Rich Tehrani : Communications and Technology Blog -
Rich Tehrani
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

The Rise (Again, and again, and again) of Edge Computing

Where computing power resides is like a sin wave.  Just ebbs and flows from being centralized to being on the edge.  When...

Full Story »

WWIII: Fight Between BigTech AI, Regulators and Lawyers is Coming

The EU's GPDR or allows General Data Protection Regulation which goes into effect next year includes a right to an explanation of decisions...

Full Story »

EU GPDR Devastating to AI

Very important guest blog post originally found on Techzone360.Last September, a U.K. House of Commons committee concluded that it is too soon to regulate...

Full Story »

Where is the Money in Communications Platform as a Service

How can today's wholesale carriers, operators and service providers meet the needs of those hanging on to PSTN and such while at...

Full Story »

Where your UC solution should be is not the same for every business

There are quite a few debates about where a business Unified Communication solution should physically be located.  Should it be customer premise...

Full Story »

CafeX Sees Call Center Converging with CRM

CafeX EVP Sajeel Hussain sees a convergence between the CRM space and contact centers and he's in a great position to know...

Full Story »

External Battery Power Bank for Microsoft Surface Book

If you are looking for a large, external battery which can power a Microsoft Surface Book, we have good news for...

Full Story »

Hypocritical? Apple Comes out as Pro Net-Neutrality

August 31, 2017

Apple, like much of Silicon Valley is pro Net Neutrality. In a letter titled: In the Matter Restoring Internet Freedom sent to the FCC today, the company laid out all the reasons we need an open Internet.

Here are the salient points:

  1. An open internet ensures that hundreds of millions of consumers get the experience they want, over the broadband connections they choose, to use the devices they love, which have become an integral part of their lives.
  2. We work hard to build great products, and what consumers do with those tools is up to them—not Apple, and not broadband providers. 
  3. Consumers must be allowed to access the lawful internet content,applications, and services of their choice.
  4. No paid fast lanes. 

Burning Man Live Stream

August 31, 2017

Coinbase: Killing the Goose that Lays the Golden Cryptocurrency

August 31, 2017

How Bitcoin and the Free Market can Screw up Bitcoin and the Free Market

The beauty of cryptocurrencies and ICOs is there now a way for tech to take on governments and allow consumers access to an alternative to government controlled “money.” Bitcoins and related currencies are a libertarian dream – allowing people from repressed countries such as Argentina, China and others to take their money out of these financial prisons if they so choose.

In 2013 we detailed the 15 reasons bitcoins were better than gold, we then reiterated it is Gold 2.0.  In January of this year we charted Bitcoin according to the Tech Hype Cycle and predicted the price would break out based upon how technology adoption works.

Google Could Lose it's Trademark

August 21, 2017

Is Google a generic term like KleenexDumpster and Realtor- unworthy of protection with a trademark symbol? The case is pending.

Dr. Wikipedia tells us:

A trademark is said to become genericized when it begins as a distinctive product identifier but changes in meaning to become generic. This typically happens when the products or services with which the trademark is associated have acquired substantial market dominance or mind share, such that the primary meaning of the genericized trademark becomes the product or service itself rather than an indication of source for the product or service. A trademark thus popularized has its legal protection at risk in some countries such as the United States and United Kingdom, as its intellectual property rights in the trademark may be lost and competitors enabled to use the genericized trademark to describe their similar products, unless the owner of an affected trademark works sufficiently to correct and prevent such broad use.

Tesla Model X Beats Lamborghini Aventador

August 21, 2017

Lambo Engineers Should be Hiding Under Rocks

Having your supercar beaten by an SUV is beyond embarrassing. Heads should be rolling all over the supercar word.

Tesla also just established the world-record for the fastest quarter-mile for an SUV, 11.418 seconds while beating a Lamborghini by 0.05 seconds. The Lambo ended up passing the Model X P100D immediately after.

There are a few shocking things to note. How much higher do you think the coefficient of drag is for the Silicon Valley SUV.

Ellen Pao and California Senate Point to a Huge Valley Harassment Problem

August 21, 2017

Ellen Pao has a new book coming out "Reset." you might recall she was a poster child for Silicon Valley sexual harassment a few years ago in her lawsuit   against Kleiner Perkins which she ended up losing.

But back to her book. A fascinating excerpt follows:

Once we were airborne, the CEO, who’d brought along a few bottles of wine, started bragging about meeting Jenna Jameson, talking about her career as the world’s greatest porn star and how he had taken a photo with her at the Playboy Mansion. He asked if I knew who she was and then proceeded to describe her pay-per-view series (Jenna’s American Sex Star), on which women competed for porn-movie contracts by performing sex acts before a live audience.

“Nope,” I said.

Intermedia Anti-Phishing Tools for Small Business

August 21, 2017

Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor which gives them access to your passwords or perhaps they could start installing ransomware.

All a company can do is be as protected as possible. One way to achieve this is with strong anti-phishing tools - similar to the ones rolled out by Intermedia last week.

The company says they have unveiled Enterprise-grade anti-phishing protection, designed for SMBs - otherwise knows and small and medium businesses.

The new Intermedia Email Protection features include:

  • Similar domain check: Spear-phishing campaign authors will typically register an email domain that looks 'similar' to a company's email domain (e.g., with two i's instead of Intermedia's domain check feature uses a similarity algorithm to confirm that the sending domain is in fact is someone from within the organization.
  • User impersonation check: Spear-phishing attacks target specific employees within an organization, by impersonating someone they know – most typically the CEO or other high-profile individuals.

Maybe Net Neutrality Needs to Apply to Silicon Valley

August 21, 2017

In the debate for net neutrality, its been left versus right for about a decade. Silicon Valley, and Democrats are for net neutrality while conservatives are for free markets with minimal government regulation.

The biggest argument advocates of net neutrality use is they fear for a world where unregulated ISPs are able to throttle and block content they don't agree with or that which is competitive.

Last month, Google, Facebook and Spotify among many others worked together to participate in a June 12 Internet-Wide Day of Action in support of net neutrality.

Organized by Fight for the Futurefreepress, and Demand Progress, the event precedes a July 17 deadline for public comment on the FCC's proposed changes to net neutrality rules, originally designed to prevent huge internet service providers from creating internet 'fast lanes' that deliver content from some owners at higher speeds (and potentially higher costs) than that of others. In his new role as head of the FCC, former commissioner and Verizon lawyer Ajit Pai has quickly mobilized efforts to roll back the Obama-era protections, among other things, arguing that the regulations will inhibit investment and innovation in the field.

Interestingly net neutrality proponants are generally associated with the antifa movement - the communist group which says it represents anti-fascism.

So there we have it - the left wants net neutrality rules so the government can ensure corporations can't keep sites they don't agree with, off the internet.

How Technology can Eliminate White Supremacy

August 17, 2017

As our country is mired in race debates, it's interesting to see how technology has inadvertently begun to actually reduce the number of white supremacists.

When researching how many white supremacists there are in the US, you find that there aren't any accurate surveys on the matter. Apparently, inbreeding makes it difficult for these people to read survey forms.

The closest number we could find is 5,000-8,000 people in the US who are part of the KKK or about .003% of the population if we use the high end of the range.

What gets really interesting is that thanks to quick and simple DNA testing white supremacists can now determine just how white they are.

The results have been shocking as 2/3 of them have found they aren't pure white.

Irony of ironies - the odds are 2:1 that the average cross-burning moron actually isn't what they think.

This of course has led many people in these groups to question the tests. It must be some conspiracy that just 2/3 of of the people tested in their "group" are impure while 1/3 are. Obviously, many of these people need to loosen their sheets to reduce the brain damage associated with oxygen deprivation.

Bottom line - technology now exists to take a population of perhaps 6,000 KKK members and knock the number down to to a mere 2,000 or the amount of people who went to our high school.

So far, 153 people in these groups have posted their results.

The Long Tail of Cybersecurity

August 9, 2017

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.

The online world made this possible. Try as they might, Barnes & Noble could not match the inventory of Amazon in all its stores. Online wins because inventory is near-infinite.

In the cybersecurity world there is is a similar phenomenon taking place. The same bell curve applies but in this case, we can assign it to the value of a target.

Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 830 Next
Featured Events