Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

2018 (Likely Wrong) Predictions

Last year, I refrained from making any telecom predictions.   And no one complained.  And this year I was content to continue down...

Full Story »

20 Years Later, Dialpad Disrupts Communications Again

History was made this week As Dialpad launched a free version of their UCaaS platform for up to five users. This amounts...

Full Story »

MegaPath Leverages Years of Experience to Lead in SD-WAN

MegaPath is in a unique position in the SD-WAN space as they were on the leading edge of the MPLS curve...

Full Story »

Value Added Services In IoT

A couple of months ago, I had the opportunity to speak at TechXLR8 Asia in Singapore.  It was a dynamic conference covering...

Full Story »

TELoIP Brings SD-WAN to Companies of All Sizes

The market predictions for SD-WAN growth show a hockey-stick. What is most interesting about this growth is it’s literally across the spectrum...

Full Story »

SD-WAN is Booming and Airespring is Providing its Customers Innovative Solutions

SD-WAN is eating the WAN, cloud and IP communications all at once. We’ve all seen the amazing projections of market growth but...

Full Story »

TPx Communications Successfully adds SD-WAN to its Portfolio of Services

IP Communications is just one of the important areas where SD-WAN is making a big impact. One company, TPx Communications got its...

Full Story »

Hypocritical? Apple Comes out as Pro Net-Neutrality

August 31, 2017

Apple, like much of Silicon Valley is pro Net Neutrality. In a letter titled: In the Matter Restoring Internet Freedom sent to the FCC today, the company laid out all the reasons we need an open Internet.

Here are the salient points:

  1. An open internet ensures that hundreds of millions of consumers get the experience they want, over the broadband connections they choose, to use the devices they love, which have become an integral part of their lives.
  2. We work hard to build great products, and what consumers do with those tools is up to them—not Apple, and not broadband providers. 
  3. Consumers must be allowed to access the lawful internet content,applications, and services of their choice.
  4. No paid fast lanes. 




Burning Man Live Stream

August 31, 2017

Coinbase: Killing the Goose that Lays the Golden Cryptocurrency

August 31, 2017

How Bitcoin and the Free Market can Screw up Bitcoin and the Free Market

The beauty of cryptocurrencies and ICOs is there now a way for tech to take on governments and allow consumers access to an alternative to government controlled “money.” Bitcoins and related currencies are a libertarian dream – allowing people from repressed countries such as Argentina, China and others to take their money out of these financial prisons if they so choose.

In 2013 we detailed the 15 reasons bitcoins were better than gold, we then reiterated it is Gold 2.0.  In January of this year we charted Bitcoin according to the Tech Hype Cycle and predicted the price would break out based upon how technology adoption works.

Google Could Lose it's Trademark

August 21, 2017

Is Google a generic term like KleenexDumpster and Realtor- unworthy of protection with a trademark symbol? The case is pending.

Dr. Wikipedia tells us:

A trademark is said to become genericized when it begins as a distinctive product identifier but changes in meaning to become generic. This typically happens when the products or services with which the trademark is associated have acquired substantial market dominance or mind share, such that the primary meaning of the genericized trademark becomes the product or service itself rather than an indication of source for the product or service. A trademark thus popularized has its legal protection at risk in some countries such as the United States and United Kingdom, as its intellectual property rights in the trademark may be lost and competitors enabled to use the genericized trademark to describe their similar products, unless the owner of an affected trademark works sufficiently to correct and prevent such broad use.



Tesla Model X Beats Lamborghini Aventador

August 21, 2017

Lambo Engineers Should be Hiding Under Rocks



Having your supercar beaten by an SUV is beyond embarrassing. Heads should be rolling all over the supercar word.



Tesla also just established the world-record for the fastest quarter-mile for an SUV, 11.418 seconds while beating a Lamborghini by 0.05 seconds. The Lambo ended up passing the Model X P100D immediately after.



There are a few shocking things to note. How much higher do you think the coefficient of drag is for the Silicon Valley SUV.







Ellen Pao and California Senate Point to a Huge Valley Harassment Problem

August 21, 2017

Ellen Pao has a new book coming out "Reset." you might recall she was a poster child for Silicon Valley sexual harassment a few years ago in her lawsuit   against Kleiner Perkins which she ended up losing.

But back to her book. A fascinating excerpt follows:

Once we were airborne, the CEO, who’d brought along a few bottles of wine, started bragging about meeting Jenna Jameson, talking about her career as the world’s greatest porn star and how he had taken a photo with her at the Playboy Mansion. He asked if I knew who she was and then proceeded to describe her pay-per-view series (Jenna’s American Sex Star), on which women competed for porn-movie contracts by performing sex acts before a live audience.

“Nope,” I said.




Intermedia Anti-Phishing Tools for Small Business

August 21, 2017



Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor which gives them access to your passwords or perhaps they could start installing ransomware.

All a company can do is be as protected as possible. One way to achieve this is with strong anti-phishing tools - similar to the ones rolled out by Intermedia last week.

The company says they have unveiled Enterprise-grade anti-phishing protection, designed for SMBs - otherwise knows and small and medium businesses.

The new Intermedia Email Protection features include:

  • Similar domain check: Spear-phishing campaign authors will typically register an email domain that looks 'similar' to a company's email domain (e.g., iintermedia.net with two i's instead of intermedia.net). Intermedia's domain check feature uses a similarity algorithm to confirm that the sending domain is in fact is someone from within the organization.
  • User impersonation check: Spear-phishing attacks target specific employees within an organization, by impersonating someone they know – most typically the CEO or other high-profile individuals.








Maybe Net Neutrality Needs to Apply to Silicon Valley

August 21, 2017

In the debate for net neutrality, its been left versus right for about a decade. Silicon Valley, and Democrats are for net neutrality while conservatives are for free markets with minimal government regulation.

The biggest argument advocates of net neutrality use is they fear for a world where unregulated ISPs are able to throttle and block content they don't agree with or that which is competitive.

Last month, Google, Facebook and Spotify among many others worked together to participate in a June 12 Internet-Wide Day of Action in support of net neutrality.

Organized by Fight for the Futurefreepress, and Demand Progress, the event precedes a July 17 deadline for public comment on the FCC's proposed changes to net neutrality rules, originally designed to prevent huge internet service providers from creating internet 'fast lanes' that deliver content from some owners at higher speeds (and potentially higher costs) than that of others. In his new role as head of the FCC, former commissioner and Verizon lawyer Ajit Pai has quickly mobilized efforts to roll back the Obama-era protections, among other things, arguing that the regulations will inhibit investment and innovation in the field.

Interestingly net neutrality proponants are generally associated with the antifa movement - the communist group which says it represents anti-fascism.

So there we have it - the left wants net neutrality rules so the government can ensure corporations can't keep sites they don't agree with, off the internet.









How Technology can Eliminate White Supremacy

August 17, 2017


As our country is mired in race debates, it's interesting to see how technology has inadvertently begun to actually reduce the number of white supremacists.

When researching how many white supremacists there are in the US, you find that there aren't any accurate surveys on the matter. Apparently, inbreeding makes it difficult for these people to read survey forms.

The closest number we could find is 5,000-8,000 people in the US who are part of the KKK or about .003% of the population if we use the high end of the range.

What gets really interesting is that thanks to quick and simple DNA testing white supremacists can now determine just how white they are.

The results have been shocking as 2/3 of them have found they aren't pure white.

Irony of ironies - the odds are 2:1 that the average cross-burning moron actually isn't what they think.

This of course has led many people in these groups to question the tests. It must be some conspiracy that just 2/3 of of the people tested in their "group" are impure while 1/3 are. Obviously, many of these people need to loosen their sheets to reduce the brain damage associated with oxygen deprivation.

Bottom line - technology now exists to take a population of perhaps 6,000 KKK members and knock the number down to to a mere 2,000 or the amount of people who went to our high school.

So far, 153 people in these groups have posted their results.
















The Long Tail of Cybersecurity

August 9, 2017

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.

The online world made this possible. Try as they might, Barnes & Noble could not match the inventory of Amazon in all its stores. Online wins because inventory is near-infinite.



In the cybersecurity world there is is a similar phenomenon taking place. The same bell curve applies but in this case, we can assign it to the value of a target.





Featured Events