Rich Tehrani : Communications and Technology Blog -
Rich Tehrani
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space


How Tech Helped Nab the Austin Bomber

March 21, 2018

As tech permeates a greater part of all our lives, it is becoming more and more difficult to pull off a large-scale string of bombing without getting caught. Case in point, the Austin Bomber whose name we will intentionally not release was caught in part thanks to video evidence at a FedEx store, store receipts and suspicious Google search history.

The bomber blew himself up as authorities closed in.

The bomber who was an unemployed college-dropout killed two and injured four leaving package bombs on doorsteps, one with a tripwire and one shipped via FedEx. Authorities do not know at this moment if others were involved or more packages are out there so if you see something suspicious please dial 911.

Hopefully the rapid pace at which law enforcement was able to find the bomber thanks in-part to technology will serve as a lesson to the next would-be bomber that you will be caught quickly.

From a civil libertarian perspective one wonders how ethical or even legal it was to acquire "suspicious" search history. The ACLU hasn't made any statements yet... We'll see if the media covers this angle going forward.

What We Got Wrong and Right in our 2017 Predictions

March 20, 2018

On December 9, 2016 we made the following predictions. Some we realized were ahead of their time but we figured, it was worth taking a risk. Topics ranged from tech to the economy and even the strength of the dollar. We've scrutinized our results.

EU GPDR Devastating to AI

March 15, 2018

Very important guest blog post originally found on Techzone360.

Last September, a U.K. House of Commons committee concluded that it is too soon to regulate artificial intelligence (AI). Its recommendation comes too late: The EU General Data Protection Regulation (GDPR), which comes into force next year, includes a right to obtain an explanation of decisions made by algorithms and a right to opt-out of some algorithmic decisions altogether. These regulations do little to help consumers, but they will slow down the development and use of AI in Europe by holding developers to a standard that is often unnecessary and infeasible.

Although the GDPR is designed to address the risk of companies making unfair decisions about individuals using algorithms, its rules will provide little benefit because other laws already protect their interests in this regard.

FCC CTO Eric Burger and TMC CEO Rich Tehrani to Keynote Ideacom 2018

March 4, 2018

The pace of change in technology continues to increase and if your company generates its income from helping customers deal with these advancements, it's up to you to stay on the cutting edge of technology. Moreover, you need a general awareness of the regulatory environment and what issues are being addressed by the federal government; now and in the future.

It’s why we’re thrilled to announce that Yours Truly (Rich Tehrani) will be giving a keynote presentation at the Ideacom 2018 conference in Washington DC, April 8-10, 2018. The focus of our presentation will be on what resellers and MSPs need to know to adapt to the changing technology landscape.

As Enterprise Tech Buying Habits Change, Are You Ready?

January 17, 2018

Thomas Saueressig, SAP SE’s 32-year-old chief information officer, looks for commitment when evaluating vendor pitches. Technology firms that get his attention are those “with which I feel confident I can build a long-term strategic partnership,” Mr. Saueressig, one of the corporate world’s youngest CIOs, told CIO Journal's Angus Loten in an email.

That kind of brand loyalty is far less important to older IT buyers, according to new research by Spiceworks Inc., a networking platform for IT professionals, which identified key generational differences in how enterprise IT buyers find and engage with technology vendors. At the end of 2016, the number of millennials in the U.S.

Digital Transformation Helps Lockheed Martin go Hypersonic!

January 16, 2018

Digital Transformation is becoming the buzzword of the decade and its meaning is rather broad. We like to call it the application of the latest computing technology to improve business processes. More specifically, using cloud, AI, cognitive computing, mobile, IoT, big, data, and other tech like chatbots and APIs. The list of technology is really never-ending, we could have added sharing economy, autonomous vehicles, smart cities, smart buildings, mesh networks, blockchain and so on.

Practically speaking, companies need to disrupt themselves or become new disruptors depending on the age of the organization.

Chelsea Manning: Top U.S. Traitor and Leaker, May Become Senator

January 13, 2018

History Will Remember the U.S. Government as Going too Easy on Hackers and Leakers

Photo courtesy of AP

The United States made a nuclear deal with Iran and also paid a ransom to have numerous American hostages/prisoners returned. In exchange, billions of dollars changed hands.

Media and Obama Responsible for HBO Hack?

November 19, 2017

There is a direct trail from the U.S. media to the hack of HBO and many others. Of course the media isn't alone. It had an accomplice in the Obama administration that had an opportunity of a lifetime to put a stop to or at least slow down international hacking into the U.S.

In August of last year, we reported the Obama administration was preparing to elevate the stature of the Pentagon’s Cyber Command, signaling more emphasis on developing cyber weapons to deter attacks, punish intruders into U.S.

Facebook Fights Revenge Porn With Dumb Idea

November 7, 2017

Facebook is testing new technology that is designed to help victims of revenge porn acts.

This new tool is currently being tested in Australia, and the company says it plans to expand it to other countries if everything goes well.
It works on a database of file hashes, a cryptographic signature computed for each file.

Facebook says that once an abuser tries to upload an image marked as "revenge porn" in its database, its system will block the upload process. This will work for images shared on the main Facebook service, but also for images shared privately via Messenger, Facebook's IM app.

If we understand this correctly, if this works as planned, the world's most desirable people, looking to protect their nude bodies, will be uploading their photos to a single location, making it without a doubt, one of the biggest targets ever in the history of hacking.

Sure, Facebook says it's not storing a copy of the photo, but only computing the file's hash and adding it to its database of revenge porn imagery.

Hackers Now Threaten Death to Schools and other Types of Extortion

October 24, 2017

Hackers are now breaking into schools which typically have lax security relative to corporations and once in, they access student information and use it to threaten death to students. Mentioning Sandy Hook - a horrific school shooting in Connecticut, a hacker group named Dark Overlord looks for up to $150,000 in bitcoin to destroy personal information which was stolen.

In a Facebook post, 

Sheriff Chuck Curry of Flathead County Sheriff's Office in Montana shared the following information:

For Immediate Release – Update on Cyber Terrorism Case – Monday

As the joint investigation into the cyber terrorism case has progressed, further information has come to light.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 69 Next
Featured Events