IT Services  >   Telecommunications Services  >   Wireless Services  >  

Short Message Service

RSS Feed    Add to Google    Add to My Yahoo!
Short Message ServiceReports
 
SMS Alert System Boosts Service for Rasa Sentosa Resort
sponsored by TalariaX
CASE STUDY: Dive into this case study to learn about the SMS alert system that Rasa Sentosa Resort in Singapore chose to alert their network engineers, equipped with a filter to allow only important messages to be sent as SMS, reducing unnecessary SMS disturbances.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

TalariaX

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Prudential Asset Management Case Study
sponsored by TalariaX
CASE STUDY: Access this brief case study that describes the plug-and-play system that Prudential Asset Management, a fund management company in Singapore, harnessed to process and convert their email alert messages to SMS. Learn how their SMS messaging is no longer dependent on other networks, providing continuous uptime.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

TalariaX

Case Study: How Tenet Insurance Improved Network Monitoring with SMS Alerts
sponsored by TalariaX
CASE STUDY: Access this concise case study that explains how an insurance company utilized SMS to provide quick and reliable IT alerts to increase response times and thus reduce system and application downtime. Read on now to learn more.
Posted: 19 Sep 2014 | Published: 31 Dec 2012

TalariaX

How a service city improved their SMS alert system
sponsored by TalariaX
CASE STUDY: Access this case study to learn about an SMS alert system that was deployed in a California service city that was complementary to the existing fire department infrastructure but also enhanced communication capabilities for a more efficient and reliable notification system, while maintaining a low capital investment.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

TalariaX

Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals
sponsored by TigerText, Inc.
EGUIDE: This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

TigerText, Inc.

The Five Must-Have Capabilities for Unbeatable Customer Care
sponsored by Pitney Bowes Business Insight
WHITE PAPER: Today, firms in the communications industry must relook at how they deliver customer service in order to streamline operations, retain customers and drive business revenue. Read this paper to learn about five, practical, cost-effective opportunities that allow firms to meet market demand and achieve an impressive Return on Investment.
Posted: 15 Jan 2010 | Published: 15 Jan 2010

Pitney Bowes Business Insight

Get a Grip on Mobile Bill Management
sponsored by Xigo
EBOOK: Mobile communications are common in today’s enterprises. The challenges of mobile expenses are daunting. This E-Book discusses the challenges and solutions needed to analyze mobile use and manage costs.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Xigo

IPCheck Server Monitor Version 5
sponsored by Paessler AG
SOFTWARE DEMO: With a bird's eye view IPCheck Server Monitor observes your network, servers, or applications and will notify you as soon as it detects a problem. If you don't hear from IPCheck Server Monitor you know that your business is running smoothly.
Posted: 10 Sep 2007 | Premiered: 29 Aug 2007

Paessler AG

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement