Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

August 2017

You are browsing the archive for August 2017.

How Technology can Eliminate White Supremacy

August 17, 2017


As our country is mired in race debates, it's interesting to see how technology has inadvertently begun to actually reduce the number of white supremacists.

When researching how many white supremacists there are in the US, you find that there aren't any accurate surveys on the matter. Apparently, inbreeding makes it difficult for these people to read survey forms.

The closest number we could find is 5,000-8,000 people in the US who are part of the KKK or about .003% of the population if we use the high end of the range.

What gets really interesting is that thanks to quick and simple DNA testing white supremacists can now determine just how white they are.

The results have been shocking as 2/3 of them have found they aren't pure white.

Irony of ironies - the odds are 2:1 that the average cross-burning moron actually isn't what they think.

This of course has led many people in these groups to question the tests. It must be some conspiracy that just 2/3 of of the people tested in their "group" are impure while 1/3 are. Obviously, many of these people need to loosen their sheets to reduce the brain damage associated with oxygen deprivation.

Bottom line - technology now exists to take a population of perhaps 6,000 KKK members and knock the number down to to a mere 2,000 or the amount of people who went to our high school.

So far, 153 people in these groups have posted their results.
















The Long Tail of Cybersecurity

August 9, 2017

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.

The online world made this possible. Try as they might, Barnes & Noble could not match the inventory of Amazon in all its stores. Online wins because inventory is near-infinite.



In the cybersecurity world there is is a similar phenomenon taking place. The same bell curve applies but in this case, we can assign it to the value of a target.





Featured Events