Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Broadband

3Jam Purchased - is it Skype?

May 4, 2011

The news just broke on TMCnet that 3Jam was purchased - and potentially by Skype. Interesting news as I have written about how TMC uses 3Jam at ITEXPO to coordinate our management team and communicate rapidly between groups. The beauty of the service is it allows you to text to a group and have a single virtual SMS number you respond to which forwards messages to everyone in the group.

Interestingly David Gurle of Skype - General Manager and Vice President of its Skype for Business unit is keynoting the next ITEXPO in Austin, Texas Tues, Sept 13, 2011 at 4:30 PM. It will be interesting to get his thoughts - of course by then the details of the purchaser will most likely be out.

Oh and one bit of concern is the news that the service will soon be shut down - hopefully the acquirer will continue it.



Bin Laden's Death, Mobile and Social

May 2, 2011

In the wake of bin Laden's death it is worth reflecting on how consumers learned about the incident which was first live reported by Sohaib Athar - an unsuspecting bin Laden neighbor who tweeted the fact that he heard a helicopter and a subsequent window-shaking bang - a rare event as he called it.



Later, a commenter @naqvi on Twitter made the connection to these events and the Obama press conference which confirmed what had happened.

Of course later - the hard news and analysis did come from the mainstream media (MSM) - with lots of commentary from the social world. GigaOm has thoughts on how social and the MSM are connected.

What is most interesting to me however is the cheering which took place at a baseball stadium when the crown learned about the bin Laden news - specifically there was TV coverage of how people in the crowd were scanning their cell phones for the news and sharing it with others in the crowd. The video below gives you a small idea of other coverage I have seen.

The concept of news circulating via social faster than TV is not something we haven't discussed before - but this this stadium example of a large group learning about an important event via people at the center of informal social circle shows you how news dissemination and the web has evolved over the years.











How to Watch The Royal Wedding

April 28, 2011

China Patent Wars: Huawei Sues ZTE

April 28, 2011



Huawei today filed lawsuits in Germany, France, and Hungary against ZTE a fellow Chinese manufacturer of telecom equipment - with strength in 4G/LTE technology among others. The interesting point here is the company is being sued for patent and trademark infringement and what this shows us is a greater concern for patents and trademarks in China. At least from Huawei.

According to the company, they paid US $222 million themselves in patent licensing fees to obtain the legal right to use patents and technologies of other companies in the industry. In fact TMCnet reported two weeks ago that Huawei and Motorola Solutions settled patent disputes.

This is great news as Huawei had a reputation years back for copying technology from companies like Cisco and after losing a  court case they seem to have become more serious about patents and trademarks.

Last month I pointed out how a sales boom for tech and media is being unleashed by China as a result of it announcing 3,001 people have been arrested for rampant product piracy and seized fake or counterfeit medicines, liquor, mobile phones and other goods.

This is all great news for western companies who have invented technology which China wants to and will continue to use.









Amazon EC2 Outage: What The Experts Tell Us

April 27, 2011

The recent Amazon outage of its EC2 service affected a number of leading-edge companies who in some cases used the fact that they housed little to no infrastructure on their premise as a selling point to investors. Certainly, the cloud computing market is in what we could call a post-evangelism phase where there seems to be universal agreement that the cloud has a role in most organizations – at least to help with some tasks – if not all. We know the concept of hosted solutions isn’t new – many companies outsource payroll for example or tax preparation.

But certainly, when the largest company providing cloud infrastructure has a major outage of one of its availability zones lasting days,  it’s time to sit back and reflect on the challenges of moving wholesale to the cloud without thinking the concept fully through.

Apple Responds to Locationgate

April 27, 2011

With the controversy surrounding the data being gathered by smartphones with Apple and Google operating systems, Apple has decided to come out with an explanation of what exactly it is doing and why. Here are the salient points of what they call a location Q&A:

  • Apple says it does not track the location of your iPhone, and it never has or will do so.
  • The reason this has become an issue is companies such as Apple haven’t done a good job explaining the complex technical issues at work.
  • Apple is maintaining a database of WiFi hotspots generated by tens of millions of devices sending encrypted information regarding the location of hotspots so as to be able to provide accurate location information when GPS satellite tracking information is not available. It cites usage in a basement as an example of why it needs to do this.
  • This crowd-sourced database is too large to fit in an iPhone but a subset of it is stored on iPhones and can be encrypted or not – based on user settings in iTunes. Researchers were confused by this data which was being backed up onto local PCs – but Apple plans on updating its software soon and at this point it will stop backing up this information.
  • Apple cannot locate a user based on its geo-tagged WiFi information.
  • Apple has been storing up to a year’s worth of location data and the company says this is a bug and going forward they will only store seven-days’ worth of location information.
  • Another bug according to Apple is the device continued to update WiFi and cell tower data from the crowd-sourced database even if location data was turned off.
  • Apple is collecting crowd-sourced traffic data in order to provide accurate traffic data for its users.
  • Apple provides anonymous crash data to third-party developers and the company’s iAds platform allows anonymous geotargeting of ads but requires user approval before sharing location data with an advertiser.

Super WiFi Hotspot Gives 3 Mile Range

April 19, 2011

One of the absolutely most disruptive technologies I have seen is Super WiFi and although, until now, the technology has been more theory than practice, there is a grandmother in Texas named Leticia Aguirre who has lit up a hotspot in her house with a range of three square miles – an absolutely staggering distance. Utilizing dynamic spectrum access the network shifts automatically between WiFi and a dormant digital UHF TV channel to provide the ideal coverage characteristics.

Organizations involved in this trial are Rice University, Houston nonprofit Technology for All (TFA) and the NSF who provided a grant to incorporate super WiFi into the network.

Coincidentally, this September will see the second occurrence of the world’s only Super WiFi Summit which will be cohosted by TMC where I am CEO and Crossfire Media where Carl Ford is a founding partner.

Which Kills More Jobs - The iPad or US Politicians?

April 18, 2011

Rep. Jesse Jackson Jr. recently went on a rant discussing how the iPad is produced in China and is responsible for killing jobs and is responsible for Borders going bankrupt. He continued to rail against universities who have adopted the iPad instead of text books. He went on to wonder what happens to publishing company and librarian jobs in such an environment.

The question on our minds must be why is the iPad the focus of his concern and not the digital camera which caused Kodak to go into a tailspin and local photo shops around the country to close down? Why not target IBM for inventing the mainframe and making it possible to use vacuum tubes and later microprocessors instead of humans using pencil and paper.

President Obama Needs to be at ITEXPO

April 15, 2011

I recently learned that President Obama isn't happy with the old White House telephone. According to Fox News he said:

The Oval Office, I always thought I was going to have really cool phones and stuff," he said during a small fundraising event at a Chicago restaurant. "I'm like, c'mon guys, I'm the president of the United States. Where's the fancy buttons and stuff and the big screen comes up?



Is Android Security Really an Issue?

April 15, 2011

Yesterday I showcased an interview with investing legend Roger McNamee, managing director and co-founder of Elevation Partners but what I didn't mention was the following comment he made, "I don't trust Android because some 16-year-old kid in the Eastern Bloc presses a button and erases everyone's hard drive."

McNamee also made a call to short Google as a pairs trade with buying Apple the day before the stock of the search leader dropped almost $50 or 8% after missing their earnings number.


But just as interesting is another big piece of news which has to do with Skype responding to an Android vulnerability which has to do with unencrypted SQLite information on the device which can be accessed by malicious software. Of course the challenge is - what software is malicious - it certainly isn't advertised as stealing data in its description in app stores. Moreover, in this case, the issue seems to be Skype not setting file permissions appropriately to avoid data from being hijacked.

Of course when I read about the controversy I thought of the comments about the 16-year-old kid.

And at a time when Android is so popular - in fact in South Korea there is an antitrust complaint against the company - one wonders, what happens if McNamee is right and the platform isn't so secure?

But then again, any platform with a degree of openness and massive adoption is a major target of hackers and if our experience with Microsoft products is a solid guide, we can expect more Android vulnerabilities to surface and potentially frequent patches to be released to counteract them.












Featured Events