IT Services  >   Telecommunications Services  >   Wireless Services  >  

Short Message Service

RSS Feed    Add to Google    Add to My Yahoo!
Short Message ServiceReports
 
HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Integrating Mobile Device Management with UC Systems and Features
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

SearchSecurity.com

Prudential Asset Management Case Study
sponsored by TalariaX
CASE STUDY: Access this brief case study that describes the plug-and-play system that Prudential Asset Management, a fund management company in Singapore, harnessed to process and convert their email alert messages to SMS. Learn how their SMS messaging is no longer dependent on other networks, providing continuous uptime.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

TalariaX

Case Study: How Tenet Insurance Improved Network Monitoring with SMS Alerts
sponsored by TalariaX
CASE STUDY: Access this concise case study that explains how an insurance company utilized SMS to provide quick and reliable IT alerts to increase response times and thus reduce system and application downtime. Read on now to learn more.
Posted: 19 Sep 2014 | Published: 31 Dec 2012

TalariaX

SMS Alert System Boosts Service for Rasa Sentosa Resort
sponsored by TalariaX
CASE STUDY: Dive into this case study to learn about the SMS alert system that Rasa Sentosa Resort in Singapore chose to alert their network engineers, equipped with a filter to allow only important messages to be sent as SMS, reducing unnecessary SMS disturbances.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

TalariaX

Intuitive and Secure, Two-Factor Authentication on Mobile Phones
sponsored by Confident Technologies
WHITE PAPER: Many online business and websites today are utilizing user's mobile phones for two-factor authentication. However, attacks on mobile devices and the SMS communication channel are increasing, calling for more secure methods of authentication. View this paper now to explore effective multi-layered, multifactor authentication methods.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

Confident Technologies

Get a Grip on Mobile Bill Management
sponsored by Xigo
EBOOK: Mobile communications are common in today’s enterprises. The challenges of mobile expenses are daunting. This E-Book discusses the challenges and solutions needed to analyze mobile use and manage costs.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Xigo

How to use Email, SMS, MMS, and PIN Messaging
sponsored by BlackBerry
VIDEO: This video, presented by Tariq Tahir, covers how to integrate BlackBerry Java applications with various BlackBerry messaging systems. Topics include email application, PIN messaing, SMS messaging, MMS messaging, and more.
Posted: 11 Jun 2010 | Premiered: 11 Jun 2010

BlackBerry

Taking a SIP: What Executives Should Know about IP Transformation in the Contact Center
sponsored by Genesys
WHITE PAPER: This white paper is intended for executives who are seeking to understand why SIP (Session Initiation Protocol) is a must-have technology for the contact center today, and how SIP-enabled IP solutions can help align you with your goals.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Genesys

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement