Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Intel Buys Way into Tablets While $99 may be Microsoft Sweet Spot

Intel recently reported earnings and the takeaway is the company is going to focus more on Android and ramp up subsidies to...

Full Story »

Why the Fax Isn't As Outdated As You Think

I wrote a blog about faxing a few months ago and got an overwhelming response. Got some comments via email and...

Full Story »

Camera-Phone Opportunity Exists for Samsung

There exists an opportunity for a superior camera with 10x or greater zoom coupled with the traditional things we are used to...

Full Story »

Tomorrow is Purchase Google Glass Day!

If you are a wearable tech fan, tomorrow is a big day as you will finally be able to (if you are...

Full Story »

The Secret Value of VoLTE

By Ed Elkin, Director, IP Platforms Marketing, Alcatel-Lucent 

At Mobile World Congress, I discovered that many network providers still aren’t aware of the broader business values of voice over LTE (VoLTE).  Most knew it readily includes HD voice for clearer calls and reduced background noise, which lets you feel like you’re standing right next to the other person. Most didn’t realize that, in unexpected ways, VoLTE helps them earn more money and increase efficiency.

Full Story »

How to Kill Shadow IT: Step One - Recognize that Resistance is Futile

By Bryan R. Davies, Senior Director of Enterprise Communications Marketing, Alcatel-Lucent

The first step in resolving any problem is to make sure you understand the core issues. So here’s the crucial question for shadow IT: What is the biggest challenge it presents for your IT department?

Holding back the flood?  

Today’s flood of mobile devices and cloud services is making shadow IT a bigger headache than ever before. But it’s nothing new. It started with the first enterprise employee who ever put an application in place without the knowledge or approval of IT staff.
Full Story »

5 Tips to Get Out of a Sales Slump

Lots of sales professionals go through a sales slump. Nothing is closing. Depression or Panic ensues - or worse, Desperation, that...

Full Story »

Software Telcos Based on NFV Want Less Equipment Provider M&A

June 18, 2013

Mergers are nothing new but about a decade ago in the telecom market they reached a fever pitch when SBC purchased AT&T and rebranded itself with the name of the acquired company. At the time it became common in the industry to believe consolidation among carriers meant consolidation needed to take place at the equipment supplier level.

The idea is if you have fewer customers, you have less pricing power which means lower overhead with means merging suppliers can eliminate redundant costs such as accounting, marketing, HR and other “synergistic” areas of the business.

Large carriers have also been known for choosing large suppliers for their hardware needs as they felt these larger companies were more likely to be around to support them in the future as they roll out their solutions.

Yealink SIP T-38G Review

June 17, 2013



The Yealink SIP T-38G Gigabit color LCD PoE IP phone is another impressive IP phone following in the steps of the Yealink T-28P that Tom Keating reviewed in 2010. Tom liked the 4-way arrow navigation keypad, which continues on the T-38G, making navigating on the color screen a breeze. The T-38P also features a very similar web admin page as the T-28P and like Tom I had no trouble adding the SIP credentials, configuring the NTP server, adding speed dials, and other various configuration options.

While referencing Tom's T-28P review for comparison to the T-38G, Tom has this noteworthy comment:
The web interface displays a message when the phone is registered so you know immediately if you put the SIP credentials in correctly. I have to say, I really loved how every change I made DOES NOT require a reboot.




Now Unclassified PRISM Docs Still Off Limits to Fed Workers

June 14, 2013

For a federal government riddled with scandals this news may not seem so important but it is indicative of the logic of government. The numerous documents which have been leaked all over the Internet regarding PRISM and countless other government spying programs are off-limits to Senate staffers. They have been asked by the Senate Security Office not to download documents which are potentially classified - even though everyone on the planet likely has.

The logic here is baffling...

TMC's New NFV News and Analysis Site

June 12, 2013

The move from proprietary hardware to software running on commercial off-the-shelf servers at the world’s telcos is one of the biggest transformations we will see this decade. Over time we can expect to see a number of network functions which used to be supplied by hardware vendors through proprietary boxes turn into software running on servers with Intel or ARM chips perhaps supplied by HP or Dell running VMware or some other flavor of virtualization. The concept is called Network Functions Virtualization or NFV. I wrote about the concept a while back in a post Metaswitch Asks: Are You Ready to be a Software Telco? and more recently in NFV-Based Software Telcos Need OSS/BSS Interoperability.

Will iRadio Kill Pandora?

June 7, 2013

34% of Internet radio users surveyed would switch to Apple’s iRadio and some believe this is a major problem for Pandora. I remember when Google was going public, similar research showed users would also switch to a better search engine given the opportunity. The challenge is many people are set in their ways and inertia keeps them from switching.

What Apple needs to do is make the radio integration so solid that you have no choice but to try it and perhaps like it better than the service you currently use.

Moped 2.0 Blends Social, Messaging and Cloud Storage

June 6, 2013

There are a plethora of apps to communicate but precious few bubble up to the top. Quite often a company comes up with an idea for a service which improves on another form of communications. Tweetdeck and Hootsuite come to mind as examples.

Another new option is Moped 2.0 which goes live as you read this entry and allows users to more easily communicate with their social circles while adding in the capability of sharing media.

A Billion WebRTC Endpoints Force Voice and Data Players to Adapt or Die

June 5, 2013


From an evolutionary standpoint regardless of whether we talk about nature or business, adaptation is a key to success in changing environments. During the industrial revolution in London a species of moth with a white color blended in with the bark of the local trees until soot from the nearby factories turned the trees black. Some darker moths were now camouflaged in the dark trees and eventually the species adapted and became black. When air quality improved, the moths over successive generations changed color again.

Your iPhone Could Get Hacked Through the Charger

June 4, 2013

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously worry about Apple devices which were not jailbroken. It is now impossible to know which Apple devices have been infected meaning all of them are suspect.

An article on TMCnet by Steve Anderson explains that a group of researchers at the Georgia Institute of Technology discovered the exploit which can be duplicated via a device called a Mactans charger.

Tehrani Speaking about Cloud at the Connecticut Business Expo

June 4, 2013

Yahoo! Should Buy Waze

June 4, 2013

If you haven’t checked out the TMCnet feature by Josh Alexander about companies Yahoo! should purchase, please do… I’ll wait. Ok – now that you’re back – isn’t this guy funny? It isn’t too often I read an article about tech where I learn things and also laugh out loud.

Featured Events