Start enriching your app
No Credit Card Required

Blog

Learn
Learn
mobileuser
By - July 20, 2015

Designed to defraud: the why of voice verification

Terminating bugs in your system is expensive in more than one way. With over 3B active Internet users, websites are more vulnerable than ever, as well as ransomware and malvertising. Not only is awareness and prevention techniques getting better, but… read more

Learn
Two Factor Authentication
By - July 17, 2015

How Two Factor Authentication is making apps more secure

Internet security is gaining more relevance as breaches increase. Society is turning mobile, which means that both private and work related information is being stored on and accessed through our devices. This of course also implicates a broader “market position”… read more

Learn
on-demand
By - May 28, 2015

The On-Demand Revolution

We have the world at our fingertips, literally. With the rise of on-demand, anyone with a smartphone can request almost anything with just a few finger taps, and have it within an hour. Luxuries that were once only for the wealthiest… read more

Learn
iphone-6-458153_1280a
By - May 27, 2015

WebRTC vs RCS — What’s The Difference

We myth busted the WebRTC vs VoLTE issue and decided to make it a fairer fight by bringing RCS into the ring for a direct battle. What is WebRTC WebRTC refers to Web Real-Time Communications. It is a free, open… read more

Learn
sinch webrtc
By - May 22, 2015

Phone Numbers: Verified Value

Today’s growing mobile market has resulted in the need for increased protection of user information. Spammers, fraudulent accounts, and hackers are on the rise, which has placed number verification at the top of many business’ priority lists. A secure user base… read more

Learn
ortc vs webrtc
By - May 21, 2015

ORTC vs WebRTC — What’s The Difference

We set VoLTE & RCS side by side in comparison to WebRTC previously, and we bring in the discussion of ORTC vs WebRTC for another round in the ring. Their relation is intrinsic, and they might not even be competitors, but… read more

Learn
Two-Factor Authentication (2FA)
By - May 15, 2015

What is 2FA and why should you care?

Co-author: Yaron Oren You may have heard about Apple’s recent rollout of two-factor authentication (2FA for short) to iMessage and Facetime. If you’re unfamiliar with the term, here’s a simple breakdown: if you’ve ever received a pin code via SMS at to enter… read more

Learn
webrtcvolte
By - May 11, 2015

WebRTC vs. VoLTE – Whats the difference?

In our ongoing series of putting technologies head to head, we jump on the WebRTC vs. VoLTE bandwagon and offer our 2 cents worth. The Wikipedia definitions for both technologies are hazy and too simplistic for us so we wanted to… read more

Learn
android push notifications
By - April 17, 2015

Sinch Managed Push for Calling on Android

In this post, I’ll walk you through adding push to your Sinch app to app calling Android app. All of the code in this post can be found in the push sample app included in the Android SDK. Sinch uses… read more

Learn
164H
By - March 26, 2015

8 proven triggers to retain app users and reduce churn

Not all apps are made equal. But all apps are looking to reach the promised land of amazing engagement from frequent users, and have loyal customers who keep returning. They are two sides of the same golden coin to us,… read more