Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

police tag

Drill down on police search:

7 result(s) displayed for police (1 - 7 of 7):

Is TomTom the Most Unethical Company in Tech?

Recently, reports have surfaced that GPS manufacturer TomTom sold the information it collected regarding the speed of its customers to the government of the Netherlands so they could set up speed traps. In short, as a customer of TomTom in...

Terrorist Umar Farouk Abdulmutallab a Social Networker

It seems there is a good chance Islamic terrorist Umar Farouk Abdulmutallab, the Nigerian national linked to Al Qaeda in an attempt to blow up a Detroit-bound airplane was an active social networker. On the Internet, he looked for guidance...

Ooma Telo Coming Soon

When I last caught up with Ooma in New York I had a chance to learn about their slick new Telo device which looks like a blend of art and communications. I have always been a fan of Bang &...

Major Spanish Hackers in Jail

Few things make people as happy as knowing hackers have gone to jail -- especially when the people going to jail are some of the most active hackers on the internet. While reading a story on the subject, I learned...

Phone Vs. Taser: Phone Wins

When a thief wielding a Taser entered the Alaskan home of a grandmnother, she faught back with her phone and eventually chased the thief away. Apparently she thinks she was Tasered but somehow didn't fall down. One wonders about this...

Skype Foiling German Police

VoIP has reduced the cost of phone calls worldwide allowing many the ability to speak with others at a low cost or even for free. Because of IP communications in fact, there has also been a business productivity renaissance. When...

P2P Identity Theft

Boy are those hackers are creative is all I could think when I learned a person used LimeWire to steal personal information such as tax returns from people’s computers. The hacker subsequently used this information to commit identity theft....
Featured Events