s look at that.
<Click>
SMS was designed 20-25 years ago as a signaling channel; not as a data channel. The original use of the signaling channels was to send messages to control or update user handsets. These messages were sent during off-peak hours and were never seen by users.
So by design, SMS and its infrastructure were not built to be a communication channel let alone a business critical communication channel. SMS lacks fundamental Quality-of-Service algorithms that other communication protocols such as TCP/IP have.
T – This creates side effects on the quality of SMS communication. Now let’s illustrate the problem with an analogy that you might be familiar with.
<Click>
Sending SMS is a bit like traveling internationally. Say you want to go from Los Angeles to London on United Airlines. United will decide to route you through their Chicago Hub.
This Hub-and-Spoke model that United uses allows them to achieve global reach. However, the Hub-and-spoke model has a side effect in that it creates delays due to knock-on effect. For instance, if the weather in Chicago is bad, you get delayed in Chicago and then you’re further delayed in reaching your final destination.
You also encounter local customs that are country specific and are subject to change. You may even encounter airline-specific regulations that affect your travel experience.
Finally, the airline industry is driven by Least Cost Routing, where the “carrier” or the vendor is focused on margin optimization rather than quality of service. So they will decide to route you based on what is best for their bottom line.
As you can see, the hub-and-spoke model in the airline industry achieves global reach but generates negative side effects on quality.
This is similar to how the SMS industry works and how its chain is designed. Networks send messages through geographical areas that are profitable for them. In order to get global with SMS you have to build a massive web of network-to-network hops.
T – These hops pass through aggregators that are chained together to give you reach but come at the cost of quality.
<Click>
Now if you look at how the industry is structured, you will find that the Legacy Telco Services are fragmented (there are a thousand carriers across the world), which increases complexity and causes a host of issues.
You want to get your messages to your customers around the world. In a typical situation, your messages are sent to an aggregator that is local. That aggregator then passes the message along to another aggregator and so on and so forth until it reaches an aggregator connected to the carrier of the phone you are trying to reach. At each step there are a number of potential issues that may come into play.
These issues can be related to –
Infrastructure such as latency, deliverability, and security.
Message content in terms of local compliance, carrier compliance, and character set
Individual handsets – phone is off, out of reach, or out of credit
Visibility constraints on data related to individual message performance or network performance.
We can’t do anything about handset issues because there is no way to deliver a message to a phone that is off or to a customer who hasn’t paid phone bills. But we can do something about the other issues.
T – So lets look at the infrastructure and content issues that might cause issues when delivering a business critical message.
<Click>
Similar to the Airline industry, the first issue with the Legacy Telco Services is latency. Most Aggregators route their SMS traffic based on Least Cost Routing. They change where they route messages based on how much it will cost them.
This results in multiple aggregators routing through the same place to get from point A to point B. Lets say 4 different aggregators are all passing their messages through the Aggregator 2 in this diagram, this can build up a massive message queue that takes time to work through.
So your messages go through Aggregator 1 quickly, but get stuck at Aggregator 2 for hours. At each one of these points you might have massive message congestion that increases the amount of time it takes to deliver your message.
You might care about quality and speed of message delivery but this conflicts with how the value chain is driven – by margin maximization.
T – The second issue with the legacy messaging value chain is security
<Click>
SMS technology is built on a store-and-forward protocol, which means that each network copies your message before it is passed along. On each hop, there is a risk that someone might read your messages. And every time a message gets copied onto a new network that risks increases dramatically.
Now some companies are compliant and ensure that messages are not viewed, but if banking information or password reset communications are being sent, it is key to secure the full chain from your app to the final handset.
T - Lets see now how regulation and compliances might might affect quality.
<Click>
By definition, introducing more and more hops increases the number of points of failure. Since aggregators are driven by cost optimization, your message might bounce around into a few different countries before it ends up at its final destination. Similar to the airline industry, countries or carriers might have their own regulations.
If it passes through a country that has a unique SMS content law, for example, you cannot send URL’s via SMS in Japan, the message could be blocked without notice despite the fact that the content is legal in the final destination.
Another example is encoding support. Let’s say you want to send a message encoded in unicode, e.g., an Arabic or Chinese message. If one of the hops that your message arrives at does not support unicode, your message will be blocked without notice.
T- Filtering is another key issue that has multiple layers and can cause frustrations for businesses using SMS.
<Click>
Now, let’s take a step back and see why filtering exists in the SMS industry. In developed countries, carriers rely on regulation to protect subscribers from spam and it works relatively well. However, in emerging countries, where regulation is difficult to enforce, carriers actually use technology to protect their consumers.
This is similar to spam email filtering technology. While it may prevent spam, it has its drawbacks and imperfections. Carriers may block messages indiscriminately if your message contains certain words. For example, the carrier Orange in Romania will block any message with the word “orange” in its body of text to prevent scam campaigns that use the company name to trick customers.
Even though your messages might be legitimate, they can get caught in a carrier’s spam filters. And worryingly, you will still receive a positive handset delivery confirmation.
T – Filtering is just one aspect of a greater issue in the legacy telco structure: compliance is one of the hardest things to maintain.
<Click>
Similar to the Airline industry, compliance really exists at two levels.
The country level, where there are legal requirements that your messages must adhere to,
The carrier level, where they have individual policies dictating what they will allow through their network.
With over 200 countries and hundreds of carriers globally, it is extremely difficult for any company to understand and stay current on these requirements that change frequently.
A lot of our customers, when they first come to us, have applications specific to each country. This requires dedicated resources to read through 200 pages of regulations per country and to build country specific apps.
What our customers are asking for is the capability to simplify this compliance landscape.
T – The last issue resulting from the legacy Telco design is the inability to see what is really happening with your messages.
<Click>
We’ve spoken at length about how this multi hop system impacts quality and delivery. In addition, it impacts the ability to measure quality and delivery because the further you are from the final carriers, the more your data gets lost in translation. Not to mention that it can be faked from the handset delivery confirmation as in the case of filtering.
Carriers have different sets of error codes and delivery status. Each aggregator attempts to translate and simplify this set of 200+ error codes into a manageable set of say 20. So it really depends on how good the final aggregator in the chain, Aggregator 4 in this example, is at translating and categorizing the final carrier’s error code set to make it useable.
Now if Aggregator 2 changes the route to maximize its margin, well, you will get different set of error codes from the new route provider that uses a different translation map.
If the error codes keep changing with the change in routes, it becomes very complicated over time to track and measure quality.
The lack of actionable data leaves businesses with more questions and very limited ability to answer them.
T – To sum it up, quality is challenging with traditional infrastructure.
<click>
The multi-hop structure creates latency.
Each additional hop increases the security risk.
Each additional hop increases the possibility of delivery failure.
Compliance must be maintained at both country and carrier levels.
And, the lack of actionable data makes it difficult for businesses to measure and benchmark their performance.
<Click>
Nexmo was founded four years ago to raise the bar for SMS.
We looked at the problem as one caused by the industry structure and we adopted an approach that we believe is the right one to address the pain points businesses face with SMS. Our solution is built on the three unique pillars.
Direct-to-Carrier Relationships –getting as close as possible to carriers
Real-time Analytics – collecting data and making it actionable
Adaptive Routing – sustaining a high quality of service for customers using proprietary algorithms
T – Lets begin with how a direct-to-carrier model is better than the traditional hub and spoke model.
<Click>
Let’s draw a parallel with the airline industry again. We’ve seen the emergence of carriers that employ a point-to-point model such as EasyJet in Europe and SouthWest in the US. These airlines do not employ a hub and spoke model, and thereby eliminate all the associated problems to create more value for their customers.
Similarly in the SMS industry, we at Nexmo have spent the last 4 years building a “one hop max” to any carrier network. It is either 0 hop or 1 hop max.
When you send a message it goes from your application to our API and we get it directly to the carriers to reach your customers.
No hops. No handoffs. No aggregator queues. No lowest cost routing.
You get decreased latency and increased deliverability because of our direct-to-carrier connections.
This approach also increases the security of your communications as well as the message does not get copied at multiple hubs.
T – The other benefit of this direct to carrier model, is that we get actionable data that feeds our real-time analytics engine.
<Click>
Today we collect more than 20 million data points per day.
These include Delivery Status, Delivery Confirmations, and Delivery failures. We use this information to build two key measurements of quality, R1 and R2, that are based on real, empirical data..
R1 Data: “Success Ratio” is the percentage of messages received by the handset.
R2 Data: “DLR Ratio” is the percentage of messages with a delivery status, regardless of the success. In addition we gather data on why the message was not delivered.
Because of our direct-to-carrier approach removes the hops, our R1 and R2 data are more accurate and actionable.
But this is not enough because of faked handset DLR for e.g., in case of filtering.
Therefore, Nexmo introduced a third quality measure called Conversion that is unique to the way we operate.
Conversion Data: We know if the message resulted in a user action, say click on a link or entry of a pass code. This feedback loop we believe is the ultimate measure of quality, complemented by the first two. Looking at these three ratios in real-time provides a holistic view of the network performance. These three ratios allow us to track our overall delivery rates on specific carriers in specific areas. It gives us actionable insight into which messages are being delivered and which are not allowing us to track in real time how networks are performing globally.
All of this data is publicly available on our Dashboard real time so you can see how carriers and routes are performing for Nexmo as a whole. You can also benchmark your own data against the Nexmo network averages.
T - With this data we can spot filtering and identify carrier or network issues and actively reroute messages with our adaptive routing technology to ensure delivery.
<Click>
With legacy network design, you need to rely on customer complaints to notify you when your messages aren’t arriving.
We have a developed a better way that is proactive, adaptive and agile. Our adaptive routing algorithm intelligently influences the way we route messages based on the actionable data that we are gathering in real time.
Based on the feedback loop we can adjust the route in real time to ensure messages are delivered and thereby sustain a high quality of service for our customers.
<Click>
In summary, you can raise the bar of your business critical communications with Nexmo.
Easily integrate our Cloud API
Gain multi-channel reach anywhere you want to expand your business.
Scale globally without having to pause and learn new local regulations
Deliver messages to the right customers at the right time
Use the most secure, private method for SMS communication
Get the data you need to measure your success and drive growth
T – Lets now look at how some of our customers are benefited from our approach to quality.
<Click>
This is an example of our customer WePopp. WePopp provides a simple way to coordinate social events allowing you to send invitations via email, SMS, and messaging systems within social networks. WePopp users found that invitations via SMS garnered a very quick response. As a result, SMS deliverability became very important for WePopp.
As WePopp text message use increased, certain challenges became apparent. WePopp’s SMS provider did not have carrier relationships outside France and an increasing number of messages from international users were not reaching intended recipients.
WePopp plugged in to Nexmo’s APIs and transparently benefitted from Nexmo’s global direct to carrier network and adaptive routing technology. When they looked at the results, they saw an increase from 80% to 95% in SMS delivery globally.
Even in France, where WePopp had a direct connection, their deliverability improved from 95% to 99%. This is because carriers are not perfect and experience downtime from planned maintenance, backed up queues from big campaigns etc.
With Nexmo, we not only have direct connections to carriers in France, but also have multiple other routes to reach carriers in France. So even if a carrier is backed up, we can send the message through our other routes to ensure message delivery.
Fring is a mobile app that allows it users to call, text, and video chat with other users for free. Fring uses Nexmo to authenticate users with a one-time-password during user acquisition. This is a business-critical use case where they could be paying $3-$5 (industry avg.) to acquire customers and it is critical at this juncture that the passcode be delivered to a user. Fring plugged in to Nexmo APIs and increased their conversion across the board. This not only decreased their user acquisition costs but also created incremental value with each additional user acquired.
As they use Nexmo’s Conversion API, we are able to show them their conversion data in real time to measure their performance and benchmark with the Nexmo average conversion on any carrier.