|By Kevin Benedict||
|August 28, 2014 04:28 PM EDT||
One of the most popular functions of a mobile phone is SMS or mobile messaging. Just look at the number of messages your family sends each month. We sometimes forget, in these days of mobile apps, that SMS and mobile messaging platforms offer powerful capabilities for the enterprise. In this interview with the Senior Product Manager of OpenMarket, Andy Shirey, we discuss the value of mobile messaging for the enterprise and how it has evolved. Enjoy!
Video Link: http://youtu.be/k3G7ByYoSNY?list=UUGizQCw2Zbs3eTLwp7icoqw
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Browse the Mobile Solution Directory
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Dec. 10, 2016 02:15 AM EST Reads: 777
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 10, 2016 02:00 AM EST Reads: 1,981
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 10, 2016 02:00 AM EST Reads: 541
Dec. 10, 2016 01:30 AM EST Reads: 3,995
Dec. 10, 2016 01:30 AM EST Reads: 752
Dec. 10, 2016 01:15 AM EST Reads: 1,213
Dec. 10, 2016 01:00 AM EST Reads: 1,258
Dec. 10, 2016 12:45 AM EST Reads: 458
Dec. 10, 2016 12:30 AM EST Reads: 607
Dec. 9, 2016 11:30 PM EST Reads: 1,150
Dec. 9, 2016 10:45 PM EST Reads: 540
Dec. 9, 2016 10:30 PM EST Reads: 1,728
Dec. 9, 2016 10:00 PM EST Reads: 314
Dec. 9, 2016 09:45 PM EST Reads: 2,009
Dec. 9, 2016 09:30 PM EST Reads: 1,284