Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

How Nuance is Powering the Voice Economy

It's no secret that voice interfaces have become one of the most successful product categories in recent years. With the price point...

Full Story »

FCC and FTC Co-Host April 23rd Expo on Robocall Blocking

The Federal Communications Commission (FCC) and the Federal Trade Commission (FTC) will host a Stop Illegal Robocalls Expo on Monday, April...

Full Story »

Why Not Move to Cloud Fax?

  The last couple of weeks I explored the topic of SIP Trunking.   One of the benefits I discussed is that cloud...

Full Story »

Jabra Responds To Evolving Workplace with Engage 65, 75

After exhausting interviews with 400 call center professionals and IT administrators, Jabra set out to design headsets for the evolving workplace. Respondents...

Full Story »

CounterPath Now does Collaboration

President and CEO Donovan JonesYears before it was fashionable, CounterPath had a soft-client, allowing an app to give mobile devices compatibility with...

Full Story »

Kollective Improves Network Performance via P2P Technology

Enterprise network congestion on continues to be a problem as software updates and files continue to grow in size. Add to these challenges,...

Full Story »

Could Scheduling Logins Make us Safer?

Hackers are relentless. Today it was discovered the Consumer Financial Protection Bureau (CFPB) suffered at least 240 data breaches and another 800 suspected...

Full Story »

Cybersecurity and the Terrible, Horrible, No Good, Very Bad Week

September 25, 2016

There are perhaps four major cybersecurity incidents in my mind which are world-changing. The first is the OPM data breach which allowed China to get the most intimate secrets of virtually all federal employees – tens of millions of them. As I’ve described – this information, which is super top-secret and consists of sexual history could be used to blackmail U.S. workers.

Jabra Halo Smart Wireless Stereo Headphones a Great iPhone 7 Companion

September 9, 2016

Confirming months of rumors, Apple announced two new iPhone 7 models which have no headphone jacks. There are two schools of thought on this decision. The first is the headphone jack is antiquated and not necessary. The second, Apple wants to make more money and charge royalties for use of the Lightning connector.

You Can Now Use your Phone on the Plane

September 9, 2016

The latest Windows 10 update makes it easier than ever to bring your mobile lifestyle onto an airplane. If you go into Settings and then Network & Internet, under Mobile hotspot, you can turn the service on and set a network name and password. As I write this on a Microsoft Surface Book, I decided to try the feature out. I then connected an iPhone and within a minute the phone rang.



You Can Get Fired for Choosing Dropbox: A True Story

September 1, 2016

An MSP is contacted by a publicly traded company looking for help managing their IT. When the MSP goes to the company conference room to tell them about how they can protect their servers, the decision-maker explains they don’t have a need for servers, they are using Dropbox.

The MSP is perplexed and explains there could be security issues with the cloud in general and it is safer to keep the data locally and have encrypted backups. The MSP is mocked – told Dropbox is safe and secure and that her old company had users on it and it works great.

Talari Adds Firewall, Features to SD-WAN solution

August 16, 2016

SD-WAN is another one of those growth areas in tech which often goes unnoticed. Some time back I went to visit Talari to learn about their solutions in the spaces – before the term was called SD-WAN. I named them one of the companies to watch in 2015 as a result.

I actually first started interviewing the company in 2011 and we have had 6 other interviews with the company as well





Recently in Cloud Computing Magazine, my colleague Peter Radizeski wrote that cloud isn’t killing the hardware business.

Silicon Valley Will Crush You!

August 10, 2016

The amount of PR generated by tech companies mostly in Silicon Valley like Google, Apple, Samsung, Facebook, Tesla and Amazon is staggering. Tech companies seem to own the media. Even more interesting, companies that are less tech but still funded by the same backers as tech companies such as Andreessen Horowitz also seem to have a lock on the media.

Case in point… A very novel company Nature’s Best has a drink called Java Pro.

Tech Culture Will Separate Winners from Losers in The Digital Economy

August 8, 2016

The 2016 Tech Culture Award winners have been announced

The outlook for tech workers has perhaps never been brighter as top tech companies look to expand their footprint and bet on moonshot projects while traditional companies innovate through tech, in some cases, disrupting themselves. Google is becoming famous for driverless cars which for them is a moonshot project – one that could be a huge future revenue driver. In response, BMW, the company famous for its tagline, “Ultimate Driving Machine,” is changing to get ready for a world where cars aren’t driven.

President Obama, After $400 Million, Where are Those Criminal Iranian Hackers ?

August 5, 2016

Why did we ship a fortune to our mortal enemy and not get the indicted cybercriminals living in Iran who attacked us, in return?

The U.S. is in a cyberwar. It's common knowledge.

New Skype Spock Chatbot Dissapoints

August 5, 2016

The New Threat: Drones Attacking Industrial Systems

August 5, 2016

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior Principal Tech Specialist Jeff Melrose explained there are numerous drone-related problems to be concerned about:

  1. They can be used to block sensors in factories such as those monitoring temperature.
  2. They can block radio signals using a jammer or similar device making a factory and IoT devices unable to communicate or perhaps communicate erratically.
  3. They can be used to trail a vehicle at up to 25 MPH.
  4. They can infiltrate computer networks – attacking WiFi as well as bluetooth mice and keyboards to get into a network.

 

In addition, the Marines have a drone which can best be described as a mini-tank, capable of firing guns and launching grenades. It comes in two sizes – the large one can potentially fire 3,000 rounds per minute!

Featured Events