Rich Tehrani : Communications and Technology Blog -
Rich Tehrani
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space


ISIS Brings Flip-Phone to Crowd-Sourced Cyber-Hacking Fight.

November 19, 2015

Its an interesting world we live in where a group like Anonymous which likely wasn't thought very highly has become a savior thanks to their efforts to combat ISIS. The Obama administration, Putin and the rest of the world which has lost their citizens to ISIS may have done less to hurt this organization in 18 months than Anonymous has done in a few days of fighting this organization.

President Obama has said repeatedly and so has Hillary Clinton that we are fighting an ideology. So any logical and sane person would put two and two together and figure out if ISIS is using social media extremely well to spread their ideology, then maybe we should shut down their twitter accounts, right? Doesn't the CIA and NSA have tens of billions of dollars at their disposal to keep the US safe?

BuckleMate Reduces Teen Injuries Through Smart Monitoring

September 24, 2015

You really need to have nerves of steel when you give the car keys to your teen child for the first time. At that very moment, a parent can have a traumatic episode where they remember their child's entire life while simultaneously reliving every near-miss collision and accident they've ever witnessed or been involved in.

The good news is, technology allows new and innovative solutions to this problem most every parent may have to face at one time or another. Specifically, BuckleMate was founded by Jeffrey Miller who serves as CEO, to deal with this issue. The following interview goes into detail regarding how his company can help make teen driving a safer endeavor and perhaps it can become simultaneously less traumatic.

Tell me about BuckleMate – how did the idea come to you?

I came across a product about 5 years ago that would force drivers to Buckle their seat belts. 

VoicePIN Voice Biometrics Brings New Tech to Phone and Apps

August 31, 2015

The biometrics market has been around for decades but never achieved widespread acceptance until after Apple rolled out TouchID. Laptop makers flirted with the technology about a decade ago but never got their systems to work very well. Apple – to its credit, released a solution which is very good.

Lasers are the Future of Drone Fighting

August 31, 2015

I’ve been among the first people to realize how drones can be a major problem for security in the world. In February 2014, in fact, I said there was a coming urban drone war and since then, drones with guns and explosives have been created. More recently I wrote about drones almost being used to attack federal buildings in Connecticut – thankfully without success and how a drone flew to the White House. I even wrote about a possible solution to the problem using microphones from SmartSense.

Clinton's BYOD Phones, E-mail Server May Achieve Bin Laden's Goal

August 20, 2015

One of Osama Bin Laden’s goals was to assassinate president Obama in order to get Joe Biden promoted to president.

Said Bin Laden:

Obama is the head of infidelity and killing him automatically will make [Vice President] Biden take over the presidency. . . . Biden is totally unprepared for that post, which will lead the U.S.

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

August 17, 2015

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front of them to make your system less attractive. In addition, malicious users have become experts at writing code which varies its port usage and encrypts packets to be virtually invisible to many of today’s forensic tools as they hide in normal traffic flows.

Moreover, breaches typically start with a break-in or infiltration, then there is reconnaissance and finally, exfiltration.

SDN and Micro-Segmentation boost Security for BYOD According to AirWatch/VMware

June 8, 2015

The proliferation of mobile devices and cloud services has caused a geometric increase in security threat possibilities as each device type and OS version can potentially be vulnerable. In addition, these devices need access to more and more cloud information – which means even more opportunities for attackers to hitch a ride along a VPN tunnel and then move laterally in the data center in the search for information to harvest or other damage to cause.

Some people questioned the acquisition of AirWatch by VMware as BYOD and MDM live in a space far removed from virtualization. The benefits of the deal however are beginning to come to fruition as the company has shown its grand vision of allowing mobile devices access to specific information in the corporate data center.

The Drone War Hits the White House

May 14, 2015

A man was just detained outside the White House for trying to fly a drone over the fence. It is too soon to know the intentions of the flyer but this is something I have warned about for some time. I first sounded the alarm over a year ago in a piece titled the Coming Urban Drone War. the challenge is as time goes on, the flying range of drones will increase meaning the ability to stop people from flying them by visually seeing them and taking action, will cease.

There may be technological solutions to the problem such as SmartSenseCom but it it unclear if it was used or would have been able to detect this threat soon enough.

In the end, the only solution to incoming drones being flown at targets from three-dimensions is to have security drones as a barrier which take out the bad drones.

The One New Anti-Theft Idea Apple Needs

May 13, 2015

I left my iPad Air 2 and a case in the glove compartment of Hertz rental car. I am a loyal Hertz customer but this is the second time I have left something of value in the car only to see it disappear very quickly after the car was returned. They told me lost and found was closed when I returned shortly after I realized it was missing. They said come back in the morning, which I did to find they couldn't find the item.

Expect Security Funding Bubble to Pop in 3-5 Years

March 26, 2015

Security is one of the hottest areas in tech right now. Indeed, there is infinite possibility in this space because technology inherently has weaknesses and malicious actors seem to always be a step ahead of users and software companies. I see many funding announcements and lately the amount of money flowing into security seems to be setting us up for a bubble burst at some point in the next half-decade or so.

I won't point out any specific companies because I do not think it is fair to single them out. And I certainly can't list all the companies which have been funded.

The opportunity in this market isn't the issue, it's just difficult to understand how so many new players will be able to carve out niches for themselves which will allow them to boost sales to the point that they justify the lofty valuations commensurate with the currently perceived opportunity.

Say that ten times fast.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 64 Next
Featured Events