IT Services  >   Telecommunications Services  >   Wireless Services  >  

Short Message Service

RSS Feed    Add to Google    Add to My Yahoo!
Short Message Service Reports
 
Video, Live Chat Usher in Multichannel Customer Service Challenges
sponsored by BoldChat - LogMeIn
EGUIDE: Customers are demanding real-time customer service and contact centers are being forced to respond. Explore the pros and cons of 4 main communication channels, how to use customer data to your advantage, and how you can achieve multichannel customer service success.
Posted: 20 Dec 2016 | Published: 14 Dec 2016

BoldChat - LogMeIn

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals
sponsored by TigerText, Inc.
EGUIDE: This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

TigerText, Inc.

Using SMS for Marketing: A Beginner’s Resource
sponsored by StrikeIron
WHITE PAPER: One of the simplest ways to connect with your customers is one they use daily with their friends -- SMS, or text message. In this buyer's guide, learn all about the use of SMS for a variety of customer relationship management (CRM).
Posted: 30 May 2014 | Published: 30 May 2014

StrikeIron

The Five Must-Have Capabilities for Unbeatable Customer Care
sponsored by Pitney Bowes Business Insight
WHITE PAPER: Today, firms in the communications industry must relook at how they deliver customer service in order to streamline operations, retain customers and drive business revenue. Read this paper to learn about five, practical, cost-effective opportunities that allow firms to meet market demand and achieve an impressive Return on Investment.
Posted: 15 Jan 2010 | Published: 15 Jan 2010

Pitney Bowes Business Insight

TransPromo Opportunities in a Digital World: Electronic Adaptations in an Era of Mobile Communications and Distracted Customers
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This whitepaper traces the evolution of E-Transpromo, demonstrating the increasingly important role across new media. It explores self-service web portals, online banking and bill consolidators, cell phone bill pay, and secure transaction email.
Posted: 03 Sep 2008 | Published: 03 Sep 2008

Pitney Bowes Group 1 Software

Genesys Global Consumer Survey - 2007
sponsored by Genesys
WHITE PAPER: This survey highlights the importance of the contact center experience and the direct impact it can have on revenue and consumer loyalty, it also reveals some interesting trends in consumer expectations.
Posted: 25 Mar 2008 | Published: 01 Jan 2007

Genesys

Intuitive and Secure, Two-Factor Authentication on Mobile Phones
sponsored by Confident Technologies
WHITE PAPER: Many online business and websites today are utilizing user's mobile phones for two-factor authentication. However, attacks on mobile devices and the SMS communication channel are increasing, calling for more secure methods of authentication. View this paper now to explore effective multi-layered, multifactor authentication methods.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

Confident Technologies

IPCheck Server Monitor Version 5
sponsored by Paessler AG
SOFTWARE DEMO: With a bird's eye view IPCheck Server Monitor observes your network, servers, or applications and will notify you as soon as it detects a problem. If you don't hear from IPCheck Server Monitor you know that your business is running smoothly.
Posted: 10 Sep 2007 | Premiered: 29 Aug 2007

Paessler AG

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement