Categories
Ozioma

How to Deactivate DND On All GSM Networks

DND (Do-Not-Disturb) is a service that stalls bulk SMS from getting delivered to your contacts or your phone number. People subscribe to DND to enable them to opt-out from receiving third party SMS messages, such as marketing campaigns and ads. As thus, this poses a challenge on sending or receiving SMS to/on DND active numbers. The only way out in most cases is if contacts unsubscribe from the service. This can only be done directly from the mobile phone of the contacts themselves.

Here are steps on how to unsubscribe or deactivate DND on all GSM networks in Nigeria.

To confirm if your phone number is DND active, simply text STATUS to 2442. For Glo numbers text HELP to 2442. If it is active it means that you can’t receive bulk SMS on that number.

Text START to 2442 on your 9mobile number if DND is active to deactivate it.

Text START to 2442 on your GLO number if DND is active to deactivate it.

Text ALLOW to 2442 on your AIRTEL number if DND is active to deactivate it.

For an MTN number that is DND active, text ALLOW to 2442 to deactivate it.

It has been discovered that Network Providers are automatically enabling DND on their subscribers’ line without their consent, and a lot of contacts aren’t aware they are DND active.

 In case these codes don’t work, kindly call your Customer Care. (Airtel 111 or 121, MTN 180, 9mobile 200, GLO 121 or 200)

Categories
Chibex Ozioma

Desktop Application Development?

Desktop applications are simply programs that can be run on your computer without needing to use a browser. Any program installed on your computer is a Desktop application (unless it runs in the background). Good examples of this can be: Microsoft File Explorer.

 The applications installed on the system’s local server known as the desktop apps, you can install it from the online websites or use the CD drive to complete the installation process. After the installation process, it does not require any internet connection to access, it works on the system’s local server.

Desktop applications and web applications are similar but not the same. The primary difference of both are desktop apps runs on the local server of the computer devices and web applications work over the internet remote access.

Types of desktop frameworks

Desktop frameworks for windows app development:

Microsoft itself provides a tool kit with a development community to develop. It allows to develop the backend with awesome coding frameworks and also it also provides the option to design a unique and eye-catching frontend windows app development. Microsoft toolkits are the best option for developing the windows app with its advanced and accessible feature of frameworks.

You can choose toolset for the universal windows platform development if you are creating your app for the windows store and develop the app you wish you to with amazing and easy to use tools and frameworks.

Desktop frameworks for MacOS app development:

Apple also encourages developers to design the desktop apps which is compatible with the architecture of the Apple computers. Logic Pro X is the default app development app launched by the app to Apple to ensure that users develop the apps which support all the Apple devices such as iOS, MacOS, watches, and even tvOS.

Cross-platforms frameworks for desktop app development:

Developers prefer to develop the apps which support cross platforms same time so that all the user can utilize it without any hassle. The key benefit of using the cross-platform framework, you are developing the unified codebase which is reused for the SaaS version of the developed app which enhances your targeted audiences.

The cross-platform frameworks are the best choice, if you are going to develop a desktop application and also you will get lots of advantages of cross platforms also it’s beneficial for the future aspects.

Different Categories of Desktop Applications to choose from

There are lots of options in desktop apps which you can choose to design or develop. It depends on your choice that which kind of application you want to design.

  • Standalone Business Application: These type of applications are the standalone business apps which are like Excel, Word, Outlook and more applications. The category includes applications which make people’s work efficient.
  • Client-Server Applications: The applications which work on the local server of the systems but the access of the information are on the remote server.
  • Utilities and Plug-ins for systems: The utilities and plug-ins which enhance the efficiency of the user’s work it include in this category.
  • Collaborative Application: These applications are included in the collaborative category it serves the common task for the users. And users can interact with the common task.
  • Multimedia Applications: This the application which helps to play movies, videos, sound files and more files from the user’s system.

There are more categories of the desktop applications which carry as per the framework of the app. You can choose any type of app to design as per your preferences.

Desktop Application Development with Chibex Tecnologies

We at Chibex Technologies ensures that you receive a desktop application that scores high on performance and enhances your business steadily.

  • We use C++ as our main language for creating desktop applications. While being powerful and flexible, it additionally allows us to control the applications at a genuine level possible.
  • .NET Framework Technology is used for development for Windows platform when a taut and seamless integration of the desktop application with Microsoft products is needed.
  • Java development platform is a prime key for desktop application development. Whether you need Java/ J2EE programming services for mobile applications or for web applications, our professional team will design solutions matching your requirements.

No matter what business you run, desktop application development tools will ease your workload and increase your bottom line. You can also get the excellent splash screen for software for your businesses with our exclusive services. We also follow the norms and morals on our windows app development and software development for the user interface, windows application UI development, cache management, testing services for software, debugging, software maintenance and performance tuning.

Categories
Chibex Ozioma

Two Factor Authentication (2FA)

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factor to verify themselves. This process is done to better protect both the user’s credentials and the resources the user can access. Two-factor authentication provides a higher level of security than authentication methods that depend on single-factor authentication (SFA), in which the user provides only one factor — typically, a password or passcode. Two-factor authentication methods rely on a user providing a password, as well as a second factor, usually either a security token or a biometric factor, such as a fingerprint or facial scan.

Two-factor authentication adds an additional layer of security to the authentication process by making it harder for attackers to gain access to a person’s devices or online accounts because knowing the victim’s password alone is not enough to pass the authentication check. Two-factor authentication has long been used to control access to sensitive systems and data, and online service providers are increasingly using 2FA to protect their users’ credentials from being used by hackers who have stolen a password database or used phishing campaigns to obtain user passwords.

Categories of  2FA

2FA is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password. Then, instead of immediately gaining access, they will be required to provide another piece of information. This second factor could come from one of the following categories:

  • Something you know: This could be a personal identification number (PIN), a password, answers to “secret questions” or a specific keystroke pattern.
  • Something you have: Typically, a user would have something in their possession, like a credit card, a smartphone, or a small hardware token.
  • Something you are: This category is a little more advanced, and might include biometric pattern of a fingerprint, an iris scan, or a voice print.
  • A location factor: This usually denoted by the location from which an authentication attempt is being made, can be enforced by limiting authentication attempts to specific devices in a particular location or, more commonly, by tracking the geographic source of an authentication attempt based on the source Internet Protocol (IP) address or some other geolocation information, such as Global Positioning System (GPS) data, derived from the user’s mobile phone or other device.
  • A time factor: This restricts user authentication to a specific time window in which logging on is permitted and restricts access to the system outside of that window.

With 2FA, a potential compromise of just one of these factors won’t unlock the account. So, even if your password is stolen or your phone is lost, the chances of someone else having your second-factor information is highly unlikely. Looking at it from another angle, if a consumer uses 2FA correctly, websites and apps can be more confident of the user’s identity, and unlock the account.

It should be noted that the vast majority of two-factor authentication methods rely on the first three authentication factors, though systems requiring greater security may use them to implement multifactor authentication (MFA), which can rely on two or more independent credentials for more secure authentication

Common Types of 2FA

If a site you use only requires a password to get in and doesn’t offer 2FA, there’s a good chance that it will be eventually be hacked. That doesn’t mean that all 2FA is the same. Several types of two factor authentications are in use today; some may be stronger or more complex than others, but all offer better protection than passwords alone. Let’s look at the most common forms of 2FA.

Hardware Tokens for 2FA

Probably the oldest form of 2FA, hardware tokens are small, like a key fob, and produce a new numeric code every 30-seconds. When a user tries to access an account, they glance at the device and enter the displayed 2FA code back into the site or app. Other versions of hardware tokens automatically transfer the 2FA code when plugged into a computer’s USB port.

They’ve got several downsides, however. For businesses, distributing these units is costly. And users find their size makes them easy to lose or misplace. Most importantly, they are not entirely safe from being hacked.

SMS Text-Message and Voice-based 2FA

SMS based 2FA interacts directly with a user’s phone. After receiving a username and password, the site sends the user a unique one-time passcode (OTP) via text message. Like the hardware token process, a user must then enter the OTP back into the application before getting access. Similarly, voice-based 2FA automatically dials a user and verbally delivers the 2FA code. While not common, it’s still used in countries where smartphones are expensive, or where cell service is poor.

For a low-risk online activity, authentication by text or voice may be all you need. But for websites that store your personal information — like utility companies, banks, or email accounts this level of 2FA may not be secure enough. In fact, SMS is considered to be the least secure way to authenticate users. Because of this, many companies are upgrading their security by moving beyond SMS based 2FA

Software Tokens for 2FA

The most popular form of two-factor authentication (and a preferred alternative to SMS and voice) uses a software-generated time-based, one-time passcode (also called TOPT, or “soft-token”).

First, a user must download and install a free 2FA app on their smartphone or desktop. They can then use the app with any site that supports this type of authentication. At sign-in, the user first enters a username and password, and then, when prompted, they enter the code shown on the app. Like hardware tokens, the soft-token is typically valid for less than a minute. And because the code is generated and displayed on the same device, soft-tokens remove the chance of hacker interception. That’s a big concern with SMS or voice delivery methods.

Best of all, since app based 2FA are available for mobile, wearables, or desktop platforms — and even work offline — user authentication is possible just about everywhere.

Push Notification for 2FA

Rather than relying on the receipt and entry of a 2FA token, websites and apps can now send the user a push notification that an authentication attempt is taking place. The device owner simply views the details and can approve or deny access with a single touch. It’s passwordless authentication with no codes to enter, and no additional interaction required.

By having a direct and secure connection between the retailer, the 2FA service, and the device, push notification eliminates any opportunity for phishing, man-in-the-middle attacks, or unauthorized access. But it only works with an internet-connected device, one that’s able to install apps to. Also, in areas where smartphone penetration is low, or where the internet is unreliable, SMS-based 2FA may be a preferred fall-back. But where it is an option, push notifications provide a secure form of security.

Other Forms of Two-Factor Authentication

Biometric 2FA, authentication that treats the user as the token, is just around the corner. Recent innovations include verifying a person’s identity via fingerprints, retina patterns, and facial recognition. Ambient noise, pulse, typing patterns, and vocal prints are also being explored. It’s only a matter of time before one of these 2FA methods takes off…and for biometric hackers to figure out how to exploit them.

Rather than building 2FA themselves, many businesses find that it’s smarter and more cost-effective to partner with an expert. Chibex Technologies offers a comprehensive suite of developer friendly authentication API’s and an SDK that can turn any app into self-branded authenticator.

Categories
Chibex Ozioma

Everything You Need to Know About USSD

Unstructured Supplementary Service Data (USSD), sometimes referred to as “Quick Codes” or “Feature codes“, is a communications protocol used by GSM cellular telephones to communicate with the mobile network operator’s computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network.

USSD applications run on the network, not on a user’s device. As such, they don’t have to be installed on the user’s phone, which is an advantage for users with feature phones that have limited storage space. USSD apps are instantly available to every subscriber the moment they’re deployed to a network.

USSD messages are up to 182 alphanumeric characters long. Unlike Short Message Service (SMS) messages, USSD messages create a real-time connection during a USSD session. The connection remains open, allowing a two-way exchange of a sequence of data. This makes USSD more responsive than services that use SMS.

How USSD works

Typically, USSD involves a query from a mobile phone user, such as a request for a bank account balance. Once the user sends the request, the USSD gateway forwards it to the user’s USSD application, which responds to the request.

The process is then repeated in reverse, i.e., the response goes back to the USSD gateway, which displays the content of that response on the screen of the user’s mobile phone. Generally, the responses, which contain a maximum of 182 alphanumeric characters, are sent in a format that’s easy to display. The user sends and receives data by dialing a specific short code usually, five numbers.

.

How USSD is used

USSD is used for several purposes, including the following:

  • Mobile banking. Unlike banking apps that need internet access and smartphone functionality, USSD banking can work on any mobile device, including feature phones.
  • Network configuration and requests. USSD is used to configure a user’s mobile device on the network. It also provides a menu of service options a user can choose from for such things as buying airtime or requesting account balances.
  • Customer update requests. USSD can integrate with enterprise resource planning (ERP) and customer relationship management (CRM) systems to request updated customer information. This enables better customer service and data accuracy.
  • Marketing surveys. USSD can be used for mobile marketing. For example, organizations can send basic marketing surveys that users can respond to immediately, enabling companies to get customer feedback in real time.
  • Callback services. Service organizations, such as insurance providers and financial services companies, can use USSD to determine customers’ interests by enabling them to request callbacks after they present their offers.
  • Order confirmations. Food delivery providers can use USSD to enable two-way communication between customers placing orders and the vendors to alert customers when their orders are on the way.
  • Coupons and vouchers. Retailers can use USSD to communicate special offers to customers, as well as send coupons and vouchers.

USSD is sometimes used in conjunction with SMS. The user sends a request to the network via USSD, and the network replies with an acknowledgement of receipt:

“Thank you, your message is being processed. A message will be sent to your phone.”

Subsequently, one or more mobile terminated SMS messages communicate the status and/or results of the initial request. In such cases, SMS is used to “push” a reply or updates to the handset when the network is ready to send them. In contrast, USSD is used for command-and-control only.

USSD payments

USSD payment processing is performed by sending a text message to a service provider. When the service provider receives the text message, it either charges the amount of the purchase to an online payment system or adds the amount to the user’s phone bill.

Benefits of USSD for Business

With numerous USSD applications comes numerous advantages of using USSD a marketing tool. Here are some significant benefits of USSD:

  1. USSD does not require internet connection or data to work. It allows free of charge roaming.
  2. USSD practically works on all GSM standard mobile phones. Since no high tech phone is required, you are guaranteed to reach more people as not everyone owns a smart phone.
  3. USSD can work across all mobile networks. It only needs a connection to the GSM network to work as it’s not mobile or SIM based.
  4. USSD is highly interactive; User can quickly see response on their phone screens and can make more requests hence allowing faster two-way communication and interaction that is seven times faster than SMS.
  5. It is highly customizable, making it ideal for all your business needs.
  6. USSD is extremely cost effective for businesses to implement and run, it is also free for subscribers to use.
  7. USSD content can be personalized and responses can be obtained in real time.
  8. It is user friendly and can be used by anyone.
  9. USSD service is easily accessible anytime and anywhere.
  10. USSD offers a possibility for portal structure building that can be simplified for users to easily remember.

Based on the above advantages it is evident that USSD remains a relevant and important technology. At Chibex Technology, we provide USSD solutions according to your business requirements. To find out more about our USSD solutions, please contact us on 08093159330 or 07026788205 or pop by our office and we will help you take your business to new heights.

Categories
Chibex Ozioma

SMS Mobile Marketing

SMS marketing is a marketing channel, much like email marketing, that allows businesses to message customers with marketing messages through SMS, or more commonly known, text messaging. These marketing messages can vary from promotional messages, product launches, new lines, sales, offers and more.

MS marketing is the perfect modern way to communicate with your customers. In this modern fast paced world, people want to communicate in a way that suits them, a nice quick, convenient way that fits with their lifestyle. And that is exactly why SMS marketing is now so popular amongst customers and businesses.

It’s quick, easy and convenient for businesses too. They can send out large bulk SMS messages all at once in the click of a button. They can then track who clicked their links and see who has unsubscribed from their messages. Statistics show that 98% of all text messages get read and 95% of all texts are read within 3 minutes.

Which means businesses love SMS marketing because they can virtually guarantee that their messages will get read instantly!

Uses of SMS Marketing for Businesses

There are lots of ways businesses are using SMS marketing, whether that be through an SMS API or an online SMS Web Platform.

  • A new product or service
  • Sale or offers
  •  Notifications
  •  Delivery updates
  •  Appointment reminders
  •  Important news
  •  Customer Service Support

Basically SMS marketing can help businesses with anything and everything.

Things to Consider to Make your SMS Marketing Successful

  • Opening line: Go with something short and sweet and attention grabbing.
  • Content/message length: Keep it short and sweet and use words and phrases like hurry, quick, offer ends soon to add some emergency to your message.
  • Tell them who you are: Make sure you say who you are and set your Sender ID to your business name.
  • Send an offer: Send an enticing deal or offer and be sure to let them know how to claim and purchase.
  • Include a website link:  Let them click and go straight to your website
  • Make sure it’s relevant: Make sure you are sending the message to your customers who might be interested. Segment your customer database, men, women etc. So you are sending relevant messages.
  • Time of your message: Make sure you are sending the message at an appropriate time so people can respond.

Who can benefit from using SMS marketing services?

Text messages can be a great addition to your digital marketing efforts regardless of what business type you have. They serve the unique function of communicating very urgent information in a highly reliable way.

But, there are certain businesses that cannot live without SMS in their marketing strategy:

  • E-commerce stores: Whether you’re sending a promotional campaigns, or order/shipping confirmations, SMS is a great tool for e-commerce stores.
  • Travel companies: SMS is essential to travel companies because customers need real-time information. This includes flight time updates, gate changes, cancellations, weather alerts, and many more. With SMS you are able to tell customers exactly what they need to know, without having to worry about if they will see it in time.
  • Service businesses that require appointments: Make sure that your clients never miss another appointment by sending them SMS reminders. This will save you tons of time and money wasted on no-shows and late appointments.
  • Large organizations with 100+ employees: Internal communication is important, but it’s hard to communicate with every employee in a large company. For urgent information, email is too slow. Using SMS for your internal communication is the best way to ensure that every employee gets the information you want to send them at the right time.

How does SMS marketing work?

SMS marketing messages are sent from “short codes,” as opposed to full telephone numbers. These short codes are typically 5-6 digits, and can be associated with one sender, or shared across multiple senders.

Many countries (including the Nigeria) do not allow sender information to be altered. This means your message will appear as a text message from whatever short code your provider used (not from your business). That is why it’s important to include your company’s name in the message. You can find out more about SMS short codes here.

Categories
Ozioma

How to Become an Ozioma Agent

Partnering with us as an agent qualifies you to reseller Ozi Units and make massive profit in this digital gold mine (just like selling network operators airtime, data, pay tv subscriptions etc).

SMS business is a multi-billion dollar industry and with Ozioma you don’t have to create and maintain your own website to resell SMS units, Ozioma takes care of all the technicalities for you. To become our agent you can contact us through our support channels. Contact us on 08093159330 or 07026788205.

Types of Agents

There are 3 types of agents in Ozioma which are Gold agents, Silver agents and Bronze Agents who Makes Ozi Units available to millions of Nigerians nationwide.

  1. Gold Agents– As a Gold agent, you will purchase units directly from the company @ N1.95 per unit and sell it to Silver sub-agents under you @ N2.10 per unit to help you resell and you can also sell it directly to customer @ N2.50 per unit. The start-up capital for this is N195000 for 100000 units. The minimum units to be sold by gold agents for a month is 1000000 units.
  2. Silver Agents– As a Silver agent, you can have Bronze sub-agents under you. You will purchase units from the Gold Agents @ N2.10 per unit and sell it to the Bronze agent @ N2.25 per unit and you can also sell it directly to the customer @ N2.50 per unit. The start-up capital for this is N21000 for 10000 units. The minimum units to be sold by silver agents for a month is 100000 units
  3. Bronze Agents- As a Bronze agent, you will buy units from the Silver agents @ N2.25 per unit and sell it directly to the customer @ N2.50 per unit. The start-up capital for this is N2275 for 1000 units. The minimum units to be sold by bronze agents for a month 10000 units.

Before you become an agent, you need to have an Ozioma account. You can start as Bronze agent and grow to Gold agent or you can start as Gold or Silver agent. With this model in place its similar to network operators model in their recharge cards distribution where they have Dealers, Resellers and Retailers.

Categories
Ozioma

How to Become an Affiliate Member in Ozioma

Affiliate Membership is a home business you can do at your free time to make additional income without quitting your current job. As an affiliate member you can be earning upto 25% life time residual commission by just recommending Ozioma to people and any time they buy units you get your commission.

Partner with us and make commissions for life from your recommendees purchases. As you move from one stage to another your commission percentage increases.
Each stage has a minimum amount of messages you must send within a month to qualify for recommendees purchase commission.

How does it work?

Becoming an affiliate member of Ozioma is very simple. All you have to do is share your Affiliate Link with people for them to create their Ozioma account with it. On their registration form, your username will automatically appear as the recommender and once they have created their account and have started buying units, you will be making commissions from every unit they buy.  For your recommendees creating account through Ozioma mobile app, inform them to use your username as the recommender on the signup form.

How to Get Your Affiliate Link?

Step 1

STEP 2

  • On the left of your dashboard you will see a list of options, click on Affiliate Referral. (if you are using a mobile phone, click on the icon to the top left of your dashboard to see the list of options then select the Affiliate Referral).

Step 3

  • You will see your referral link, click on copy and share on all your social media platforms.

AFFILIATE MEMBER STAGES

There are 7 stages of Affiliate members, which are,

  1. ENTHUSIAST : This is the first stage stage. In this stage you have to refer or recommend up to 1- 10 people before you can move to the next stage and you also need to send a minimum of 5 SMS in a month for you to receive your commissions. When your recommendees buy units through the bank, online or cash, you get 10% of their units purchased as your commission and if they buy through voucher (agents) you will receive a commission of 2%.
  2. LEADER : This is the second stage. In this stage, you need to refer up to 11-50 people before you can move to the next stage and you also need to send a minimum of 20 SMS in a month before you can receive your commission. Your commission in this stage will be 15% when your recommendees buy units through the bank, online or cash and 5% when they buy units through voucher (agents).
  3. PROFESSIONAl : This is the third stage. You need to refer up to 51-100 people before you can move out from this stage and you also need to send a minimum of 50 SMS in a month for you to receive your commission. Your commission in this stage will be 17.5% when your recommendees buy units through the bank, cash or online and 6% when they buy through voucher.
  4. BOSS : This is the fourth stage. You need to refer up to 101-500 people before you can move out of this stage and you also need to send a minimum of 100 SMS in a month before you can receive your commission.  Your commission here will be 20% when your recommendees buy units through the bank, cash or online and 7% when they buy through voucher (agent).
  5. VIP : This is the fifth stage. You need to refer up to 501-1000 people before you can move out of this stage and you also need to send a minimum of 120 SMS in a month before you can receive your commission.  Your commission here will be 22.5% when your recommendees buy units through the bank, cash or online and 8% when they buy through voucher (agent).
  6. DON : This is the sixth stage. You need to refer up to 1001-5000 people before you can move out of this stage and you also need to send a minimum of 150 SMS in a month before you can receive your commission.  Your commission here will be 25% when your recommendees buy units through the bank, cash or online and 9% when they buy through voucher (agent).
  7. ULTIMATE : This is the seventh stage. You need to refer up to 5001-1000000 people before you can move out of this stage and you also need to send a minimum of 200 SMS in a month before you can receive your commission.  Your commission here will be 30% when your recommendees buy units through the bank, cash or online and 10% when they buy through voucher (agent).
Categories
Ozioma

How to Unsubscribe from a Newsletter

Whether its a paid or free SMS Newsletter, you can always unsubscribe from it at anytime you want.

STEP 1:

STEP 2:

  • Once you have logged in to your account, you’ll see your dashboard. On the top right corner of your dashboard, you’ll see your profile icon. Click on it and select Manage Newsletter.

STEP 3:

  • When you see the newsletter you want to unsubscribe from then click on unsubscribe.
  • You will be asked if you are sure you want to unsubscribe. Click on Yes Unsubscribe. If you are not sure then click on cancel
Categories
Ozioma

HOW TO SUBCRIBE TO A NEWSLETTER

Subscribing to a free or paid newsletter on Ozioma is actually very simple. All you have to do is just follow this few simple steps.

STEP 1:

STEP 2:

  • Once you have logged in to your account, you’ll see your dashboard. On the top right corner of your dashboard, you’ll see your profile icon. Click on it and select Manage Newsletter.

STEP 3:

  • Click on Find and Subscribe.

STEP 4:

  • Enter the SUBCODE of the Newsletter you want to subscribe to. Then click on search.

STEP 5:

  • You will find details of the Newsletter you searched for (the Subcode, Publisher, Newsletter, description and subtype). The subtype will be either free or paid. If it has extra charges it will be shown there too.
  • Click on subscribe.

STEP 6:

  • You will be asked if you are sure you want to subscribe. Click on Yes subscribe me. If you are not sure click on cancel.
Categories
Ozioma

How to Create Paid SMS Newsletters

There are 2 types of SMS Newsletters in ozioma which are.

  1. Free SMS Newsletter: This means that the sender will pay the cost of the message sent. Free SMS newsletters can be sent to both ozioma users and non-users.
  2. Paid SMS Newsletter: This means that the subscribers will be the one to pay for the messages they receive from you. The sender does not pay for the messages. This can be used by churches for sending daily devotional messages while the members pay the cost for it. Paid SMS Newsletters can only be sent to ozioma users because before subscribing, they have to accept to pay for the messages. subscribers cannot be added by you. They have to join by them self using your subcode. You can also add extra charge in your paid newsletter if you want to go into content publishing, which is sharing knowledge on your area of specialization(s) to earn more money.

How to create a Paid SMS Newsletter

STEP 1

STEP 2

  • On the left of your dashboard you will see a list of options, click on SMS Newsletter. (if you are using a mobile phone, click on the icon to the top left of your dashboard to see the list of options then select the SMS Newsletter).

STEP 3

  • At the bottom of your SMS Newsletter to the right, click on the pink colored icon.

STEP 4

  • Write the name of the newsletter (like family, customers, employees etc).
  • Describe the newsletter
  • Click on the paid to put it on.

STEP 5

  • Select the frequency you want to be sending messages to your paid subscribers (daily, weekly and monthly).
  • After that, click on create. But if you want to add extra charge to make money then select the amount of units you want to add (0.0, 0.2, 0.4, 0.6, 0.8, 1). Then click create.

NOTE

You cannot add contacts directly like in free Newsletter. You have to share your SUBCODE with people so they can subscribe to your newsletter themselves, and Only people using Ozioma app can subscribe to it.