Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Unified Communications in the Cloud

A couple of weeks ago, I explored the migration to Unified Communications and gave my point of view about how the migration is somewhat...

Full Story »

DieselGate: We Were Right, Something Smells Awful

Remember back in 2015 when we said something doesn't smell right in the VW diesel scandal? it would be impossible for the...

Full Story »

What Should the Next Generation SBC Be Able to Handle?

It’s strange to be writing about a next generation SBC, given that it seems only yesterday that SBCs came to the fore. ...

Full Story »

StaffAlerter Provides Value in Emergency Notification and IoT

With terrorist attacks and other shooting incidents becoming commonplace, the need to quickly notify large groups of people regarding dangerous situations seems...

Full Story »

Top 8 IoT Trends for 2017

The IoT market is accelerating as growth comes from numerous directions and markets and as it does, one thing is very clear,...

Full Story »

Google Dandelion to Popularize Geothermal?

Geothermal energy is pure perfection for heating and cooling homes in climates which are very hot or very cold because the ground...

Full Story »

LANTelligence's CEO on Channel and Contact Center

After a short conversation with Martin Tracey, CEO of Unified Communications Solutions Provider, LANtelligence, we decided to do an interview to...

Full Story »

July 15 2005 Podcast

July 15, 2005

Consumer Digest Article

July 15, 2005

Consumer Digest was nice enough to ask me to write and article for them about VoIP. It was a great deal of fun to do. I received an e-mail from one of their editors named James Tehrani (no relation – that we are aware of anyway) asking if I could write something geared towards consumers and very objective.

I had a great deal of fun and saw how the editorial process in another publishing company works which is always interesting. Their editorial staff is first rate and I have a great deal of respect for the magazine.

Check out the August 2005 issue… the one with the 2006 Sneak Peak cover.



Airplane Cell Phones

July 15, 2005

We are living in a converged world and I am just a converged guy. "The last thing most air passengers want is to be forced to listen to their neighbor chat on their cell phone about their ailments, their dating problems, the latest reality TV show or up-to-the-minute estimates of time of arrival," says Rep. John Mica, chairman of the House Transportation and Infrastructure's subcommittee on aviation. Today his panel was discussing whether we should have cell phones on flights. Perhaps Blackberries should be allowed but not phones was one of the discussion points.

Cisco VoIP Flaws

July 15, 2005

Cisco recently released fixes for security flaws in its CallManager product line. Flaws are of various types from resource leaks to weak resistance to malformed packets. There is also sensitivity to denial of service attacks. The impact of these vulnerabilities are potential breaches of confidentiality, higher CPU utilization, and potentially phones not responding.

I wonder, will Cisco be the hacker target in the VoIP world that Microsoft is in the PC world?

TMCnet in Top 4,000 Sites in World

July 14, 2005

Recently, thanks to loyal readers like yourself, TMCnet crossed the 4,000 mark meaning our site is in the top 4,000 sites in the world. This is according to Alexa, a division of Amazon.com. Sites are ranked by both unique visitors and page views over time with penalties going to sites that bring momentary spikes in traffic.

We are honored to be in this elite group of the world’s top web sites and are noticing that on many days of the week, TMCnet’s traffic is in the top 2,500 sites in the world!

If you want to track how websites rank quickly, download the Alexa toolbar and see for yourself. Here is a large graph of TMCnet’s ranking growth over the years.

To facilitate this amazing growth we have turned to web hosting for some of our content, ordered a T3, and we are adding new content servers to our network on a regular basis.

Next week we unveil a brand new TMCnet which has been under development for many months.







Jack Welch on China

July 14, 2005

More On BellSouth Vonage Purchase

July 14, 2005

Mark Evans does some great analysis of the rumor I reported on yesterday of BellSouth buying Vonage. Does it seem logical to me that each Vonage customer is worth $4,375? No way. My editorial team beat the bushes looking to confirm this story and as you might expect BellSouth had no comment.

An area that Mark didn’t explore in this blog post is the hype surrounding XM and Sirius satellite radio.

BellSouth to Buy Vonage

July 13, 2005

E911 and VoIP Deadline

July 13, 2005

Playing with FireFox

July 13, 2005



I have been using FireFox more and more recently and was amused to find out
that when I went to Microsoft Office
Update
I was told I need to use IE to download the required patches. I am
no expert on monopolies but there seems to be something unfair about being
forced into having a copy of IE on hand to make sure you can upgrade your
software.



The same thing holds true for Windows
Update
. I would think the EU and the DOJ/FTC would be up in arms about such
practices.



Here is the e-mail regarding a security flaw in Office that started me down
this path:



 National Cyber Alert System



 Technical Cyber
Security Alert TA05-193A



 Microsoft Windows, Internet
Explorer, and Word Vulnerabilities



 Original release date: July 12, 2005

 Last revised: --

 Source: US-CERT



Systems Affected



 * Microsoft Windows

 * Microsoft Office

 * Microsoft Internet Explorer



 For more complete information, refer
to the Microsoft Security

 Bulletin Summary for July, 2005.



Overview



 Microsoft has released updates that
address critical vulnerabilities

 in Windows, Office, and Internet
Explorer. Exploitation of these

 vulnerabilities could allow a remote,
unauthenticated attacker to

 execute arbitrary code on an affected
system.



I. Description



 Microsoft Security Bulletins for July,
2005 address vulnerabilities in

 Windows, Office, and Internet
Explorer.




















































































Featured Events