nexmo presentation at tadhack

14
Hacking the Nexmo API Telecom Application Developer Hackathon Madrid, June 6th and 7th 2014

Upload: alan-quayle

Post on 09-May-2015

765 views

Category:

Technology


0 download

DESCRIPTION

Nex

TRANSCRIPT

Page 1: Nexmo presentation at TADHack

H a c k i n g t h e N e x m o A P I

Telecom Application Developer Hackathon

Madrid, June 6th and 7th 2014

Page 2: Nexmo presentation at TADHack

Part 1:

Live Coding

Page 3: Nexmo presentation at TADHack

Useful documentation

Nexmo documentation: https://docs.nexmo.com/index.php/voice-api

Nexmo SMS API: https://docs.nexmo.com/index.php/sms-api

Nexmo Voice API: https://docs.nexmo.com/index.php/voice-api

Nexmo Labs: https://labs.nexmo.com/

Page 4: Nexmo presentation at TADHack

Part 2:

Sample Use Cases

Page 5: Nexmo presentation at TADHack

1.0 Sending Alerts & Invites

Alerts 1. Suspect activity takes place 2. Alert sent to users phone

Social Invites 1.  Sarah Installs your app 2.  Selects contacts to invite 3.  Effectively and selectively send invites

Page 6: Nexmo presentation at TADHack

2.0 Verify Identity During Sign Up/Sign In

Client Side 1.  Jack signs onto your site 2.  He receives a one time code

on his mobile 3.  Provides the code he was

sent to verify his identity with the server

Server Side 1.  Login configured for 2FA 2.  Code generated, stored, and

sent via SMS 3.  Server verifies Jack’s identity

by checking the code entered with the stored code

Page 7: Nexmo presentation at TADHack

3.0 Proxy SMS for Privacy

User 1: Bob 1.  Bob wants to

message Alice anonymously

2.  He is given a proxied number

3.  Sends a message

Server 1.  Checks sender to

find that its Bob 2.  Queries for Bob’s

conversation 3.  Sends Bob’s

message to Alice

User 2: Alice 1.  Receives the

message from the proxied number

2.  Replies to Bob 3.  Process repeats

Page 8: Nexmo presentation at TADHack

4.0 Pipeline Data: Using SMS as a channel

Device monitoring data inputs 1.  An event outside of normal parameters occurs where wireless

internet connection is unavailable 2.  The device sends an SMS immediately upon being triggered, or

on a schedule 3.  The SMS becomes an HTTP request to a server 4.  Data is accessible and near real-time

Page 9: Nexmo presentation at TADHack

5.0 Virtualize Numbers

Provide SMS without a phone 1.  Sarah needs to send and receive without a phone 2.  She’s provided a virtual number 3.  She sends a new message from the application 4.  Outbound messages are relayed via SMS 5.  Tom sends Sarah’s virtual number a message via SMS 6.  The message is relayed to the application where Sarah receives

it

Use Case 1

Page 10: Nexmo presentation at TADHack

5.1 Virtualize Numbers

Send SMS from a different number e.g. work vs home 1.  Sarah needs to send and receive without using her personal

number 2.  She’s provided a virtual number, and can reply, or load her

contacts 3.  Tom sends her virtual number an SMS

Use Case 2

Page 11: Nexmo presentation at TADHack

5.2 Virtualize Numbers

Have two way SMS conversations virtually 1.  Sarah needs to send and receive without using her personal

number 2.  She’s provided a virtual number, and can reply, or load her

contacts 3.  Tom is assigned a virtual number 4.  He sends an SMS 5.  Inbound SMS is relayed using Tom’s virtual number

Use Case 3

Page 12: Nexmo presentation at TADHack

6.0 Request Feedback

Allow users to send in feedback through SMS 1.  Jerry gives a speech 2.  He needs a way to gather feedback 3.  He provides a number that users can respond to via SMS 4.  Feedback is stored in application for analysis

Page 13: Nexmo presentation at TADHack

Nexmo connects the whole world

Through very simple cloud API

Page 14: Nexmo presentation at TADHack

Call to action

2 way communication

Healthcare • Appointment management

• Patient follow-up • Medication reminders

Retail • Customer authentication • Customer service • Promotions

Social Media • User authentication • P2P messaging • Social invites

Travel/Hospitality • Reservation confirmation • Check-in & -out • Travel alerts

Finance • 2 factor authentication • Transaction alert • Balance alerts

Just to give you some ideas…

User 2 factor authentication

Marketing communications

Notifications, alerts and promotions Virtual numbers Payment

confirmation

Booking & delivery confirmation