Often, I scratch my head and wonder, “How relevant is SMS in 2018, which also marks the 25th birthday of text messaging?”


8 Must-Ask IoT Connectivity Questions

by ‎02-01-2018 07:50 AM - edited ‎02-01-2018 07:52 AM

The Internet of Things (IoT) holds incredible opportunities for businesses, their partners, and end users, and much of its promise hinges on connections that exchange data and automate processes without human intervention. Cellular connectivity plays a key role with nomadic devices enabling a wide range of IoT technology.



The Case for Short Codes in a Long Code World

by Moderator ‎05-23-2017 10:56 AM - edited ‎05-23-2017 11:27 AM

Receipt of SMS messages from a previously unknown or unexpected long code is no different than receiving a message from a previously unknown or expected email address. At best, it may be recognized; however, at worst, it could be a phishing attack. There is no legitimacy. With SMS Short codes, you have some measure of confidence that the message is legitimate as the sender is likely recognized. In fact, if an organization is sending important, time sensitive messages such as 2FA codes, then we would recommend that the originating address of the SMS messages should be an easy-to-remember and recognize short code.


When we talk about the consumer we really mean the shopper and shopping is now no longer just the moment of purchase. Brands and their Advertising agencies must look further to track and understand the changes in shopping behaviors.


Last mile connectivity – Your connection to a happy customer

by ‎05-09-2017 08:43 AM - edited ‎05-09-2017 09:03 AM

“Last mile connectivity” is always taken for granted and used by everyone in everyday life. We could not live without it. Is such importance of the last mile also reflected appropriately in the vendor evaluation?


SAP Consumer Insight 365 Leads the Industry in Features and Design

by Sophia_Marx on ‎12-07-2016 02:32 AM - last edited on ‎05-11-2017 08:32 AM by Community Manager

Let’s say you want to open up Bob’s Donuts in a particular area of Santa Clara. What facts do you need to know? Who lives there, who works there, are there other donut shops nearby? Are customers shopping or eating in the area? Would a marketing campaign catch the right types of customers? Will Bob’s Donuts be successful in this area?


The solution is simple. SAP Consumer Insight 365 powered by SAP Digital Interconnect.


Have you ever forgotten a password?  I know that I have.  I do all the time, in fact, although over the last year or two, I’ve gotten better at managing my password schemes (yes, I have schemes that I’ve memorized to generate new passwords).  But forgotten password recovery is a “popular” mechanism in which bad guys can gain access to your account. So, we must incorporate a number of checks to disrupt and prevent attempts to gain access to accounts.


The Struggle is real: Learning to love 2FA to combat online fraud

by Moderator on ‎09-26-2016 07:15 AM - last edited on ‎12-07-2016 04:02 AM by Community Manager

In the past few years, the incidents of major data breaches as well as hacking into personal accounts for not only public people, but also not-so-public people, seem to be on the increase. 


For SMS messaging, getting routing right is important

by Moderator ‎05-02-2016 12:56 PM - edited ‎10-25-2016 08:14 AM

Why is it important that SMS messages are routed correctly? The global SMS ecosystem consists of separate, logical Application-to-Person (or A2P) connectivity network – one where mobile network operators (MNOs) have approved, and in many cases, monetized, this type of mostly commercial and non-human generated traffic. Traditionally, the A2P network uses separate connectivity from the general conversational or Person-to-Person (or P2P) connections. The reasons for this are numerous; however a significant reason is that it helps to control spam andgrey route traffic over the P2P networks.



At the 2016 Facebook’s F8 Developer’s conference, a new no-password login solution was announced called Account Kit.  Account Kit is designed to be an alternative login facility for people who either don’t want to use a social login such as Facebook or a non-password login. Users are given a choice between either email or their mobile phone number as their “identity.”  After providing one or the other, a one-time code is sent via email or SMS to their mobile device.  Access to the account is then granted.


About the Authors
  • John Candish leads the global business for SAP IoT Connect 365 for the SAP Digital Interconnect organization His goal is to make connecting IoT devices globally simpler for all enterprises. John has worked in both technical and commercial roles. Prior to his current position, John headed the global business for SAP IPX 365 mobile service for SAP Digital Interconnect.
  • Rohit Tripathi is Global Vice President and General Manger, SAP Digital Interconnect, and brings with him over 20 years of experience in software and business operations. In his current role, Rohit focuses on bringing to market value added solutions that help SAP Mobile Services customers get more engaged, secure and gather actionable insights in the Digital World. Rohit also serves on the North American Board of Directors for Mobile Marketers Association. Previously, Rohit held various leadership positions at SAP in the area of technology and products. Prior to joining SAP, Rohit was with The Boston Consulting Group where he advised senior executives of Fortune 500 companies on business strategy and operations.
  • William Dudley has almost 30 years of experience building and managing telecommunications network infrastructure. He defines SAP Digital Interconnects’ global solutions strategy within the mobile ecosystem, focusing on solutions for messaging, next-generation networks (LTE, IPX), and mobile consumer engagement. As mobile evangelist, he communicates through both internal and external publications and is active in industry groups.