Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Apple Pay Vs. Google Wallet

Replacing credit cards can likely only be done if the new system is dead-easy to use and it moreover has to be...

Full Story »

Signaling Offers Great Differentiation for Mobile Value-Added Service Offerings

We’ve all heard that some Value Added Services (VAS) revenue such as Short Message Service (SMS) are starting to decline in...

Full Story »

Birdstep Improves Wireless User Experience, Reduces Churn

A smartphone user can get tripped up easily when in motion as today’s smartphones look for WiFi networks to connect to and...

Full Story »

Sonos BOOST, For Music in Tough to Reach Places

I’ve been using Sonos as an in-home streaming solution for many years and since it relies on WiFi it provides infinite levels...

Full Story »

IOT tests do NOT tell the whole story

Service providers typically have infrastructure from multiple vendors installed in their networks.  Mostly this is by design since they don’t want...

Full Story »

Notes from Connections 2014 Part Deux

More notes from BSFT Connections 2014 in the desert by friends of my at the show. These notes are from ANPI's...

Full Story »

Notes from Connections 2014

Broadsoft Connections kicked off with the usual festivities yesterday including a pool party and a summer fashion show. This morning it...

Full Story »

Effectively Telling Your Product's Story

June 18, 2013


One of the most interesting aspects of my career is watching the thousands of companies I have met over the years make it or not make it. For every success like Netflix, eBay, TellMe and Digium there are countless other failures – companies who seem to have a solid technology angle but somehow fail to communicate their message effectively.

I was reminded of this fact when I saw The Carousel from Mad Men. The video above reminds us how technology is not really exciting – neither are new products. What is exciting is how new ideas and solutions are weaved into a story which potential customers will embrace and be passionate about.

This is even more true decades after the above-scene took place because we now have social media which can instantly propel or destroy brands based upon how consumers feel about them.

Dialogic and Cisco Round Out Day's NFV News

June 18, 2013

It’s been a busy week regarding NFV and the software telco (R)evolution. First off Dialogic had some solid thoughts on six of the network elements ripe for NFV – they are routers, SBCs, media servers, softswitches, signaling nodes and DPI/WAN acceleration solutions – it is worth pointing out that on this last area the company’s Jim Machi says they are a “maybe”. You can read his thoughts for the details.



Cisco had some news in the space as well. The company’s Kelly Ahuja SVP, GM, Mobility Business Group spent about an hour discussing the impact of NFV on the company’s business.

Software Telcos Based on NFV Want Less Equipment Provider M&A

June 18, 2013

Mergers are nothing new but about a decade ago in the telecom market they reached a fever pitch when SBC purchased AT&T and rebranded itself with the name of the acquired company. At the time it became common in the industry to believe consolidation among carriers meant consolidation needed to take place at the equipment supplier level.

The idea is if you have fewer customers, you have less pricing power which means lower overhead with means merging suppliers can eliminate redundant costs such as accounting, marketing, HR and other “synergistic” areas of the business.

Large carriers have also been known for choosing large suppliers for their hardware needs as they felt these larger companies were more likely to be around to support them in the future as they roll out their solutions.

Yealink SIP T-38G Review

June 17, 2013



The Yealink SIP T-38G Gigabit color LCD PoE IP phone is another impressive IP phone following in the steps of the Yealink T-28P that Tom Keating reviewed in 2010. Tom liked the 4-way arrow navigation keypad, which continues on the T-38G, making navigating on the color screen a breeze. The T-38P also features a very similar web admin page as the T-28P and like Tom I had no trouble adding the SIP credentials, configuring the NTP server, adding speed dials, and other various configuration options.

While referencing Tom's T-28P review for comparison to the T-38G, Tom has this noteworthy comment:
The web interface displays a message when the phone is registered so you know immediately if you put the SIP credentials in correctly. I have to say, I really loved how every change I made DOES NOT require a reboot.




Now Unclassified PRISM Docs Still Off Limits to Fed Workers

June 14, 2013

For a federal government riddled with scandals this news may not seem so important but it is indicative of the logic of government. The numerous documents which have been leaked all over the Internet regarding PRISM and countless other government spying programs are off-limits to Senate staffers. They have been asked by the Senate Security Office not to download documents which are potentially classified - even though everyone on the planet likely has.

The logic here is baffling...

TMC's New NFV News and Analysis Site

June 12, 2013

The move from proprietary hardware to software running on commercial off-the-shelf servers at the world’s telcos is one of the biggest transformations we will see this decade. Over time we can expect to see a number of network functions which used to be supplied by hardware vendors through proprietary boxes turn into software running on servers with Intel or ARM chips perhaps supplied by HP or Dell running VMware or some other flavor of virtualization. The concept is called Network Functions Virtualization or NFV. I wrote about the concept a while back in a post Metaswitch Asks: Are You Ready to be a Software Telco? and more recently in NFV-Based Software Telcos Need OSS/BSS Interoperability.

Will iRadio Kill Pandora?

June 7, 2013

34% of Internet radio users surveyed would switch to Apple’s iRadio and some believe this is a major problem for Pandora. I remember when Google was going public, similar research showed users would also switch to a better search engine given the opportunity. The challenge is many people are set in their ways and inertia keeps them from switching.

What Apple needs to do is make the radio integration so solid that you have no choice but to try it and perhaps like it better than the service you currently use.

Moped 2.0 Blends Social, Messaging and Cloud Storage

June 6, 2013

There are a plethora of apps to communicate but precious few bubble up to the top. Quite often a company comes up with an idea for a service which improves on another form of communications. Tweetdeck and Hootsuite come to mind as examples.

Another new option is Moped 2.0 which goes live as you read this entry and allows users to more easily communicate with their social circles while adding in the capability of sharing media.

A Billion WebRTC Endpoints Force Voice and Data Players to Adapt or Die

June 5, 2013


From an evolutionary standpoint regardless of whether we talk about nature or business, adaptation is a key to success in changing environments. During the industrial revolution in London a species of moth with a white color blended in with the bark of the local trees until soot from the nearby factories turned the trees black. Some darker moths were now camouflaged in the dark trees and eventually the species adapted and became black. When air quality improved, the moths over successive generations changed color again.

Your iPhone Could Get Hacked Through the Charger

June 4, 2013

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously worry about Apple devices which were not jailbroken. It is now impossible to know which Apple devices have been infected meaning all of them are suspect.

An article on TMCnet by Steve Anderson explains that a group of researchers at the Georgia Institute of Technology discovered the exploit which can be duplicated via a device called a Mactans charger.

Featured Events